F5 BIG-IP Next Service Proxy for Kubernetes 1.6.0

CPE Details

F5 BIG-IP Next Service Proxy for Kubernetes 1.6.0
1.6.0
2023-10-17
13h29 +00:00
2023-10-17
13h29 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:1.6.0:*:*:*:*:*:*:*

Informations

Vendor

f5

Product

big-ip_next_service_proxy_for_kubernetes

Version

1.6.0

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2024-23314 2024-02-14 16h30 +00:00 When HTTP/2 is configured on BIG-IP or BIG-IP Next SPK systems, undisclosed responses can cause the Traffic Management Microkernel (TMM) to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
7.5
Haute
CVE-2023-45886 2023-11-20 23h00 +00:00 The BGP daemon (bgpd) in IP Infusion ZebOS through 7.10.6 allow remote attackers to cause a denial of service by sending crafted BGP update messages containing a malformed attribute.
7.5
Haute
CVE-2023-40534 2023-10-10 12h32 +00:00 When a client-side HTTP/2 profile and the HTTP MRF Router option are enabled for a virtual server, and an iRule using the HTTP_REQUEST event or Local Traffic Policy are associated with the virtual server, undisclosed requests can cause TMM to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
7.5
Haute
CVE-2023-44487 2023-10-10 00h00 +00:00 The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
7.5
Haute