Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2009-2301
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The radware AppWall Web Application Firewall (WAF) 1.0.2.6, with Gateway 4.6.0.2, allows remote attackers to read source code via a direct request to (1) funcs.inc, (2) defines.inc, or (3) msg.inc in Management/.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
radware AppWall Web应用防火墙源码泄露漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Radware AppWall是一款硬件的Web应用防火墙(WAF) 。 radware AppWall防火墙在运行为客户端和所保护的Web服务器之间的反向代理。在转发给Web服务器之前,所有的HTTP请求都经过检查。可通过一个正常情况下外部用户无法访问的独立管理页面来管理设备,这个Web页面是使用PHP编程语言实现的。有些功能存储在了include文件中,在需要时嵌入。由于Web服务器没有解释扩展名为*.inc的文件,因此能够访问管理界面的用户可以通过直接请求所包含的文件来访问部分产品源码 。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2009-2301
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2009-2301
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2009-2301

No comments yet


Leave a comment