Total vulnerabilities in the database
An authenticated attacker granted a Viewer or Auditor role on a BIG-IQ can upload arbitrary files using an undisclosed iControl REST endpoint. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Software | From | Fixed in |
---|---|---|
f5 / big-iq_centralized_management | 8.0.0 | 8.3.0 |