{"vulnerability": "CVE-2020-5949", "sightings": [{"uuid": "49aa2c8f-df05-4c48-a95a-fd325f27eeb6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-5949", "type": "seen", "source": "https://t.me/cibsecurity/20574", "content": "\u203c CVE-2020-5949 \u203c\n\nOn BIG-IP versions 14.0.0-14.0.1 and 13.1.0-13.1.3.4, certain traffic pattern sent to a virtual server configured with an FTP profile can cause the FTP channel to break.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-12T00:45:46.000000Z"}, {"uuid": "cd7cef5f-db20-40d6-a448-fdd6e8e32113", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-5949", "type": "seen", "source": "https://t.me/cibsecurity/20633", "content": "\u203c CVE-2020-5949 \u203c\n\nOn BIG-IP versions 14.0.0-14.0.1 and 13.1.0-13.1.3.4, certain traffic pattern sent to a virtual server configured with an FTP profile can cause the FTP channel to break.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-12T02:25:17.000000Z"}, {"uuid": "1e383fc9-5f8d-4024-a953-6061d0b16381", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-5949", "type": "seen", "source": "https://t.me/cibsecurity/20541", "content": "\u203c CVE-2020-5949 \u203c\n\nOn BIG-IP versions 14.0.0-14.0.1 and 13.1.0-13.1.3.4, certain traffic pattern sent to a virtual server configured with an FTP profile can cause the FTP channel to break.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-12T00:25:23.000000Z"}, {"uuid": "a4353920-d8e9-40c6-8538-2532bbc76ba7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-5949", "type": "seen", "source": "https://t.me/cibsecurity/20613", "content": "\u203c CVE-2020-5949 \u203c\n\nOn BIG-IP versions 14.0.0-14.0.1 and 13.1.0-13.1.3.4, certain traffic pattern sent to a virtual server configured with an FTP profile can cause the FTP channel to break.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-12T01:25:12.000000Z"}, {"uuid": "6cd0633d-b8db-43df-8816-cdc1ac248329", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-5949", "type": "seen", "source": "https://t.me/cibsecurity/20593", "content": "\u203c CVE-2020-5949 \u203c\n\nOn BIG-IP versions 14.0.0-14.0.1 and 13.1.0-13.1.3.4, certain traffic pattern sent to a virtual server configured with an FTP profile can cause the FTP channel to break.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-12T01:05:04.000000Z"}, {"uuid": "65b820d6-dceb-4fe9-adf4-04a32e203265", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-5949", "type": "seen", "source": "https://t.me/cibsecurity/20521", "content": "\u203c CVE-2020-5949 \u203c\n\nOn BIG-IP versions 14.0.0-14.0.1 and 13.1.0-13.1.3.4, certain traffic pattern sent to a virtual server configured with an FTP profile can cause the FTP channel to break.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T23:25:24.000000Z"}, {"uuid": "6cf33182-472c-4397-853d-ffe394a8bda3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-5949", "type": "seen", "source": "https://t.me/cibsecurity/20554", "content": "\u203c CVE-2020-5949 \u203c\n\nOn BIG-IP versions 14.0.0-14.0.1 and 13.1.0-13.1.3.4, certain traffic pattern sent to a virtual server configured with an FTP profile can cause the FTP channel to break.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-12T00:35:52.000000Z"}, {"uuid": "7bdf4479-23a4-43ef-8467-a8813a90138f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-5949", "type": "seen", "source": "https://t.me/cibsecurity/20501", "content": "\u203c CVE-2020-5949 \u203c\n\nOn BIG-IP versions 14.0.0-14.0.1 and 13.1.0-13.1.3.4, certain traffic pattern sent to a virtual server configured with an FTP profile can cause the FTP channel to break.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T22:54:31.000000Z"}, {"uuid": "9974902e-ce66-4693-9a4c-9629a6586e24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-5949", "type": "seen", "source": "https://t.me/cibsecurity/20482", "content": "\u203c CVE-2020-5949 \u203c\n\nOn BIG-IP versions 14.0.0-14.0.1 and 13.1.0-13.1.3.4, certain traffic pattern sent to a virtual server configured with an FTP profile can cause the FTP channel to break.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-11T22:38:58.000000Z"}, {"uuid": "f7f8cc18-272e-4d74-a898-5c060a5d34ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-5949", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/2306", "content": "F5 Big IP Vulnerabilities:\n1. F5 TMUI XSS vulnerability (CVE-2020-5948)\nhttps://support.f5.com/csp/article/K42696541\n]-&gt; Restricting access to the Configuration utility by source IP address (11.x-16.x)\nhttps://support.f5.com/csp/article/K13309\n]-&gt; Overview of securing access to the BIG-IP system\n2. BIG-IP LTM vulnerability (CVE-2020-5949)\nhttps://support.f5.com/csp/article/K20984059\n]-&gt; Configuring SYN cookie protection (13.x-16.x)\nhttps://support.f5.com/csp/article/K74451051", "creation_timestamp": "2020-12-16T12:01:59.000000Z"}]}