lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sat, 5 Jan 2019 14:31:53 +0200
From: Henri Salo <>
To: Daniel Bishtawi <>
Subject: Re: [FD] Reflected Cross-site Scripting Vulnerability in Microweber

On Thu, Jan 03, 2019 at 10:45:36AM +0100, Daniel Bishtawi wrote:
> We are glad to inform you about the vulnerabilities we reported in
> Microweber 1.0.8.
> Affected Versions: 1.0.8
> Homepage:
> Status: Not Fixed
> CVE-ID: CVE-2018-19917
> Netsparker Advisory Reference: NS-18-038

> 13th April 2018- First Contact
> 14th April 2018 - Technical Details Sent
> 28th June 2018 - Attempted to Contact
> 3rd January 2019 - Advisory Released

How did you contact vendor? Are you sure that they didn't fix this?  Latest
version is 1.1.2 according to Do you plan to
follow-up on this or is this case closed from your point of view?

Henri Salo

Sent through the Full Disclosure mailing list
Web Archives & RSS:

Powered by blists - more mailing lists