We have cleaned up the issues listed on quttera, no idea about bit defender. No idea what they think is the cause. Lodged a query on their forum so hoping we get some help.
The IDS alert comes in the web client rules classification. It is an “overflow exploit” rule that is being flagged in this case.
The potentially suspicious files all have eval packed as initialization of function pointer to JavaScript method fromCharCode
But this should come to play in combination with an iFrame: http://www.quttera.com/detailed_report/www.fluffheaven.com#ReportTabPotSusp
Magento recently had to be updated. Avast! Web Shield is even alerting on this link for the malicious code on the magento website: htxp://stackoverflow.com/questions/13822419/clients-magento-website-contains-malicious-code-how-to-get-rid-of-it as infested with JS:iFrame-AGU[Trj]
This also played in May of this year and later so recently - Magento store can be hacked due to compromised FTP credentials, an insecure web host, a vulnerable extension, a weak password, or an outdated Magento installation. → http://blog.sucuri.net/2012/07/magento-security-update-1-7-0-2-zend_xmlrpc-vulnerability.html (also flagged by avast! Webshield as PHP:Backdoor-BG[Trj]