cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2020-5947,https://securityvulnerability.io/vulnerability/CVE-2020-5947,TCP Sequence Number Exposure in F5 BIG-IP Products,"In specific versions of F5 BIG-IP systems, attackers might exploit a flaw that allows them to retrieve TCP sequence numbers. This can lead to potential reuse of these numbers in subsequent connections, targeting the same source and destination IP addresses and ports. The affected BIG-IP platforms stand vulnerable to unauthorized access, enabling malicious actors to compromise the integrity of network communications. Users of the impacted models should take immediate action to mitigate potential risks and apply available patches.",F5,"Big-ip 2000 Series (c112), Big-ip 4000 Series (c113), Big-ip I2000 Series (c117), Big-ip I4000 Series (c115), Big-ip Virtual Edition (ve)",4.3,MEDIUM,0.000539999979082495,false,,false,false,false,,,false,false,,2020-11-19T00:14:19.000Z,0 CVE-2020-5939,https://securityvulnerability.io/vulnerability/CVE-2020-5939,Traffic Management Microkernel Vulnerability in F5 BIG-IP Virtual Edition,"In specific versions of F5 BIG-IP Virtual Edition systems running on VMware, an issue arises when utilizing an Intel-based 85299 Network Interface Controller (NIC) card with Single Root I/O Virtualization (SR-IOV) enabled in vSphere. This vulnerability can cause the Traffic Management Microkernel (TMM) to fail, resulting in an inability to transmit traffic. This could potentially disrupt network services and affect overall system performance.",F5,Big-ip Virtual Edition (ve),7.5,HIGH,0.0010300000431016088,false,,false,false,false,,,false,false,,2020-11-05T19:14:16.000Z,0