The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of TMOS

OpenSSL: information disclosure via ECC Scalar Multiplication
On an Intel processor (VIGILANCE-VUL-27667), an attacker can measure the execution time of the ECC Scalar Multiplication of OpenSSL, in order to obtain the used key...
bulletinjan2019, CERTFR-2018-AVI-607, CERTFR-2019-AVI-242, cpuapr2019, cpujan2019, cpujan2020, cpujul2019, CVE-2018-5407, DLA-1586-1, DSA-2019-197, DSA-2020-030, DSA-4348-1, DSA-4355-1, ibm10794537, ibm10875298, ibm10886313, K49711130, openSUSE-SU-2018:3903-1, openSUSE-SU-2018:4050-1, openSUSE-SU-2018:4104-1, openSUSE-SU-2019:0088-1, openSUSE-SU-2019:0234-1, RHSA-2019:0483-01, RHSA-2019:2125-01, SSA:2018-325-01, SUSE-SU-2018:3864-1, SUSE-SU-2018:3864-2, SUSE-SU-2018:3866-1, SUSE-SU-2018:3964-1, SUSE-SU-2018:3989-1, SUSE-SU-2018:4001-1, SUSE-SU-2018:4068-1, SUSE-SU-2018:4274-1, SUSE-SU-2019:0117-1, SUSE-SU-2019:0395-1, SUSE-SU-2019:1553-1, SYMSA1490, TNS-2018-16, TNS-2018-17, USN-3840-1, VIGILANCE-VUL-27760
Intel processors: information disclosure via SMT/Hyper-Threading PortSmash
An attacker can bypass access restrictions to data via SMT/Hyper-Threading PortSmash on an Intel processor, in order to obtain sensitive information...
530514, bulletinjan2019, CERTFR-2019-AVI-242, cpuapr2019, cpujan2019, cpujan2020, cpujul2019, CVE-2018-5407, DSA-2018-030, DSA-2019-197, DSA-2020-030, DSA-4348-1, DSA-4355-1, ibm10794537, K49711130, openSUSE-SU-2018:4050-1, openSUSE-SU-2018:4104-1, openSUSE-SU-2019:0088-1, openSUSE-SU-2019:0234-1, RHSA-2019:2125-01, SUSE-SU-2018:3964-1, SUSE-SU-2018:3989-1, SUSE-SU-2018:4001-1, SUSE-SU-2018:4068-1, SUSE-SU-2018:4274-1, SUSE-SU-2019:0117-1, SUSE-SU-2019:0395-1, SUSE-SU-2019:1553-1, USN-3840-1, VIGILANCE-VUL-27667
F5 BIG-IP: denial of service via iControl TMSH
An attacker can generate a fatal error via iControl TMSH of F5 BIG-IP, in order to trigger a denial of service...
CERTFR-2018-AVI-525, CVE-2018-15325, K77313277, VIGILANCE-VUL-27664
F5 BIG-IP: denial of service via VLAN Group Port Lockdown
An attacker can generate a fatal error via VLAN Group Port Lockdown of F5 BIG-IP, in order to trigger a denial of service...
CERTFR-2018-AVI-525, CVE-2018-15320, K72442354, VIGILANCE-VUL-27663
F5 BIG-IP: denial of service via HTTP Normalize URI
An attacker can generate a fatal error via HTTP Normalize URI of F5 BIG-IP, in order to trigger a denial of service...
CERTFR-2018-AVI-525, CVE-2018-15319, K64208870, VIGILANCE-VUL-27662
F5 BIG-IP APM: denial of service via Portal Access
An attacker can generate a fatal error via Portal Access of F5 BIG-IP APM, in order to trigger a denial of service...
CERTFR-2018-AVI-525, CVE-2018-15324, K52206731, VIGILANCE-VUL-27661
F5 BIG-IP: denial of service via TMM SSL BAD_RECORD_MAC
An attacker can generate a fatal error via TMM SSL BAD_RECORD_MAC of F5 BIG-IP, in order to trigger a denial of service...
CERTFR-2018-AVI-525, CVE-2018-15317, K43625118, VIGILANCE-VUL-27660
F5 BIG-IP: denial of service via Tmsh Edit Cli Preference
An attacker can generate a fatal error via Tmsh Edit Cli Preference of F5 BIG-IP, in order to trigger a denial of service...
CERTFR-2018-AVI-525, CVE-2018-15322, K28003839, VIGILANCE-VUL-27659
F5 BIG-IP: denial of service via MQTT
An attacker can generate a fatal error via MQTT of F5 BIG-IP, in order to trigger a denial of service...
CERTFR-2018-AVI-525, CVE-2018-15323, K26583415, VIGILANCE-VUL-27658
F5 BIG-IP: privilege escalation via Configuration Utility Commands
An attacker can bypass restrictions via Configuration Utility Commands of F5 BIG-IP, in order to escalate his privileges...
CERTFR-2018-AVI-525, CVE-2018-15327, K20222812, VIGILANCE-VUL-27657
Our database contains other pages. You can request a free trial to read them.

Display information about TMOS: