Sanewall is a firewall builder for Linux which uses an elegant language abstracted to just the right level. This makes it powerful and easy to use, audit, and understand. It allows you to create very readable configurations even for complex stateful firewalls. Sanewall can be used for almost any purpose, including control of any number of internal/external/virtual interfaces, control of any combination of routed traffic, setting up DMZ routers and servers, all kinds of NAT, providing strong protection (flooding, spoofing, etc.), transparent caches, source MAC verification, blacklists, and whitelists. Newer versions abstract the differences between IPv4 and IPv6, allowing you to define a common set of rules for both, while permitting specific rules for each as you need.
f4baeaaad503a6e733fc98155a24a5842b86f244638b2018545645810223b907
Moscrack is intended to facilitate the use of a WPA cracker on a cluster. Currently, it has only been used with Mosix (clustering software) and SSH nodes. It works by reading a word list from STDIN or a file, breaking it into chunks and passing those chunks off to separate processes that run in parallel. The parallel processes can then execute on different nodes in your cluster. All results are checked (to a degree) and recorded on your master node. Logging, error handling, etc. are all handled for you. Moscrack is designed to be run for long periods of time (days, weeks, or more).
5a08dbac7461ef9260bbc72b1d7369ff6adace6b3953a49855e03761bd8e4bed
A use-after-free memory corruption vulnerability was identified in Microsoft Internet Explorer 8. This allows a malicious user to remotely execute arbitrary code on a vulnerable user's machine, in the context of the current user. The memory corruption happens when the application of a style sheet performs style computations on the DOM. A DOM textNode pointer becomes corrupted after the style computation. This pointer is then overwritten when the innerHTML property on the parent object is set.
42e29adc4eef804c5f70dc15a5cf982d90aed29c7b2c9eba91d110e9941198d8
Pantea is a plugin-based HTTP session hijacking tool for well known websites. Written in Python.
cd04c3ccd5bbc6ffef7c5877a03c9799a88c54a9db8dd50163cdfa6602824b36
Habbomobile.com and Sulake.com suffer from a remote blind SQL injection vulnerability.
7216bccc44fb13d787aae8860bec2a3ca9a20013ccc5d83fdc5c15b30a10aa39
Apple Security Advisory 2013-06-04-1 - OS X Mountain Lion version 10.8.4 and Security Update 2013-002 is now available and addresses over 30 security issues.
29c85f7c4991f40f099be32dac2f2a9438a7fc5388a3ae3de429d2a6ba9bb431
Apple Security Advisory 2013-06-04-2 - Safari 6.0.5 is now available and addresses 26 security issues.
e4c05585872c8f1accdd9be9aef4509008eb45dd66dbd1ee0d0d2cef3ba21239
JBoss AS administration consoles versions prior to 1.2 re-embed password that are disclosed when viewing page source. This is an obvious poor security practice and the vendor has decided not to fix it, possibly due to lack of comprehending why it is a bad idea.
c0f10c6904c19a05d1e8a3d0396455570738d1fbdff15f5f67e17fa95e061da2