Malicious website detected?

See: https://www.virustotal.com/en-gb/url/c2b26ae1e3f87e98d5c9b76ab1fdc1f89d776cce6d5fc847de2c92d7eefba5a7/analysis/
Fortinet’s malware alerts → https://urlquery.net/report.php?id=1434976889706
Outdated Web Server Apache Found: Apache/2.2.3
Malware reports on IP: https://www.virustotal.com/en-gb/ip-address/67.192.91.162/information/
Reputation Score: 50/100
Reverse DNS: 398645-web3.intermakers-it.com.
ISP Location: Dallas, Texas, United States
ISP: Rackspace Hosting

See: http://www.fuzzysecurity.com/tutorials/14.html (vulnerable script: -/prettyPhoto/js/jquery.prettyPhoto.js?ver=3.1.3)
Any good adblocker prevents htxp://vmss.boldchat.com/aid/709469358799389659/bc.vms4/vms.js from loading

Similar CMS risks were being described by me here: https://forum.avast.com/index.php?topic=170502.0
And “u-design/styles/style1/css/text.css?ver=1.0” should be updated!
Exploitable theme - read: http://www.exploit4arab.net/exploits/164

polonus (volunteer website security analyst and website error-hunter)

P.S. On side-threat, read: http://www.computersecurity.org/malware-traffic-samples/exploit-kit-samples-traffic-pcap-downloads/nuclear-exploit-kit/nuclear-exploit-kit-with-callbacks-pcap-converted-traffic-sample/

D