Page 129 of 673 results (0.008 seconds)

CVSS: 4.0EPSS: 3%CPEs: 16EXPL: 1

Directory traversal vulnerability in the configuration utility in F5 BIG-IP before 12.0.0 and Enterprise Manager 3.0.0 through 3.1.1 allows remote authenticated users to access arbitrary files in the web root via unspecified vectors. Vulnerabilidad de salto de directorio en la utilidad de configuración en F5 BIG-IP en versiones anteriores a 12.0.0 y Enterprise Manager 3.0.0 hasta la versión 3.1.1, permite a usuarios remotos autenticados acceder a archivos arbitrarios en la raíz web a través de vectores no especificados. F5 BigIP version 10.2.4 Build 595.0 Hotfix HF3 suffers from a path traversal vulnerability. • https://www.exploit-db.com/exploits/38448 http://packetstormsecurity.com/files/133931/F5-BigIP-10.2.4-Build-595.0-HF3-Path-Traversal.html http://www.securitytracker.com/id/1033532 http://www.securitytracker.com/id/1033533 https://support.f5.com/kb/en-us/solutions/public/17000/200/sol17253.html • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.8EPSS: 0%CPEs: 31EXPL: 0

Memory leak in the virtual server component in F5 Big-IP LTM, AAM, AFM, Analytics, APM, ASM, GTM, Link Controller, and PEM 11.5.x before 11.5.1 HF10, 11.5.3 before HF1, and 11.6.0 before HF5, BIG-IQ Cloud, Device, and Security 4.4.0 through 4.5.0, and BIG-IQ ADC 4.5.0 allows remote attackers to cause a denial of service (memory consumption) via a large number of crafted ICMP packets. Vulnerabilidad de fuga de memoria en el componente de servidor virtual en F5 Big-IP LTM, AAM, AFM, Analytics, APM, ASM, GTM, Link Controller y PEM 11.5.x en versiones anteriores a 11.5.1 HF10, 11.5.3 en versiones anteriores a HF1 y 11.6.0 en versiones anteriores a HF5, BIG-IQ Cloud, Device y Security 4.4.0 hasta la versión 4.5.0 y BIG-IQ ADC 4.5.0, permite a atacantes remotos causar una denegación de servicio (consumo de la memoria) a través de un gran número de paquetes ICMP manipulados. • http://www.securitytracker.com/id/1033334 https://support.f5.com/kb/en-us/solutions/public/17000/000/sol17047.html • CWE-399: Resource Management Errors •

CVSS: 7.8EPSS: 1%CPEs: 45EXPL: 4

racoon/gssapi.c in IPsec-Tools 0.8.2 allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon crash) via a series of crafted UDP requests. racoon/gssapi.c en IPsec-Tools 0.8.2 permite a atacantes remotos causar una denegación de servicios (referencia a puntero nulo y caída de demonio IKE) a través de una serie de solicitudes UDP manipuladas. • http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159482.html http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159549.html http://packetstormsecurity.com/files/131992/IPsec-Tools-0.8.2-Denial-Of-Service.html http://seclists.org/fulldisclosure/2015/May/81 http://seclists.org/fulldisclosure/2015/May/83 http://www.debian.org/security/2015/dsa-3272 http://www.openwall.com/lists/oss-security/2015/05/20/1 http://www.openwall.com/lists/oss-security/20 • CWE-476: NULL Pointer Dereference •

CVSS: 4.3EPSS: 0%CPEs: 43EXPL: 0

The automatic signature update functionality in the (1) Phone Home feature in F5 BIG-IP LTM, AAM, AFM, Analytics, APM, GTM, and Link Controller 11.5.0 through 11.6.0, ASM 10.0.0 through 11.6.0, and PEM 11.3.0 through 11.6.0 and the (2) Call Home feature in ASM 10.0.0 through 11.6.0 and PEM 11.3.0 through 11.6.0 does not properly validate server SSL certificates, which allows remote attackers to conduct man-in-the-middle attacks via a crafted certificate. La funcionalidad de la actualización automática de firmas en (1) la característica Phone Home en F5 BIG-IP LTM, AAM, AFM, Analytics, APM, GTM, y Link Controller 11.5.0 hasta 11.6.0, ASM 10.0.0 hasta 11.6.0, y PEM 11.3.0 hasta 11.6.0 y (2) la característica Call Home en ASM 10.0.0 hasta 11.6.0 y PEM 11.3.0 hasta 11.6.0 no valida correctamente los certificados SSL de servidores, lo que permite a atacantes remotos realizar ataques man-in-the-middle a través de un certificado manipulado. • http://www.securitytracker.com/id/1032305 https://support.f5.com/kb/en-us/solutions/public/16000/000/sol16090.html •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 2

Cross-site scripting (XSS) vulnerability in F5 BIG-IP Application Security Manager (ASM) before 11.6 allows remote attackers to inject arbitrary web script or HTML via the Response Body field when creating a new user account. Vulnerabilidad de XSS en F5 BIG-IP Application Security Manager (ASM) anterior a 11.6 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través del campo Response Body cuando se crea una cuenta de usuario nueva. • http://packetstormsecurity.com/files/129911/F5-BIG-IP-Application-Security-Manager-ASM-XSS.html http://seclists.org/fulldisclosure/2015/Jan/43 http://www.securityfocus.com/archive/1/534459/100/0/threaded http://www.securitytracker.com/id/1031551 https://exchange.xforce.ibmcloud.com/vulnerabilities/99907 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •