[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <32FE602A-E73A-4203-9E2C-71A9825F4B7F@martinelli.com>
Date: Thu, 14 Jun 2007 17:31:14 -0400
From: "John M. Martinelli" <john@...tinelli.com>
To: accounting@...city.com
Cc: bugtraq@...urityfocus.com
Subject: Re: RedLevel Advisory #23 - SalesCart Shopping Cart SQL Injection Vulnerability
Dear "Accounting",
I have legally posted vulnerability information on a mailing list
specifically for this issue. The public is entitled to this
information. It is up to the editors of the board to decide whether
this vulnerability is fact or fiction. They don't post incorrect
vulnerability information. Otherwise, I could simply say I have 15
remote root vulnerabilities affecting every linux kernel.
If you would prefer for our company to look into your commercial
product, we would be more than happy. For now, though, we would
appreciate private and direct correspondence.
Thank you,
John Martinelli
RedLevel.org Security
On Jun 13, 2007, at 1:36 PM, accounting@...city.com wrote:
> This is not true and is actually "slander".
>
> He says no one responded; however, I personally talked with Mr.
> Martinelli and explained to him he was looking at an old out-of-
> date demo on the website that is not indicative of the released
> product.
>
> These tests were performed on a "non-commercial" product demo and
> are not indicative of the commercial product at all. We were able
> to reproduce this sql injection on this demo code but not on the
> released product. In addition, the product the customer is
> referring to is also completely "obsolete".
>
> Mr. Martinelli's information is incorrect and down right slanderous
> in at least 3 or 4 accounts.
Powered by blists - more mailing lists