![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.111016 |
Categoría: | Web application abuses |
Título: | F5 FirePass Multiple Input Validation Vulnerabilities |
Resumen: | F5 FirePass is prone to multiple input-validation; vulnerabilities. |
Descripción: | Summary: F5 FirePass is prone to multiple input-validation vulnerabilities. Vulnerability Insight: The device fails to sufficiently sanitize user-supplied input. These issues include information-disclosure, security bypass, and cross-site scripting vulnerabilities. Vulnerability Impact: An attacker can exploit these issues to bypass security restrictions, to view sensitive information, and to steal cookie-based authentication credentials. This may allow the attacker to compromise the application and the underlying system. Other attacks are also possible. Affected Software/OS: F5 FirePass 5.4.0 through 5.5.1 and 6.0.0. Solution: The vendor has released updates listened in the referenced advisory. CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2007-0195 BugTraq ID: 21957 http://www.securityfocus.com/bid/21957 http://lists.grok.org.uk/pipermail/full-disclosure/2007-January/051651.html http://www.mnin.org/advisories/2007_firepass.pdf http://www.osvdb.org/32736 http://secunia.com/advisories/23627 |
Copyright | Copyright (C) 2015 SCHUTZWERK GmbH |
Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |