Loading HuntDB...

Websafe

50 Versions 50 CVEs

Versions

" 11.5.4

OTHER 1 CVE

12.0.0-12.1.1

OTHER 1 CVE

11.6.0 &#xe2

OTHER 2 CVEs

&#x80

OTHER 2 CVEs

" 11.6.1

OTHER 2 CVEs

11.4.0 &#xe2

OTHER 1 CVE

14.0.0-14.0.0.2, 13.0.0-13.1.1.1

OTHER 1 CVE

11.5.0-11.5.4

OTHER 3 CVEs

11.6.0 before 11.6.0 HF6, 11.5.0 before 11.5.3 HF2, 11.3.0 before 11.4.1 HF10

OTHER 1 CVE

11.4.0-11.6.1

OTHER 1 CVE

12.0.0 HF3

OTHER 1 CVE

11.5.1-11.5.x

OTHER 1 CVE

12.0.0 HF4

OTHER 1 CVE

12.0.0 through 12.1.2

OTHER 2 CVEs

11.6.1 HF1

OTHER 1 CVE

12.1.0 through 12.1.2

OTHER 1 CVE

11.6.0 through 11.6.1 HF1

OTHER 1 CVE

11.5.1-11.6.1

OTHER 2 CVEs

11.5.1 HF6 through 11.5.4 HF4

OTHER 1 CVE

varies depending on product-see https://support.f5.com/csp/article/K92140924 for table

OTHER 1 CVE

11.6.1-11.6.x

OTHER 1 CVE

11.5.4 HF4-11.5.5

OTHER 1 CVE

11.4.1-11.5.5

OTHER 1 CVE

13.1.0-13.1.0.3

OTHER 2 CVEs

12.1.0-12.1.1

OTHER 1 CVE

12.1.0-12.1.3.5

OTHER 2 CVEs

12.0.0-12.1.3.1

OTHER 2 CVEs

13.1.0-13.1.0.5

OTHER 3 CVEs

11.6.1

SEMANTIC 1 CVE

11.5.1-11.5.5

OTHER 7 CVEs

12.0.0-12.1.2

OTHER 9 CVEs

12.0.0-12.1.3.3

OTHER 1 CVE

11.2.1-11.6.3.1

OTHER 3 CVEs

11.6.1-11.6.3.1

OTHER 2 CVEs

11.6.0-11.6.3.1

OTHER 2 CVEs

13.0.0

SEMANTIC 22 CVEs

12.1.0-12.1.3.1

OTHER 7 CVEs

13.0.0-13.1.0.3

OTHER 2 CVEs

EM 3.1.1

OTHER 1 CVE

12.1.0-12.1.3.3

OTHER 2 CVEs

11.6.1-11.6.2

OTHER 3 CVEs

14.0.0-14.0.0.2, 13.0.0-13.1.0.7, 12.1.0-12.1.3.5, 11.6.1-11.6.3.2, 11.5.1-11.5.8

OTHER 1 CVE

13.0.0-13.1.0.5

OTHER 7 CVEs

12.1.0-12.1.2

OTHER 7 CVEs

11.6.0-11.6.2

OTHER 1 CVE

14.0.0-14.0.0.2, 13.0.0-13.1.0.7, 12.1.0-12.1.3.5, 11.6.0-11.6.3.2, 11.2.1-11.5.6

OTHER 1 CVE

11.2.1-11.5.6

OTHER 1 CVE

11.6.0-11.6.1

OTHER 5 CVEs

13.1.0-13.1.0..7

OTHER 1 CVE

11.2.1

SEMANTIC 9 CVEs

Recent CVEs

CVE-2019-6598

In BIG-IP 14.0.0-14.0.0.2, 13.0.0-13.1.0.7, 12.1.0-12.1.3.5, 11.6.1-11.6.3.2, or 11.5.1-11.5.8 or Enterprise Manager 3.1.1, malformed requests to the Traffic Management User Interface (TMUI), also referred to as the BIG-IP Configuration utility, may lead to disruption of TMUI services. This attack requires an authenticated user with any role (other than the No Access role). The No Access user role cannot login and does not have the access level to perform the attack.

UNKNOWN Mar 13, 2019

CVE-2018-15322

On BIG-IP 14.0.0-14.0.0.2, 13.0.0-13.1.0.7, 12.1.0-12.1.3.5, 11.6.0-11.6.3.2, or 11.2.1-11.5.6, BIG-IQ Centralized Management 6.0.0-6.0.1, 5.0.0-5.4.0 or 4.6.0, BIG-IQ Cloud and Orchestration 1.0.0, iWorkflow 2.0.1-2.3.0, or Enterprise Manager 3.1.1 a BIG-IP user granted with tmsh access may cause the BIG-IP system to experience denial-of-service (DoS) when the BIG-IP user uses the tmsh utility to run the edit cli preference command and proceeds to save the changes to another filename repeatedly. This action utilises storage space on the /var partition and when performed repeatedly causes the /var partition to be full.

UNKNOWN Oct 31, 2018

CVE-2018-15323

On BIG-IP 14.0.0-14.0.0.2 or 13.0.0-13.1.1.1, in certain circumstances, when processing traffic through a Virtual Server with an associated MQTT profile, the TMM process may produce a core file and take the configured HA action.

UNKNOWN Oct 31, 2018

CVE-2018-5537

A remote attacker may be able to disrupt services on F5 BIG-IP 13.0.0-13.1.0.5, 12.1.0-12.1.3.5, 11.6.0-11.6.3.1, or 11.2.1-11.5.6 if the TMM virtual server is configured with a HTML or a Rewrite profile. TMM may restart while processing some specially prepared HTML content from the back end.

UNKNOWN Jul 25, 2018

CVE-2018-5530

F5 BIG-IP 13.0.0-13.1.0.5, 12.1.0-12.1.3.5, or 11.6.0-11.6.3.1 virtual servers with HTTP/2 profiles enabled are vulnerable to "HPACK Bomb".

UNKNOWN Jul 25, 2018

CVE-2018-5519

On F5 BIG-IP 13.0.0-13.1.0.5, 12.1.0-12.1.3.3, or 11.2.1-11.6.3.1, administrative users by way of undisclosed methods can exploit the ssldump utility to write to arbitrary file paths. For users who do not have Advanced Shell access (for example, any user when licensed for Appliance Mode), this allows more permissive file access than intended.

UNKNOWN May 02, 2018

CVE-2018-5516

On F5 BIG-IP 13.0.0-13.1.0.5, 12.1.0-12.1.2, or 11.2.1-11.6.3.1, Enterprise Manager 3.1.1, BIG-IQ Centralized Management 5.0.0-5.4.0 or 4.6.0, BIG-IQ Cloud and Orchestration 1.0.0, or F5 iWorkflow 2.0.2-2.3.0, authenticated users granted TMOS Shell (tmsh) access can access objects on the file system which would normally be disallowed by tmsh restrictions. This allows for authenticated, low privileged attackers to exfiltrate objects on the file system which should not be allowed.

UNKNOWN May 02, 2018

CVE-2018-5518

On F5 BIG-IP 13.0.0-13.1.0.5 or 12.0.0-12.1.3.3, malicious root users with access to a VCMP guest can cause a disruption of service on adjacent VCMP guests running on the same host. Exploiting this vulnerability causes the vCMPd process on the adjacent VCMP guest to restart and produce a core file. This issue is only exploitable on a VCMP guest which is operating in "host-only" or "bridged" mode. VCMP guests which are "isolated" are not impacted by this issue and do not provide mechanism to exploit the vulnerability. Guests which are deployed in "Appliance Mode" may be impacted however the exploit is not possible from an Appliance Mode guest. To exploit this vulnerability root access on a guest system deployed as "host-only" or "bridged" mode is required.

UNKNOWN May 02, 2018

CVE-2018-5515

On F5 BIG-IP 13.0.0-13.1.0.5, using RADIUS authentication responses from a RADIUS server with IPv6 addresses may cause TMM to crash, leading to a failover event.

UNKNOWN May 02, 2018

CVE-2018-5520

On an F5 BIG-IP 13.0.0-13.1.0.5, 12.1.0-12.1.3.1, or 11.2.1-11.6.3.1 system configured in Appliance mode, the TMOS Shell (tmsh) may allow an administrative user to use the dig utility to gain unauthorized access to file system resources.

UNKNOWN May 02, 2018