Another presentation of just the issues Eddy mentions:
Search results for -sproactiva.cl/intranet.
Total number observed artifacts in database: URLs, HTTP cookies, Flash cookies, HTML5 localStorage cookies, sessionStorage cookies and SSL/TLS checks. Recents scans from a few hours back are listed below.
-http://intranet.com/ 3rd-party 1 Persistent 3 Session 0 Score ?
-http://interact-intranet.com/ 3rd-party 4 Persistent 9 Session 4 Score ?
-http://proactive-internet.com/ 3rd-party 0 Persistent 4 Session 1 Score ?
See: -https://aw-snap.info/file-viewer/?protocol=not-secure&tgt=sproactiva.cl%2Fintranet&ref_sel=GSP2&ua_sel=ff&fs=1
and
https://urlscan.io/result/65fc6ffb-407b-44ae-8270-9ecbe0f9afd0#summaryAnd you are never alone on these BigData domains:
http://domainbigdata.com/50.87.144.108So when there is abuse on that same IP, you can reap the consequences of that as well,
Also consider the results from scanning URL: -http://sproactiva.cl/intranet/javascript/tapmodo-Jcrop-1902fbc/js/jquery.Jcrop.js
Number of sources found: 109
Number of sinks found: 88
jQuery bug with this expression in that very code for that hash was patched
quickExpr = /^(?:[^#<]*(<[\w\W]+>)[^>]*$|#([\w\-]*)$
The quick patch by jQuery is:
- quickExpr = /^(?:[^<]*(<[\w\W]+>)[^>]*$|#([\w\-]*)$)/,
+ quickExpr = /^(?:[^#<]*(<[\w\W]+>)[^>]*$|#([\w\-]*)$)/,
polonus (volunteer website security analyst and website error-hunter)