Known Vulnerabilities in BIG-IP Guided Configuration