<div dir="ltr">

<div style="color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;text-decoration-style:initial;text-decoration-color:initial;background-color:rgb(255,255,255)">Hi, List,<div><br></div><div>2.77 ver. of Agora contains 4 modules. List:</div></div><div style="color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;text-decoration-style:initial;text-decoration-color:initial;background-color:rgb(255,255,255)"><br></div><div style="text-align:start;text-indent:0px;text-decoration-style:initial;text-decoration-color:initial;background-color:rgb(255,255,255)"><div><span style="font-size:12.8px">Drupal < 7.58 / < 8.3.9 / < 8.4.6 / < 8.5.1 - Remote Code Execution [CVE-2018-7600]</span></div><div><span style="font-size:12.8px">CloudMe Sync <= v1.10.9 Remote Buffer Overflow [CVE-2018-6892]</span></div><div><span style="font-size:12.8px">AxxonSoft Axxon Next - Directory Traversal Vulnerability [CVE-2018-7467]</span></div><div><span style="font-size:12.8px">Wordpress Fastest Cache <= 0.8.7.4 Blind SQL Injection</span></div></div><div style="color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;text-decoration-style:initial;text-decoration-color:initial;background-color:rgb(255,255,255)"><br></div><div style="color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;text-decoration-style:initial;text-decoration-color:initial;background-color:rgb(255,255,255)"><div>Happy pentesting,</div><div><a href="http://gleg.net/" target="_blank" style="color:rgb(17,85,204)">Gleg`s Security team</a></div><div>Follow us on Twitter: <a href="https://twitter.com/GlegExploitPack" target="_blank" style="color:rgb(17,85,204)">GlegExploitPack</a></div></div><div class="gmail-yj6qo" style="color:rgb(34,34,34);font-family:arial,sans-serif;font-size:12.8px;font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial"></div><br class="gmail-Apple-interchange-newline">

<br></div>