—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1
The following Cisco Security Advisory was published by Cisco PSIRT at 18:41 UTC on 2019-October-23.
+——————————————————————–
Cisco HyperFlex Software Command Injection Vulnerability
CVE-2018-15380
SIR: High
CVSS Score v(3.0): 8.8
URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190220-hyperflex-injection [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190220-hyperflex-injection”]
—–BEGIN PGP SIGNATURE—–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=IxWt
—–END PGP SIGNATURE—–
_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com