F5

Big-ip Access Policy Manager

586 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.26%
  • Veröffentlicht 19.10.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 03:50:32

On F5 BIG-IP 13.0.0-13.1.1.1 and 12.1.0-12.1.3.6, a reflected Cross-Site Scripting (XSS) vulnerability exists in an undisclosed page of the BIG-IP Configuration utility that allows an authenticated user to execute JavaScript for the currently logged-...

  • EPSS 0.26%
  • Veröffentlicht 19.10.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 03:50:32

On F5 BIG-IP 13.0.0-13.1.1.1 and 12.1.0-12.1.3.6, there is a reflected Cross Site Scripting (XSS) vulnerability in an undisclosed Configuration Utility page.

  • EPSS 0.12%
  • Veröffentlicht 19.10.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 03:50:32

In F5 BIG-IP APM 13.0.0-13.1.1.1, APM Client 7.1.5-7.1.6, and/or Edge Client 7101-7160, the BIG-IP APM Edge Client component loads the policy library with user permission and bypassing the endpoint checks.

  • EPSS 3.53%
  • Veröffentlicht 10.10.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 03:50:31

When F5 BIG-IP 13.0.0-13.1.0.5, 12.1.0-12.1.3.5, 11.6.0-11.6.3.2, or 11.5.1-11.5.6 is processing specially crafted TCP traffic with the Large Receive Offload (LRO) feature enabled, TMM may crash, leading to a failover event. This vulnerability is not...

  • EPSS 0.65%
  • Veröffentlicht 08.10.2018 19:29:00
  • Zuletzt bearbeitet 21.11.2024 02:58:04

Under some circumstances on BIG-IP 12.0.0-12.1.0, 11.6.0-11.6.1, or 11.4.0-11.5.4 HF1, the Traffic Management Microkernel (TMM) may not properly clean-up pool member network connections when using SPDY or HTTP/2 virtual server profiles.

  • EPSS 0.28%
  • Veröffentlicht 13.09.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 03:50:31

A vulnerability in BIG-IP APM portal access 11.5.1-11.5.7, 11.6.0-11.6.3, and 12.1.0-12.1.3 discloses the BIG-IP software version in rewritten pages.

Exploit
  • EPSS 0.21%
  • Veröffentlicht 13.09.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 04:09:02

On BIG-IP APM 11.6.0-11.6.3, an insecure AES ECB mode is used for orig_uri parameter in an undisclosed /vdesk link of APM virtual server configured with an access profile, allowing a malicious user to build a redirect URI value using different blocks...

  • EPSS 0.75%
  • Veröffentlicht 13.09.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 04:09:03

On BIG-IP APM 11.6.0-11.6.3.1, 12.1.0-12.1.3.3, 13.0.0, and 13.1.0-13.1.0.3, APMD may core when processing SAML Assertion or response containing certain elements.

  • EPSS 3.82%
  • Veröffentlicht 06.09.2018 21:29:00
  • Zuletzt bearbeitet 21.11.2024 04:08:43

The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments...

Exploit
  • EPSS 0.13%
  • Veröffentlicht 17.08.2018 12:29:00
  • Zuletzt bearbeitet 21.11.2024 04:09:02

The svpn and policyserver components of the F5 BIG-IP APM client prior to version 7.1.7.1 for Linux and macOS runs as a privileged process and can allow an unprivileged user to get ownership of files owned by root on the local client host. A maliciou...