U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2013-7025

Change History

Modified Analysis by NIST 3/12/2018 1:22:58 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:sonicwall:uma_e5000_firmware:7.0:*:*:*:*:*:*:*
          *cpe:2.3:o:sonicwall:uma_e5000_firmware:7.1:*:*:*:*:*:*:*
          *cpe:2.3:o:sonicwall:uma_e5000_firmware:7.1:sp1:*:*:*:*:*:*
     OR
          cpe:2.3:h:sonicwall:uma_e5000:-:*:*:*:*:*:*:*
Changed CPE Configuration
OR
     *cpe:2.3:a:dell:sonicwall_analyzer:7.0:*:*:*:*:*:*:*
     *cpe:2.3:a:dell:sonicwall_analyzer:7.1:*:*:*:*:*:*:*
     *cpe:2.3:a:dell:sonicwall_analyzer:7.1:sp1:*:*:*:*:*:*
     *cpe:2.3:a:dell:sonicwall_global_management_system:7.0:*:*:*:*:*:*:*
     *cpe:2.3:a:dell:sonicwall_global_management_system:7.1:*:*:*:*:*:*:*
     *cpe:2.3:a:dell:sonicwall_global_management_system:7.1:sp1:*:*:*:*:*:*
     *cpe:2.3:a:dell:sonicwall_universal_management_appliance_e5000_software:7.0:*:*:*:*:*:*:*
     *cpe:2.3:a:dell:sonicwall_universal_management_appliance_e5000_software:7.1:*:*:*:*:*:*:*
     *cpe:2.3:a:dell:sonicwall_universal_management_appliance_e5000_software:7.1:sp1:*:*:*:*:*:*
     *cpe:2.3:h:dell:sonicwall_universal_management_appliance_e5000:-:*:*:*:*:*:*:*
OR
     *cpe:2.3:a:sonicwall:analyzer:7.0:*:*:*:*:*:*:*
     *cpe:2.3:a:sonicwall:analyzer:7.1:*:*:*:*:*:*:*
     *cpe:2.3:a:sonicwall:analyzer:7.1:sp1:*:*:*:*:*:*
     *cpe:2.3:a:sonicwall:global_management_system:7.0:*:*:*:*:*:*:*
     *cpe:2.3:a:sonicwall:global_management_system:7.1:*:*:*:*:*:*:*
     *cpe:2.3:a:sonicwall:global_management_system:7.1:sp1:*:*:*:*:*:*
Changed Reference Type
http://archives.neohapsis.com/archives/bugtraq/2013-12/0022.html No Types Assigned
http://archives.neohapsis.com/archives/bugtraq/2013-12/0022.html Third Party Advisory
Changed Reference Type
http://osvdb.org/100610 No Types Assigned
http://osvdb.org/100610 Broken Link
Changed Reference Type
http://seclists.org/fulldisclosure/2013/Dec/32 Exploit
http://seclists.org/fulldisclosure/2013/Dec/32 Exploit, Mailing List, Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/55923 No Types Assigned
http://secunia.com/advisories/55923 Third Party Advisory
Changed Reference Type
http://www.exploit-db.com/exploits/30054 Exploit
http://www.exploit-db.com/exploits/30054 Exploit, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securityfocus.com/bid/64103 Exploit
http://www.securityfocus.com/bid/64103 Exploit, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securitytracker.com/id/1029433 No Types Assigned
http://www.securitytracker.com/id/1029433 Third Party Advisory, VDB Entry
Changed Reference Type
https://exchange.xforce.ibmcloud.com/vulnerabilities/89462 No Types Assigned
https://exchange.xforce.ibmcloud.com/vulnerabilities/89462 VDB Entry