Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information.
0f5dcc5a29fa53d65c98523b8c3f4bcf8d40925317b5795163dacd9845010fc1
EMC Mainframe Enablers ResourcePak Base versions 7.6.0, 8.0.0 and 8.1.0 allows a Key 8 program to run in supervisor state instead of problem state. This could allow the program code which runs as an authorized user to give control to another Key 8 program in supervisor state. Supervisor state can allow privileged instructions to execute and/or cause inadvertent or intentional storage overlays which could lead to data corruption.
526a795cd971ff014a4a9a94419f640f5de269c0e2748d5afad6fc17a7132b58
Red Hat Security Advisory 2017-1203-01 - Red Hat Single Sign-On 7.1 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. The Node.js adapter provides a simple module for authentication and authorization in Node.js applications. This asynchronous patch is a security update for the Node.js adapter for Red Hat Single Sign-On 7.1. Multiple security issues have been addressed.
b4f3c09e0428f9437886ffaca57e18f0250e21f0e5f87f017e2c3ff9da2c3ff7
Gentoo Linux Security Advisory 201705-4 - Multiple vulnerabilities have been found in NSS, the worst of which may allow execution of arbitrary code. Versions less than 3.29.5 are affected.
346443ae580438784b81eb9c7fdc7b563a5d3b95a8af59a8acaeb82a141b5d99
MPEngine MsMpEng in Microsoft Windows 8, 8.1, 10, Windows Server, SCEP, Microsoft Security Essentials, and more suffers from a remotely exploitable type confusion.
71f1e4c261be22330753db2dd368004f0b32b16209242b09131afbc4d41684fb
Red Hat Security Advisory 2017-1201-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 52.1.0. Security Fix: Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird.
513c05081d4826c7fbc75fdbc0de7ae58ac4724c0da10a37a8e7f3faea2f08b5
Gemalto SmartDiag Diagnosis Tool versions 2.5 and below buffer overflow exploit with SEH overwrite.
f0fdfc5111c06ba95a692a071f3afbae09ba4c4054c74f3f657156eeb1ad1664
Red Hat Security Advisory 2017-1202-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly. Security Fix: A denial of service flaw was found in the way BIND handled DNSSEC validation. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response.
aa1a8560376b594bb43d9eb72aaf3ee936f770ef89efb4b9960addee62eba6f5
This is a tool written to disable Intel AMT on Windows.
43d281d3af482c3a29092988f5f489c291d5212710372376d4c2e150a542d75b
This is a bug in Xen that permits an attacker with control over the kernel of a 64bit X86 PV guest to write arbitrary entries into a live top-level pagetable.
e9f97698b1d30763651c3fe3ec05094c81ef95cdabb0ef6ebee3a207a40e6924
Gentoo Linux Security Advisory 201705-3 - Multiple vulnerabilities have been found in Oracle's JRE and JDK software suites, the worst of which may allow execution of arbitrary code. Versions less than 1.8.0.131 are affected.
cdc851e6911fd412a0b29fe19557dfe298eb74f3e7d775fe08d163b52eaf97fb
Gentoo Linux Security Advisory 201705-2 - Multiple vulnerabilities have been found in the Chromium web browser, the worst of which allows remote attackers to execute arbitrary code. Versions less than 58.0.3029.81 are affected.
512659491d5673288c601dcddae323d0e144021482ae1fe3fa9681a7a6298ec0
113 bytes small Linux/x86-64 reverse shell shellcode for IPv6.
53aaa723460ce28fd9810d24eb108ae532bcd8d100cfec7408fd6f5ed549d7c1
80 bytes small Linux/x86 disable ASLR shellcode.
a89b320f865cdda9d5046f6f4681f6c53c6f9fb688e99d6c9b6dff98a1e9e85d
RPCBind / libtirpc denial of service exploit.
d0ca6273bf34f85942ea8f97a7137b04ccf6c78c845b743af2ade8ba0a24ca25