Wysiwyg - a PHISH - tries to run scripts of unvalidated origins...

Re: https://urlquery.net/report/06dbe376-0187-4102-b6be-73d99bde4ca2
Re: vuln. library to be retired: http://retire.insecurity.today/#!/scan/14dc3fddad19a75f51ba5756437eddcc2dc9b1dcfca0c66c7db81deb0552ecb0
Errors in the code

wXw.ledsandcompany.com/skin/frontend/default/saphi/js/jquery-1.7.2.min.js benign
info: ActiveXDataObjectsMDAC detected Microsoft.XMLHTTP
info: [decodingLevel=0] found JavaScript
error: undefined function p.getElementsByTagName
error: undefined variable p
https://aw-snap.info/file-viewer/?protocol=secure&tgt=www.ledsandcompany.com%2Fjs%2Fvarien%2Fform.js&ref_sel=GSP2&ua_sel=ff&fs=1
Risk rate of default.cgi page: http://toolbar.netcraft.com/site_report?url=http://46.255.106.103
Buffer underrun vuln. on Apache/2.4.16 Unix OpenSSL/1.0.1e-fips mod_bwlimited/1.4 exploit
See overflow here: http://www.domxssscanner.com/scan?url=https%3A%2F%2Fwww.ledsandcompany.com%2Fskin%2Ffrontend%2Fdefault%2Fsm_saphi%2Fjs%2Fjquery-1.7.2.min.js
to hxtp://michelemateusphotography.com & -: hxtp://www.neatanswers.com/includes/neatanswers.js /=-amazon-ad-widgets

polonus (volunteer website security analyst and website error-hunter)