Update: the exploit (or this variant at least) is not detected by avast!

I’ve sent the exploit to virus[at]avast.com.

Antivirus Version Last Update Result AhnLab-V3 2008.1.16.10 2008.01.15 - AntiVir 7.6.0.46 2008.01.15 HTML/Silly.Gen Authentium 4.93.8 2008.01.13 - Avast 4.7.1098.0 2008.01.14 - AVG 7.5.0.516 2008.01.14 Exploit BitDefender 7.2 2008.01.15 Trojan.Downloader.JS.Agent.ON CAT-QuickHeal 9.00 2008.01.15 - ClamAV 0.91.2 2008.01.14 - DrWeb 4.44.0.09170 2008.01.15 - eSafe 7.0.15.0 2008.01.14 JS.IEslice.aq eTrust-Vet 31.3.5459 2008.01.15 JS/SillyDlScript.DG Ewido 4.0 2008.01.15 - FileAdvisor 1 2008.01.15 - Fortinet 3.14.0.0 2008.01.15 - F-Prot 4.4.2.54 2008.01.14 - F-Secure 6.70.13030.0 2008.01.15 Exploit.HTML.IESlice.bz Ikarus T3.1.1.20 2008.01.15 Virus.Exploit.HTML.IESlice.bz Kaspersky 7.0.0.125 2008.01.15 Exploit.HTML.IESlice.bz McAfee 5207 2008.01.15 JS/Downloader-AUD Microsoft 1.3109 2008.01.15 Exploit:JS/Mult.K NOD32v2 2792 2008.01.15 - Norman 5.80.02 2008.01.15 - Panda 9.0.0.4 2008.01.14 - Prevx1 V2 2008.01.15 - Rising 20.27.12.00 2008.01.15 - Sophos 4.24.0 2008.01.15 Mal/ExpJS-D Sunbelt 2.2.907.0 2008.01.15 - Symantec 10 2008.01.15 Trojan.Webkit!html TheHacker 6.2.9.187 2008.01.13 - VBA32 3.12.2.5 2008.01.13 - VirusBuster 4.3.26:9 2008.01.15 - Webwasher-Gateway 6.6.2 2008.01.15 Script.Silly.Gen

Seems to be the one mentioned here:

http://www.webhostingtalk.com/showthread.php?t=651748

More info. here:

http://blog.scansafe.com/journal/2008/1/15/mom-pop-sites-hit-hard-by-host-compromise.html