So, I clicked on a reasonably-looking LinkedIn invite, not thinking about hovering overing the link first, since usually the e-mail client warns me about such things.
Once I realized I landed on an exploit page, I quickly copied the source (containing some obviously guilty JavaScript), closed the window, and deobfuscated the attack code proper (homebrew-encoded wrapped in an eval).
EDIT: here's the pastebin of the deobfuscated code, followed by the actual HTML attack page.
Fortunately, it looks like the payload wasn't deployed in my case - the attack targets PDF and Java browser plugins, of which I had none (I do have Java installed sans plugin, but the version looks to be too recent for the attack anyway).
However, as I'm no JS expert (and much less a JS exploit expert by inference), I tried to search for the attack code to make sure I'm not affected. No results so far.
Of course, this makes sense - public-viewable code like that would attract skiddies and anyone else wishing to use it for malicious purposes.
Nevertheless, given the JavaScript attack code, how can I find information about the exploit?