Well there was a link there i=on that page which if you clicked it took you to the proof of concept and it may have been that demo exploit that is getting trapped. But vv.cc domain doesn’t come out too clean on reputation, in this case seems related to another sub-domain but the whole domain appears to get tarred with the same brush http://www.mywot.com/en/scorecard/sator.vv.cc as it inherits the main domains rep.
Also see http://www.urlvoid.com/scan/vv.cc.
Edit: Even if you manage to get round the various blocks the file system shield as the fall back option alerts on it, so I rather doubt it is an FP, how it is being launched from that geek.com is the thing, perhaps what they are on about an exploit. But I doubt that to as this doesn’t appear to follow the webgl flaw.
See file properties from the avast chest.
Also see VT results, 19/42 hits, http://www.virustotal.com/file-scan/report.html?id=11ddae8d130b42d2814fab54b5edae4d1157f68c2dd8c7d6ff53f1fe56158e9d-1305322841