www.upc.ch

The website www.upc.ch which is a trustful provider for internet, telephone, and TV is blocked by Avast Security for Mac OS version 13.11 with virus definition 18092704.

You can report a suspected FP (File/Website) here: https://www.avast.com/false-positive-file-form.php

There is a browser hijacker of sorts there - -https://127.demdex.net script -https://127.demdex.net/event?d_nsid=0&d_ld=_ts%3D1538137287622&d_rtbd=json&d_jsonv=1&d_dst=1&d_cb=demdexRequestCallback_0_1538137287622&c_ch_referrer=&c_ch_hash=&c_ch_host=www.upc.ch&c_ch_hostname=www.upc.ch&c_ch_pathname=en%2F&c_ch_protocol=https%3A&c_ch_pageName=homepage&c_ch_channel=Homepage&c_ch_events=event9&c_ch_server=www.upc.ch&c_ch_eVar3=homepage&c_ch_eVar13=New&c_ch_eVar16=1%3A00PM&c_ch_eVar17=Friday&c_ch_eVar18=Weekday&c_ch_eVar25=Consumer&c_ch_eVar27=Direct&c_ch_eVar50=nc&c_ch_eVar73=Direct&c_ch_prop1=en&c_ch_prop9=visit%20start&c_ch_prop13=New&c_ch_prop16=1%3A00PM&c_ch_prop17=Friday&c_ch_prop18=Weekday&c_ch_prop23=Homepage&c_ch_prop24=Homepage&c_ch_prop25=Consumer&c_ch_prop30=en&c_ch_prop39=landscape&c_ch_prop64=Appm%202.4.0%20-%202017-12-01%20(DTM)&c_ch_hier2=Homepage
[demdexRequestCallback_0_1538137287622({})]

where we have a code error for

-127.demdex.net/
status: (referer=-http:/XXX/web?q=puppies)saved 17411 bytes c3c692fe8f5c04af4132e6fe54e5561ffe3bd605
info: [script] -127.demdex.net/portal/common/scripts/jquery/jquery-2.0.0.min.js
info: [script] -127.demdex.net/portal/common/scripts/plugins/jquery.cookies.2.2.0.min.js
info: [script] -127.demdex.net/portal/common/cui/2.14.0/js/coral.min.js
info: [decodingLevel=0] found JavaScript
error: undefined variable clearTimeout *
error: undefined function d[m]
error: undefined variable d
error: line:3: SyntaxError: missing = in XML attribute:
error: line:3:
error: line:3: …^
file: c3c692fe8f5c04af4132e6fe54e5561ffe3bd605: 17411 bytes
* using clearTimeout with an undefined or null value.

2 vulnerable libraries: https://retire.insecurity.today/#!/scan/22ac64ea6c9cf3ca9b6558fa8971a988274086da6160a3b8c111dae7c670f44b

How attackers can exploit this: https://github.com/jquery/jquery/issues/2432 Info credits go out to: dmethvin & homakov,
both jQuery researchers on Github

error for -https://www.upc.ch/etc/designs/upc-generic/js/jquery.min.a07af932cf9c2785869aaab701504f0d.js
[/quote]
-www.upc.ch/etc/designs/upc-generic/js/jquery.min.a07af932cf9c2785869aaab701504f0d.js
status: (referer=-http:/XXX/web?q=puppies)saved 123508 bytes 1ea1fa54da36d3fdd43630a843617d4a1dc0a38a
info: ActiveXDataObjectsMDAC detected Microsoft.XMLHTTP
info: [decodingLevel=0] found JavaScript
error: undefined variable cI
file: 1ea1fa54da36d3fdd43630a843617d4a1dc0a38a: 123508 bytes
[/quote]
Read background on error: https://expressionengine.com/forums/topic/234582/ci-news-tutorial-undefined-variable-error
& error on -www.upc.ch/etc/designs/upc-generic/js/cq-combined.min.89d98950ec6218c1bcadedc8da9a56e8.js

-www.upc.ch/etc/designs/upc-generic/js/cq-combined.min.89d98950ec6218c1bcadedc8da9a56e8.js
status: (referer=-http:/XXX/web?q=puppies)saved 123930 bytes 440292bf7563dc73c509b55f4b0f8fe8cacc15d0
info: ActiveXDataObjectsMDAC detected Microsoft.XMLHTTP
info: [decodingLevel=0] found JavaScript
error: undefined variable cB
file: 440292bf7563dc73c509b55f4b0f8fe8cacc15d0: 123930 bytes

polonus (3rd party cold reconnaissance website security analyst and website error-hunter)

Hi,
I can visit the site without any problem, so perhaps it was already fixed? If you still have trouble accessing the website, can you post a printscreen of the detection please?