<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>News</title>
    <description>News</description>
    <pubDate>Tue, 10 Mar 2026 13:16:23 +0000</pubDate>
    <lastBuildDate>Tue, 10 Mar 2026 13:16:23 +0000</lastBuildDate>
    <generator>LiquidFiles Forum</generator>
    <link>https://forum.liquidfiles.com/forums/news.6/</link>
    <atom:link rel="self" type="application/rss+xml" href="https://forum.liquidfiles.com/forums/news.6/index.rss"/>
    <item>
      <title>CVE-2025-55182 - React Server Components vulnerability</title>
      <pubDate>Thu, 11 Dec 2025 09:23:40 +0000</pubDate>
      <link>https://forum.liquidfiles.com/threads/cve-2025-55182-react-server-components-vulnerability.1981/</link>
      <guid>https://forum.liquidfiles.com/threads/cve-2025-55182-react-server-components-vulnerability.1981/</guid>
      <author>invalid@example.com (David)</author>
      <dc:creator>David</dc:creator>
      <content:encoded><![CDATA[This is false positive. LF appliance does not use React server components.]]></content:encoded>
    </item>
    <item>
      <title>Cannot renew Let's Encrypt certificate</title>
      <pubDate>Tue, 02 Sep 2025 16:05:25 +0000</pubDate>
      <link>https://forum.liquidfiles.com/threads/cannot-renew-lets-encrypt-certificate.1973/</link>
      <guid>https://forum.liquidfiles.com/threads/cannot-renew-lets-encrypt-certificate.1973/</guid>
      <author>invalid@example.com (David)</author>
      <dc:creator>David</dc:creator>
      <content:encoded><![CDATA[Let&#039;s Encrypt CA has removed recently the contact email attribute from their API so without updating the LF server the certificate can&#039;t be renewed.<br />
This change has been reflected in the LF appliance since version 4.1.9. <br />
If you have installed older version please update optimally to the latest version. <br />
After then re-validate  the certificate manually again in &quot;Admin &gt; System &gt; Certificate&quot; settings.]]></content:encoded>
    </item>
    <item>
      <title>CVE-2024-6387 - regreSSHion</title>
      <pubDate>Wed, 03 Jul 2024 09:49:06 +0000</pubDate>
      <link>https://forum.liquidfiles.com/threads/cve-2024-6387-regresshion.1941/</link>
      <guid>https://forum.liquidfiles.com/threads/cve-2024-6387-regresshion.1941/</guid>
      <author>invalid@example.com (David)</author>
      <dc:creator>David</dc:creator>
      <content:encoded><![CDATA[LF v3 with Centos7 is not affected.<br />
 <br />
The LF v4 is not affected as well in case you have enabled at  least the System Security Auto Updates (Admin &gt; System &gt; Updates).<br />
Then you should have installed or will have installed the fixed ssh version <b>1:8.9p1-3ubuntu0.10</b> <b>(jammy)</b> during a next nightly maintenance.<br />
<a href="https://ubuntu.com/security/CVE-2024-6387" target="_blank" class="externalLink" rel="nofollow">https://ubuntu.com/security/CVE-2024-6387</a><br />
<br />
How to check Installed version:<br />


<div class="bbCodeBlock bbCodeCode">
	<div class="type">Code:</div>
	<pre>#apt info ssh     

Package: ssh
Version: 1:8.9p1-3ubuntu0.10
</pre>
</div>]]></content:encoded>
    </item>
    <item>
      <title>LiquidFiles v4 supports the DUO Universal Prompt</title>
      <pubDate>Tue, 20 Feb 2024 10:24:53 +0000</pubDate>
      <link>https://forum.liquidfiles.com/threads/liquidfiles-v4-supports-the-duo-universal-prompt.1925/</link>
      <guid>https://forum.liquidfiles.com/threads/liquidfiles-v4-supports-the-duo-universal-prompt.1925/</guid>
      <author>invalid@example.com (David)</author>
      <dc:creator>David</dc:creator>
      <content:encoded><![CDATA[After the migration to v4 please activate the Universal Prompt in your DUO administration portal.]]></content:encoded>
    </item>
    <item>
      <title>Spring4Shell</title>
      <pubDate>Wed, 06 Apr 2022 08:45:06 +0000</pubDate>
      <link>https://forum.liquidfiles.com/threads/spring4shell.1873/</link>
      <guid>https://forum.liquidfiles.com/threads/spring4shell.1873/</guid>
      <author>invalid@example.com (David)</author>
      <dc:creator>David</dc:creator>
      <content:encoded><![CDATA[LiquidFiles does not use the Pivotal Spring Framework and is therefore not vulnerable to CVE-2010-1622, CVE-2018-1273, CVE-2022-22963, CVE-2022-22965 and similar other related to Spring.]]></content:encoded>
    </item>
    <item>
      <title>CVE-2021-4034 Polkit Privilege</title>
      <pubDate>Thu, 27 Jan 2022 10:17:10 +0000</pubDate>
      <link>https://forum.liquidfiles.com/threads/cve-2021-4034-polkit-privilege.1866/</link>
      <guid>https://forum.liquidfiles.com/threads/cve-2021-4034-polkit-privilege.1866/</guid>
      <author>invalid@example.com (David)</author>
      <dc:creator>David</dc:creator>
      <content:encoded><![CDATA[<a href="https://access.redhat.com/security/vulnerabilities/RHSB-2022-001" target="_blank" class="externalLink" rel="nofollow">CVE-2021-4034</a> vulnerability is not risky for LF appliance because it does not use the non privileged accounts in the system for users. Standard LF appliances installed on-presmise even do not have installed the polkit package so these appliances are Not vulnerable at all.<br />
<ul>
<li>Attention should be paid if you have LF appliance deployed in <b>Azure</b>, where polikit is used by management agents. The polkit in...</li>
</ul><br />
<a href="https://forum.liquidfiles.com/threads/cve-2021-4034-polkit-privilege.1866/" class="internalLink">CVE-2021-4034 Polkit Privilege</a>]]></content:encoded>
    </item>
    <item>
      <title>CVE-2021-44228 - LiquidFiles is Not using Log4J</title>
      <pubDate>Mon, 13 Dec 2021 07:11:15 +0000</pubDate>
      <link>https://forum.liquidfiles.com/threads/cve-2021-44228-liquidfiles-is-not-using-log4j.1860/</link>
      <guid>https://forum.liquidfiles.com/threads/cve-2021-44228-liquidfiles-is-not-using-log4j.1860/</guid>
      <author>invalid@example.com (David)</author>
      <dc:creator>David</dc:creator>
      <content:encoded><![CDATA[We&#039;ve gotten a fair few support requests over the last couple of days asking if LiquidFiles is vulnerable to the recent Log4J vulnerability (CVE-2021-44228) <b>and it isn&#039;t</b>.<br />
<br />
LiquidFiles, including the LiquidFiles product and the LiquidFiles company is not using Log4J anywhere now or have been in the past.<br />
<br />
And it is a good reminder if you are not using either LiquidFiles v3.5.15 or v3.6.4, it is recommended to update to either of these versions for security, stability, functionality and...<br />
<br />
<a href="https://forum.liquidfiles.com/threads/cve-2021-44228-liquidfiles-is-not-using-log4j.1860/" class="internalLink">CVE-2021-44228 - LiquidFiles is Not using Log4J</a>]]></content:encoded>
    </item>
    <item>
      <title>Welcome to the Forum</title>
      <pubDate>Mon, 04 Jan 2016 16:39:28 +0000</pubDate>
      <link>https://forum.liquidfiles.com/threads/welcome-to-the-forum.1/</link>
      <guid>https://forum.liquidfiles.com/threads/welcome-to-the-forum.1/</guid>
      <author>invalid@example.com (Johan)</author>
      <dc:creator>Johan</dc:creator>
      <content:encoded><![CDATA[Welcome to the LiquidFiles forum.<br />
<br />
This is for you to interact with fellow LiquidFiles users, ask questions, share tips and tricks, branding updates and API integrations.<br />
<br />
We want to keep this as open and friendly as possible. Use your best judgment at all times and we won&#039;t have to add any moderation and similar.<br />
<br />
Enjoy!]]></content:encoded>
    </item>
  </channel>
</rss>
