
CVE-2024-21782 – BIG-IP and BIG-IQ secure copy vulnerability
https://notcve.org/view.php?id=CVE-2024-21782
14 Feb 2024 — BIG-IP or BIG-IQ Resource Administrators and Certificate Managers who have access to the secure copy (scp) utility but do not have access to Advanced shell (bash) can execute arbitrary commands with a specially crafted command string. This vulnerability is due to an incomplete fix for CVE-2020-5873. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated Los administradores de recursos y administradores de certificados de BIG-IP o BIG-IQ que tienen acceso a la utilidad d... • https://my.f5.com/manage/s/article/K98606833 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVE-2024-23976 – BIG-IP Appliance mode iAppsLX vulnerability
https://notcve.org/view.php?id=CVE-2024-23976
14 Feb 2024 — When running in Appliance mode, an authenticated attacker assigned the Administrator role may be able to bypass Appliance mode restrictions utilizing iAppsLX templates on a BIG-IP system. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated Cuando se ejecuta en modo Dispositivo, un atacante autenticado al que se le haya asignado la función de Administrador puede eludir las restricciones del modo Dispositivo utilizando plantillas iAppsLX en un sistema BIG-IP. Nota: Las... • https://my.f5.com/manage/s/article/K91054692 • CWE-266: Incorrect Privilege Assignment •

CVE-2024-22389 – BIG-IP iControl REST API Vulnerability
https://notcve.org/view.php?id=CVE-2024-22389
14 Feb 2024 — When BIG-IP is deployed in high availability (HA) and an iControl REST API token is updated, the change does not sync to the peer device. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated Cuando BIG-IP se implementa en alta disponibilidad (HA) y se actualiza un token de API REST de iControl, el cambio no se sincroniza con el dispositivo par. Nota: Las versiones de software que han llegado al final del soporte técnico (EoTS) no se evalúan • https://my.f5.com/manage/s/article/K32544615 • CWE-613: Insufficient Session Expiration •

CVE-2014-9342
https://notcve.org/view.php?id=CVE-2014-9342
08 Dec 2014 — Cross-site scripting (XSS) vulnerability in the tree view (pl_tree.php) feature in Application Security Manager (ASM) in F5 BIG-IP 11.3.0 allows remote attackers to inject arbitrary web script or HTML by accessing a crafted URL during automatic policy generation. Vulnerabilidad de XSS en la caracteristica tree view (pl_tree.php) en Application Security Manager (ASM) en F5 BIG-IP 11.3.0 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios mediante el acceso a una URL manipulada ... • http://secunia.com/advisories/62000 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2008-7032 – F5 BIG-IP 9.4.3 - Web Management Interface Cross-Site Request Forgery
https://notcve.org/view.php?id=CVE-2008-7032
24 Aug 2009 — Web Management Console Cross-site request forgery (CSRF) vulnerability in the web management console in F5 BIG-IP 9.4.3 allows remote attackers to hijack the authentication of administrators for requests that create new administrators and execute shell commands, as demonstrated using tmui/Control/form. Vulnerabilidad de falsificación de petición cruzada en sitios cruzados (CSRF) en la consola de gestión web en F5 BIG-IP v9.4.3 permite a atacantes remotos secuestrar la autenticación de los administradores pa... • https://www.exploit-db.com/exploits/31133 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVE-2007-6258 – Apache Tomcat Connector jk2-2.0.2 mod_jk2 - Remote Overflow
https://notcve.org/view.php?id=CVE-2007-6258
18 Feb 2008 — Multiple stack-based buffer overflows in the legacy mod_jk2 2.0.3-DEV and earlier Apache module allow remote attackers to execute arbitrary code via a long (1) Host header, or (2) Hostname within a Host header. Múltiples desbordamientos de búfer basados en pila en el módulo de Apache legacy mod_jk2 2.0.3-DEV y anteriores permiten a atacantes remotos ejecutar código de su elección a través de una (1) cabecera Host larga o (2) Hostname dentro de una cabecera Host larga. • https://www.exploit-db.com/exploits/5386 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •