Quest KACE System Management Appliance version 8.0 (Build 8.0.318) suffers from code execution, cross site scripting, path traversal, remote SQL injection, and various other vulnerabilities.
fd18c79b0364edc307ae0073788f224ea5fd016ba9223e6018267eb9911d3f41
This Metasploit module exploits a chain of vulnerabilities in the Accellion File Transfer appliance. This appliance exposes a UDP service on port 8812 that acts as a gateway to the internal communication bus. This service uses Blowfish encryption for authentication, but the appliance ships with two easy to guess default authentication keys. This Metasploit module abuses the known default encryption keys to inject a message into the communication bus. In order to execute arbitrary commands on the remote appliance, a message is injected into the bus destined for the 'matchrep' service. This service exposes a function named 'insert_plugin_meta_info' which is vulnerable to an input validation flaw in a call to system(). This provides access to the 'soggycat' user account, which has sudo privileges to run the primary admin tool as root. These two flaws are fixed in update version FTA_8_0_562.
adc6990f1cf99e26413f21f398ece6121bbb6179c5ffc9a96eea0dee3107fd02
Secunia Security Advisory - Some vulnerabilities have been reported in Cisco Adaptive Security Appliance (ASA), which can be exploited by malicious people to cause a DoS (Denial of Service) and disclose potentially sensitive information.
dbb59c26a4fdabdb6132581b336f2eea3542c7851382d8fd7025f7163eed4dce
Secunia Security Advisory - Two vulnerabilities have been reported in Cisco Adaptive Security Appliance (ASA), which can be exploited by malicious people to cause a DoS (Denial of Service).
7299c269130a7991d113d951b7ebb4ed6b85e1add8dbc40b9bfc0b09b356731d
Cisco Security Advisory - Cisco ASA 5500 Series Adaptive Security Appliances are affected by a transparent firewall packet buffer exhaustion vulnerability, a SCCP denial of service vulnerability, a RIP denial of service vulnerability, and an unauthorized file system access vulnerability.
e76421e954aaa07cd6bf59eee71ec3dfe95a934bc32fb56fe6edae8a2ff01ed9
Secunia Security Advisory - HD Moore has reported multiple vulnerabilities in Accellion File Transfer Appliance, which can be exploited by malicious, local users to disclose sensitive information and gain escalated privileges and by malicious users and malicious people to compromise a vulnerable system.
1f052e71d3c42be89da41ca1395232fcf10740cbd2841d1ce266870bf0b37457
Rapid7 Security Advisory - The Accellion File Transfer Appliance, prior to version FTA_8_0_562, suffers from a number of security flaws that can lead to a remote root compromise. These include issues like command injection, administrative tty check bypass, static passwords for privileged accounts, and more.
0a8e02333db7c5c6cf71307a3206cf3d0cad0322edd4b58872ca8c87a34994eb
Secunia Security Advisory - Multiple vulnerabilities have been reported in Cisco ASA (Adaptive Security Appliance) 5500 Series, which can be exploited by malicious users and malicious people to bypass certain security restrictions and by malicious people to cause a DoS (Denial of Service).
f744c2892c05ced66a4a7afc42cfa077630f7b60708ccb87d8686545e05f728d
Secunia Security Advisory - A vulnerability has been reported in Cisco ASA (Adaptive Security Appliance) 5500 Series, which can be exploited by malicious people to cause a DoS (Denial of Service).
059cb66f291658be78fd9af1bb8816490128415a85cb71c8c26c056a14b065b7
NGS Secure has discovered an enumeration vulnerability in (Cisco) Cisco VPN Concentrator, Cisco PIX and Cisco Adaptive Security Appliance.
36fee32442875e7c34fe81340c8ce76a9f75d1183377a5043c7a1e10371a76c1
Secunia Security Advisory - A weakness has been reported in Cisco ASA (Adaptive Security Appliance) 5500 Series, which can be exploited by malicious people to gain knowledge of certain information.
b5ae965c5bb6f20748ae5916f5a0ae4551b829b73a4b7c28d4a780b806a39a03
Core Security Technologies Advisory - A security vulnerability was discovered in LANDesk Management Suite: The Landesk web application does not sufficiently verify if a well-formed request was provided by the user who submitted the request. Using this information an external remote attacker can run arbitrary code using the 'gsbadmin' user (that is the user running the web-server). In order to be able to successfully make the attack, the administrator must be logged in to the appliance with the browser that the attacker uses to make the attack (for instance, exploiting a XSS in a different tab in the browser).
3dc2b0c9c31c4becfd753be92f87f46eef1496e094193a2f7775f7b49bd1734b
Web-based Local Management Interface (LMI) of IBM Proventia Network Mail Security System appliance (firmware 1.6) is vulnerable to a CRLF Injection vulnerability. When exploited by an authenticated attacker, such vulnerability could lead to compromising the security of the appliance, allowing injection of custom HTTP cookies, forcing external redirects, potential HTTP Response Splitting attacks, etc.
e89f3a47c9d247e4c7ef74ea39c92a4c23d3b46381a0211b7b0b6dd059c87d44
Web-based Local Management Interface (LMI) of IBM Proventia Network Mail Security System appliance (firmware 1.6) is vulnerable to an Insecure Direct Object Reference vulnerability. When exploited by an authenticated attacker, such vulnerability could lead to compromising the security of the appliance, allowing OS command execution, local file inclusion resulting in exposure of appliance configuration files, source code, etc.
4faf8158f2565688d604706ac1cf4006697d9a3c4dc9926cebbe5d8ab0579ade
Web-based Local Management Interface (LMI) of IBM Proventia Network Mail Security System appliance (firmware 1.6 and 2.5) is vulnerable to multiple persistent and reflected XSS attacks. When exploited by an external/internal attacker, such identified vulnerabilities could lead to Session Hijack, Information Disclosure, force installation of malicious file or Trojan on users' PCs, etc.
7d77648766361a40b7d96f7ef892d0dab12d44b36490044262f591af031bf755
Web-based Local Management Interface (LMI) of IBM Proventia Network Mail Security System appliance (firmware 1.6 and 2.5) is vulnerable to XSRF attacks. When exploited by an attacker, the identified vulnerabilities could lead to compromising the security of the appliance, including unauthorized alteration of appliance's settings, DoS attacks, etc.
e79b5a9fb4e89af714cf275dfcd4e03761b0ba0e0db20144b1e00d48f36b7d68
Cisco Security Advisory - Cisco ASA 5500 Series Adaptive Security Appliances are affected by multiple denial of service vulnerabilities.
39cd6000cab98f829af61bf134f80406dff7844df55369514435f07d3e0cdecb
Secunia Security Advisory - Some vulnerabilities have been reported in Cisco ASA (Adaptive Security Appliance) 5500 Series, which can be exploited by malicious people to cause a DoS (Denial of Service).
0869d86e4e0d1927f18d50abc6307864fd633d09d3e8273f7915332c66f54193
The EMC Celerra Network Attached Storage (NAS) appliance allows for unauthorized access to a root NFS export.
7f8a55ea48522f9e3ff51e1ce2c01aa22c50783f5a13c5e6ad77041f33f1523f
VMware Security Advisory - VMware Studio 2.1 addresses security vulnerabilities in virtual appliances created with Studio 2.0.
0db53c597e93d42d1dc1c70847ad8b7ad162e5bfd7ee81e6fd69c060ab801465
InterScan Web Security Virtual Appliance version 5.0 suffers from a permanent cross site scripting vulnerability.
d60343329b98b29fcbff997e59b730f730f821f2e44103c45085db4e6f514328
Secunia Security Advisory - Some vulnerabilities have been reported in Trend Micro InterScan Web Security Virtual Appliance, which can be exploited by malicious users to disclose potentially sensitive information or compromise a vulnerable system, and by malicious people to conduct cross-site request forgery attacks.
a0681c7eefd99d0f2764f58b138c0a8dfb67d04cdfcd62a27bac8a3f6babbba1
Cisco Adaptive Security Appliance (ASA) is vulnerable to HTTP response splitting caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability using a specially-crafted URL to execute script in a victim?s web browser within the security context of the Adaptive Security Appliance site. Versions 8.1(1) and earlier are affected.
3064d44bee1b7468da72c1186ac4343d80636c9c5e6f3943f1d2992b6d3100b1
Secunia Security Advisory - Some vulnerabilities have been reported in TANDBERG Video Communication Server, which can be exploited by malicious users to disclose sensitive information, and by malicious people to conduct hijacking attacks and potentially compromise a vulnerable appliance.
1b5f6a02031dc444d2ff506eaf260738ce1068e4785e3c4b23a5c70be4b01708
Virtual Security Research, LLC. Security Advisory - On December 2nd, VSR identified an authentication bypass vulnerability in TANDBERG's Video Communication Server, firmware version x4.2.1. This vulnerability allows for the complete bypass of authentication in the administrative web console. Since this web interface can be used to execute arbitrary code on the appliance as root (via software updates), the severity is considered critical.
db51c425156ad6e9f3fa40fb9a1383e98edfded1cb0710c6c58c4a658f0b3a0b
Virtual Security Research, LLC. Security Advisory - On December 2nd, VSR identified a SSH service authentication weakness vulnerability in the TANDBERG's Video Communication Server. This issue would allow an attacker with privileged network access to conduct server impersonation and man-in-the-middle attacks on administrator SSH sessions. Successful attacks could yield shell access to vulnerable appliances.
5d59b48678f9f742a235347210d3b7f85ea422e15a8e88168874895fb1bf8af4