generally avast is very hot on these detections. This site on opening loads a packed javascript file and it is in that (unreadable for humans) file that avast alerts.
Whilst there are very few detections, very few AVs are actually looking for this or capable of detecting it.
While investigating the site I got a similar warning as I describe here: http://forum.avast.com/index.php?topic=46089.0;prev_next=next e.g.: Sign of “JS:ScriptPE-inf [Trj]” has been found in “C:\Users\Polonus\App Data\Roaming\Flock\Profiles\67^^zqs.default\sessionstore-1.js”
Yes you could contact them referring to this thread
Here I checked the iFrames there for you:
Check took 7.61 seconds
(Level: 0) Url checked:
htxp://forum.burninthespotlight.com
Google code detected (Ads, not a cheater)
Zeroiframes detected on this site: 1
No ad codes identified
(Level: 1) Url checked: (iframe source) This is the iFrame re-direct we talk about
This URL is currently listed as malicious by Trend-Micro,
with the gif image I give this decoded done with GreyMagic…
Susoicious is
htxp://tererariymgmail.phpnet.us/index.php?s=a31ae2b0ec52e0ebcb546983ef61997b
Blank page / could not connect
No ad codes identified
(Level: 1) Url checked: (script source)
htxp://yui.yahooapis.com/2.7.0/build/yuiloader-dom-event/yuiloader-dom-event.js?v=401
Zeroiframes detected on this site: 0
No ad codes identified
(Level: 1) Url checked: (script source)
htxp://yui.yahooapis.com/2.7.0/build/connection/connection-min.js?v=401
Zeroiframes detected on this site: 0
No ad codes identified
(Level: 1) Url checked: (script source)
htxp://forum.burninthespotlight.com/clientscript/vbulletin-core.js?v=401
Zeroiframes detected on this site: 0
No ad codes identified
(Level: 1) Url checked: (script source)
htxp://forum.burninthespotlight.com/clientscript/vbulletin_md5.js?v=401
Zeroiframes detected on this site: 0
No ad codes identified
(Level: 1) Url checked: (script source)
type=text/javascript htxp://pagead2.googlesyndication.com/pagead/show_ads.js
Blank page / could not connect
No ad codes identified
(Level: 1) Url checked: (script source)
htxp://forum.burninthespotlight.com/clientscript/vbulletin_read_marker.js?v=401
Zeroiframes detected on this site: 0
No ad codes identified
(Level: 1) Url checked: (script source)
type=text/javascript htxp://pagead2.googlesyndication.com/pagead/show_ads.js
Blank page / could not connect
No ad codes identified