Is this suspicious code detected as malcode?

Scanned: https://www.virustotal.com/en/url/274dbe8be40eabf4ff86cd1bf52dbcefad54c8045c17b22cc237d748c2b53359/analysis/1455392001/
Flagged here: http://killmalware.com/13-art.ru/# and at -https://13-art.ru/
Detected libraries:
jquery - 1.11.3 : -https://13-art.ru/wp-includes/js/jquery/jquery.js?ver=1.11.3
jquery-migrate - 1.2.1 : -https://13-art.ru/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.2.1
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
1 vulnerable library detected
See: http://phpxref.ftwr.co.uk/wordpress/nav.html?wp-includes/js/comment-reply.min.js.source.html

Code redirects to -http://услуги/ Website risk status 10 red out of 10: http://toolbar.netcraft.com/site_report?url=http://xn--c1akhxjc backlink.

5 malicious files detected at Quttera’s: http://quttera.com/detailed_report/13-art.ru
Severity: Malicious
Reason: Detected encoded JavaScript code commonly used to hide malicious behaviour.
Details: Detected malicious JavaScript code
See beyond

 jQuery.noConflict();/*

http://www.domxssscanner.com/scan?url=https%3A%2F%2F13-art.ru%2Fwp-includes%2Fjs%2Fjquery%2Fjquery.js%3Fver%3D1.11.3

and Potentially Suspicious files: 1
-mc.yandex.ru/metrika/watch.js
Severity: Potentially Suspicious
Reason: Detected procedure that is commonly used in suspicious activity.
Details: Too low entropy detected in string [[‘:,:,:,:,:,:,:,:,0,0,:,:,:,:,:,:String.,:String.,:String.,:,:,:,:,:,:,0,:,:,:,:,:,:,:,:,:String.,:,:S’]] of length 170 which may point to obfuscation or shellcode.

SRI Stylesheet issue: Tag Result

Missing SRI hash

WordPress security issues: see: https://hackertarget.com/wordpress-security-scan/
The following plugins were detected by reading the HTML source of the WordPress sites front page.

js_composer_theme

Warning User Enumeration is possible
The first two user ID’s were tested to determine if user enumeration is possible.

ID User Login
1 None lihoyplay_khfdh824

polonus

1 detect now as “HTML/Framer”, see: https://www.virustotal.com/en/file/1bcff10add876d8a5614dd9bbb331ba3ee305a77299521c7fe1b49ecd0afe74a/analysis/1455394337/
Thanks go out to Pondus for verifying. Sorry Avast does not have this yet.

polonus

1 detect now as "HTML/Framer", see: https://www.virustotal.com/en/file/1bcff10add876d8a5614dd9bbb331ba3ee305a77299521c7fe1b49ecd0afe74a/analysis/1455394337/ Thanks go out to Pondus for verifying. [b]Sorry Avast does not have this yet.[/b]

polonus

F-Secure lab confirms infected

=========================================================================
The file you sent was found to be malicious.

We will be detecting the sample you submitted as Trojan.Iframe.CII in the next database update.