cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2020-5947,https://securityvulnerability.io/vulnerability/CVE-2020-5947,,"In versions 16.0.0-16.0.0.1 and 15.1.0-15.1.1, on specific BIG-IP platforms, attackers may be able to obtain TCP sequence numbers from the BIG-IP system that can be reused in future connections with the same source and destination port and IP numbers. Only these platforms are affected: BIG-IP 2000 series (C112), BIG-IP 4000 series (C113), BIG-IP i2000 series (C117), BIG-IP i4000 series (C115), BIG-IP Virtual Edition (VE).",F5,"Big-ip 2000 Series (c112), Big-ip 4000 Series (c113), Big-ip I2000 Series (c117), Big-ip I4000 Series (c115), Big-ip Virtual Edition (ve)",4.3,MEDIUM,0.000539999979082495,false,false,false,false,,false,false,2020-11-19T00:14:19.000Z,0 CVE-2020-5939,https://securityvulnerability.io/vulnerability/CVE-2020-5939,,"In versions 16.0.0-16.0.0.1, 15.1.0-15.1.0.3, 15.0.0-15.0.1.3, 14.1.0-14.1.2.6, and 13.1.0-13.1.3.4, BIG-IP Virtual Edition (VE) systems on VMware, with an Intel-based 85299 Network Interface Controller (NIC) card and Single Root I/O Virtualization (SR-IOV) enabled on vSphere, may fail and leave the Traffic Management Microkernel (TMM) in a state where it cannot transmit traffic.",F5,Big-ip Virtual Edition (ve),7.5,HIGH,0.0010300000431016088,false,false,false,false,,false,false,2020-11-05T19:14:16.000Z,0 CVE-2020-5888,https://securityvulnerability.io/vulnerability/CVE-2020-5888,,"On versions 15.1.0-15.1.0.1, 15.0.0-15.0.1.2, and 14.1.0-14.1.2.3, BIG-IP Virtual Edition (VE) may expose a mechanism for adjacent network (layer 2) attackers to access local daemons and bypass port lockdown settings.",F5,Big-ip Ve,8.1,HIGH,0.0006900000153109431,false,false,false,false,,false,false,2020-04-30T21:04:52.000Z,0 CVE-2020-5887,https://securityvulnerability.io/vulnerability/CVE-2020-5887,,"On versions 15.1.0-15.1.0.1, 15.0.0-15.0.1.2, and 14.1.0-14.1.2.3, BIG-IP Virtual Edition (VE) may expose a mechanism for remote attackers to access local daemons and bypass port lockdown settings.",F5,Big-ip Ve,9.1,CRITICAL,0.004579999949783087,false,false,false,false,,false,false,2020-04-30T20:43:51.000Z,0 CVE-2020-5881,https://securityvulnerability.io/vulnerability/CVE-2020-5881,,"On versions 15.0.0-15.1.0.1, 14.1.0-14.1.2.3, and 13.1.0-13.1.3.3, when the BIG-IP Virtual Edition (VE) is configured with VLAN groups and there are devices configured with OSPF connected to it, the Network Device Abstraction Layer (NDAL) Interfaces can lock up and in turn disrupting the communication between the mcpd and tmm processes.",F5,Big-ip Ve,7.5,HIGH,0.0010300000431016088,false,false,false,false,,false,false,2020-04-30T20:39:57.000Z,0 CVE-2020-5878,https://securityvulnerability.io/vulnerability/CVE-2020-5878,,"On versions 15.1.0-15.1.0.1, 15.0.0-15.0.1.1, and 14.1.0-14.1.2.3, Traffic Management Microkernel (TMM) may restart on BIG-IP Virtual Edition (VE) while processing unusual IP traffic.",F5,Big-ip Ve,7.5,HIGH,0.0010300000431016088,false,false,false,false,,false,false,2020-04-30T20:24:29.000Z,0