Introduction
Multiple vulnerabilities were identified within the Teracue ENC-400,
including pre-authenticated remote code authentication. While the vendor
has released updated firmware after these issues were identified, they are
not all resolved with the latest version of the
___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
I thought I had reported it but not, better late than never.
___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
___
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
CA20190212-01: Security Notice for CA Privileged Access Manager
Issued: February 12, 2019
Last Updated: February 12, 2019
CA Technologies Support is alerting customers to a potential risk
with CA Privileged Access Manager. A vulnerability exists
On Wed, Jan 30, 2019 at 09:28:15AM +0100, Daniel Bishtawi wrote:
> https://www.netsparker.com/web-applications-advisories/ns-18-052-reflected-cross-site-scripting-in-collabtive/
CVE-2019-8935 has been assigned for this vulnerability.
--
Henri Salo
Hello,
We are glad to inform you about the vulnerabilities we reported in
GetSimpleCMS 3.3.13.
Here are the details:
Advisory by Netsparker
Name: Open Redirection Vulnerability in GetSimpleCMS
Affected Software: GetSimpleCMS
Affected Versions: 3.3.13
Homepage: http://get-simple.info/
SecureAuth - SecureAuth Labs Advisory
http://www.secureauth.com/
Micro Focus Filr Multiple Vulnerabilities
1. *Advisory Information*
Title: Micro Focus Filr Multiple Vulnerabilities
Advisory ID: SAUTH-2019-0001
Advisory URL: