U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2013-0150

Change History

Reanalysis by NIST 12/14/2023 11:08:02 AM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* versions from (including) 10.1.0 up to (including) 10.2.4
     *cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* versions from (including) 11.0.0 up to (including) 11.3.0
     *cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.3.0:*:*:*:*:*:*:*
     *cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* versions from (including) 11.0.0 up to (including) 11.3.0
     *cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* versions from (including) 10.1.0 up to (including) 10.2.4
     *cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* versions from (including) 11.0.0 up to (including) 11.3.0
     *cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:* versions from (including) 10.1.0 up to (including) 10.2.4
     *cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:* versions from (including) 11.0.0 up to (including) 11.3.0
     *cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* versions from (including) 10.1.0 up to (including) 10.2.4
     *cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* versions from (including) 11.0.0 up to (including) 11.3.0
     *cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* versions from (including) 10.1.0 up to (including) 10.2.4
     *cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* versions from (including) 11.0.0 up to (including) 11.3.0
     *cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* versions from (including) 10.1.0 up to (including) 10.2.4
     *cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* versions from (including) 11.0.0 up to (including) 11.3.0
     *cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.3.0:*:*:*:*:*:*:*
     *cpe:2.3:a:f5:big-ip_protocol_security_module:*:*:*:*:*:*:*:* versions from (including) 10.1.0 up to (including) 10.2.4
     *cpe:2.3:a:f5:big-ip_protocol_security_module:*:*:*:*:*:*:*:* versions from (including) 11.0.0 up to (including) 11.3.0
     *cpe:2.3:a:f5:big-ip_wan_optimization_manager:*:*:*:*:*:*:*:* versions from (including) 10.1.0 up to (including) 10.2.4
     *cpe:2.3:a:f5:big-ip_wan_optimization_manager:*:*:*:*:*:*:*:* versions from (including) 11.0.0 up to (including) 11.3.0
     *cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* versions from (including) 10.1.0 up to (including) 10.2.4
     *cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* versions from (including) 11.0.0 up to (including) 11.3.0
     *cpe:2.3:a:f5:firepass:*:*:*:*:*:*:*:* versions from (including) 6.0.0 up to (including) 6.1.0
     *cpe:2.3:a:f5:firepass:7.0.0:*:*:*:*:*:*:*
Removed CPE Configuration
OR
     *cpe:2.3:a:f5:big-ip_access_policy_manager:10.1.0:*:*:*:*:*:*:*
     *cpe:2.3:a:f5:big-ip_access_policy_manager:10.2.4:*:*:*:*:*:*:*
     *cpe:2.3:a:f5:big-ip_access_policy_manager:11.0.0:*:*:*:*:*:*:*
     *cpe:2.3:a:f5:big-ip_access_policy_manager:11.3.0:*:*:*:*:*:*:*
     *cpe:2.3:h:f5:big-ip_access_policy_manager:10.1.0:*:*:*:*:*:*:standalone
     *cpe:2.3:h:f5:big-ip_access_policy_manager:10.2.4:*:*:*:*:*:*:standalone
     *cpe:2.3:h:f5:big-ip_access_policy_manager:11.0.0:*:*:*:*:*:*:standalone
     *cpe:2.3:h:f5:big-ip_access_policy_manager:11.3.0:*:*:*:*:*:*:standalone

								
						
Removed CPE Configuration
OR
     *cpe:2.3:h:f5:firepass:6.0:*:*:*:*:*:*:*
     *cpe:2.3:h:f5:firepass:6.1.0:*:*:*:*:*:*:*
     *cpe:2.3:h:f5:firepass:7.0.0:*:*:*:*:*:*:*

								
						
Changed Reference Type
http://secunia.com/advisories/53477 Vendor Advisory
http://secunia.com/advisories/53477 Not Applicable, Vendor Advisory
Changed Reference Type
https://nealpoole.com/blog/2013/07/code-execution-via-f5-networks-java-applet/ No Types Assigned
https://nealpoole.com/blog/2013/07/code-execution-via-f5-networks-java-applet/ Third Party Advisory