CVE-2020-5912
- EPSS 0.08%
- Veröffentlicht 26.08.2020 15:15:12
- Zuletzt bearbeitet 21.11.2024 05:34:48
In BIG-IP versions 15.1.0-15.1.0.4, 15.0.0-15.0.1.3, 14.1.0-14.1.2.3, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, the restjavad process's dump command does not follow current best coding practices and may overwrite arbitrary files.
- EPSS 94.43%
- Veröffentlicht 01.07.2020 15:15:15
- Zuletzt bearbeitet 02.04.2025 18:28:41
In BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, the Traffic Management User Interface (TMUI), also referred to as the Configuration utility, has a Remote Code Execution (RCE) vulnerability i...
CVE-2020-5903
- EPSS 9.08%
- Veröffentlicht 01.07.2020 15:15:15
- Zuletzt bearbeitet 21.11.2024 05:34:47
In BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, a Cross-Site Scripting (XSS) vulnerability exists in an undisclosed page of the BIG-IP Configuration utility.
CVE-2020-5904
- EPSS 0.28%
- Veröffentlicht 01.07.2020 15:15:15
- Zuletzt bearbeitet 21.11.2024 05:34:48
In BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, a cross-site request forgery (CSRF) vulnerability in the Traffic Management User Interface (TMUI), also referred to as the Configuration utility, exists in an undi...
- EPSS 0.26%
- Veröffentlicht 01.07.2020 15:15:15
- Zuletzt bearbeitet 21.11.2024 05:34:48
In version 11.6.1-11.6.5.2 of the BIG-IP system Configuration utility Network > WCCP page, the system does not sanitize all user-provided data before display.
CVE-2020-5906
- EPSS 0.13%
- Veröffentlicht 01.07.2020 15:15:15
- Zuletzt bearbeitet 21.11.2024 05:34:48
In versions 13.1.0-13.1.3.3, 12.1.0-12.1.5.2, and 11.6.1-11.6.5.2, the BIG-IP system does not properly enforce the access controls for the scp.blacklist files. This allows Admin and Resource Admin users with Secure Copy (SCP) protocol access to read ...
CVE-2020-5907
- EPSS 0.36%
- Veröffentlicht 01.07.2020 15:15:15
- Zuletzt bearbeitet 21.11.2024 05:34:48
In BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.3, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, an authorized user provided with access only to the TMOS Shell (tmsh) may be able to conduct arbitrary file read/writes via the built-in sftp ...
CVE-2020-5890
- EPSS 0.13%
- Veröffentlicht 30.04.2020 22:15:12
- Zuletzt bearbeitet 21.11.2024 05:34:46
On BIG-IP 15.0.0-15.0.1, 14.1.0-14.1.2.3, 13.1.0-13.1.3.3, and 12.1.0-12.1.5.1 and BIG-IQ 5.2.0-7.1.0, when creating a QKView, credentials for binding to LDAP servers used for remote authentication of the BIG-IP administrative interface will not full...
CVE-2020-5888
- EPSS 0.16%
- Veröffentlicht 30.04.2020 22:15:11
- Zuletzt bearbeitet 21.11.2024 05:34:46
On versions 15.1.0-15.1.0.1, 15.0.0-15.0.1.2, and 14.1.0-14.1.2.3, BIG-IP Virtual Edition (VE) may expose a mechanism for adjacent network (layer 2) attackers to access local daemons and bypass port lockdown settings.
CVE-2020-5882
- EPSS 0.65%
- Veröffentlicht 30.04.2020 21:15:17
- Zuletzt bearbeitet 21.11.2024 05:34:45
On BIG-IP 15.0.0-15.0.1.3, 14.1.0-14.1.2.3, 13.1.0-13.1.3.3, 12.1.0-12.1.5, and 11.6.1-11.6.5.1, under certain conditions, the Intel QuickAssist Technology (QAT) cryptography driver may produce a Traffic Management Microkernel (TMM) core file.