lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <60E90CEE7B2D53499B74022758354F5F5B4B75D2@SA-EXCH01.security-assessment.local>
Date: Wed, 20 Nov 2013 01:01:53 +0000
From: Thomas Hibbert <Thomas.Hibbert@...urity-assessment.com>
To: "full-disclosure@...ts.grok.org.uk" <full-disclosure@...ts.grok.org.uk>
Subject: CORRECTION: Kaseya 6.3 Arbitrary File Upload
Vulnerability
The previously posted advisory for the Kaseya 6.3 Arbitrary File Upload Vulnerability innacurately listed version 6.3.0.2 as
being affected by the issue. In fact, 6.3.0.2 includes the fix for this vulnerability. All versions and hotfixes prior to 6.3.0.2 are vulnerable.
Download attachment "PGP.sig" of type "application/pgp-signature" (823 bytes)
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists