On all versions of 16.1.x, 15.1.x, 14.1.x, 13.1.x, 12.1.x, and 11.6.x of F5 BIG-IP APM, and F5 BIG-IP Guided Configuration (GC) all versions before 9.0, a reflected cross-site scripting (XSS) vulnerability exists in an undisclosed page of F5 BIG-IP Guided Configuration that allows an malicious user to execute JavaScript in the context of the currently logged-in user. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
f5 big-ip access policy manager 13.1.0 |
||
f5 big-ip access policy manager 14.1.0 |
||
f5 big-ip access policy manager 15.1.0 |
||
f5 big-ip access policy manager 14.1.4 |
||
f5 big-ip access policy manager 16.1.0 |
||
f5 big-ip access policy manager 16.1.2 |
||
f5 big-ip access policy manager 16.1.1 |
||
f5 big-ip access policy manager 15.1.5 |
||
f5 big-ip access policy manager 15.1.4 |
||
f5 big-ip access policy manager 15.1.3 |
||
f5 big-ip access policy manager 13.1.1 |
||
f5 big-ip access policy manager 13.1.3 |
||
f5 big-ip access policy manager 13.1.4 |
||
f5 big-ip access policy manager 13.1.5 |
||
f5 big-ip access policy manager 14.1.2 |
||
f5 big-ip access policy manager 14.1.3 |
||
f5 big-ip access policy manager 15.1.1 |
||
f5 big-ip access policy manager 15.1.2 |
||
f5 big-ip guided configuration |