Show filters
423 Total Results
Displaying 31-40 of 423
Sort by:
Attacker Value
Unknown
CVE-2024-23976
Disclosure Date: February 14, 2024 (last updated January 24, 2025)
When running in Appliance mode, an authenticated attacker assigned the Administrator role may be able to bypass Appliance
mode restrictions utilizing iAppsLX templates on a BIG-IP system. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
0
Attacker Value
Unknown
CVE-2024-23314
Disclosure Date: February 14, 2024 (last updated January 24, 2025)
When HTTP/2 is configured on BIG-IP or BIG-IP Next SPK systems, undisclosed responses can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
0
Attacker Value
Unknown
CVE-2024-22389
Disclosure Date: February 14, 2024 (last updated January 24, 2025)
When BIG-IP is deployed in high availability (HA) and an iControl REST API token is updated, the change does not sync to the peer device.
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
0
Attacker Value
Unknown
CVE-2024-22093
Disclosure Date: February 14, 2024 (last updated January 24, 2025)
When running in appliance mode, an authenticated remote command injection vulnerability exists in an undisclosed iControl REST endpoint on multi-bladed systems. A successful exploit can allow the attacker to cross a security boundary. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
0
Attacker Value
Unknown
CVE-2024-21782
Disclosure Date: February 14, 2024 (last updated January 24, 2025)
BIG-IP or BIG-IQ Resource Administrators and Certificate Managers who have access to the secure copy (scp) utility but do not have access to Advanced shell (bash) can execute arbitrary commands with a specially crafted command string. This vulnerability is due to an incomplete fix for CVE-2020-5873.
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
0
Attacker Value
Unknown
CVE-2023-49802
Disclosure Date: December 11, 2023 (last updated December 15, 2023)
The LinkedCustomFields plugin for MantisBT allows users to link values between two custom fields, creating linked drop-downs. Prior to version 2.0.1, cross-site scripting in the MantisBT LinkedCustomFields plugin allows Javascript execution, when a crafted Custom Field is linked via the plugin and displayed when reporting a new Issue or editing an existing one. This issue is fixed in version 2.0.1. As a workaround, one may utilize MantisBT's default Content Security Policy, which blocks script execution.
0
Attacker Value
Unknown
CVE-2023-45317
Disclosure Date: October 26, 2023 (last updated November 08, 2023)
The application interface allows users to perform certain actions via
HTTP requests without performing any validity checks to verify the
requests. This can be exploited to perform certain actions with
administrative privileges if a logged-in user visits a malicious web
site.
0
Attacker Value
Unknown
CVE-2023-45228
Disclosure Date: October 26, 2023 (last updated November 08, 2023)
The application suffers from improper access control when editing users.
A user with read permissions can manipulate users, passwords, and
permissions by sending a single HTTP POST request with modified
parameters.
0
Attacker Value
Unknown
CVE-2023-42769
Disclosure Date: October 26, 2023 (last updated November 08, 2023)
The cookie session ID is of insufficient length and can be exploited by
brute force, which may allow a remote attacker to obtain a valid
session, bypass authentication, and manipulate the transmitter.
0
Attacker Value
Unknown
CVE-2023-41966
Disclosure Date: October 26, 2023 (last updated November 08, 2023)
The application suffers from a privilege escalation vulnerability. A
user with read permissions can elevate privileges by sending a HTTP POST
to set a parameter.
0