Total vulnerabilities in the database
On F5OS-A beginning in version 1.2.0 to before 1.3.0 and F5OS-C beginning in version 1.3.0 to before 1.5.0, processing F5OS tenant file names may allow for command injection. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Software | From | Fixed in |
---|---|---|
f5 / f5os-c | 1.3.0 | 1.5.0 |
f5 / f5os-a | 1.2.0 | 1.3.0 |