Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
f5 big-ip access policy manager 12.1.0 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2018-5536
A remote attacker via undisclosed measures, may be able to exploit an F5 BIG-IP APM 13.0.0-13.1.0.7 or 12.1.0-12.1.3.5 virtual server configured with an APM per-request policy object and cause a memory leak in the APM module.
F5 Big-ip Access Policy Manager
F5 Big-ip Access Policy Manager 14.0.0
5
CVSSv2
CVE-2018-5533
Under certain conditions on F5 BIG-IP 13.0.0, 12.1.0-12.1.2, 11.6.0-11.6.3.1, or 11.5.0-11.5.6, TMM may core while processing SSL forward proxy traffic.
F5 Big-ip Local Traffic Manager 13.0.0
F5 Big-ip Local Traffic Manager
F5 Big-ip Application Acceleration Manager 13.0.0
F5 Big-ip Application Acceleration Manager
F5 Big-ip Advanced Firewall Manager 13.0.0
F5 Big-ip Advanced Firewall Manager
F5 Big-ip Analytics 13.0.0
F5 Big-ip Analytics
F5 Big-ip Access Policy Manager 13.0.0
F5 Big-ip Access Policy Manager
F5 Big-ip Application Security Manager 13.0.0
F5 Big-ip Application Security Manager
F5 Big-ip Domain Name System 13.0.0
F5 Big-ip Domain Name System
F5 Big-ip Edge Gateway 13.0.0
F5 Big-ip Edge Gateway
F5 Big-ip Fraud Protection Service 13.0.0
F5 Big-ip Fraud Protection Service
F5 Big-ip Global Traffic Manager 13.0.0
F5 Big-ip Global Traffic Manager
F5 Big-ip Link Controller 13.0.0
F5 Big-ip Link Controller
5
CVSSv2
CVE-2018-5535
On F5 BIG-IP 14.0.0, 13.0.0-13.1.0, 12.1.0-12.1.3, or 11.5.1-11.6.3 specifically crafted HTTP responses, when processed by a Virtual Server with an associated QoE profile that has Video enabled, may cause TMM to incorrectly buffer response data causing the TMM to restart resultin...
F5 Big-ip Local Traffic Manager
F5 Big-ip Local Traffic Manager 14.0.0
F5 Big-ip Application Acceleration Manager
F5 Big-ip Application Acceleration Manager 14.0.0
F5 Big-ip Advanced Firewall Manager
F5 Big-ip Advanced Firewall Manager 14.0.0
F5 Big-ip Analytics
F5 Big-ip Analytics 14.0.0
F5 Big-ip Access Policy Manager
F5 Big-ip Access Policy Manager 14.0.0
F5 Big-ip Application Security Manager
F5 Big-ip Application Security Manager 14.0.0
F5 Big-ip Domain Name System
F5 Big-ip Domain Name System 14.0.0
F5 Big-ip Edge Gateway
F5 Big-ip Edge Gateway 14.0.0
F5 Big-ip Fraud Protection Service
F5 Big-ip Fraud Protection Service 14.0.0
F5 Big-ip Global Traffic Manager
F5 Big-ip Global Traffic Manager 14.0.0
F5 Big-ip Link Controller
F5 Big-ip Link Controller 14.0.0
5
CVSSv2
CVE-2018-5532
On F5 BIG-IP 13.0.0, 12.1.0-12.1.2, 11.6.0-11.6.3.1, or 11.2.1-11.5.6 a domain name cached within the DNS Cache of TMM may continue to be resolved by the cache even after the parent server revokes the record, if the DNS Cache is receiving a stream of requests for the cached name.
F5 Big-ip Local Traffic Manager 13.0.0
F5 Big-ip Local Traffic Manager
F5 Big-ip Application Acceleration Manager 13.0.0
F5 Big-ip Application Acceleration Manager
F5 Big-ip Advanced Firewall Manager 13.0.0
F5 Big-ip Advanced Firewall Manager
F5 Big-ip Analytics 13.0.0
F5 Big-ip Analytics
F5 Big-ip Access Policy Manager 13.0.0
F5 Big-ip Access Policy Manager
F5 Big-ip Application Security Manager 13.0.0
F5 Big-ip Application Security Manager
F5 Big-ip Domain Name System 13.0.0
F5 Big-ip Domain Name System
F5 Big-ip Edge Gateway 13.0.0
F5 Big-ip Edge Gateway
F5 Big-ip Fraud Protection Service 13.0.0
F5 Big-ip Fraud Protection Service
F5 Big-ip Global Traffic Manager 13.0.0
F5 Big-ip Global Traffic Manager
F5 Big-ip Link Controller 13.0.0
F5 Big-ip Link Controller
5
CVSSv2
CVE-2018-5534
Under certain conditions on F5 BIG-IP 13.1.0-13.1.0.5, 13.0.0, 12.1.0-12.1.3.1, 11.6.0-11.6.3.1, or 11.5.0-11.5.6, TMM may core while processing SSL forward proxy traffic.
F5 Big-ip Local Traffic Manager 13.0.0
F5 Big-ip Local Traffic Manager
F5 Big-ip Application Acceleration Manager 13.0.0
F5 Big-ip Application Acceleration Manager
F5 Big-ip Advanced Firewall Manager 13.0.0
F5 Big-ip Advanced Firewall Manager
F5 Big-ip Analytics 13.0.0
F5 Big-ip Analytics
F5 Big-ip Access Policy Manager 13.0.0
F5 Big-ip Access Policy Manager
F5 Big-ip Application Security Manager 13.0.0
F5 Big-ip Application Security Manager
F5 Big-ip Domain Name System 13.0.0
F5 Big-ip Domain Name System
F5 Big-ip Edge Gateway 13.0.0
F5 Big-ip Edge Gateway
F5 Big-ip Fraud Protection Service 13.0.0
F5 Big-ip Fraud Protection Service
F5 Big-ip Global Traffic Manager 13.0.0
F5 Big-ip Global Traffic Manager
F5 Big-ip Link Controller 13.0.0
F5 Big-ip Link Controller
5
CVSSv2
CVE-2018-5524
Under certain conditions, on F5 BIG-IP 13.0.0-13.1.0.5, 12.1.0-12.1.3.1, or 11.6.1 HF2-11.6.3.1, virtual servers configured with Client SSL or Server SSL profiles which make use of network hardware security module (HSM) functionality are exposed and impacted by this issue.
F5 Big-ip Application Acceleration Manager
F5 Big-ip Local Traffic Manager
F5 Big-ip Advanced Firewall Manager
F5 Big-ip Analytics
F5 Big-ip Access Policy Manager
F5 Big-ip Application Security Manager
F5 Big-ip Edge Gateway
F5 Big-ip Link Controller
F5 Big-ip Policy Enforcement Manager
F5 Big-ip Webaccelerator
F5 Big-ip Fraud Protection Service
5
CVSSv2
CVE-2017-6153
Features in F5 BIG-IP 13.0.0-13.1.0.3, 12.1.0-12.1.3.1, 11.6.1-11.6.3.1, 11.5.1-11.5.5, or 11.2.1 system that utilizes inflate functionality directly, via an iRule, or via the inflate code from PEM module are subjected to a service disruption via a "Zip Bomb" attack.
F5 Big-ip Application Acceleration Manager 13.0.0
F5 Big-ip Application Acceleration Manager 11.2.1
F5 Big-ip Application Acceleration Manager
F5 Big-ip Application Acceleration Manager 13.1.0
F5 Big-ip Local Traffic Manager 11.2.1
F5 Big-ip Local Traffic Manager 13.0.0
F5 Big-ip Local Traffic Manager
F5 Big-ip Local Traffic Manager 13.1.0
F5 Big-ip Advanced Firewall Manager 11.2.1
F5 Big-ip Advanced Firewall Manager 13.0.0
F5 Big-ip Advanced Firewall Manager
F5 Big-ip Advanced Firewall Manager 13.1.0
F5 Big-ip Analytics 11.2.1
F5 Big-ip Analytics 13.0.0
F5 Big-ip Analytics
F5 Big-ip Analytics 13.1.0
F5 Big-ip Access Policy Manager 13.0.0
F5 Big-ip Access Policy Manager 11.2.1
F5 Big-ip Access Policy Manager
F5 Big-ip Access Policy Manager 13.1.0
F5 Big-ip Application Security Manager 13.0.0
F5 Big-ip Application Security Manager 11.2.1
5
CVSSv2
CVE-2018-5513
On F5 BIG-IP 13.1.0-13.1.0.3, 13.0.0, 12.1.0-12.1.3.3, 11.6.1-11.6.3.1, 11.5.1-11.5.5, or 11.2.1, a malformed TLS handshake causes TMM to crash leading to a disruption of service. This issue is only exposed on the data plane when Proxy SSL configuration is enabled. The control pl...
F5 Big-ip Application Acceleration Manager 13.0.0
F5 Big-ip Application Acceleration Manager
F5 Big-ip Local Traffic Manager 13.0.0
F5 Big-ip Local Traffic Manager
F5 Big-ip Advanced Firewall Manager 13.0.0
F5 Big-ip Advanced Firewall Manager
F5 Big-ip Analytics 13.0.0
F5 Big-ip Analytics
F5 Big-ip Access Policy Manager 13.0.0
F5 Big-ip Access Policy Manager
F5 Big-ip Application Security Manager 13.0.0
F5 Big-ip Application Security Manager
F5 Big-ip Domain Name System 13.0.0
F5 Big-ip Domain Name System
F5 Big-ip Edge Gateway 13.0.0
F5 Big-ip Edge Gateway
F5 Big-ip Global Traffic Manager 13.0.0
F5 Big-ip Global Traffic Manager
F5 Big-ip Link Controller 13.0.0
F5 Big-ip Link Controller
F5 Big-ip Policy Enforcement Manager 13.0.0
F5 Big-ip Policy Enforcement Manager
5
CVSSv2
CVE-2018-5506
In F5 BIG-IP 13.0.0, 12.1.0-12.1.2, 11.6.1, 11.5.1-11.5.5, or 11.2.1 the Apache modules apache_auth_token_mod and mod_auth_f5_auth_token.cpp allow possible unauthenticated bruteforce on the em_server_ip authorization parameter to obtain which SSL client certificates used for mutu...
F5 Big-ip Local Traffic Manager 11.6.1
F5 Big-ip Local Traffic Manager 11.2.1
F5 Big-ip Local Traffic Manager 13.0.0
F5 Big-ip Local Traffic Manager
F5 Big-ip Application Acceleration Manager 11.6.1
F5 Big-ip Application Acceleration Manager 13.0.0
F5 Big-ip Application Acceleration Manager 11.2.1
F5 Big-ip Application Acceleration Manager
F5 Big-ip Advanced Firewall Manager 11.2.1
F5 Big-ip Advanced Firewall Manager 11.6.1
F5 Big-ip Advanced Firewall Manager 13.0.0
F5 Big-ip Advanced Firewall Manager
F5 Big-ip Analytics 11.2.1
F5 Big-ip Analytics 11.6.1
F5 Big-ip Analytics 13.0.0
F5 Big-ip Analytics
F5 Big-ip Access Policy Manager 13.0.0
F5 Big-ip Access Policy Manager 11.2.1
F5 Big-ip Access Policy Manager 11.6.1
F5 Big-ip Access Policy Manager
F5 Big-ip Application Security Manager 13.0.0
F5 Big-ip Application Security Manager 11.6.1
5
CVSSv2
CVE-2018-5507
On F5 BIG-IP versions 13.0.0, 12.1.0-12.1.3.1, 11.6.1-11.6.2, or 11.5.1-11.5.5, vCMP guests running on VIPRION 2100, 4200 and 4300 series blades cannot correctly decrypt ciphertext from established SSL sessions with small MTU.
F5 Big-ip Local Traffic Manager
F5 Big-ip Local Traffic Manager 13.0.0
F5 Big-ip Application Acceleration Manager
F5 Big-ip Application Acceleration Manager 13.0.0
F5 Big-ip Advanced Firewall Manager
F5 Big-ip Advanced Firewall Manager 13.0.0
F5 Big-ip Analytics
F5 Big-ip Analytics 13.0.0
F5 Big-ip Access Policy Manager
F5 Big-ip Access Policy Manager 13.0.0
F5 Big-ip Application Security Manager
F5 Big-ip Application Security Manager 13.0.0
F5 Big-ip Edge Gateway
F5 Big-ip Edge Gateway 13.0.0
F5 Big-ip Global Traffic Manager
F5 Big-ip Global Traffic Manager 13.0.0
F5 Big-ip Link Controller
F5 Big-ip Link Controller 13.0.0
F5 Big-ip Policy Enforcement Manager
F5 Big-ip Policy Enforcement Manager 13.0.0
F5 Big-ip Webaccelerator
F5 Big-ip Webaccelerator 13.0.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23692
malicious code
XML injection
CVE-2024-28020
CVE-2024-35252
CVE-2024-5833
CVE-2024-30066
injection
CVE-2024-23282
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »