From 35c0422ec9a8d7d65506de18f4864ec2269a0163 Mon Sep 17 00:00:00 2001 From: MostInterestingBotInTheWorld <98333686+MostInterestingBotInTheWorld@users.noreply.github.com> Date: Thu, 5 May 2022 14:26:04 -0400 Subject: [PATCH] Enhancement: cves/2021/CVE-2021-22986.yaml by mp --- cves/2021/CVE-2021-22986.yaml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/cves/2021/CVE-2021-22986.yaml b/cves/2021/CVE-2021-22986.yaml index 89a47a6628..56e02c0d49 100644 --- a/cves/2021/CVE-2021-22986.yaml +++ b/cves/2021/CVE-2021-22986.yaml @@ -1,10 +1,10 @@ id: CVE-2021-22986 info: - name: F5 BIG-IP iControl REST Unauthenticated Remote Command Execution + name: F5 BIG-IP iControl REST - Remote Command Execution author: rootxharsh,iamnoooob severity: critical - description: The F5 BIG-IP iControl REST interface has an unauthenticated remote command execution vulnerability. + description: F5 BIG-IP iControl REST interface has an unauthenticated remote command execution vulnerability. reference: - https://attackerkb.com/topics/J6pWeg5saG/k03009991-icontrol-rest-unauthenticated-remote-command-execution-vulnerability-cve-2021-22986 - https://support.f5.com/csp/article/K03009991 @@ -55,4 +55,4 @@ requests: - "uid=" condition: and -# Enhanced by mp on 2022/04/13 +# Enhanced by mp on 2022/05/05