I read the report, and I caught onto this point:
“Unspecified vulnerability in the Java Runtime Environment component
in Oracle Java SE JDK and JRE 7 and 6 Update 27 and earlier allows remote untrusted Java Web Start
applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors
related to Scripting"
Two things from this which I'd like to point out.
1. This is a weakness in Java from January 2012, with a very old version of Java. So unless you have a version that's over two years old, even if this was a malicious code, it won't work since it relies on that very old version.
2. The reason it's probably ringing up as bad is due to it having a similar code to whatever that virus did. I won't say it's common but false positives do happen from time to time by unintentionally writing code which part of it looks close enough for a virus scanner to ring up as suspect.
I'm really willing to wager it's a false positive, since this was patched a long time ago. You can always bring it up in the scanner company's support forums, but it's really unlikely someone's going to use such an outdated weakness which I would be horribly stunned if it wasn't patched by now to attack someone's machine with.
I'm also willing to wager since only two of those scanners out of 54 saw something (and two different things), it's very likely it's a false positive.