These vulnerabilities import JavaScript from bad sources that are not necessarily owned by the page owner. For more details, see http://blog.securitee.org/?p=255.