F5 Big-IP WebAccelerator 12.1.5.1

CPE Details

F5 Big-IP WebAccelerator 12.1.5.1
12.1.5.1
2020-02-24
15h16 +00:00
2020-02-24
15h16 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:f5:big-ip_webaccelerator:12.1.5.1:*:*:*:*:*:*:*

Informations

Vendor

f5

Product

big-ip_webaccelerator

Version

12.1.5.1

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2020-5915 2020-08-26 12h28 +00:00 In BIG-IP versions 15.1.0-15.1.0.4, 15.0.0-15.0.1.3, 14.1.0-14.1.2.3, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, an undisclosed TMUI page contains a vulnerability which allows a stored XSS when BIG-IP systems are setup in a device trust.
6.1
Moyen
CVE-2019-10744 2019-07-25 21h43 +00:00 Versions of lodash lower than 4.17.12 are vulnerable to Prototype Pollution. The function defaultsDeep could be tricked into adding or modifying properties of Object.prototype using a constructor payload.
9.1
Critique
CVE-2019-13135 2019-07-01 17h27 +00:00 ImageMagick before 7.0.8-50 has a "use of uninitialized value" vulnerability in the function ReadCUTImage in coders/cut.c.
8.8
Haute
CVE-2019-12295 2019-05-23 09h56 +00:00 In Wireshark 3.0.0 to 3.0.1, 2.6.0 to 2.6.8, and 2.4.0 to 2.4.14, the dissection engine could crash. This was addressed in epan/packet.c by restricting the number of layers and consequently limiting recursion.
7.5
Haute
CVE-2019-6604 2019-03-28 19h28 +00:00 On BIG-IP 11.5.1-11.5.8, 11.6.1-11.6.3, 12.1.0-12.1.3.6, 13.0.0-13.1.1.1, and 14.0.0-14.0.0.2, under certain conditions, hardware systems with a High-Speed Bridge and using non-default Layer 2 forwarding configurations may experience a lockup of the High-Speed Bridge.
6.8
Moyen