Unknown_html_RFI_eval on site?

See: https://www.virustotal.com/nl/url/2ab407986fb146b2d10425e42afa2ac502033515138620be574703cbc50d84d5/analysis/1417882555/
Potentially suspicious files 5 detected by Qutrtera’s.

[[<meta http-equiv="refresh" content="0; url=http://wXw.vancouveropera.ca/blog/" />]]

WordPress version outdated: Upgrade required.
Outdated WordPress Found: WordPress Under 4.0
Earlier detected on other domain from IP - IDS alert for “ET POLICY SSLv3 outbound connection from client vulnerable to POODLE attack”.
Code hick-up: www.blogger.com/static/v1/widgets/2885176887-widgets.js benign
[nothing detected] (script) wXw.blogger.com/static/v1/widgets/2885176887-widgets.js
status: (referer=vancouveropera.blogspot dot com/)saved 90891 bytes c7c274f8ee77d8c1d9304fa548efd950ece96848
info: ActiveXDataObjectsMDAC detected Microsoft.XMLHTTP
info: [decodingLevel=0] found JavaScript
suspicious:
Issues: dynamically-assigned reverse DNS entries; Hosts found sending virus mails; Hosts found sending phishing and spam mails;
Hosts are added by our bots as users connect with hacked boxes and open proxies. Lists 's that sent more than 2 virus in the last 24 hours.
Illegal 3rd party exploits, including proxies, worms and trojan exploits.

Code discusssed in our Russian sub-forum (interesting): https://forum.avast.com/index.php?topic=127840.20

polonus

it is a blog that has moved to a new location, if you enter you will see that info and after 5sek are redirected to new location vancouveropera.ca/blog/ what you see in the code you posted