- EPSS 94.43%
- Veröffentlicht 01.07.2020 15:15:15
- Zuletzt bearbeitet 27.10.2025 17:07:00
In BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, the Traffic Management User Interface (TMUI), also referred to as the Configuration utility, has a Remote Code Execution (RCE) vulnerability i...
CVE-2020-5903
- EPSS 9.08%
- Veröffentlicht 01.07.2020 15:15:15
- Zuletzt bearbeitet 21.11.2024 05:34:47
In BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, a Cross-Site Scripting (XSS) vulnerability exists in an undisclosed page of the BIG-IP Configuration utility.
CVE-2020-5904
- EPSS 0.28%
- Veröffentlicht 01.07.2020 15:15:15
- Zuletzt bearbeitet 21.11.2024 05:34:48
In BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, a cross-site request forgery (CSRF) vulnerability in the Traffic Management User Interface (TMUI), also referred to as the Configuration utility, exists in an undi...
- EPSS 0.26%
- Veröffentlicht 01.07.2020 15:15:15
- Zuletzt bearbeitet 21.11.2024 05:34:48
In version 11.6.1-11.6.5.2 of the BIG-IP system Configuration utility Network > WCCP page, the system does not sanitize all user-provided data before display.
CVE-2020-5906
- EPSS 0.13%
- Veröffentlicht 01.07.2020 15:15:15
- Zuletzt bearbeitet 21.11.2024 05:34:48
In versions 13.1.0-13.1.3.3, 12.1.0-12.1.5.2, and 11.6.1-11.6.5.2, the BIG-IP system does not properly enforce the access controls for the scp.blacklist files. This allows Admin and Resource Admin users with Secure Copy (SCP) protocol access to read ...
CVE-2020-5907
- EPSS 0.36%
- Veröffentlicht 01.07.2020 15:15:15
- Zuletzt bearbeitet 21.11.2024 05:34:48
In BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.3, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, an authorized user provided with access only to the TMOS Shell (tmsh) may be able to conduct arbitrary file read/writes via the built-in sftp ...
CVE-2020-5908
- EPSS 0.09%
- Veröffentlicht 01.07.2020 15:15:15
- Zuletzt bearbeitet 21.11.2024 05:34:48
In versions bundled with BIG-IP APM 12.1.0-12.1.5 and 11.6.1-11.6.5.2, Edge Client for Linux exposes full session ID in the local log files.
CVE-2020-5896
- EPSS 0.06%
- Veröffentlicht 12.05.2020 16:15:11
- Zuletzt bearbeitet 21.11.2024 05:34:47
On versions 7.1.5-7.1.9, the BIG-IP Edge Client's Windows Installer Service's temporary folder has weak file and folder permissions.
CVE-2020-5897
- EPSS 0.86%
- Veröffentlicht 12.05.2020 16:15:11
- Zuletzt bearbeitet 21.11.2024 05:34:47
In versions 7.1.5-7.1.9, there is use-after-free memory vulnerability in the BIG-IP Edge Client Windows ActiveX component.
CVE-2020-5898
- EPSS 0.07%
- Veröffentlicht 12.05.2020 16:15:11
- Zuletzt bearbeitet 21.11.2024 05:34:47
In versions 7.1.5-7.1.9, BIG-IP Edge Client Windows Stonewall driver does not sanitize the pointer received from the userland. A local user on the Windows client system can send crafted DeviceIoControl requests to \\.\urvpndrv device causing the Wind...