cpe:/a:f5:big-ip_policy_enforcement_manager:11.6.0 cpe:/a:f5:big-ip_policy_enforcement_manager:11.6.1 cpe:/a:f5:big-ip_policy_enforcement_manager:11.6.2 cpe:/a:f5:big-ip_policy_enforcement_manager:12.0.0 cpe:/a:f5:big-ip_policy_enforcement_manager:12.1.0 cpe:/a:f5:big-ip_policy_enforcement_manager:12.1.1 cpe:/a:f5:big-ip_policy_enforcement_manager:12.1.2 cpe:/a:f5:big-ip_policy_enforcement_manager:12.1.3 cpe:/a:f5:big-ip_policy_enforcement_manager:13.0.0 CVE-2017-6169 2018-02-06T08:29:00.240-05:00 2018-03-13T14:01:05.797-04:00 4.3 NETWORK MEDIUM NONE NONE NONE PARTIAL http://nvd.nist.gov 2018-02-28T13:05:43.367-05:00 SECTRACK 1040332 CONFIRM https://support.f5.com/csp/article/K31404801 In versions 13.0.0, 12.0.0-12.1.3, or 11.6.0-11.6.2, an F5 BIG-IP virtual server using the URL categorization feature may cause the Traffic Management Microkernel (TMM) to produce a core file when it receives malformed URLs during categorization.