Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information.
b89ce52958eae19cd6fa5c5e71d68e3130b33a9d44a0a3e29f850c054da7b9f8
WordPress WebDorado Gallery plugin versions 1.3.29 and below suffer from a remote SQL injection vulnerability.
227bcd336ca927d03f80ddb19bb7e509dab683539cf91336f3c32587cb65f0bb
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.
fa18a31c56ce9dbce492d800fda8c947612199427f64f544b81e290dde1fce8f
WordPress Spider Event Calendar plugin versions 1.5.49 and below suffer from a remote SQL injection vulnerability.
bc548ce1e8c0c072428fe46342994e52caa28f5512161c7553dea228235984ca
EMC Data Domain OS is potentially vulnerable to a privilege escalation vulnerability. A rogue administrator may be able to log in as the Security Office (SO) and escalate privileges by using SO user?s public key that is stored unprotected on the Data Domain system. Versions 5.2, 5.4, 5.5, 5.6, 5.7 prior to DD OS 5.7.3.0, and 6.0 prior DD OS 6.0.1.0 are affected.
61da17b9c0d2b6edce182f8808b1194c9e0556a20d5daa30a0889a0408df310e
WordPress Facebook plugin versions 1.0.13 and below suffer from a remote SQL injection vulnerability.
f8f1c74c777cd1f35c53ba55abb71303f0d6e5c7adf8aa8a3fa4d1de231fd699
CloudBees Jenkins version 2.32.1 suffers from an unauthenticated remote code execution vulnerability.
142fb9c1fa1663f30278c55089d5387e15d4caea5392b59704a70a5249278ac5
ViMbAdmin version 3.0.15 suffers from multiple cross site scripting vulnerabilities.
067b3a15efe9a192d79a969f742d9c2512e27f03e20ca8488e2b372580885a55
ViMbAdmin version 3.0.15 suffers from multiple cross site request forgery vulnerabilities.
db59d696af1d8b59c960a3417810138ec73b064ca1d5d0e2c19c235f2ef56ab9
Nexus 9 Android Builds before N4F27B contains a firmware injection vulnerability via I2C bus through a SAR sensor driver flashing flaw. This vulnerability requires access to the I2C bus, which is available via the USB fastboot interface and HBOOT interface, which is exposed via the headphone jack.
09cb9ce7a0b1f5b948804b87b863cd8f524662124754065615cd2d56ab103125
HPE Security Bulletin HPESBHF03736 1 - A potential security vulnerability has been identified in certain legacy versions of HPE Aruba and HPE ProVision network switches. The vulnerability could be remotely exploited to allow remote disclosure of information. Revision 1 of this advisory.
51147accaa67fe7dd42234eab28dcfe0a3852c9fd9f2a07d2ca4d4d18363fe99
HPE Security Bulletin HPESBGN03740 1 - Potential security vulnerabilities have been identified in HPE Network Automation. The vulnerabilities could be remotely exploited to allow SQL injection, code execution, information disclosure, authentication bypass, elevated privilege execution, and invalid session management. Revision 1 of this advisory.
a10b0651d0ce49fee90ffaeee69b79d408bddd67458713111892f480273e5d03
WordPress (core) 4.6 suffers from an unauthenticated remote code execution condition via an exploitable version of PHPMailer built-in to WordPress code. Exploitation details provided.
3562cc0222ccab73bf32045e3f2bee84233aef4cd3e169a98bcd74a969767f51