Vulnerabilities in BIG-IP APM