CVE-2020-5887
- EPSS 0.37%
- Published 30.04.2020 21:15:17
- Last modified 21.11.2024 05:34:46
On versions 15.1.0-15.1.0.1, 15.0.0-15.0.1.2, and 14.1.0-14.1.2.3, BIG-IP Virtual Edition (VE) may expose a mechanism for remote attackers to access local daemons and bypass port lockdown settings.
CVE-2020-5889
- EPSS 0.16%
- Published 30.04.2020 21:15:17
- Last modified 21.11.2024 05:34:46
On versions 15.1.0-15.1.0.1, 15.0.0-15.0.1.2, and 14.1.0-14.1.2.3, in BIG-IP APM portal access, a specially crafted HTTP request can lead to reflected XSS after the BIG-IP APM system rewrites the HTTP response from the untrusted backend server and se...
CVE-2020-5891
- EPSS 0.65%
- Published 30.04.2020 21:15:17
- Last modified 21.11.2024 05:34:46
On BIG-IP 15.1.0-15.1.0.1, 15.0.0-15.0.1.2, and 14.1.0-14.1.2.3, undisclosed HTTP/2 requests can lead to a denial of service when sent to a virtual server configured with the Fallback Host setting and a server-side HTTP/2 profile.
CVE-2020-5893
- EPSS 0.13%
- Published 30.04.2020 21:15:17
- Last modified 21.11.2024 05:34:46
In versions 7.1.5-7.1.8, when a user connects to a VPN using BIG-IP Edge Client over an unsecure network, BIG-IP Edge Client responds to authentication requests over HTTP while sending probes for captive portal detection.
CVE-2020-5873
- EPSS 0.29%
- Published 30.04.2020 21:15:16
- Last modified 21.11.2024 05:34:44
On BIG-IP 15.0.0-15.0.1, 14.1.0-14.1.2.3, 13.1.0-13.1.3.1, 12.1.0-12.1.5, and 11.6.1-11.6.5 and BIG-IQ 5.2.0-7.1.0, a user associated with the Resource Administrator role who has access to the secure copy (scp) utility but does not have access to Adv...
CVE-2020-5874
- EPSS 0.65%
- Published 30.04.2020 21:15:16
- Last modified 21.11.2024 05:34:44
On BIG-IP APM 15.0.0-15.0.1.2, 14.1.0-14.1.2.3, and 14.0.0-14.0.1, in certain circumstances, an attacker sending specifically crafted requests to a BIG-IP APM virtual server may cause a disruption of service provided by the Traffic Management Microke...
CVE-2020-5875
- EPSS 0.65%
- Published 30.04.2020 21:15:16
- Last modified 21.11.2024 05:34:44
On BIG-IP 15.0.0-15.0.1 and 14.1.0-14.1.2.3, under certain conditions, the Traffic Management Microkernel (TMM) may generate a core file and restart while processing SSL traffic with an HTTP/2 full proxy.
CVE-2020-5876
- EPSS 0.3%
- Published 30.04.2020 21:15:16
- Last modified 21.11.2024 05:34:44
On BIG-IP 15.0.0-15.0.1.3, 14.1.0-14.1.2.3, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, a race condition exists where mcpd and other processes may make unencrypted connection attempts to a new configuration sync peer. The race condition ca...
CVE-2020-5877
- EPSS 0.65%
- Published 30.04.2020 21:15:16
- Last modified 21.11.2024 05:34:45
On BIG-IP 15.0.0-15.1.0.1, 14.1.0-14.1.2.3, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, malformed input to the DATAGRAM::tcp iRules command within a FLOW_INIT event may lead to a denial of service.
CVE-2020-5878
- EPSS 0.65%
- Published 30.04.2020 21:15:16
- Last modified 21.11.2024 05:34:45
On versions 15.1.0-15.1.0.1, 15.0.0-15.0.1.1, and 14.1.0-14.1.2.3, Traffic Management Microkernel (TMM) may restart on BIG-IP Virtual Edition (VE) while processing unusual IP traffic.