Количество 3
Количество 3
CVE-2025-23239
When running in Appliance mode, and logged into a highly-privileged role, an authenticated remote command injection vulnerability exists in an undisclosed iControl REST endpoint. A successful exploit can allow the attacker to cross a security boundary. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
GHSA-47pf-mc42-q29m
When running in Appliance mode, an authenticated remote command injection vulnerability exists in an undisclosed iControl REST endpoint. A successful exploit can allow the attacker to cross a security boundary. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
BDU:2025-05324
Уязвимость компонента iControl REST средства контроля доступа и удаленной аутентификации BIG-IP, позволяющая нарушителю внедрить произвольные команды
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-23239 When running in Appliance mode, and logged into a highly-privileged role, an authenticated remote command injection vulnerability exists in an undisclosed iControl REST endpoint. A successful exploit can allow the attacker to cross a security boundary. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. | CVSS3: 8.7 | 0% Низкий | около 1 года назад | |
GHSA-47pf-mc42-q29m When running in Appliance mode, an authenticated remote command injection vulnerability exists in an undisclosed iControl REST endpoint. A successful exploit can allow the attacker to cross a security boundary. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. | CVSS3: 8.7 | 0% Низкий | около 1 года назад | |
BDU:2025-05324 Уязвимость компонента iControl REST средства контроля доступа и удаленной аутентификации BIG-IP, позволяющая нарушителю внедрить произвольные команды | CVSS3: 8.7 | 0% Низкий | около 1 года назад |
Уязвимостей на страницу