Quest KACE System Management Appliance version 8.0 (Build 8.0.318) suffers from code execution, cross site scripting, path traversal, remote SQL injection, and various other vulnerabilities.
fd18c79b0364edc307ae0073788f224ea5fd016ba9223e6018267eb9911d3f41
E-Mail Security Virtual Appliance (EVSA) suffers from a remote command execution vulnerability. Versions prior to 2.0.6 are affected.
6e4b74507cc0d89132a2039f65a75dcfe8903fdc24f6e4e066324b6bdfab2cac
AfterLogic Mailsuite Pro (VMware Appliance) version 6.3 suffers from a stored cross site scripting vulnerability.
70975b139f142c6b5aa2788169c1656874f10ae8fd42b3b7714b3d1791acff41
Barracuda Appliances suffer from a validation filter bypass vulnerability.
c222b5b36db2aca926df6332261353a3202eb98ce3597706a147c11aa1a06dae
Secunia Security Advisory - IBM has acknowledged a vulnerability in IBM WebSphere DataPower SOA Appliances, which can be exploited by malicious people to potentially compromise a vulnerable system.
17cbef896fca04580b6f564fd63c9176795cf37920d71602358744012253b898
Secunia Security Advisory - A vulnerability has been reported in Cisco Adaptive Security Appliances (ASA), which can be exploited by malicious people to cause a DoS (Denial of Service).
d9696ad4a0464e8fb8c2df3901f29929389a161e3dfdf6087c98fdaa1cb0366c
Cisco Security Advisory - Cisco ASA 5500 Series Adaptive Security Appliances (Cisco ASA) and Cisco Catalyst 6500 Series ASA Services Module (Cisco ASASM) contain a vulnerability that may allow an unauthenticated, remote attacker to cause the reload of the affected device. Cisco has released free software updates that address this vulnerability. Workarounds that mitigate this vulnerability are available.
b2138abe79ccd8a8c42dc9e1dd56625e65c8b779de339dfbe6292280c1a13fc6
F5 ships a public/private key pair on BIG-IP appliances that allows passwordless authentication to any other BIG-IP box. Since the key is easily retrievable, an attacker can use it to gain unauthorized remote access as root.
6ac4496033f2428dbb162f6a1981e581a57e0ffa587cd8f0dc742fc39045f66e
Secunia Security Advisory - A vulnerability has been reported in Cisco Adaptive Security Appliance (ASA), which can be exploited by malicious people to disclose potentially sensitive information.
e45add35072bcdc3ef566dbf7d8d09806ebc1397cbf59712514aac863b8976d8
Secunia Security Advisory - SecureWorks has reported multiple vulnerabilities in Cisco IronPort Web Security Appliance, which can be exploited by malicious people to conduct spoofing attacks.
bd5856b4bf23b2ee5dc41be06a3ae532f7aee6530ff8fdfa67b17e7ba8d42102
McAfee Email and Web Security Appliance versions prior to 5.5 Patch 6, Email and Web Security 5.6 Patch 3, and McAfee Email Gateway 7.0 Patch 1 suffer from a file download vulnerability.
541d487c0fd9f602725c99856fa3e3627cd412b773bb200ff86822d291aee585
McAfee Email and Web Security Appliance versions prior to 5.5 Patch 6, Email and Web Security 5.6 Patch 3, and McAfee Email Gateway 7.0 Patch 1 suffer from a password cracking vulnerability.
83b1fca33c08846e197daa065fc717ff51f5a94766c6b9b25ceeac7ca984be29
McAfee Email and Web Security Appliance versions prior to 5.5 Patch 6, Email and Web Security 5.6 Patch 3, and McAfee Email Gateway 7.0 Patch 1 suffer from a token disclosure vulnerability.
5e6128752681e8d4144799b7dd87140151481f96ddb6ba769da110dd68f46272
McAfee Email and Web Security Appliance versions prior to 5.5 Patch 6, Email and Web Security 5.6 Patch 3, and McAfee Email Gateway 7.0 Patch 1 suffer from an access bypass vulnerability.
38b9c98ba1910b6ae86c52cbb72d534f1960caf1fa1e8484b1a424503d4d3a2b
McAfee Email and Web Security Appliance versions prior to 5.5 Patch 6, Email and Web Security 5.6 Patch 3, and McAfee Email Gateway 7.0 Patch 1 suffer from a session hijacking vulnerability.
ea917b03e7a1554b15684bdf3c879c93ffadab2739f8cdd41c0e98cfd264ec09
McAfee Email and Web Security Appliance versions prior to 5.5 Patch 6, Email and Web Security 5.6 Patch 3, and McAfee Email Gateway 7.0 Patch 1 suffer from a cross site scripting vulnerability.
0c1840f7a89acaf990fbe44ab43b5a65bc48fca9f572401830ddd523cc72dcde
Secunia Security Advisory - Multiple vulnerabilities have been reported in Cisco Adaptive Security Appliances (ASA), which can be exploited by malicious people to cause a DoS (Denial of Service).
04f94b5e9668c52ce3e7f50859dae731c540f71605f3dcd95f5cb07bebd47236
Secunia Security Advisory - A vulnerability has been reported in Cisco Adaptive Security Appliances, which can be exploited by malicious people to compromise a user's system.
d2a4d17b2e4a22fddd19853e49d3bd37ca40b61fd337fa4af3abd1b48a7c33e2
Cisco Security Advisory - Cisco ASA 5500 Series Adaptive Security Appliances (ASA) and Cisco Catalyst 6500 Series ASA Services Module (ASASM) are affected by the following vulnerabilities: * Cisco ASA UDP Inspection Engine Denial of Service Vulnerability * Cisco ASA Threat Detection Denial of Service Vulnerability * Cisco ASA Syslog Message 305006 Denial of Service Vulnerability * Protocol-Independent Multicast Denial of Service Vulnerability These vulnerabilities are independent of each other; a release that is affected by one of the vulnerabilities may not be affected by the others. Cisco has released free software updates that address these vulnerabilities. Workarounds are available to mitigate some of the vulnerabilities.
990c9a606064bf238d98e228790139578f19956f848e51c0a0e2979bcdd36a50
Cisco Security Advisory - The Cisco Clientless VPN solution as deployed by Cisco ASA 5500 Series Adaptive Security Appliances (Cisco ASA) uses an ActiveX control on client systems to perform port forwarding operations. Microsoft Windows-based systems that are running Internet Explorer or another browser that supports Microsoft ActiveX technology may be affected if the system has ever connected to a device that is running the Cisco Clientless VPN solution. A remote, unauthenticated attacker who could convince a user to connect to a malicious web page could exploit this issue to execute arbitrary code on the affected machine with the privileges of the web browser. The affected ActiveX control is distributed to endpoint systems by Cisco ASA. However, the impact of successful exploitation of this vulnerability is to the endpoint system only and does not compromise Cisco ASA devices. Cisco has released free software updates that address this vulnerability. Workarounds that mitigate this vulnerability are available.
d5eb4f15929e22adebee6cabc4901b0a19fd375282c7f4226edd361bb721237f
Secunia Security Advisory - A weakness and multiple vulnerabilities have been reported in McAfee Email and Web Security Appliance and McAfee Email Gateway, which can be exploited by malicious users to disclose sensitive information and bypass certain security restrictions and by malicious people to conduct cross-site scripting and brute force attacks.
f90be7060896697d5f5c0e2675f47e178f02ef74d7532acb5b29a7d9dff80c93
Secunia Security Advisory - Benjamin Kunz Mejri has reported multiple vulnerabilities in Endian UTM Software Appliance and Endian Firewall Community, which can be exploited by malicious people to conduct cross-site scripting attacks.
b6d8e1f2583717c4148ec2cbe26cde65c599801c0a79760d7040635245364976
Secunia Security Advisory - Dell SecureWorks has reported a vulnerability in Cisco IronPort Encryption Appliance, which can be exploited by malicious people to conduct cross-site scripting attacks.
d5ed499f5d4dbd3bd82fa2a8e35b386b06abb9d43aaff44a2e6cd07ae084694e
Secunia Security Advisory - A weakness has been reported in WebSphere DataPower SOA Appliances, which can be exploited by malicious people to disclose potentially sensitive information and hijack a user's session.
db66bededf664c60f8f072d807940f1ac7f1cb778b83dbf502a25c19ecce1ae2
The Fortigate UTM WAF appliance suffers from persistent and reflective cross site scripting vulnerabilities.
c6c86248697ee4c3697220c46be0ac388573c9c584a375d85ff287d22f84e25d
Secunia Security Advisory - Cisco has acknowledged a vulnerability in some Cisco IronPort Appliances, which can be exploited by malicious people to compromise a vulnerable system.
d785dc9e631d3b1120e86c0a4c91b7392356cb1707ba6a18f9fed6ae9d90f317