Innova is a framework that permits to manipulate network sessions starting at layer 3 and is transparent to the application. It runs entirely in userspace on Linux and supports plugins.
76a6b396d0382cb1e3ce80a6fdabd05fd9b1230c10e350f7bde29acae52e3420
This code shows how to send hidden data steganographed into a simulation of common (worm) traffic.
72789619c48df1f96f8be7684eaa9420f1b13be1f7734eed11122fd57144ff76
sud (superuser daemon) permits a user to switch to root privileges and to use a suid program in a nosuid environment. It is based on a client/server model and on the ability to pass file descriptors between processes. sud permits you to choose your authentication method, and your effective credentials will be checked by using a Unix domain socket.
c4fdf9dfc7a58daf75cb37d2bc4d10d3767216e2b8e4861a87c2d274bac252a0
Generic time path analysis via ttysnoop-0.12c patching.
13016e6b61ab15b5890f728bf71f7270d8fdfbbb5dc4099f6534aa603a989044
WordPress version 2.1.1 appears susceptible to cross site request forgery and cross site scripting flaws.
daf5b2bff4192f8610c00e3e14289988f76213f754870291fbd422e7e7d3a21d
HP Security Bulletin - Various potential security vulnerabilities have been identified in Microsoft software that is running on the Storage Management Appliance (SMA). Some of these vulnerabilities may be pertinent to the SMA, please check the table in the Resolution section of this Security Bulletin.
f6ba7e6602502bb7888051bbac3a93ccd82defa30533818ceba01de1579d66d9
SEC Consult Security Advisory 20070226-0 - The 3rd party module Pagesetter for PostNuke is susceptible to a local file inclusion vulnerability. Versions 6.2.0 and 6.3.0 beta 5 are affected.
575fbb65bb1e067007269f53fe512d45d47ee97dd535d2999d2ace632822781a