Несколько недавно найденных уязвимостей:
Ссылки:
[1] http://htfl.ru/cat-news-uyazvimosti-po
[2] /out.php?link=http://www.samba.org
[3] /out.php?link=http://www.samba.org/samba/security/CVE-2012-0870.html
[4] /out.php?link=http://www.samba.org/samba/ftp/patches/security/samba-3.0-CVE-2012-0870.patch
[5] /out.php?link=http://www.samba.org/samba/ftp/patches/security/samba-3.2-CVE-2012-0870.patch
[6] /out.php?link=http://www.samba.org/samba/ftp/patches/security/samba-3.3-CVE-2012-0870.patch
[7] /out.php?link=http://www.samba.org/samba/ftp/patches/security/
[8] /out.php?link=http://vigilance.fr/vulnerability/Linux-iproute2-file-corruption-via-tmp-11394
[9] /out.php?link=http://python.org/
[10] http://htfl.ru/news/universalnyi-sposob-dos-ataki-zatragivayushchii-php-java-ruby-python-i-razlichnye-web-platformy
[11] /out.php?link=http://bugs.python.org/issue14001
[12] /out.php?link=http://bugs.python.org/issue13885
[13] /out.php?link=http://www.openssl.org/~bodo/tls-cbc.txt
[14] /out.php?link=http://www.libpng.org/pub/png/libpng.html
[15] /out.php?link=http://secunia.com/advisories/47827/
[16] /out.php?link=http://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=20286
[17] /out.php?link=http://aix.software.ibm.com/aix/efixes/security/icmp_advisory.asc
[18] /out.php?link=http://archives.neohapsis.com/archives/fulldisclosure/2012-02/0404.html
[19] /out.php?link=http://service.real.com/realplayer/security/02062012_player/en/
[20] /out.php?link=http://www.mathopd.org/
[21] /out.php?link=http://www.mail-archive.com/mathopd%40mathopd.org/msg00392.html