The alert comes when an image is double clicked (which would open it full size, rather than immediately download it.) and the site tries to go to: http://www.pdclipart.org/displayimage.php?album=search&cat=0&pos=1 where the part after ? simply identifies the postion of the image in the thumbnail table.
It’s odd, because NoScript doesn’t report any added scripts trying to run at this point.
I did some research on this site and it really seems to be a serious and safe website, but I can’t say if this site is really infected or if this is a false positive… http://www.mywot.com/en/scorecard/www.pdclipart.org
This is the part of the resident Log (link disarmed):
However I have stumbled around in there and not got a single alert. I tried to go to the thumbnails.php link you gave only to get an error, The selected album/file does not exist !
So I had to do a search to return some results and then click on one of them to get the alert.
Now I have had a look at the page code where the alert happens and I can only see one script tag which might possibly be causing this alert and it is one of the google scripts at the end of the page.
But, I’m not convinced it is a good detection, so I have submitted it for analysis.
I did see that and did a search on plala.or.jp and looked at WOT (two reports of malware) and norton safe web (nothing indicated). However checking on the cgi35 sub-domain returns more
I couldn’t download the actuall css.js as the network shield blocks plala.or.jp
14.04.2009 19:18:04 Network Shield: blocked access to malicious site cgi35.plala.or.jp/BTO/data/entry/css.js
Paused it and got the css.js and yes it is malware detected by the standard shield.
Sign of "VBS:Obfuscated-gen [trj]" has been found in "E:\Downloads\css.js"