Несколько недавно найденных уязвимостей:
Ссылки:
[1] http://htfl.ru/cat-news-uyazvimosti-po
[2] /out.php?link=http://www.freepbx.org
[3] /out.php?link=http://archives.neohapsis.com/archives/fulldisclosure/2012-03/0234.html
[4] /out.php?link=http://www.freepbx.org/news/2012-03-26/security-concerns-2-11-updates-and-expiring-early-bird-specials
[5] /out.php?link=http://www.ghostscript.com/
[6] /out.php?link=http://bugs.ghostscript.com/show_bug.cgi?id=692856
[7] /out.php?link=http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-March/000110.html
[8] /out.php?link=http://gajim.org/
[9] /out.php?link=http://secunia.com/advisories/48708/
[10] /out.php?link=http://www.libpng.org/pub/png/src/libpng-1.5.10-README.txt
[11] /out.php?link=http://home.gdal.org/private/zdi-can-1221/zdi-can-1221.txt
[12] /out.php?link=http://permalink.gmane.org/gmane.comp.db.mysql.announce/655
[13] http://htfl.ru/news/neponyatnaya-situatsiya-s-0-day-eksploitom-i-27-uyazvimostyami-v-mysql
[14] /out.php?link=http://bugs.mysql.com/bug.php?id=59533
[15] /out.php?link=http://pastebin.com/tCxNTD96
[16] /out.php?link=http://puppetlabs.com/
[17] /out.php?link=http://puppetlabs.com/security/
[18] /out.php?link=http://seclists.org/fulldisclosure/2012/Apr/123
[19] /out.php?link=http://www.infosecinstitute.com/courses/ethical_hacking_training.html
[20] /out.php?link=https://launchpad.net/wicd/+announcement/9888
[21] /out.php?link=http://ffmpeg.org/
[22] /out.php?link=http://secunia.com/advisories/48770/
[23] /out.php?link=http://ffmpeg.org/download.html
[24] /out.php?link=http://rpm.org/wiki/Releases/4.9.1.3#Security