lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 14 Jun 2007 17:31:14 -0400 From: "John M. Martinelli" <john@...tinelli.com> To: accounting@...city.com Cc: bugtraq@...urityfocus.com Subject: Re: RedLevel Advisory #23 - SalesCart Shopping Cart SQL Injection Vulnerability Dear "Accounting", I have legally posted vulnerability information on a mailing list specifically for this issue. The public is entitled to this information. It is up to the editors of the board to decide whether this vulnerability is fact or fiction. They don't post incorrect vulnerability information. Otherwise, I could simply say I have 15 remote root vulnerabilities affecting every linux kernel. If you would prefer for our company to look into your commercial product, we would be more than happy. For now, though, we would appreciate private and direct correspondence. Thank you, John Martinelli RedLevel.org Security On Jun 13, 2007, at 1:36 PM, accounting@...city.com wrote: > This is not true and is actually "slander". > > He says no one responded; however, I personally talked with Mr. > Martinelli and explained to him he was looking at an old out-of- > date demo on the website that is not indicative of the released > product. > > These tests were performed on a "non-commercial" product demo and > are not indicative of the commercial product at all. We were able > to reproduce this sql injection on this demo code but not on the > released product. In addition, the product the customer is > referring to is also completely "obsolete". > > Mr. Martinelli's information is incorrect and down right slanderous > in at least 3 or 4 accounts.
Powered by blists - more mailing lists