URL with unknown_exe flagged?

See: http://urlquery.net/report.php?id=2730373
See: https://www.virustotal.com/en/url/36164196da986966caf967acb1e8752690fdeaabcb4f353b4e8d6440cb501331/analysis/
Verdict:
Deprecated downloads for Download: ngg.slideshow.min.js. The REST URL parameter 5 appears to be vulnerable to OS command execution injection
See this DORK: http://xss.cx/2011/04/23/dork/blind-sql-injection-os-command-execution-ligattsecuritycom.html (link article source Hoyt LLC Research)
Also consider: http://forum.avast.com/index.php?topic=103181.0

pol

What happened here for URL to be flagged at VW:
http://urlquery.net/report.php?id=2737917 & https://www.virustotal.com/nl/url/2f2884ace278a6dce1145654b43c5c119735d31f6ef9664a4099c19aed368053/analysis/1369914649/
host taken down? For IP IDS alert = MALWARE-CNC Win32.Delf outbound connection → https://support.sourcefire.com/supplemental/sf-rules-2012-11-08-mod.html
Not found in here: http://www.abuseipdb.com/check/poland.otservlist.org

polonus

Unconditional redirect found, potentially suspiicous → http://urlquery.net/report.php?id=2738090

index.html
Severity: Potentially Suspicious
Reason: Detected unconditional redirection to external web resource.
Details: <META HTTP-EQUIV=“refresh” CONTENT=“0;URL=http://www.pbrand.ne.jp/www2/hi-nobori/index.html”%0D%0A%0D%0A
Threat dump: [[<META HTTP-EQUIV=“refresh” CONTENT=“0;URL=http://www.pbrand.ne.jp/www2/hi-nobori/index.html

]] File size[byte]: 241 File type: ASCII MD5: 3A2CDECAEB0D23378C6D60DBDBC186EF Scan duration[sec]: 0.001000

pol