cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2020-5947,https://securityvulnerability.io/vulnerability/CVE-2020-5947,,"In versions 16.0.0-16.0.0.1 and 15.1.0-15.1.1, on specific BIG-IP platforms, attackers may be able to obtain TCP sequence numbers from the BIG-IP system that can be reused in future connections with the same source and destination port and IP numbers. Only these platforms are affected: BIG-IP 2000 series (C112), BIG-IP 4000 series (C113), BIG-IP i2000 series (C117), BIG-IP i4000 series (C115), BIG-IP Virtual Edition (VE).",F5,"Big-ip 2000 Series (c112), Big-ip 4000 Series (c113), Big-ip I2000 Series (c117), Big-ip I4000 Series (c115), Big-ip Virtual Edition (ve)",4.3,MEDIUM,0.000539999979082495,false,false,false,false,,false,false,2020-11-19T00:14:19.000Z,0 CVE-2020-5939,https://securityvulnerability.io/vulnerability/CVE-2020-5939,,"In versions 16.0.0-16.0.0.1, 15.1.0-15.1.0.3, 15.0.0-15.0.1.3, 14.1.0-14.1.2.6, and 13.1.0-13.1.3.4, BIG-IP Virtual Edition (VE) systems on VMware, with an Intel-based 85299 Network Interface Controller (NIC) card and Single Root I/O Virtualization (SR-IOV) enabled on vSphere, may fail and leave the Traffic Management Microkernel (TMM) in a state where it cannot transmit traffic.",F5,Big-ip Virtual Edition (ve),7.5,HIGH,0.0010300000431016088,false,false,false,false,,false,false,2020-11-05T19:14:16.000Z,0