Page 35 of 343 results (0.007 seconds)

CVSS: 9.8EPSS: 0%CPEs: 45EXPL: 0

23 May 2017 — In some circumstances, an F5 BIG-IP version 12.0.0 to 12.1.2 and 13.0.0 Azure cloud instance may contain a default administrative password which could be used to remotely log into the BIG-IP system. The impacted administrative account is the Azure instance administrative user that was created at deployment. The root and admin accounts are not vulnerable. An attacker may be able to remotely access the BIG-IP host via SSH. En algunas circunstancias, una instancia de nube de Azure de F5 BIG-IP versiones 12.0.0... • http://www.securitytracker.com/id/1038569 • CWE-798: Use of Hard-coded Credentials •

CVSS: 5.3EPSS: 0%CPEs: 5EXPL: 0

09 May 2017 — In F5 BIG-IP APM 12.0.0 through 12.1.2 and 13.0.0, an authenticated user with an established access session to the BIG-IP APM system may be able to cause a traffic disruption if the length of the requested URL is less than 16 characters. En F5 BIG-IP APM versiones 12.0.0 hasta la 12.1.2 y versión 13.0.0, un usuario autenticado con una sesión establecida de acceso al sistema BIG-IP APM podría causar una interrupción del tráfico si la longitud de la solicitud URL es menor de 16 caracteres. • http://www.securitytracker.com/id/1038408 • CWE-118: Incorrect Access of Indexable Resource ('Range Error') •

CVSS: 7.8EPSS: 1%CPEs: 45EXPL: 4

26 May 2015 — racoon/gssapi.c in IPsec-Tools 0.8.2 allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon crash) via a series of crafted UDP requests. racoon/gssapi.c en IPsec-Tools 0.8.2 permite a atacantes remotos causar una denegación de servicios (referencia a puntero nulo y caída de demonio IKE) a través de una serie de solicitudes UDP manipuladas. Javantea discovered a NULL pointer dereference flaw in racoon, the Internet Key Exchange daemon of ipsec-tools. A remote attacker c... • http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159482.html • CWE-476: NULL Pointer Dereference •