Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2014-2928

EPSS 64.60% · P98
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2014-2928

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The iControl API in F5 BIG-IP LTM, APM, ASM, GTM, Link Controller, and PSM 10.0.0 through 10.2.4 and 11.0.0 through 11.5.1, BIG-IP AAM 11.4.0 through 11.5.1, BIG-IP AFM and PEM 11.3.0 through 11.5.1, BIG-IP Analytics 11.0.0 through 11.5.1, BIG-IP Edge Gateway, WebAccelerator, WOM 10.1.0 through 10.2.4 and 11.0.0 through 11.3.0, Enterprise Manager 2.1.0 through 2.3.0 and 3.0.0 through 3.1.1, and BIG-IQ Cloud, Device, and Security 4.0.0 through 4.3.0 allows remote administrators to execute arbitrary commands via shell metacharacters in the hostname element in a SOAP request.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
多款F5产品任意命令执行漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
F5 BIG-IP LTM等都是美国F5公司的产品。LTM是一款本地流量管理器;APM是一套提供安全统一访问关键业务应用和网络的解决方案。 多款F5产品的iControl API组件中存在安全漏洞。远程攻击者可借助SOAP请求的hostname元素中的shell元字符利用该漏洞执行任意命令。以下产品及版本受到影响:F5 BIG-IP LTM,APM,ASM,GTM,Link Controller,PSM 10.0.0至10.2.4版本和11.0.0至11.5.1版本,BIG-IP AAM 11.4.0至1
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2014-2928

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2014-2928

Please Login to view more intelligence information

Same Patch Batch · n/a · 2014-05-12 · 21 CVEs total

CVE-2013-5984Microweber ‘file’参数目录遍历漏洞
CVE-2014-3455MediaWiki SemanticForms扩展跨站请求伪造漏洞
CVE-2014-3454MediaWiki SemanticForms扩展跨站请求伪造漏洞
CVE-2014-3243SOAPpy 缓冲区溢出漏洞
CVE-2014-3242SOAPpy 信息泄露漏洞
CVE-2014-2301OrbiTeam BSCW 信息泄露漏洞
CVE-2013-6472MediaWiki 信息泄露漏洞
CVE-2013-6454MediaWiki 跨站脚本漏洞
CVE-2013-6453MediaWiki 输入验证漏洞
CVE-2013-6452MediaWiki 跨站脚本漏洞
CVE-2013-4772多款D-Link产品远程身份认证绕过漏洞
CVE-2013-5749SimpleRisk 跨站脚本漏洞
CVE-2013-5748SimpleRisk 跨站请求伪造漏洞
CVE-2013-5671fog-dragonfly Ruby Gem ‘imagemagickutils.rb’命令注入漏洞
CVE-2013-4581GitLab 远程代码执行漏洞
CVE-2013-4580GitLab ‘helpers.rb’未授权API访问漏洞
CVE-2013-4577GNU GRUB Debian补丁包权限许可和访问控制漏洞
CVE-2013-4574MediaWiki TimedMediaHandler扩展跨站脚本漏洞
CVE-2013-4571MediaWiki Scribunto扩展缓冲区溢出漏洞
CVE-2013-4570MediaWiki Scribunto扩展拒绝服务漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2014-2928

No comments yet


Leave a comment