Vulnerabilities > F5 > Firepass > 6.0

DATE CVE VULNERABILITY TITLE RISK
2012-04-05 CVE-2012-2053 Permissions, Privileges, and Access Controls vulnerability in F5 Firepass 6.0/6.1.0/7.0.0
The sudoers file in the Linux system configuration in F5 FirePass 6.0.0 through 6.1.0 and 7.0.0 does not require a password for executing commands as root, which allows local users to gain privileges via the sudo program, as demonstrated by the user account that executes PHP scripts, a different vulnerability than CVE-2012-1777.
local
low complexity
f5 CWE-264
7.2
2012-04-05 CVE-2012-1777 SQL Injection vulnerability in F5 Firepass 6.0/6.1.0/7.0.0
SQL injection vulnerability in my.activation.php3 in F5 FirePass 6.0.0 through 6.1.0 and 7.0.0 allows remote attackers to execute arbitrary SQL commands via the state parameter.
network
low complexity
f5 CWE-89
7.5
2007-01-12 CVE-2007-0195 Input Validation vulnerability in F5 Firepass
my.activation.php3 in F5 FirePass 5.4 through 5.5.1 and 6.0 displays different error messages for failed login attempts with a valid username than for those with an invalid username, which allows remote attackers to confirm the validity of an LDAP account.
network
low complexity
f5
5.0
2007-01-12 CVE-2007-0188 Input Validation vulnerability in F5 Firepass
F5 FirePass 5.4 through 5.5.1 does not properly enforce host access restrictions when a client uses a single integer (dword) representation of an IP address ("dotless IP address"), which allows remote authenticated users to connect to the FirePass administrator console and certain other network resources.
network
low complexity
f5
6.5
2007-01-12 CVE-2007-0187 Input Validation vulnerability in F5 Firepass
F5 FirePass 5.4 through 5.5.2 and 6.0 allows remote attackers to access restricted URLs via (1) a trailing null byte, (2) multiple leading slashes, (3) Unicode encoding, (4) URL-encoded directory traversal or same-directory characters, or (5) upper case letters in the domain name.
network
low complexity
f5
7.5