Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
f5 big-ip guided configuration 8.0 vulnerabilities and exploits
(subscribe to this query)
4.4
CVSSv3
CVE-2023-39447
When BIG-IP APM Guided Configurations are configured, undisclosed sensitive information may be logged in restnoded log. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
F5 Big-ip Access Policy Manager 17.0.0
F5 Big-ip Guided Configuration 8.0
F5 Big-ip Guided Configuration 6.0
F5 Big-ip Access Policy Manager
F5 Big-ip Guided Configuration
6.8
CVSSv3
CVE-2022-27878
On all versions of 16.1.x, 15.1.x, 14.1.x, 13.1.x, 12.1.x, and 11.6.x of F5 BIG-IP, and F5 BIG-IP Guided Configuration (GC) all versions before 9.0, a stored cross-site scripting (XSS) vulnerability exists in an undisclosed page of the BIG-IP Configuration utility that allows an ...
F5 Big-ip Local Traffic Manager 13.1.0
F5 Big-ip Application Acceleration Manager 13.1.0
F5 Big-ip Advanced Firewall Manager 13.1.0
F5 Big-ip Analytics 13.1.0
F5 Big-ip Access Policy Manager 13.1.0
F5 Big-ip Application Security Manager 13.1.0
F5 Big-ip Global Traffic Manager 13.1.0
F5 Big-ip Link Controller 13.1.0
F5 Big-ip Policy Enforcement Manager 13.1.0
F5 Big-ip Domain Name System 13.1.0
F5 Big-ip Access Policy Manager 14.1.0
F5 Big-ip Advanced Firewall Manager 14.1.0
F5 Big-ip Advanced Firewall Manager 15.1.0
F5 Big-ip Analytics 14.1.0
F5 Big-ip Application Acceleration Manager 14.1.0
F5 Big-ip Application Acceleration Manager 15.1.0
F5 Big-ip Application Security Manager 14.1.0
F5 Big-ip Domain Name System 14.1.0
F5 Big-ip Domain Name System 15.1.0
F5 Big-ip Fraud Protection Service 13.1.0
F5 Big-ip Fraud Protection Service 14.1.0
F5 Big-ip Fraud Protection Service 15.1.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32976
CVE-2024-33557
CVE-2024-36801
CVE-2024-35654
authentication bypass
CVE-2024-24919
CSRF
code execution
CVE-2024-27348
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started