Benign or unknown_html abuse aka redirecting to clickjacking site

Benign or unknown_html abuse at 208.87.35.30 blord dot com
Content returned by request for: htxp://exclusiverewards.blord.com/


1: < sc​ript >
2: "FLUredirectnrUS.html" && (window.location="FLUredirectnrUS dot .html"); (clickjacking site similar to that found in Facebook spam posts)
3: < / sc​ript > < !-- Mini 1358778327 --> 

See: http://www.scumware.org/report/208.87.35.30
A deeper dive into this issue: http://thenewfr0ntier.blogspot.nl/2013/01/ip-address-188.html (article posted by admin of the New Frontier Information Security in the Age of the Hyperconnected)
Is this clickjacking redirect detected by avast? I think not…see attached image survey 2013

polonus

Another issue of unknown html: https://www.virustotal.com/url/051294a669587ce1c2e868680ed198b5777d0b6daa35a8c2d4933db912041ac1/analysis/
See: http://zulu.zscaler.com/submission/show/0555fedad9fc768d484465becb5b7cf3-1358780695
http://sitecheck.sucuri.net/results/forum.computerweek.it/
Web application details:
Application: vBulletin 4.0.4 - htxp://www.vbulletin.com/ exploitable software: vBulletin version 4.0.4 suffers from a code execution vulnerability.
OpenX ad server installed: hxtp://ad.spreamedia.it/www/delivery/
Leaks in OpenX 2.8.10 will allow attackers to inject malicious code into ads. Abused now on a grand scale!
For update info: http://www.openxtips.com/ (poster Erik Geurts).
See this advisory: https://www.htbridge.com/advisory/HTB23116 (link source info from High-Tech Bridge Security Research Lab),

polonus