eval()is eval! This functions and similar ones (
element.insertAdjacentHTML()) should never be used in production stage of a website, because the parsing of the executable string is often not secure and result therefore often in a cross-site scripting vulnerability. Instead of these functions create html elements by script and add it to the DOM object.
document.write("This page has moved, <A HREF='https://subscribe.financeflick.com/?skipEmail=1&q=&tp1=2POTEXG7L&tp2=antwort.com&tp3=lve&custom_tags=%7B%22merge_pid%22%3A%22%22%2C%22gcat%22%3A%22Reference%20%3E%20Language%20Resources%20%3E%20Foreign%20Language%20Resources%20%3E%20Translation%20Tools%20%26%20Resources%22%7D&jserror=1'>Click here to go there.");[http://antwort.com/]