Product:

Enterprise_manager

(F5)
Repositories https://github.com/torvalds/linux
#Vulnerabilities 37
Date Id Summary Products Score Patch Annotated
2019-10-09 CVE-2018-5743 By design, BIND is intended to limit the number of TCP clients that can be connected at any given time. The number of allowed connections is a tunable parameter which, if unset, defaults to a conservative value for most servers. Unfortunately, the code which was intended to limit the number of simultaneous connections contained an error which could be exploited to grow the number of simultaneous connections beyond this limit. Versions affected: BIND 9.9.0 -> 9.10.8-P1, 9.11.0 -> 9.11.6,... Big\-Ip_access_policy_manager, Big\-Ip_advanced_firewall_manager, Big\-Ip_analytics, Big\-Ip_application_acceleration_manager, Big\-Ip_application_security_manager, Big\-Ip_domain_name_system, Big\-Ip_edge_gateway, Big\-Ip_fraud_protection_service, Big\-Ip_global_traffic_manager, Big\-Ip_link_controller, Big\-Ip_local_traffic_manager, Big\-Ip_policy_enforcement_manager, Big\-Ip_webaccelerator, Big\-Iq_centralized_management, Enterprise_manager, Iworkflow, Bind 7.5
2019-10-09 CVE-2019-6471 A race condition which may occur when discarding malformed packets can result in BIND exiting due to a REQUIRE assertion failure in dispatch.c. Versions affected: BIND 9.11.0 -> 9.11.7, 9.12.0 -> 9.12.4-P1, 9.14.0 -> 9.14.2. Also all releases of the BIND 9.13 development branch and version 9.15.0 of the BIND 9.15 development branch and BIND Supported Preview Edition versions 9.11.3-S1 -> 9.11.7-S1. Big\-Ip_access_policy_manager, Big\-Ip_advanced_firewall_manager, Big\-Ip_analytics, Big\-Ip_application_acceleration_manager, Big\-Ip_application_security_manager, Big\-Ip_domain_name_system, Big\-Ip_edge_gateway, Big\-Ip_fraud_protection_service, Big\-Ip_global_traffic_manager, Big\-Ip_link_controller, Big\-Ip_local_traffic_manager, Big\-Ip_policy_enforcement_manager, Big\-Ip_webaccelerator, Big\-Iq_centralized_management, Enterprise_manager, Iworkflow, Bind 5.9
2019-11-14 CVE-2018-12207 Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access. Ubuntu_linux, Debian_linux, Big\-Ip_access_policy_manager, Big\-Ip_advanced_firewall_manager, Big\-Ip_analytics, Big\-Ip_application_acceleration_manager, Big\-Ip_application_security_manager, Big\-Ip_domain_name_system, Big\-Ip_fraud_protection_service, Big\-Ip_global_traffic_manager, Big\-Ip_link_controller, Big\-Ip_local_traffic_manager, Big\-Ip_policy_enforcement_manager, Big\-Iq_centralized_management, Enterprise_manager, Fedora, Celeron_g1610_firmware, Celeron_g1610t_firmware, Celeron_g1620_firmware, Celeron_g1620t_firmware, Celeron_g1630_firmware, Celeron_g1820_firmware, Celeron_g1820t_firmware, Celeron_g1820te_firmware, Celeron_g1830_firmware, Celeron_g1840_firmware, Celeron_g1840t_firmware, Celeron_g1850_firmware, Celeron_g3900_firmware, Celeron_g3900e_firmware, Celeron_g3900t_firmware, Celeron_g3900te_firmware, Celeron_g3902e_firmware, Celeron_g3920_firmware, Celeron_g3930_firmware, Celeron_g3930e_firmware, Celeron_g3930t_firmware, Celeron_g3930te_firmware, Celeron_g3950_firmware, Celeron_g4900_firmware, Celeron_g4900t_firmware, Celeron_g4920_firmware, Celeron_g4930_firmware, Celeron_g4930e_firmware, Celeron_g4930t_firmware, Celeron_g4932e_firmware, Celeron_g4950_firmware, Core_i3\-1005g1_firmware, Core_i3\-10110u_firmware, Core_i3\-10110y_firmware, Core_i3\-5005u_firmware, Core_i3\-5010u_firmware, Core_i3\-5015u_firmware, Core_i3\-5020u_firmware, Core_i3\-5157u_firmware, Core_i3\-6100_firmware, Core_i3\-6100h_firmware, Core_i3\-6100u_firmware, Core_i3\-6167u_firmware, Core_i3\-7100_firmware, Core_i3\-7100h_firmware, Core_i3\-7100t_firmware, Core_i3\-7100u_firmware, Core_i3\-7167u_firmware, Core_i3\-7300_firmware, Core_i3\-7300t_firmware, Core_i3\-7320_firmware, Core_i3\-7350k_firmware, Core_i3\-8100_firmware, Core_i3\-8100t_firmware, Core_i3\-8109u_firmware, Core_i3\-8130u_firmware, Core_i3\-8145u_firmware, Core_i3\-8300_firmware, Core_i3\-8300t_firmware, Core_i3\-8350k_firmware, Core_i3\-9100_firmware, Core_i3\-9100t_firmware, Core_i3\-9300_firmware, Core_i3\-9300t_firmware, Core_i3\-9320_firmware, Core_i3\-9350k_firmware, Core_i5\+8400_firmware, Core_i5\+8500_firmware, Core_i5\-10210u_firmware, Core_i5\-10210y_firmware, Core_i5\-10310y_firmware, Core_i5\-1035g1_firmware, Core_i5\-1035g4_firmware, Core_i5\-1035g7_firmware, Core_i5\-5200u_firmware, Core_i5\-5250u_firmware, Core_i5\-5257u_firmware, Core_i5\-5287u_firmware, Core_i5\-5350h_firmware, Core_i5\-6200u_firmware, Core_i5\-6260u_firmware, Core_i5\-6267u_firmware, Core_i5\-6287u_firmware, Core_i5\-6300hq_firmware, Core_i5\-6350hq_firmware, Core_i5\-7200u_firmware, Core_i5\-7260u_firmware, Core_i5\-7267u_firmware, Core_i5\-7287u_firmware, Core_i5\-7300hq_firmware, Core_i5\-7360u_firmware, Core_i5\-7400_firmware, Core_i5\-7400t_firmware, Core_i5\-7440hq_firmware, Core_i5\-7500_firmware, Core_i5\-7500t_firmware, Core_i5\-7600_firmware, Core_i5\-7600k_firmware, Core_i5\-7600t_firmware, Core_i5\-7y54_firmware, Core_i5\-8200y_firmware, Core_i5\-8250u_firmware, Core_i5\-8259u_firmware, Core_i5\-8265u_firmware, Core_i5\-8269u_firmware, Core_i5\-8300h_firmware, Core_i5\-8305g_firmware, Core_i5\-8350u_firmware, Core_i5\-8400_firmware, Core_i5\-8400b_firmware, Core_i5\-8400t_firmware, Core_i5\-8500b_firmware, Core_i5\-8700b_firmware, Core_i5\-9300h_firmware, Core_i5\-9400_firmware, Core_i5\-9400h_firmware, Core_i5\-9400t_firmware, Core_i5\-9500_firmware, Core_i5\-9500t_firmware, Core_i5\-9600_firmware, Core_i5\-9600k_firmware, Core_i5\-9600t_firmware, Core_i7\+8700_firmware, Core_i7\-10510u_firmware, Core_i7\-10510y_firmware, Core_i7\-1065g7_firmware, Core_i7\-10710u_firmware, Core_i7\-5500u_firmware, Core_i7\-5550u_firmware, Core_i7\-5557u_firmware, Core_i7\-5700hq_firmware, Core_i7\-5750hq_firmware, Core_i7\-5775c_firmware, Core_i7\-5850hq_firmware, Core_i7\-5950hq_firmware, Core_i7\-6500u_firmware, Core_i7\-6560u_firmware, Core_i7\-6567u_firmware, Core_i7\-6700hq_firmware, Core_i7\-6770hq_firmware, Core_i7\-6820hk_firmware, Core_i7\-6870hq_firmware, Core_i7\-6970hq_firmware, Core_i7\-7500u_firmware, Core_i7\-7560u_firmware, Core_i7\-7567u_firmware, Core_i7\-7660u_firmware, Core_i7\-7700_firmware, Core_i7\-7700hq_firmware, Core_i7\-7700k_firmware, Core_i7\-7700t_firmware, Core_i7\-7800x_firmware, Core_i7\-7820hk_firmware, Core_i7\-7820hq_firmware, Core_i7\-7820x_firmware, Core_i7\-7920hq_firmware, Core_i7\-8086k_firmware, Core_i7\-8500y_firmware, Core_i7\-8550u_firmware, Core_i7\-8559u_firmware, Core_i7\-8565u_firmware, Core_i7\-8650u_firmware, Core_i7\-8705g_firmware, Core_i7\-8706g_firmware, Core_i7\-8709g_firmware, Core_i7\-8750h_firmware, Core_i7\-8809g_firmware, Core_i7\-9700_firmware, Core_i7\-9700k_firmware, Core_i7\-9700t_firmware, Core_i7\-9750h_firmware, Core_i7\-9850h_firmware, Core_i9\-10900x_x\-Series_firmware, Core_i9\-10920x_x\-Series_firmware, Core_i9\-10940x_x\-Series_firmware, Core_i9\-10980xe_firmware, Core_i9\-7900x_firmware, Core_i9\-7920x_firmware, Core_i9\-7940x_firmware, Core_i9\-7960x_firmware, Core_i9\-7980xe_firmware, Core_i9\-9900x_x\-Series_firmware, Core_i9\-9920x_x\-Series_firmware, Core_i9\-9940x_x\-Series_firmware, Core_i9\-9960x_x\-Series_firmware, Core_i9\-9980xe_firmware, Core_m3\-6y30_firmware, Core_m3\-6y54_firmware, Core_m3\-7y30_firmware, Core_m3\-8100y_firmware, Core_m\-5y10_firmware, Core_m\-5y10a_firmware, Core_m\-5y10c_firmware, Core_m\-5y31_firmware, Core_m\-5y51_firmware, Core_m\-5y70_firmware, Core_m\-5y71_firmware, Pentium_gold_4410y_firmware, Pentium_gold_4415u_firmware, Pentium_gold_4415y_firmware, Pentium_gold_4417u_firmware, Pentium_gold_4425y_firmware, Pentium_gold_5405u_firmware, Pentium_gold_6405u_firmware, Pentium_gold_g5400_firmware, Pentium_gold_g5400t_firmware, Pentium_gold_g5420_firmware, Pentium_gold_g5420t_firmware, Pentium_gold_g5500_firmware, Pentium_gold_g5500t_firmware, Pentium_gold_g5600_firmware, Pentium_gold_g5600t_firmware, Pentium_gold_g5620_firmware, Xeon_3040_firmware, Xeon_3050_firmware, Xeon_3060_firmware, Xeon_3065_firmware, Xeon_3070_firmware, Xeon_5030_firmware, Xeon_5040_firmware, Xeon_5050_firmware, Xeon_5060_firmware, Xeon_5063_firmware, Xeon_5070_firmware, Xeon_5080_firmware, Xeon_5110_firmware, Xeon_5120_firmware, Xeon_5130_firmware, Xeon_5140_firmware, Xeon_5150_firmware, Xeon_5160_firmware, Xeon_7020_firmware, Xeon_7030_firmware, Xeon_7040_firmware, Xeon_7041_firmware, Xeon_7110m_firmware, Xeon_7110n_firmware, Xeon_7120m_firmware, Xeon_7120n_firmware, Xeon_7130m_firmware, Xeon_7130n_firmware, Xeon_7140m_firmware, Xeon_7140n_firmware, Xeon_7150n_firmware, Xeon_bronze_3204_firmware, Xeon_d\-1513n_firmware, Xeon_d\-1518_firmware, Xeon_d\-1520_firmware, Xeon_d\-1521_firmware, Xeon_d\-1523n_firmware, Xeon_d\-1527_firmware, Xeon_d\-1528_firmware, Xeon_d\-1529_firmware, Xeon_d\-1531_firmware, Xeon_d\-1533n_firmware, Xeon_d\-1537_firmware, Xeon_d\-1539_firmware, Xeon_d\-1540_firmware, Xeon_d\-1541_firmware, Xeon_d\-1543n_firmware, Xeon_d\-1548_firmware, Xeon_d\-1553n_firmware, Xeon_d\-1557_firmware, Xeon_d\-1559_firmware, Xeon_d\-1567_firmware, Xeon_d\-1571_firmware, Xeon_d\-1577_firmware, Xeon_d\-1602_firmware, Xeon_d\-1622_firmware, Xeon_d\-1623n_firmware, Xeon_d\-1627_firmware, Xeon_d\-1633n_firmware, Xeon_d\-1637_firmware, Xeon_d\-1649n_firmware, Xeon_d\-1653n_firmware, Xeon_d\-2123it_firmware, Xeon_d\-2141i_firmware, Xeon_d\-2142it_firmware, Xeon_d\-2143it_firmware, Xeon_d\-2145nt_firmware, Xeon_d\-2146nt_firmware, Xeon_d\-2161i_firmware, Xeon_d\-2163it_firmware, Xeon_d\-2166nt_firmware, Xeon_d\-2173it_firmware, Xeon_d\-2177nt_firmware, Xeon_d\-2183it_firmware, Xeon_d\-2187nt_firmware, Xeon_d\-2191_firmware, Xeon_e3110_firmware, Xeon_e3120_firmware, Xeon_e3\-1220_v3_firmware, Xeon_e3\-1220_v5_firmware, Xeon_e3\-1220_v6_firmware, Xeon_e3\-1220l_v3_firmware, Xeon_e3\-1225_v3_firmware, Xeon_e3\-1225_v5_firmware, Xeon_e3\-1225_v6_firmware, Xeon_e3\-1226_v3_firmware, Xeon_e3\-1230_v5_firmware, Xeon_e3\-1230_v6_firmware, Xeon_e3\-1230l_v3_firmware, Xeon_e3\-1231_v3_firmware, Xeon_e3\-1235l_v5_firmware, Xeon_e3\-1240_v5_firmware, Xeon_e3\-1240_v6_firmware, Xeon_e3\-1240l_v3_firmware, Xeon_e3\-1240l_v5_firmware, Xeon_e3\-1241_v3_firmware, Xeon_e3\-1245_v5_firmware, Xeon_e3\-1245_v6_firmware, Xeon_e3\-1246_v3_firmware, Xeon_e3\-1260l_v5_firmware, Xeon_e3\-1265l_v3_firmware, Xeon_e3\-1265l_v4_firmware, Xeon_e3\-1268l_v5_firmware, Xeon_e3\-1270_v5_firmware, Xeon_e3\-1270_v6_firmware, Xeon_e3\-1271_v3_firmware, Xeon_e3\-1275_v3_firmware, Xeon_e3\-1275_v5_firmware, Xeon_e3\-1275_v6_firmware, Xeon_e3\-1276_v3_firmware, Xeon_e3\-1280_v5_firmware, Xeon_e3\-1280_v6_firmware, Xeon_e3\-1281_v3_firmware, Xeon_e3\-1285_v4_firmware, Xeon_e3\-1285l_v4_firmware, Xeon_e3\-1505m_v5_firmware, Xeon_e3\-1505m_v6_firmware, Xeon_e3\-1515m_v5_firmware, Xeon_e3\-1535m_v5_firmware, Xeon_e3\-1535m_v6_firmware, Xeon_e3\-1545m_v5_firmware, Xeon_e3\-1558l_v5_firmware, Xeon_e3\-1565l_v5_firmware, Xeon_e3\-1575m_v5_firmware, Xeon_e3\-1585_v5_firmware, Xeon_e3\-1585l_v5_firmware, Xeon_e5205_firmware, Xeon_e5220_firmware, Xeon_e5240_firmware, Xeon_e5310_firmware, Xeon_e5320_firmware, Xeon_e5335_firmware, Xeon_e5345_firmware, Xeon_e5405_firmware, Xeon_e5410_firmware, Xeon_e5420_firmware, Xeon_e5430_firmware, Xeon_e5440_firmware, Xeon_e5450_firmware, Xeon_e5462_firmware, Xeon_e5472_firmware, Xeon_e5502_firmware, Xeon_e5503_firmware, Xeon_e5504_firmware, Xeon_e5506_firmware, Xeon_e5507_firmware, Xeon_e5520_firmware, Xeon_e5530_firmware, Xeon_e5540_firmware, Xeon_e5603_firmware, Xeon_e5606_firmware, Xeon_e5607_firmware, Xeon_e5620_firmware, Xeon_e5630_firmware, Xeon_e5640_firmware, Xeon_e5645_firmware, Xeon_e5649_firmware, Xeon_e5\-1620_v2_firmware, Xeon_e5\-1620_v3_firmware, Xeon_e5\-1620_v4_firmware, Xeon_e5\-1630_v3_firmware, Xeon_e5\-1630_v4_firmware, Xeon_e5\-1650_v2_firmware, Xeon_e5\-1650_v3_firmware, Xeon_e5\-1650_v4_firmware, Xeon_e5\-1660_v2_firmware, Xeon_e5\-1660_v3_firmware, Xeon_e5\-1660_v4_firmware, Xeon_e5\-1680_v3_firmware, Xeon_e5\-1680_v4_firmware, Xeon_e5\-2403_v2_firmware, Xeon_e5\-2407_v2_firmware, Xeon_e5\-2420_v2_firmware, Xeon_e5\-2430_v2_firmware, Xeon_e5\-2430l_v2_firmware, Xeon_e5\-2440_v2_firmware, Xeon_e5\-2450_v2_firmware, Xeon_e5\-2450l_v2_firmware, Xeon_e5\-2470_v2_firmware, Xeon_e5\-2603_v2_firmware, Xeon_e5\-2603_v3_firmware, Xeon_e5\-2603_v4_firmware, Xeon_e5\-2608l_v4_firmware, Xeon_e5\-2609_v2_firmware, Xeon_e5\-2609_v4_firmware, Xeon_e5\-2618l_v4_firmware, Xeon_e5\-2620_v2_firmware, Xeon_e5\-2620_v3_firmware, Xeon_e5\-2620_v4_firmware, Xeon_e5\-2623_v3_firmware, Xeon_e5\-2623_v4_firmware, Xeon_e5\-2628l_v4_firmware, Xeon_e5\-2630_v2_firmware, Xeon_e5\-2630_v3_firmware, Xeon_e5\-2630_v4_firmware, Xeon_e5\-2630l_v2_firmware, Xeon_e5\-2630l_v3_firmware, Xeon_e5\-2630l_v4_firmware, Xeon_e5\-2637_v2_firmware, Xeon_e5\-2637_v3_firmware, Xeon_e5\-2637_v4_firmware, Xeon_e5\-2640_v2_firmware, Xeon_e5\-2640_v3_firmware, Xeon_e5\-2640_v4_firmware, Xeon_e5\-2643_v2_firmware, Xeon_e5\-2643_v3_firmware, Xeon_e5\-2643_v4_firmware, Xeon_e5\-2648l_v4_firmware, Xeon_e5\-2650_v2_firmware, Xeon_e5\-2650_v3_firmware, Xeon_e5\-2650_v4_firmware, Xeon_e5\-2650l_v2_firmware, Xeon_e5\-2650l_v3_firmware, Xeon_e5\-2650l_v4_firmware, Xeon_e5\-2658_v4_firmware, Xeon_e5\-2660_v2_firmware, Xeon_e5\-2660_v3_firmware, Xeon_e5\-2660_v4_firmware, Xeon_e5\-2667_v2_firmware, Xeon_e5\-2667_v3_firmware, Xeon_e5\-2667_v4_firmware, Xeon_e5\-2670_v2_firmware, Xeon_e5\-2670_v3_firmware, Xeon_e5\-2680_v2_firmware, Xeon_e5\-2680_v3_firmware, Xeon_e5\-2680_v4_firmware, Xeon_e5\-2683_v3_firmware, Xeon_e5\-2683_v4_firmware, Xeon_e5\-2687w_v2_firmware, Xeon_e5\-2687w_v3_firmware, Xeon_e5\-2687w_v4_firmware, Xeon_e5\-2690_v2_firmware, Xeon_e5\-2690_v3_firmware, Xeon_e5\-2690_v4_firmware, Xeon_e5\-2695_v2_firmware, Xeon_e5\-2695_v3_firmware, Xeon_e5\-2695_v4_firmware, Xeon_e5\-2697_v2_firmware, Xeon_e5\-2697_v3_firmware, Xeon_e5\-2697_v4_firmware, Xeon_e5\-2697a_v4_firmware, Xeon_e5\-2698_v3_firmware, Xeon_e5\-2698_v4_firmware, Xeon_e5\-2699_v3_firmware, Xeon_e5\-2699_v4_firmware, Xeon_e5\-2699a_v4_firmware, Xeon_e5\-4603_v2_firmware, Xeon_e5\-4607_v2_firmware, Xeon_e5\-4610_v2_firmware, Xeon_e5\-4610_v3_firmware, Xeon_e5\-4610a_v4_firmware, Xeon_e5\-4620_v2_firmware, Xeon_e5\-4620_v3_firmware, Xeon_e5\-4620_v4_firmware, Xeon_e5\-4627_v2_firmware, Xeon_e5\-4627_v3_firmware, Xeon_e5\-4627_v4_firmware, Xeon_e5\-4628l_v4_firmware, Xeon_e5\-4640_v2_firmware, Xeon_e5\-4640_v3_firmware, Xeon_e5\-4640_v4_firmware, Xeon_e5\-4650_v2_firmware, Xeon_e5\-4650_v3_firmware, Xeon_e5\-4650_v4_firmware, Xeon_e5\-4655_v3_firmware, Xeon_e5\-4655_v4_firmware, Xeon_e5\-4657l_v2_firmware, Xeon_e5\-4660_v3_firmware, Xeon_e5\-4660_v4_firmware, Xeon_e5\-4667_v3_firmware, Xeon_e5\-4667_v4_firmware, Xeon_e5\-4669_v3_firmware, Xeon_e5\-4669_v4_firmware, Xeon_e6510_firmware, Xeon_e6540_firmware, Xeon_e7210_firmware, Xeon_e7220_firmware, Xeon_e7310_firmware, Xeon_e7320_firmware, Xeon_e7330_firmware, Xeon_e7340_firmware, Xeon_e7420_firmware, Xeon_e7430_firmware, Xeon_e7440_firmware, Xeon_e7450_firmware, Xeon_e7520_firmware, Xeon_e7530_firmware, Xeon_e7540_firmware, Xeon_e7\-2850_v2_firmware, Xeon_e7\-2870_v2_firmware, Xeon_e7\-2880_v2_firmware, Xeon_e7\-2890_v2_firmware, Xeon_e7\-4809_v2_firmware, Xeon_e7\-4809_v3_firmware, Xeon_e7\-4809_v4_firmware, Xeon_e7\-4820_v2_firmware, Xeon_e7\-4820_v3_firmware, Xeon_e7\-4820_v4_firmware, Xeon_e7\-4830_v2_firmware, Xeon_e7\-4830_v3_firmware, Xeon_e7\-4830_v4_firmware, Xeon_e7\-4850_v2_firmware, Xeon_e7\-4850_v3_firmware, Xeon_e7\-4850_v4_firmware, Xeon_e7\-4860_v2_firmware, Xeon_e7\-4870_v2_firmware, Xeon_e7\-4880_v2_firmware, Xeon_e7\-4890_v2_firmware, Xeon_e7\-8850_v2_firmware, Xeon_e7\-8855_v4_firmware, Xeon_e7\-8857_v2_firmware, Xeon_e7\-8860_v3_firmware, Xeon_e7\-8860_v4_firmware, Xeon_e7\-8867_v3_firmware, Xeon_e7\-8867_v4_firmware, Xeon_e7\-8870_v2_firmware, Xeon_e7\-8870_v3_firmware, Xeon_e7\-8870_v4_firmware, Xeon_e7\-8880_v2_firmware, Xeon_e7\-8880_v3_firmware, Xeon_e7\-8880_v4_firmware, Xeon_e7\-8880l_v2_firmware, Xeon_e7\-8880l_v3_firmware, Xeon_e7\-8890_v2_firmware, Xeon_e7\-8890_v3_firmware, Xeon_e7\-8890_v4_firmware, Xeon_e7\-8891_v2_firmware, Xeon_e7\-8891_v3_firmware, Xeon_e7\-8891_v4_firmware, Xeon_e7\-8893_v2_firmware, Xeon_e7\-8893_v3_firmware, Xeon_e7\-8893_v4_firmware, Xeon_e7\-8895_v2_firmware, Xeon_e\-2104g_firmware, Xeon_e\-2124_firmware, Xeon_e\-2124g_firmware, Xeon_e\-2126g_firmware, Xeon_e\-2134_firmware, Xeon_e\-2136_firmware, Xeon_e\-2144g_firmware, Xeon_e\-2146g_firmware, Xeon_e\-2174g_firmware, Xeon_e\-2176g_firmware, Xeon_e\-2186g_firmware, Xeon_e\-2224_firmware, Xeon_e\-2224g_firmware, Xeon_e\-2226g_firmware, Xeon_e\-2234_firmware, Xeon_e\-2236_firmware, Xeon_e\-2244g_firmware, Xeon_e\-2246g_firmware, Xeon_e\-2274g_firmware, Xeon_e\-2276g_firmware, Xeon_e\-2278g_firmware, Xeon_e\-2286g_firmware, Xeon_e\-2288g_firmware, Xeon_ec3539_firmware, Xeon_ec5509_firmware, Xeon_ec5539_firmware, Xeon_ec5549_firmware, Xeon_gold_5215_firmware, Xeon_gold_5215l_firmware, Xeon_gold_5215m_firmware, Xeon_gold_5217_firmware, Xeon_gold_5218_firmware, Xeon_gold_5218b_firmware, Xeon_gold_5218n_firmware, Xeon_gold_5218t_firmware, Xeon_gold_5220_firmware, Xeon_gold_5220s_firmware, Xeon_gold_5220t_firmware, Xeon_gold_5222_firmware, Xeon_gold_6222v_firmware, Xeon_gold_6226_firmware, Xeon_gold_6230_firmware, Xeon_gold_6230n_firmware, Xeon_gold_6230t_firmware, Xeon_gold_6234_firmware, Xeon_gold_6238_firmware, Xeon_gold_6238l_firmware, Xeon_gold_6238m_firmware, Xeon_gold_6238t_firmware, Xeon_gold_6240_firmware, Xeon_gold_6240l_firmware, Xeon_gold_6240m_firmware, Xeon_gold_6240y_firmware, Xeon_gold_6242_firmware, Xeon_gold_6244_firmware, Xeon_gold_6246_firmware, Xeon_gold_6248_firmware, Xeon_gold_6252_firmware, Xeon_gold_6252n_firmware, Xeon_gold_6254_firmware, Xeon_gold_6262v_firmware, Xeon_l3014_firmware, Xeon_l3110_firmware, Xeon_l3360_firmware, Xeon_l3406_firmware, Xeon_l3426_firmware, Xeon_l5215_firmware, Xeon_l5238_firmware, Xeon_l5240_firmware, Xeon_l5310_firmware, Xeon_l5318_firmware, Xeon_l5320_firmware, Xeon_l5335_firmware, Xeon_l5408_firmware, Xeon_l5410_firmware, Xeon_l5420_firmware, Xeon_l5430_firmware, Xeon_l5506_firmware, Xeon_l5508_firmware, Xeon_l5518_firmware, Xeon_l5520_firmware, Xeon_l5530_firmware, Xeon_l5609_firmware, Xeon_l5618_firmware, Xeon_l5630_firmware, Xeon_l5638_firmware, Xeon_l5640_firmware, Xeon_l7345_firmware, Xeon_l7445_firmware, Xeon_l7455_firmware, Xeon_l7545_firmware, Xeon_l7555_firmware, Xeon_lc3518_firmware, Xeon_lc3528_firmware, Xeon_lc5518_firmware, Xeon_lc5528_firmware, Xeon_lv_5113_firmware, Xeon_lv_5128_firmware, Xeon_lv_5133_firmware, Xeon_lv_5138_firmware, Xeon_lv_5148_firmware, Xeon_platinum_8253_firmware, Xeon_platinum_8256_firmware, Xeon_platinum_8260_firmware, Xeon_platinum_8260l_firmware, Xeon_platinum_8260m_firmware, Xeon_platinum_8260y_firmware, Xeon_platinum_8268_firmware, Xeon_platinum_8270_firmware, Xeon_platinum_8276_firmware, Xeon_platinum_8276l_firmware, Xeon_platinum_8276m_firmware, Xeon_platinum_8280_firmware, Xeon_platinum_8280l_firmware, Xeon_platinum_8280m_firmware, Xeon_platinum_9221_firmware, Xeon_platinum_9222_firmware, Xeon_platinum_9242_firmware, Xeon_platinum_9282_firmware, Xeon_silver_4208_firmware, Xeon_silver_4209t_firmware, Xeon_silver_4210_firmware, Xeon_silver_4214_firmware, Xeon_silver_4214y_firmware, Xeon_silver_4215_firmware, Xeon_silver_4216_firmware, Xeon_w3520_firmware, Xeon_w3530_firmware, Xeon_w3540_firmware, Xeon_w3550_firmware, Xeon_w3565_firmware, Xeon_w3570_firmware, Xeon_w3580_firmware, Xeon_w3670_firmware, Xeon_w3680_firmware, Xeon_w3690_firmware, Xeon_w5580_firmware, Xeon_w5590_firmware, Xeon_w\-2123_firmware, Xeon_w\-2125_firmware, Xeon_w\-2133_firmware, Xeon_w\-2135_firmware, Xeon_w\-2145_firmware, Xeon_w\-2155_firmware, Xeon_w\-2175_firmware, Xeon_w\-2195_firmware, Xeon_w\-2223_firmware, Xeon_w\-2225_firmware, Xeon_w\-2235_firmware, Xeon_w\-2245_firmware, Xeon_w\-2255_firmware, Xeon_w\-2265_firmware, Xeon_w\-2275_firmware, Xeon_w\-2295_firmware, Xeon_w\-3175x_firmware, Xeon_w\-3223_firmware, Xeon_w\-3225_firmware, Xeon_w\-3245_firmware, Xeon_w\-3245m_firmware, Xeon_w\-3265_firmware, Xeon_w\-3265m_firmware, Xeon_w\-3275_firmware, Xeon_w\-3275m_firmware, Xeon_x3210_firmware, Xeon_x3220_firmware, Xeon_x3230_firmware, Xeon_x3320_firmware, Xeon_x3330_firmware, Xeon_x3350_firmware, Xeon_x3360_firmware, Xeon_x3370_firmware, Xeon_x3380_firmware, Xeon_x3430_firmware, Xeon_x3440_firmware, Xeon_x3450_firmware, Xeon_x3460_firmware, Xeon_x3470_firmware, Xeon_x3480_firmware, Xeon_x5260_firmware, Xeon_x5270_firmware, Xeon_x5272_firmware, Xeon_x5355_firmware, Xeon_x5365_firmware, Xeon_x5450_firmware, Xeon_x5460_firmware, Xeon_x5470_firmware, Xeon_x5472_firmware, Xeon_x5482_firmware, Xeon_x5492_firmware, Xeon_x5550_firmware, Xeon_x5560_firmware, Xeon_x5570_firmware, Xeon_x5647_firmware, Xeon_x5650_firmware, Xeon_x5660_firmware, Xeon_x5667_firmware, Xeon_x5670_firmware, Xeon_x5672_firmware, Xeon_x5675_firmware, Xeon_x5677_firmware, Xeon_x5680_firmware, Xeon_x5687_firmware, Xeon_x5690_firmware, Xeon_x6550_firmware, Xeon_x7350_firmware, Xeon_x7460_firmware, Xeon_x7542_firmware, Xeon_x7550_firmware, Xeon_x7560_firmware, Leap, Solaris, Enterprise_linux_server, Enterprise_linux_server_aus, Enterprise_linux_server_eus, Enterprise_linux_server_tus, Openshift_container_platform 6.5
2020-01-08 CVE-2014-5209 An Information Disclosure vulnerability exists in NTP 4.2.7p25 private (mode 6/7) messages via a GET_RESTRICT control message, which could let a malicious user obtain sensitive information. Big\-Ip_access_policy_manager, Big\-Ip_advanced_firewall_manager, Big\-Ip_analytics, Big\-Ip_application_acceleration_manager, Big\-Ip_application_security_manager, Big\-Ip_domain_name_system, Big\-Ip_edge_gateway, Big\-Ip_global_traffic_manager, Big\-Ip_link_controller, Big\-Ip_local_traffic_manager, Big\-Ip_policy_enforcement_manager, Big\-Ip_protocol_security_module, Big\-Ip_wan_optimization_manager, Big\-Ip_webaccelerator, Big\-Iq_adc, Big\-Iq_centralized_management, Big\-Iq_cloud, Big\-Iq_cloud_and_orchestration, Big\-Iq_device, Big\-Iq_security, Enterprise_manager, Iworkflow, Mobilesafe, Websafe, Ntp 5.3
2012-05-24 CVE-2011-3188 The (1) IPv4 and (2) IPv6 implementations in the Linux kernel before 3.1 use a modified MD4 algorithm to generate sequence numbers and Fragment Identification values, which makes it easier for remote attackers to cause a denial of service (disrupted networking) or hijack network sessions by predicting these values and sending crafted packets. Arx, Big\-Ip_access_policy_manager, Big\-Ip_analytics, Big\-Ip_application_security_manager, Big\-Ip_edge_gateway, Big\-Ip_global_traffic_manager, Big\-Ip_link_controller, Big\-Ip_local_traffic_manager, Big\-Ip_protocol_security_module, Big\-Ip_wan_optimization_manager, Big\-Ip_webaccelerator, Enterprise_manager, Firepass, Linux_kernel, Enterprise_linux 9.1
2019-12-23 CVE-2019-19151 On BIG-IP versions 15.0.0-15.1.0, 14.0.0-14.1.2.3, 13.1.0-13.1.3.2, 12.1.0-12.1.5, and 11.5.2-11.6.5.1, BIG-IQ versions 7.0.0, 6.0.0-6.1.0, and 5.0.0-5.4.0, iWorkflow version 2.3.0, and Enterprise Manager version 3.1.1, authenticated users granted TMOS Shell (tmsh) privileges are able access objects on the file system which would normally be disallowed by tmsh restrictions. This allows for authenticated, low privileged attackers to access objects on the file system which would not normally... Big\-Ip_access_policy_manager, Big\-Ip_advanced_firewall_manager, Big\-Ip_analytics, Big\-Ip_application_acceleration_manager, Big\-Ip_application_security_manager, Big\-Ip_domain_name_system, Big\-Ip_edge_gateway, Big\-Ip_fraud_protection_service, Big\-Ip_global_traffic_manager, Big\-Ip_link_controller, Big\-Ip_local_traffic_manager, Big\-Ip_policy_enforcement_manager, Big\-Ip_webaccelerator, Big\-Iq_centralized_management, Enterprise_manager, Iworkflow N/A
2019-11-15 CVE-2019-6663 The BIG-IP 15.0.0-15.0.1, 14.0.0-14.1.2.2, 13.1.0-13.1.3.1, 12.1.0-12.1.5, and 11.5.1-11.6.5.1, BIG-IQ 7.0.0, 6.0.0-6.1.0, and 5.2.0-5.4.0, iWorkflow 2.3.0, and Enterprise Manager 3.1.1 configuration utility is vulnerable to Anti DNS Pinning (DNS Rebinding) attack. Big\-Ip_access_policy_manager, Big\-Ip_advanced_firewall_manager, Big\-Ip_analytics, Big\-Ip_application_acceleration_manager, Big\-Ip_application_security_manager, Big\-Ip_domain_name_system, Big\-Ip_edge_gateway, Big\-Ip_fraud_protection_service, Big\-Ip_global_traffic_manager, Big\-Ip_link_controller, Big\-Ip_local_traffic_manager, Big\-Ip_policy_enforcement_manager, Big\-Ip_webaccelerator, Big\-Iq_centralized_management, Enterprise_manager, Iworkflow N/A
2017-05-01 CVE-2017-6128 An attacker may be able to cause a denial-of-service (DoS) attack against the sshd component in F5 BIG-IP, Enterprise Manager, BIG-IQ, and iWorkflow. Big\-Ip_access_policy_manager, Big\-Ip_advanced_firewall_manager, Big\-Ip_analytics, Big\-Ip_application_acceleration_manager, Big\-Ip_application_security_manager, Big\-Ip_edge_gateway, Big\-Ip_global_traffic_manager, Big\-Ip_link_controller, Big\-Ip_local_traffic_manager, Big\-Ip_policy_enforcement_manager, Big\-Ip_protocol_security_module, Big\-Ip_webaccelerator, Big\-Ip_websafe, Big\-Iq_application_delivery_controller, Big\-Iq_centralized_management, Big\-Iq_cloud, Big\-Iq_cloud_and_orchestration, Big\-Iq_device, Big\-Iq_security, Enterprise_manager, F5_iworkflow 7.5
2019-09-04 CVE-2019-6646 On BIG-IP 11.5.2-11.6.4 and Enterprise Manager 3.1.1, REST users with guest privileges may be able to escalate their privileges and run commands with admin privileges. Big\-Ip_access_policy_manager, Big\-Ip_advanced_firewall_manager, Big\-Ip_analytics, Big\-Ip_application_acceleration_manager, Big\-Ip_application_security_manager, Big\-Ip_domain_name_system, Big\-Ip_edge_gateway, Big\-Ip_fraud_protection_service, Big\-Ip_global_traffic_manager, Big\-Ip_link_controller, Big\-Ip_local_traffic_manager, Big\-Ip_policy_enforcement_manager, Big\-Ip_webaccelerator, Enterprise_manager 8.8
2017-06-09 CVE-2016-7469 A stored cross-site scripting (XSS) vulnerability in the Configuration utility device name change page in BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, GTM, Link Controller, PEM, PSM, WebAccelerator, WOM and WebSafe version 12.0.0 - 12.1.2, 11.4.0 - 11.6.1, and 11.2.1 allows an authenticated user to inject arbitrary web script or HTML. Exploitation requires Resource Administrator or Administrator privileges, and it could cause the Configuration utility client to become unstable. Big\-Ip_access_policy_manager, Big\-Ip_advanced_firewall_manager, Big\-Ip_analytics, Big\-Ip_application_acceleration_manager, Big\-Ip_application_security_manager, Big\-Ip_domain_name_system, Big\-Ip_edge_gateway, Big\-Ip_global_traffic_manager, Big\-Ip_link_controller, Big\-Ip_local_traffic_manager, Big\-Ip_policy_enforcement_manager, Big\-Ip_protocol_security_module, Big\-Ip_wan_optimization_manager, Big\-Ip_webaccelerator, Big\-Ip_websafe, Enterprise_manager 5.4