F5

Big-ip Webaccelerator

217 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.34%
  • Veröffentlicht 02.08.2023 16:15:10
  • Zuletzt bearbeitet 21.11.2024 08:13:32

A cross-site scripting (XSS) vulnerability exists in an undisclosed page of the BIG-IP Configuration utility that allows an attacker to run JavaScript in the context of the currently logged-in user.  Note: Software versions which have reached End of...

  • EPSS 0.07%
  • Veröffentlicht 02.08.2023 16:15:10
  • Zuletzt bearbeitet 21.11.2024 08:17:20

Specific F5 BIG-IP platforms with Cavium Nitrox FIPS HSM cards generate a deterministic password for the Crypto User account.  The predictable nature of the password allows an authenticated user with TMSH access to the BIG-IP system, or anyone with ...

  • EPSS 0.4%
  • Veröffentlicht 03.05.2023 15:15:13
  • Zuletzt bearbeitet 21.11.2024 07:56:38

When UDP profile with idle timeout set to immediate or the value 0 is configured on a virtual server, undisclosed traffic can cause TMM to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

  • EPSS 0.14%
  • Veröffentlicht 03.05.2023 15:15:12
  • Zuletzt bearbeitet 21.11.2024 07:48:12

When an SSL profile is configured on a Virtual Server, undisclosed traffic can cause an increase in CPU or SSL accelerator resource utilization.   Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

  • EPSS 0.35%
  • Veröffentlicht 03.05.2023 15:15:12
  • Zuletzt bearbeitet 21.11.2024 07:52:47

Multiple reflected cross-site scripting (XSS) vulnerabilities exist in undisclosed pages of the BIG-IP Configuration utility which allow an attacker to run JavaScript in the context of the currently logged-in user.  Note: Software versions which hav...

  • EPSS 0.6%
  • Veröffentlicht 03.05.2023 15:15:12
  • Zuletzt bearbeitet 21.11.2024 07:55:00

A directory traversal vulnerability exists in an undisclosed page of the BIG-IP Configuration utility which may allow an authenticated attacker to read files with .xml extension. Access to restricted information is limited and the attacker does not c...

  • EPSS 0.16%
  • Veröffentlicht 19.10.2022 22:15:13
  • Zuletzt bearbeitet 21.11.2024 07:24:12

On specific hardware platforms, on BIG-IP versions 16.1.x before 16.1.3.1, 15.1.x before 15.1.7, 14.1.x before 14.1.5.1, and all versions of 13.1.x, while Intel QAT (QuickAssist Technology) and the AES-GCM/CCM cipher is in use, undisclosed conditions...

Exploit
  • EPSS 14.68%
  • Veröffentlicht 11.11.2021 19:15:07
  • Zuletzt bearbeitet 22.08.2025 10:33:16

The Diffie-Hellman Key Agreement Protocol allows remote attackers (from the client side) to send arbitrary numbers that are actually not public keys, and trigger expensive server-side DHE modular-exponentiation calculations, aka a D(HE)at or D(HE)ate...

Exploit
  • EPSS 0.73%
  • Veröffentlicht 31.03.2021 18:15:15
  • Zuletzt bearbeitet 21.11.2024 05:51:08

On BIG-IP versions 14.1.4 and 16.0.1.1, when the Traffic Management Microkernel (TMM) process handles certain undisclosed traffic, it may start dropping all fragmented IP traffic. Note: Software versions which have reached End of Software Development...

  • EPSS 0.28%
  • Veröffentlicht 05.11.2020 20:15:17
  • Zuletzt bearbeitet 21.11.2024 05:34:52

In versions 16.0.0-16.0.0.1, 15.1.0-15.1.0.5, and 14.1.0-14.1.2.3, a stored cross-site scripting (XSS) vulnerability exists in an undisclosed page of the BIG-IP Traffic Management User Interface (TMUI), also known as the BIG-IP Configuration utility.