lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <06DA44B99382B2428AD8DBFEE6CD209FAFD924@APOLLO.il.corp.radware.com>
Date: Thu, 2 Jul 2009 14:23:16 +0300
From: "Shaked  Vax" <ShakedV@...ware.com>
To: <full-disclosure@...ts.grok.org.uk>
Subject: Re: radware AppWall Web Application Firewall:
	Source code disclosure on management interface

Radware team has completed analysis of the reported issue, concluding
that no AppWall customer using the product  according to Radware
deployment recommendations would be exposed to vulnerability as a result
of this issue. This is due to the facts that this issue exists only on
the management interface that is recommended to be connection to
internal LAN only, and that it does not allow performing any actions
that would influence machine functionality.
 Nevertheless, in order to enforce our commitment to deliver top
security solution to our customers, Radware will supply a fix for this
issue within its upcoming AppWall release.

Shaked Vax
AppWall Product Manager 
ShakedV@...ware.com 
 

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ