Show filters
350 Total Results
Displaying 141-150 of 350
Sort by:
Attacker Value
Unknown

CVE-2020-8461

Disclosure Date: December 17, 2020 (last updated February 22, 2025)
A CSRF protection bypass vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an attacker to get a victim's browser to send a specifically encoded request without requiring a valid CSRF token.
Attacker Value
Unknown

CVE-2020-5949

Disclosure Date: December 11, 2020 (last updated November 28, 2024)
On BIG-IP versions 14.0.0-14.0.1 and 13.1.0-13.1.3.4, certain traffic pattern sent to a virtual server configured with an FTP profile can cause the FTP channel to break.
Attacker Value
Unknown

CVE-2020-5947

Disclosure Date: November 19, 2020 (last updated November 28, 2024)
In versions 16.0.0-16.0.0.1 and 15.1.0-15.1.1, on specific BIG-IP platforms, attackers may be able to obtain TCP sequence numbers from the BIG-IP system that can be reused in future connections with the same source and destination port and IP numbers. Only these platforms are affected: BIG-IP 2000 series (C112), BIG-IP 4000 series (C113), BIG-IP i2000 series (C117), BIG-IP i4000 series (C115), BIG-IP Virtual Edition (VE).
Attacker Value
Unknown

CVE-2020-28579

Disclosure Date: November 18, 2020 (last updated February 22, 2025)
A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an authenticated, remote attacker to send a specially crafted HTTP message and achieve remote code execution with elevated privileges.
Attacker Value
Unknown

CVE-2020-28580

Disclosure Date: November 18, 2020 (last updated February 22, 2025)
A command injection vulnerability in AddVLANItem of Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an authenticated, remote attacker to send specially crafted HTTP messages and execute arbitrary OS commands with elevated privileges.
Attacker Value
Unknown

CVE-2020-28581

Disclosure Date: November 18, 2020 (last updated February 22, 2025)
A command injection vulnerability in ModifyVLANItem of Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an authenticated, remote attacker to send specially crafted HTTP messages and execute arbitrary OS commands with elevated privileges.
Attacker Value
Unknown

CVE-2020-28578

Disclosure Date: November 18, 2020 (last updated February 22, 2025)
A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an unauthenticated, remote attacker to send a specially crafted HTTP message and achieve remote code execution with elevated privileges.
Attacker Value
Unknown

CVE-2020-5939

Disclosure Date: November 05, 2020 (last updated November 28, 2024)
In versions 16.0.0-16.0.0.1, 15.1.0-15.1.0.3, 15.0.0-15.0.1.3, 14.1.0-14.1.2.6, and 13.1.0-13.1.3.4, BIG-IP Virtual Edition (VE) systems on VMware, with an Intel-based 85299 Network Interface Controller (NIC) card and Single Root I/O Virtualization (SR-IOV) enabled on vSphere, may fail and leave the Traffic Management Microkernel (TMM) in a state where it cannot transmit traffic.
Attacker Value
Unknown

CVE-2020-5943

Disclosure Date: November 05, 2020 (last updated February 22, 2025)
In versions 14.1.0-14.1.0.1 and 14.1.2.5-14.1.2.7, when a BIG-IP object is created or listed through the REST interface, the protected fields are obfuscated in the REST response, not protected via a SecureVault cryptogram as TMSH does. One example of protected fields is the GTM monitor password.
Attacker Value
Unknown

CVE-2020-5938

Disclosure Date: October 29, 2020 (last updated February 22, 2025)
On BIG-IP 13.1.0-13.1.3.4, 12.1.0-12.1.5.2, and 11.6.1-11.6.5.2, when negotiating IPSec tunnels with configured, authenticated peers, the peer may negotiate a different key length than the BIG-IP configuration would otherwise allow.