CVE-2012-1493
- EPSS 84.38%
- Published 09.07.2012 22:55:00
- Last modified 11.04.2025 00:51:21
F5 BIG-IP appliances 9.x before 9.4.8-HF5, 10.x before 10.2.4, 11.0.x before 11.0.0-HF2, and 11.1.x before 11.1.0-HF3, and Enterprise Manager before 2.1.0-HF2, 2.2.x before 2.2.0-HF1, and 2.3.x before 2.3.0-HF3, use a single SSH private key across di...
- EPSS 0.48%
- Published 16.03.2009 16:30:00
- Last modified 09.04.2025 00:30:58
The management interface in F5 BIG-IP 9.4.3 allows remote authenticated users with Resource Manager privileges to inject arbitrary Perl code via unspecified configuration settings related to Perl EP3 with templates, probably triggering static code in...
CVE-2008-1503
- EPSS 0.35%
- Published 25.03.2008 19:44:00
- Last modified 09.04.2025 00:30:58
Cross-site scripting (XSS) vulnerability in the web management interface in F5 BIG-IP 9.4.3 allows remote attackers to inject arbitrary web script or HTML via (1) the name of a node object, or the (2) sysContact or (3) sysLocation SNMP configuration ...
CVE-2008-0265
- EPSS 11.25%
- Published 15.01.2008 20:00:00
- Last modified 09.04.2025 00:30:58
Multiple cross-site scripting (XSS) vulnerabilities in the Search function in the web management interface in F5 BIG-IP 9.4.3 allow remote attackers to inject arbitrary web script or HTML via the SearchString parameter to (1) list_system.jsp, (2) lis...
CVE-2005-2245
- EPSS 0.85%
- Published 12.07.2005 04:00:00
- Last modified 03.04.2025 01:03:51
Unknown vulnerability in F5 BIG-IP 9.0.2 through 9.1 allows attackers to "subvert the authentication of SSL transactions," via unknown attack vectors, possibly involving NATIVE ciphers.
- EPSS 80.86%
- Published 31.05.2005 04:00:00
- Last modified 03.04.2025 01:03:51
Multiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote attackers to cause a denial of service (connection loss) via a spoofed packet with a large timer value, which causes ...
- EPSS 7.21%
- Published 08.11.1999 05:00:00
- Last modified 03.04.2025 01:03:51
bigconf.conf in F5 BIG/ip 2.1.2 and earlier allows remote attackers to read arbitrary files by specifying the target file in the "file" parameter.