F5

Big-ip Access Policy Manager

586 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.4%
  • Veröffentlicht 06.02.2019 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:53:32

libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (`lib/vauth/ntlm.c:ntlm_decode_type2_target`) does not validate incoming data correctly and is subjec...

  • EPSS 0.2%
  • Veröffentlicht 05.02.2019 18:29:00
  • Zuletzt bearbeitet 21.11.2024 04:46:45

On BIG-IP APM 14.0.0 to 14.0.0.4, 13.0.0 to 13.1.1.3 and 12.1.0 to 12.1.3.7, a reflected cross-site scripting (XSS) vulnerability exists in the resource information page for authenticated users when a full webtop is configured on the BIG-IP APM syste...

  • EPSS 0.12%
  • Veröffentlicht 28.12.2018 15:29:00
  • Zuletzt bearbeitet 21.11.2024 03:50:35

On versions 11.2.1. and greater, unrestricted Snapshot File Access allows BIG-IP system's user with any role, including Guest Role, to have access and download previously generated and available snapshot files on the BIG-IP configuration utility such...

  • EPSS 0.28%
  • Veröffentlicht 28.12.2018 15:29:00
  • Zuletzt bearbeitet 21.11.2024 03:50:35

A cross-site request forgery (CSRF) vulnerability in the APM webtop 11.2.1 or greater may allow attacker to force an APM webtop session to log out and require re-authentication.

  • EPSS 0.51%
  • Veröffentlicht 28.12.2018 15:29:00
  • Zuletzt bearbeitet 21.11.2024 03:50:35

When APM 13.0.0-13.1.x is deployed as an OAuth Resource Server, APM becomes a client application to an external OAuth authorization server. In certain cases when communication between the BIG-IP APM and the OAuth authorization server is lost, APM may...

  • EPSS 0.28%
  • Veröffentlicht 20.12.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:50:34

On BIG-IP 14.0.0-14.0.0.2, 13.0.0-13.1.1.1, or 12.1.0-12.1.3.7, or Enterprise Manager 3.1.1, when authenticated administrative users run commands in the Traffic Management User Interface (TMUI), also referred to as the BIG-IP Configuration utility, r...

  • EPSS 0.61%
  • Veröffentlicht 20.12.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:50:34

On BIG-IP 14.0.0-14.0.0.2, 13.0.0-13.1.1.1, or 12.1.0-12.1.3.7, when a virtual server using the inflate functionality to process a gzip bomb as a payload, the BIG-IP system will experience a fatal error and may cause the Traffic Management Microkerne...

  • EPSS 2.18%
  • Veröffentlicht 12.12.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 03:50:34

On BIG-IP 14.0.x, 13.x, 12.x, and 11.x, Enterprise Manager 3.1.1, BIG-IQ 6.x, 5.x, and 4.x, and iWorkflow 2.x, the passphrases for SNMPv3 users and trap destinations that are used for authentication and privacy are not handled by the BIG-IP system Se...

  • EPSS 0.12%
  • Veröffentlicht 06.12.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 03:50:35

The svpn component of the F5 BIG-IP APM client prior to version 7.1.7.2 for Linux and macOS runs as a privileged process and can allow an unprivileged user to get ownership of files owned by root on the local client host in a race condition.

  • EPSS 0.82%
  • Veröffentlicht 31.10.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 03:50:32

In BIG-IP 14.0.0-14.0.0.2, 13.0.0-13.1.1.5, 12.1.0-12.1.4.1, and 11.2.1-11.6.3.2, an attacker sending specially crafted SSL records to a SSL Virtual Server will cause corruption in the SSL data structures leading to intermittent decrypt BAD_RECORD_MA...