Websites that do not use standards and best practices vulnerable....

See: https://validator.w3.org/check?uri=http%3A%2F%2Fweigav.com%2F&charset=(detect+automatically)&doctype=Inline&group=0
34 Errors, 15 warnings.
What you acquire you should also retire: -http://weigav.com/
Detected libraries:
jquery - 1.5 : (active1) -http://weigav.com/js/jquery-1.5.min.js
Info: Severity: medium
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4969
http://research.insecurelabs.org/jquery/test/
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
Info: Severity: medium
https://github.com/jquery/jquery/issues/2432
http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/
jquery - 1.5 : (active1) -http://weigav.com/js/jquery-1.5.min.js
Info: Severity: medium
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4969
http://research.insecurelabs.org/jquery/test/
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
Info: Severity: medium
https://github.com/jquery/jquery/issues/2432
http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/
swfobject - 2.2 : -http://weigav.com/js/swfobject.js
swfobject - 2.2 : -http://weigav.com/js/swfobject.js
(active) - the library was also found to be active by running code
2 vulnerable libraries detected

Fail and two warnings: https://asafaweb.com/Scan?Url=weigav.comhttp://toolbar.netcraft.com/site_report?url=http://weigav.com
SQL Security Bypass Vuln forX-AspNet-Version: 2.0.50727 (an oldie from 2008).
OK here: https://sritest.io/#report/424a434d-2aef-4b14-a046-3adf916b650a

polonus