lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CACqxkW+seG8y=PGvURmPxQr2SoLNCET0g6dL-11NJuTGT-sY7g@mail.gmail.com> Date: Sat, 15 Apr 2017 14:53:21 +0100 From: Nick Boyce <nick.boyce@...il.com> To: fulldisclosure@...lists.org Subject: Re: [FD] [SYSS-2015-036] Password Safe and Repository Enterprise v7.4.4 - Violation of Secure Design Principles (CWE-657) > [vulnerability in] Password Safe and Repository > Enterprise ... password management > software ... vendor MATESO GmbH JFTR, neither the linked: http://www.passwordsafe.de/en/products/business/enterprise-edition.html [redirects to https://www.passwordsafe.com/products/business/enterprise-edition.html] nor the related: https://private.passwordsafe.de/index_e.html (home user edition) appear to have any connection with the Bruce-Schneir-originated Password Safe that so many of us know and love. https://pwsafe.org/ You know what to do :) Cheers Nick _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/