From cd5a44196c8c842039ee5dc79a04d30327eca3df Mon Sep 17 00:00:00 2001 From: MostInterestingBotInTheWorld <98333686+MostInterestingBotInTheWorld@users.noreply.github.com> Date: Thu, 5 May 2022 15:09:49 -0400 Subject: [PATCH] Enhancement: cves/2021/CVE-2021-22986.yaml by mp --- cves/2021/CVE-2021-22986.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-22986.yaml b/cves/2021/CVE-2021-22986.yaml index 56e02c0d49..ac78fc461d 100644 --- a/cves/2021/CVE-2021-22986.yaml +++ b/cves/2021/CVE-2021-22986.yaml @@ -4,7 +4,7 @@ info: name: F5 BIG-IP iControl REST - Remote Command Execution author: rootxharsh,iamnoooob severity: critical - description: F5 BIG-IP iControl REST interface has an unauthenticated remote command execution vulnerability. + description: F5 BIG-IP iControl REST interface is susceptible to an unauthenticated remote command execution vulnerability. reference: - https://attackerkb.com/topics/J6pWeg5saG/k03009991-icontrol-rest-unauthenticated-remote-command-execution-vulnerability-cve-2021-22986 - https://support.f5.com/csp/article/K03009991