F5

Big-ip Webaccelerator

217 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.46%
  • Veröffentlicht 04.09.2019 17:15:11
  • Zuletzt bearbeitet 21.11.2024 04:46:52

On BIG-IP 14.1.0-14.1.0.5, 14.0.0-14.0.0.4, 13.0.0-13.1.2, 12.1.0-12.1.4.1, 11.5.2-11.6.4, when processing authentication attempts for control-plane users MCPD leaks a small amount of memory. Under rare conditions attackers with access to the managem...

  • EPSS 0.78%
  • Veröffentlicht 04.09.2019 16:15:10
  • Zuletzt bearbeitet 21.11.2024 04:46:52

On BIG-IP 14.0.0-14.1.0.5, 13.0.0-13.1.2, 12.1.0-12.1.4.1, 11.5.2-11.6.4, FTP traffic passing through a Virtual Server with both an active FTP profile associated and connection mirroring configured may lead to a TMM crash causing the configured HA ac...

Exploit
  • EPSS 3.41%
  • Veröffentlicht 26.07.2019 00:15:11
  • Zuletzt bearbeitet 21.11.2024 04:19:50

Versions of lodash lower than 4.17.12 are vulnerable to Prototype Pollution. The function defaultsDeep could be tricked into adding or modifying properties of Object.prototype using a constructor payload.

  • EPSS 0.35%
  • Veröffentlicht 03.07.2019 19:15:13
  • Zuletzt bearbeitet 21.11.2024 04:46:51

On BIG-IP 14.1.0-14.1.0.5, 14.0.0-14.0.0.4, 13.0.0-13.1.1.4, and 12.1.0-12.1.4, a high volume of malformed analytics report requests leads to instability in restjavad process. This causes issues with both iControl REST and some portions of TMUI. The ...

  • EPSS 0.13%
  • Veröffentlicht 03.07.2019 19:15:13
  • Zuletzt bearbeitet 21.11.2024 04:46:51

On BIG-IP 14.1.0-14.1.0.5, 14.0.0-14.0.0.4, 13.0.0-13.1.1.4, 12.1.0-12.1.4, 11.6.1-11.6.3.4, and 11.5.1-11.5.8, when the BIG-IP system is licensed for Appliance mode, a user with either the Administrator or the Resource Administrator role can bypass ...

  • EPSS 0.5%
  • Veröffentlicht 03.07.2019 19:15:13
  • Zuletzt bearbeitet 21.11.2024 04:46:51

On BIG-IP 14.1.0-14.1.0.5 and 14.0.0-14.0.0.4, Malformed http requests made to an undisclosed iControl REST endpoint can lead to infinite loop of the restjavad process.

  • EPSS 0.13%
  • Veröffentlicht 03.07.2019 19:15:13
  • Zuletzt bearbeitet 21.11.2024 04:46:51

On BIG-IP 14.1.0-14.1.0.5, 14.0.0-14.0.0.4, 13.0.0-13.1.1.4, 12.1.0-12.1.4, 11.6.1-11.6.3.4, and 11.5.1-11.5.8, SNMP exposes sensitive configuration objects over insecure transmission channels. This issue is exposed when a passphrase is inserted into...

  • EPSS 0.66%
  • Veröffentlicht 03.07.2019 19:15:13
  • Zuletzt bearbeitet 21.11.2024 04:46:51

On BIG-IP 12.1.0-12.1.4.1, undisclosed requests can cause iControl REST processes to crash. The attack can only come from an authenticated user; all roles are capable of performing the attack. Unauthenticated users cannot perform this attack.

  • EPSS 0.11%
  • Veröffentlicht 03.07.2019 19:15:12
  • Zuletzt bearbeitet 21.11.2024 04:46:50

On BIG-IP 14.1.0-14.1.0.5, 14.0.0-14.0.0.4, 13.0.0-13.1.1.4, and 12.1.0-12.1.4, under certain circumstances, attackers can decrypt configuration items that are encrypted because the vCMP configuration unit key is generated with insufficient randomnes...

  • EPSS 0.12%
  • Veröffentlicht 03.07.2019 18:15:11
  • Zuletzt bearbeitet 21.11.2024 04:46:50

On BIG-IP 14.1.0-14.1.0.5, 14.0.0-14.0.0.4, 13.0.0-13.1.1.4, 12.1.0-12.1.4.1, and 11.5.1-11.6.4, when the BIG-IP system is licensed with Appliance mode, user accounts with Administrator and Resource Administrator roles can bypass Appliance mode restr...