Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Sa520w
(Cisco)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 3 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2015-12-13 | CVE-2015-6418 | The random-number generator on Cisco Small Business RV routers 4.x and SA500 security appliances 2.2.07 does not have sufficient entropy, which makes it easier for remote attackers to determine a TLS key pair via unspecified computations upon handshake key-exchange data, aka Bug ID CSCus15224. | Rv016_multi\-Wan_vpn_firmware, Rv042_dual_wan_vpn_router_firmware, Rv042g_dual_gigabit_wan_vpn_firmware, Rv082_dual_wan_vpn_router_firmware, Sa520, Sa520w, Sa540 | N/A | ||
2011-07-28 | CVE-2011-2547 | The web-based management interface on Cisco SA 500 series security appliances with software before 2.1.19 allows remote authenticated users to execute arbitrary commands via crafted parameters to web forms, aka Bug ID CSCtq65681. | Sa500_software, Sa520, Sa520w, Sa540 | N/A | ||
2011-07-28 | CVE-2011-2546 | SQL injection vulnerability in the web-based management interface on Cisco SA 500 series security appliances with software before 2.1.19 allows remote attackers to execute arbitrary SQL commands via unspecified vectors, aka Bug ID CSCtq65669. | Sa500_software, Sa520, Sa520w, Sa540 | N/A |