F5

Big-ip Access Policy Manager

538 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.34%
  • Veröffentlicht 02.08.2023 16:15:10
  • Zuletzt bearbeitet 21.11.2024 08:13:32

A cross-site scripting (XSS) vulnerability exists in an undisclosed page of the BIG-IP Configuration utility that allows an attacker to run JavaScript in the context of the currently logged-in user.  Note: Software versions which have reached End of...

  • EPSS 0.07%
  • Veröffentlicht 02.08.2023 16:15:10
  • Zuletzt bearbeitet 21.11.2024 08:17:20

Specific F5 BIG-IP platforms with Cavium Nitrox FIPS HSM cards generate a deterministic password for the Crypto User account.  The predictable nature of the password allows an authenticated user with TMSH access to the BIG-IP system, or anyone with ...

  • EPSS 0.4%
  • Veröffentlicht 03.05.2023 15:15:13
  • Zuletzt bearbeitet 21.11.2024 07:56:38

When UDP profile with idle timeout set to immediate or the value 0 is configured on a virtual server, undisclosed traffic can cause TMM to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

  • EPSS 0.15%
  • Veröffentlicht 03.05.2023 15:15:12
  • Zuletzt bearbeitet 21.11.2024 07:47:54

An improper certificate validation vulnerability exists in the BIG-IP Edge Client for Windows and macOS and may allow an attacker to impersonate a BIG-IP APM system.  Note: Software versions which have reached End of Technical Support (EoTS) are not...

  • EPSS 0.14%
  • Veröffentlicht 03.05.2023 15:15:12
  • Zuletzt bearbeitet 21.11.2024 07:48:12

When an SSL profile is configured on a Virtual Server, undisclosed traffic can cause an increase in CPU or SSL accelerator resource utilization.   Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

  • EPSS 0.35%
  • Veröffentlicht 03.05.2023 15:15:12
  • Zuletzt bearbeitet 21.11.2024 07:52:47

Multiple reflected cross-site scripting (XSS) vulnerabilities exist in undisclosed pages of the BIG-IP Configuration utility which allow an attacker to run JavaScript in the context of the currently logged-in user.  Note: Software versions which hav...

  • EPSS 0.6%
  • Veröffentlicht 03.05.2023 15:15:12
  • Zuletzt bearbeitet 21.11.2024 07:55:00

A directory traversal vulnerability exists in an undisclosed page of the BIG-IP Configuration utility which may allow an authenticated attacker to read files with .xml extension. Access to restricted information is limited and the attacker does not c...

  • EPSS 0.27%
  • Veröffentlicht 03.05.2023 15:15:11
  • Zuletzt bearbeitet 21.11.2024 07:44:39

In the pre connection stage, an improper enforcement of message integrity vulnerability exists in BIG-IP Edge Client for Windows and Mac OS.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

  • EPSS 0.36%
  • Veröffentlicht 01.02.2023 18:15:11
  • Zuletzt bearbeitet 21.11.2024 07:44:35

On BIG-IP versions 16.1.x before 16.1.3.3, 15.1.x before 15.1.8, 14.1.x before 14.1.5.3, and all versions of 13.1.x, when a SIP profile is configured on a Message Routing type virtual server, undisclosed traffic can cause TMM to terminate. Note: Sof...

  • EPSS 0.36%
  • Veröffentlicht 01.02.2023 18:15:11
  • Zuletzt bearbeitet 21.11.2024 07:44:35

On version 14.1.x before 14.1.5.3, and all versions of 13.1.x, when the BIG-IP APM system is configured with all the following elements, undisclosed requests may cause the Traffic Management Microkernel (TMM) to terminate: * An OAuth Server that ...