The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of F5 BIG-IP Hardware

F5 BIG-IP: denial of service via Behavioral DoS
An attacker can generate a fatal error via Behavioral DoS of F5 BIG-IP, in order to trigger a denial of service...
CVE-2018-5526, K62201098, VIGILANCE-VUL-26281
F5 BIG-IP: denial of service via DIAMETER
An attacker can send malicious DIAMETER packets to F5 BIG-IP, in order to trigger a denial of service...
CVE-2018-5522, K54130510, VIGILANCE-VUL-26280
F5 BIG-IP: denial of service via SSL Profiles
An attacker can generate a fatal error via SSL Profiles of F5 BIG-IP, in order to trigger a denial of service...
CVE-2018-5524, K53931245, VIGILANCE-VUL-26279
F5 BIG-IP: denial of service via Inflate Zip Bomb
An attacker can generate a fatal error via Inflate Zip Bomb of F5 BIG-IP, in order to trigger a denial of service...
CVE-2017-6153, K52167636, VIGILANCE-VUL-26278
F5 BIG-IP: privilege escalation via Configuration Utility
An attacker can bypass restrictions via Configuration Utility of F5 BIG-IP, in order to escalate his privileges...
CVE-2018-5523, K50254952, VIGILANCE-VUL-26277
F5 BIG-IP: denial of service via TLS Handshake
An attacker can generate a fatal error via TLS Handshake of F5 BIG-IP, in order to trigger a denial of service...
CVE-2018-5513, K46940010, VIGILANCE-VUL-26276
F5 BIG-IP: Cross Site Scripting via GeoIP
An attacker can trigger a Cross Site Scripting via GeoIP of F5 BIG-IP, in order to run JavaScript code in the context of the web site...
CVE-2018-5521, K23124150, VIGILANCE-VUL-26275
F5 BIG-IP: file reading via Configuration Utility
A local attacker can read a file via Configuration Utility of F5 BIG-IP, in order to obtain sensitive information...
CVE-2018-5525, K00363258, VIGILANCE-VUL-26274
procps: multiple vulnerabilities
An attacker can use several vulnerabilities of procps...
CVE-2018-1122, CVE-2018-1123, CVE-2018-1124, CVE-2018-1125, CVE-2018-1126, DLA-1390-1, DSA-2020-030, DSA-2020-289, DSA-4208-1, FEDORA-2018-bba8fed5ab, FEDORA-2018-de5de06754, JSA10917, K00409335, K16124204, K83271321, openSUSE-SU-2018:1848-1, openSUSE-SU-2019:0291-1, openSUSE-SU-2019:2376-1, openSUSE-SU-2019:2379-1, RHSA-2018:1700-01, RHSA-2018:1777-01, RHSA-2018:2267-01, RHSA-2018:2268-01, RHSA-2019:1944-01, RHSA-2019:2189-01, RHSA-2019:2401-01, RHSA-2020:0595-01, RHSA-2020:1265-01, RHSA-2020:1464-01, SB10241, SSA:2018-142-03, SUSE-SU-2018:1836-1, SUSE-SU-2018:2042-1, SUSE-SU-2018:2451-2, SUSE-SU-2019:0450-1, SUSE-SU-2019:2730-1, Synology-SA-18:51, USN-3658-1, USN-3658-2, USN-3658-3, VIGILANCE-VUL-26197
Processors: information disclosure via System Register
A local attacker can read a memory fragment via System Register of some processors, in order to obtain sensitive information...
525441, ADV180013, CERTFR-2018-AVI-429, CERTFR-2019-AVI-036, CERTFR-2019-AVI-489, cisco-sa-20180521-cpusidechannel, CVE-2018-3640, DLA-1446-1, DLA-1506-1, DSA-2018-175, DSA-2019-030, DSA-4273-1, DSA-4273-2, FG-IR-18-002, HPESBHF03850, HT209193, ibm10796076, K51801290, openSUSE-SU-2018:1904-1, openSUSE-SU-2018:2399-1, SSA-268644, SSA-608355, SUSE-SU-2018:1926-1, SUSE-SU-2018:1935-1, SUSE-SU-2018:2076-1, SUSE-SU-2018:2331-1, SUSE-SU-2018:2335-1, SUSE-SU-2018:2338-1, TA18-141A, USN-3756-1, VIGILANCE-VUL-26184, VU#180049
Our database contains other pages. You can request a free trial to read them.

Display information about F5 BIG-IP Hardware: