cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-24966,https://securityvulnerability.io/vulnerability/CVE-2024-24966,Remote Authentication Vulnerability in F5OS," When LDAP remote authentication is configured on F5OS, a remote user without an assigned role will be incorrectly authorized.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.",F5,"F5OS - Appliance,F5OS - Chassis",5.5,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-02-14T16:30:22.023Z,0 CVE-2024-23607,https://securityvulnerability.io/vulnerability/CVE-2024-23607,F5 OS QKView Directory Traversal Vulnerability Allows Read Access to Outside Files," A directory traversal vulnerability exists in the F5OS QKView utility that allows an authenticated attacker to read files outside the QKView directory.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.",F5,"F5OS - Appliance,F5OS - Chassis",5.5,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2024-02-14T16:30:20.564Z,0 CVE-2023-36494,https://securityvulnerability.io/vulnerability/CVE-2023-36494,F5OS-A vulnerability," Audit logs on F5OS-A may contain undisclosed sensitive information.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.",F5,F5os - Appliance,4.4,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2023-08-02T16:15:00.000Z,0 CVE-2023-22657,https://securityvulnerability.io/vulnerability/CVE-2023-22657,F5OS vulnerability,"A command injection vulnerability has been identified in F5OS-A and F5OS-C products, allowing attackers to manipulate file name inputs and execute arbitrary commands. This security flaw affects versions of F5OS-A from 1.2.0 to just before 1.3.0, and F5OS-C from 1.3.0 up to but not including 1.5.0. Users are urged to review their affected systems and implement the necessary updates to mitigate possible security risks.",F5,"F5OS-A,F5OS-C",7.8,HIGH,0.0004600000102072954,false,,false,false,false,,,false,false,,2023-02-01T18:15:00.000Z,0 CVE-2022-41780,https://securityvulnerability.io/vulnerability/CVE-2022-41780,F5OS CLI vulnerability CVE-2022-41780,"In F5OS-A version 1.x before 1.1.0 and F5OS-C version 1.x before 1.4.0, a directory traversal vulnerability exists in an undisclosed location of the F5OS CLI that allows an attacker to read arbitrary files.",F5,"F5os-a,F5os-c",5.5,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-10-19T00:00:00.000Z,0 CVE-2022-41835,https://securityvulnerability.io/vulnerability/CVE-2022-41835,F5OS vulnerability CVE-2022-41835,"In F5OS-A version 1.x before 1.1.0 and F5OS-C version 1.x before 1.5.0, excessive file permissions in F5OS allows an authenticated local attacker to execute limited set of commands in a container and impact the F5OS controller.",F5,"F5os-a,F5os-c",7.3,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2022-10-19T00:00:00.000Z,0 CVE-2022-25990,https://securityvulnerability.io/vulnerability/CVE-2022-25990,External Port Exposure in F5OS-A Software by F5 Networks,"F5 Networks has identified a vulnerability in F5OS-A software versions 1.0.x before 1.0.1 where certain registry ports are exposed externally. This poses a risk, as unauthorized access may occur if these ports are misconfigured or left unprotected. It's crucial for organizations running this software version to assess their security configurations and apply the necessary updates to mitigate potential risks.",F5,F5os-a,5.3,MEDIUM,0.0008399999933317304,false,,false,false,false,,,false,false,,2022-05-04T00:00:00.000Z,0