but why when some people go on the page avast don't detect it?
I don't know and as we only have one person saying they don't have an alert we would need to know what browser, OS and set-up they have as any of those things could lead to it not being detected.
I didn't watch the video (dial-up) so I have no idea what Jahn meant when he said he I followed the procedure you used in your video, and Avast doesn't detect anything.
Now why this didn't alert on one or more, is a different issue, but this detection is IMHO correct, why would a .jpg file be hacked in this way. It is still detected in the latest VPS 081227-0
I'm still not getting any detection on this page after a repair of Avast/reboot. I do believe Avast is working properly, though. Avast recently detected JS:XMLParse-A [Expl] during Scanit tests
HERE, and later detected the leftover TIF's and SysVolume entries during a Standard demand scan.
My Avast providers are at default values, except I've added a redirected HTTP port (for proxy server) to Web Shield.
I can only guess that another security program is blocking the exploited jpg iframe before Avast sees it. XP SP2, Firefox 3.0.5 with ABP, Dr.Web link checker, Finjan, SiteAdvisor, NoScript, Perspectives and WOT. No detection either in IE7 with flash disabled by Toggle Flash, Finjan, WOT and Dr. Web link checker. I also use SAS Pro (my forever gratitude to CastleCops [R.I.P.] and Nick for my free lifetime licenses), Comodo Internet Security in ProActive Safe Modes (AV module not installed) and a custom Hosts file. I'm betting on CIS, though nothing shows in the firewall or Defense+ logs.
According to the video, mathboyx215 accessed the Wikipedia page via a link in a Google search for hunantv. I was attempting to duplicate the occurence, so that is what I meant when I said I went there in the same manner. Hope this clears some mud out, and sorry I couldn't get back here sooner.
