Vulnerabilities > F5 > F5Os A
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-08-02 | CVE-2023-36494 | Information Exposure Through Log Files vulnerability in F5 F5Os-A 1.4.0 Audit logs on F5OS-A may contain undisclosed sensitive information. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. | 4.4 |
2023-02-01 | CVE-2023-22657 | Command Injection vulnerability in F5 F5Os-A and F5Os-C On F5OS-A beginning in version 1.2.0 to before 1.3.0 and F5OS-C beginning in version 1.3.0 to before 1.5.0, processing F5OS tenant file names may allow for command injection. | 7.8 |
2022-10-19 | CVE-2022-41780 | Unspecified vulnerability in F5 F5Os-A and F5Os-C In F5OS-A version 1.x before 1.1.0 and F5OS-C version 1.x before 1.4.0, a directory traversal vulnerability exists in an undisclosed location of the F5OS CLI that allows an attacker to read arbitrary files. | 5.5 |
2022-10-19 | CVE-2022-41835 | Unspecified vulnerability in F5 F5Os-A and F5Os-C In F5OS-A version 1.x before 1.1.0 and F5OS-C version 1.x before 1.5.0, excessive file permissions in F5OS allows an authenticated local attacker to execute limited set of commands in a container and impact the F5OS controller. | 8.8 |
2022-05-05 | CVE-2022-25990 | Unspecified vulnerability in F5 F5Os-A 1.0.0 On 1.0.x versions prior to 1.0.1, systems running F5OS-A software may expose certain registry ports externally. | 5.3 |
2021-11-11 | CVE-2002-20001 | Resource Exhaustion vulnerability in multiple products The Diffie-Hellman Key Agreement Protocol allows remote attackers (from the client side) to send arbitrary numbers that are actually not public keys, and trigger expensive server-side DHE modular-exponentiation calculations, aka a D(HE)at or D(HE)ater attack. | 7.5 |