10 November 2008
Attackers have been using the recently announced vulnerability in Adobe Reader 8 to attack Windows users, warn security experts from ISC (Internet Storm Center). The attackers are exploiting the util.printf JavaScript function to trigger a buffer overload. A PDF containing the malicious code was recognised by over 30 virus scanners at VirusTotal, although it would take only a simple obfuscation of the code to outsmart antivirus engines.
More: http://www.heise-online.co.uk/security/Hackers-exploit-PDF-security-flaws--/news/111920
MoinMoin Full Path Disclosure Weakness
Release Date: 2008-11-10
Critical:
Not critical
Impact: Exposure of system information
Where: From remote
Solution Status: Unpatched
Software: MoinMoin 1.x
Description:
Xia Shing Zee has discovered a weakness in MoinMoin, which can be exploited by malicious people to disclose system information.
The weakness is caused due to the application displaying the full installation path in an error report, when an HTTP request for an overly long URL is received.
The weakness is confirmed in version 1.8.0 (standalone server mode). Other versions may also be affected.
Solution:
Filter HTTP requests for overly long URLs in a proxy.
Provided and/or discovered by:
Xia Shing Zee

Chowhound
Comic Vine
GameFAQs
GameSpot
Giant Bomb
TechRepublic