Total vulnerabilities in the database
In F5OS-A version 1.x before 1.1.0 and F5OS-C version 1.x before 1.5.0, excessive file permissions in F5OS allows an authenticated local attacker to execute limited set of commands in a container and impact the F5OS controller.
Software | From | Fixed in |
---|---|---|
f5 / f5os-a | 1.0.0 | 1.1.0 |
f5 / f5os-c | 1.3.0.x | 1.5.0 |