Various vulnerabilities exist in Regulus 2.x that allow for an attacker to gain access to sensitive information and to bypass certain security restrictions.
9f15687e204d7d59ed2335586f5bc35eda839d764767eed8ad9ceee0a80e7127
© 2022 Packet Storm. All rights reserved.