Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
big-ip access policy manager client vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2020-5897
In versions 7.1.5-7.1.9, there is use-after-free memory vulnerability in the BIG-IP Edge Client Windows ActiveX component.
F5 Big-ip Access Policy Manager
F5 Big-ip Access Policy Manager Client
6.7
CVSSv3
CVE-2020-5892
In versions 7.1.5-7.1.8, the BIG-IP Edge Client components in BIG-IP APM, Edge Gateway, and FirePass legacy allow malicious users to obtain the full session ID from process memory.
F5 Big-ip Access Policy Manager
F5 Big-ip Access Policy Manager Client
F5 Big-ip Edge Gateway
5.4
CVSSv3
CVE-2020-5889
On versions 15.1.0-15.1.0.1, 15.0.0-15.0.1.2, and 14.1.0-14.1.2.3, in BIG-IP APM portal access, a specially crafted HTTP request can lead to reflected XSS after the BIG-IP APM system rewrites the HTTP response from the untrusted backend server and sends it to the client.
F5 Big-ip Access Policy Manager
3.7
CVSSv3
CVE-2020-5893
In versions 7.1.5-7.1.8, when a user connects to a VPN using BIG-IP Edge Client over an unsecure network, BIG-IP Edge Client responds to authentication requests over HTTP while sending probes for captive portal detection.
F5 Big-ip Access Policy Manager
F5 Big-ip Access Policy Manager Client
4.9
CVSSv3
CVE-2019-19150
On versions 15.0.0-15.0.1.1, 14.1.0-14.1.2, 14.0.0-14.0.1, 13.1.0-13.1.3.1, 12.1.0-12.1.5, and 11.5.2-11.6.5.1, the BIG-IP APM system logs the client-session-id when a per-session policy is attached to the virtual server with debug logging enabled.
F5 Big-ip Access Policy Manager
5.5
CVSSv3
CVE-2019-6668
The BIG-IP APM Edge Client for macOS bundled with BIG-IP APM 15.0.0-15.0.1, 14.1.0-14.1.0.5, 14.0.0-14.0.0.4, 13.1.0-13.1.1.5, 12.1.0-12.1.5, and 11.5.1-11.6.5 may allow unprivileged users to access files owned by root.
F5 Big-ip Access Policy Manager
9.8
CVSSv3
CVE-2019-6675
BIG-IP configurations using Active Directory, LDAP, or Client Certificate LDAP for management authentication with multiple servers are exposed to a vulnerability which allows an authentication bypass. This can result in a complete compromise of the system. This issue only impacts...
F5 Big-ip Link Controller
F5 Big-ip Link Controller 14.1.0.3.0.79.6-eng Hotfix
F5 Big-ip Link Controller 14.1.0.3.0.97.6-eng Hotfix
F5 Big-ip Link Controller 14.1.0.3.0.99.6-eng Hotfix
F5 Big-ip Link Controller 14.1.0.5.0.15.5-eng Hotfix
F5 Big-ip Link Controller 14.1.0.5.0.36.5-eng Hotfix
F5 Big-ip Link Controller 14.1.0.5.0.40.5-eng Hotfix
F5 Big-ip Link Controller 14.1.0.6.0.11.9-eng Hotfix
F5 Big-ip Link Controller 14.1.0.6.0.14.9-eng Hotfix
F5 Big-ip Link Controller 14.1.0.6.0.68.9-eng Hotfix
F5 Big-ip Link Controller 14.1.0.6.0.70.9-eng Hotfix
F5 Big-ip Link Controller 14.1.2.0.11.37-eng Hotfix
F5 Big-ip Link Controller 14.1.2.0.18.37-eng Hotfix
F5 Big-ip Link Controller 14.1.2.0.32.37-eng Hotfix
F5 Big-ip Link Controller 14.1.2.1.0.46.4-eng Hotfix
F5 Big-ip Link Controller 14.1.2.1.0.14.4-eng Hotfix
F5 Big-ip Link Controller 14.1.2.1.0.16.4-eng Hotfix
F5 Big-ip Link Controller 14.1.2.1.0.34.4-eng Hotfix
F5 Big-ip Link Controller 14.1.2.1.0.97.4-eng Hotfix
F5 Big-ip Link Controller 14.1.2.1.0.99.4-eng Hotfix
F5 Big-ip Link Controller 14.1.2.1.0.105.4-eng Hotfix
F5 Big-ip Link Controller 14.1.2.1.0.111.4-eng Hotfix
7.5
CVSSv3
CVE-2018-5743
By design, BIND is intended to limit the number of TCP clients that can be connected at any given time. The number of allowed connections is a tunable parameter which, if unset, defaults to a conservative value for most servers. Unfortunately, the code which was intended to limit...
F5 Big-ip Local Traffic Manager
F5 Big-ip Local Traffic Manager 15.0.0
F5 Big-ip Application Acceleration Manager
F5 Big-ip Application Acceleration Manager 15.0.0
F5 Big-ip Advanced Firewall Manager
F5 Big-ip Advanced Firewall Manager 15.0.0
F5 Big-ip Analytics
F5 Big-ip Analytics 15.0.0
F5 Big-ip Access Policy Manager
F5 Big-ip Access Policy Manager 15.0.0
F5 Big-ip Application Security Manager
F5 Big-ip Application Security Manager 15.0.0
F5 Big-ip Edge Gateway
F5 Big-ip Edge Gateway 15.0.0
F5 Big-ip Fraud Protection Service
F5 Big-ip Fraud Protection Service 15.0.0
F5 Big-ip Global Traffic Manager
F5 Big-ip Global Traffic Manager 15.0.0
F5 Big-ip Link Controller
F5 Big-ip Link Controller 15.0.0
F5 Big-ip Webaccelerator
F5 Big-ip Webaccelerator 15.0.0
3 Github repositories
7.5
CVSSv3
CVE-2019-6656
BIG-IP APM Edge Client before version 7.1.8 (7180.2019.508.705) logs the full apm session ID in the log files. Vulnerable versions of the client are bundled with BIG-IP APM versions 15.0.0-15.0.1, 14,1.0-14.1.0.6, 14.0.0-14.0.0.4, 13.0.0-13.1.1.5, 12.1.0-12.1.5, and 11.5.1-11.6.5...
F5 Big-ip Access Policy Manager
F5 Big-ip Access Policy Manager Client
7.5
CVSSv3
CVE-2019-6629
On BIG-IP 14.1.0-14.1.0.5, undisclosed SSL traffic to a virtual server configured with a Client SSL profile may cause TMM to fail and restart. The Client SSL profile must have session tickets enabled and use DHE cipher suites to be affected. This only impacts the data plane, ther...
F5 Big-ip Local Traffic Manager
F5 Big-ip Application Acceleration Manager
F5 Big-ip Advanced Firewall Manager
F5 Big-ip Analytics
F5 Big-ip Access Policy Manager
F5 Big-ip Application Security Manager
F5 Big-ip Domain Name System
F5 Big-ip Edge Gateway
F5 Big-ip Global Traffic Manager
F5 Big-ip Link Controller
F5 Big-ip Policy Enforcement Manager
F5 Big-ip Webaccelerator
F5 Big-ip Websafe
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
NULL pointer dereference
CVE-2023-52689
CVE-2024-23803
client side
CVE-2023-52696
information disclosure
CVE-2024-35843
CVE-2024-27130
CVE-2023-52697
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »