Known vulnerabilities in F5 Networks BIG-IP ASM 13.1.3.5 - page 2

Vendor: F5 Networks
Website: https://f5.com/
Total Security Bulletins: 35

Security bulletins (35)

Secuity bulletin Severity Status Published
SB2021082512: Denial of service in F5 BIG-IP products Low
Patched
25.08.2021
SB2021031102: Remote code execution in iControl REST API in multiple F5 BIG-IP products High
Patched Exploited
11.03.2021
SB2021030902: System tracking vulnerability in Linux kernel in F5 BIP-IP products Medium
Not patched
09.03.2021
SB2021030501: Remote code execution in BIND in multiple F5 BIG-IP products High
Not patched
05.03.2021
SB2021021905: Denial of service in curl implementation for Command Line Interface, EAV Monitors, iRules components in F5 BIG-IP products Low
Not patched
19.02.2021
SB2021021902: Improper certificate revocation in curl implementation within Command Line Interface, EAV Monitors and iRules components in F5 BIG-IP products Medium
Not patched
19.02.2021
SB2021021111: Race condition in iControl REST component in F5 BIG-IP Medium
Patched
11.02.2021
SB2021020901: Local denial of service in Linux kernel in F5 BIG-IP products Low
Not patched
09.02.2021
SB2021011411: OpenSSL vulnerability in multiple F5 products Medium
Not patched
14.01.2021
SB2020122907: Privilege escalation in procps-ng component in F5 BIG-IP Low
Not patched
29.12.2020
SB2020122813: Multiple vulnerabilities in procps-ng component in F5 BIG-IP products High
Not patched
28.12.2020
SB2020122413: Information disclosure in Linux kernel if F5 BIG-IP products Medium
Not patched
24.12.2020
SB2020122316: Buffer overflow in cURL component in F5 Networks products Medium
Patched
23.12.2020
SB2020121720: Raccoon attack against TLS implementation in F5 BIG-IP Medium
Not patched
17.12.2020
SB2020060252: Authentication bypass in NTP component in F5 BIG-IP Low
Not patched
02.06.2020


Showing elements 21 - 40 out of 35