Hi chochor,
A very infected site you have indeed. You are lucky that none of the major have decided to blacklist your site.
First, your jQuery file. (jquery-1.3.2.min.js)
Sucuri says on line 19, from “If(J===G)” down, contains the exploit. However, I did not see anything apparent in that script and decided to upload the part that looked like regular jQuery coding to VirusTotal. See: https://www.virustotal.com/file/3b992588ed7d8d7eac046b7f7f9ec353c9346004ab7645981deb0dddff5bf221/analysis/1335100855/
Thus, the coding before and after the /qpi/ tag contains the exploit. See attachment #1 for readable malscript.
I am unable to access jquery.jqzoom-1.0.1.js.
jquery.jqzoom1.0.1.js contains the same exploit. Line 1124. See attachment #2 for script to be removed.
Same with jquery.hoverIntent.minified.js and jquery.fancybox-1.3.1.js. Remove the coding before and after the /qpi/ tag.
I suggest you upgrade to jQuery 1.7.2.
http://docs.jquery.com/Downloading_jQuery
Your CSS files are NOT malicious. Zulu is warning of infection because they have links to your site, which is malicious.
Now for your HTML pages.
The homepage of your site is indeed infected. Check line 1518. Notice the and . Remove everything inbetween.
Same with your 404 pages, which I assume are generated by your 404javascript.js. Remove the coding before and after the tags.
bestsellery-c-96.html, nowosci-c-31.html, and promocje-c-113.html also contain the same exploit mentioned above.
The following PHP pages do as well:
advanced_search.php
contact_us.php
create_account.php
shopping_cart.php
Refrence: http://zulu.zscaler.com/submission/show/7917bf94ed0fee5bc56a206bc920db6b-1335100086
http://sitecheck.sucuri.net/results/http://www.lingerie4u.pl/
I’m assuming that the malcreants made a tool for javascript injection. Looks exactly alike. :-\