U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2004-0594

Change History

Modified Analysis by NIST 2/15/2024 4:17:59 PM

Action Type Old Value New Value
Changed CPE Configuration
OR
     *cpe:2.3:h:avaya:converged_communications_server:2.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*
     *cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*
     *cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
     *cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*
OR
     *cpe:2.3:a:openpkg:openpkg:2.0:*:*:*:*:*:*:*
     *cpe:2.3:a:openpkg:openpkg:2.1:*:*:*:*:*:*:*
     *cpe:2.3:h:avaya:converged_communications_server:2.0:*:*:*:*:*:*:*
     *cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
     *cpe:2.3:o:hp:hp-ux:b.11.00:*:*:*:*:*:*:*
     *cpe:2.3:o:hp:hp-ux:b.11.11:*:*:*:*:*:*:*
     *cpe:2.3:o:hp:hp-ux:b.11.22:*:*:*:*:*:*:*
     *cpe:2.3:o:hp:hp-ux:b.11.23:*:*:*:*:*:*:*
     *cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*
     *cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
     *cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*
Changed CPE Configuration
OR
     *cpe:2.3:a:avaya:integrated_management:*:*:*:*:*:*:*:*
     *cpe:2.3:a:php:php:3.0:*:*:*:*:*:*:*
     *cpe:2.3:a:php:php:3.0.1:*:*:*:*:*:*:*
     *cpe:2.3:a:php:php:3.0.2:*:*:*:*:*:*:*
     *cpe:2.3:a:php:php:3.0.3:*:*:*:*:*:*:*
     *cpe:2.3:a:php:php:3.0.4:*:*:*:*:*:*:*
     *cpe:2.3:a:php:php:3.0.5:*:*:*:*:*:*:*
     *cpe:2.3:a:php:php:3.0.6:*:*:*:*:*:*:*
     *cpe:2.3:a:php:php:3.0.7:*:*:*:*:*:*:*
     *cpe:2.3:a:php:php:3.0.8:*:*:*:*:*:*:*
     *cpe:2.3:a:php:php:3.0.9:*:*:*:*:*:*:*
     *cpe:2.3:a:php:php:3.0.10:*:*:*:*:*:*:*
     *cpe:2.3:a:php:php:3.0.11:*:*:*:*:*:*:*
     *cpe:2.3:a:php:php:3.0.12:*:*:*:*:*:*:*
     *cpe:2.3:a:php:php:3.0.13:*:*:*:*:*:*:*
     *cpe:2.3:a:php:php:3.0.14:*:*:*:*:*:*:*
     *cpe:2.3:a:php:php:3.0.15:*:*:*:*:*:*:*
     *cpe:2.3:a:php:php:3.0.16:*:*:*:*:*:*:*
     *cpe:2.3:a:php:php:3.0.17:*:*:*:*:*:*:*
     *cpe:2.3:a:php:php:3.0.18:*:*:*:*:*:*:*
     *cpe:2.3:a:php:php:4.0:*:*:*:*:*:*:*
     *cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:*
     *cpe:2.3:a:php:php:4.0.1:patch1:*:*:*:*:*:*
     *cpe:2.3:a:php:php:4.0.1:patch2:*:*:*:*:*:*
     *cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:*
     *cpe:2.3:a:php:php:4.0.3:*:*:*:*:*:*:*
     *cpe:2.3:a:php:php:4.0.3:patch1:*:*:*:*:*:*
     *cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:*
     *cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:*
     *cpe:2.3:a:php:php:4.0.6:*:*:*:*:*:*:*
     *cpe:2.3:a:php:php:4.0.7:*:*:*:*:*:*:*
     *cpe:2.3:a:php:php:4.0.7:rc1:*:*:*:*:*:*
     *cpe:2.3:a:php:php:4.0.7:rc2:*:*:*:*:*:*
     *cpe:2.3:a:php:php:4.0.7:rc3:*:*:*:*:*:*
     *cpe:2.3:a:php:php:4.1.0:*:*:*:*:*:*:*
     *cpe:2.3:a:php:php:4.1.1:*:*:*:*:*:*:*
     *cpe:2.3:a:php:php:4.1.2:*:*:*:*:*:*:*
     *cpe:2.3:a:php:php:4.2:*:dev:*:*:*:*:*
     *cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:*
     *cpe:2.3:a:php:php:4.2.1:*:*:*:*:*:*:*
     *cpe:2.3:a:php:php:4.2.2:*:*:*:*:*:*:*
     *cpe:2.3:a:php:php:4.2.3:*:*:*:*:*:*:*
     *cpe:2.3:a:php:php:4.3.0:*:*:*:*:*:*:*
     *cpe:2.3:a:php:php:4.3.1:*:*:*:*:*:*:*
     *cpe:2.3:a:php:php:4.3.2:*:*:*:*:*:*:*
     *cpe:2.3:a:php:php:4.3.3:*:*:*:*:*:*:*
     *cpe:2.3:a:php:php:4.3.5:*:*:*:*:*:*:*
     *cpe:2.3:a:php:php:4.3.6:*:*:*:*:*:*:*
     *cpe:2.3:a:php:php:4.3.7:*:*:*:*:*:*:*
     *cpe:2.3:a:php:php:5.0:rc1:*:*:*:*:*:*
     *cpe:2.3:a:php:php:5.0:rc2:*:*:*:*:*:*
     *cpe:2.3:a:php:php:5.0:rc3:*:*:*:*:*:*
     *cpe:2.3:h:avaya:s8300:r2.0.0:*:*:*:*:*:*:*
     *cpe:2.3:h:avaya:s8300:r2.0.1:*:*:*:*:*:*:*
     *cpe:2.3:h:avaya:s8500:r2.0.0:*:*:*:*:*:*:*
     *cpe:2.3:h:avaya:s8500:r2.0.1:*:*:*:*:*:*:*
     *cpe:2.3:h:avaya:s8700:r2.0.0:*:*:*:*:*:*:*
     *cpe:2.3:h:avaya:s8700:r2.0.1:*:*:*:*:*:*:*
OR
     *cpe:2.3:a:php:php:*:*:*:*:*:*:*:* versions from (including) 4.0 up to (excluding) 4.3.7
     *cpe:2.3:a:php:php:5.0.0:beta1:*:*:*:*:*:*
     *cpe:2.3:a:php:php:5.0.0:beta2:*:*:*:*:*:*
     *cpe:2.3:a:php:php:5.0.0:beta3:*:*:*:*:*:*
     *cpe:2.3:a:php:php:5.0.0:beta4:*:*:*:*:*:*
     *cpe:2.3:a:php:php:5.0.0:rc1:*:*:*:*:*:*
     *cpe:2.3:a:php:php:5.0.0:rc2:*:*:*:*:*:*
Added CWE

								
							
							
						
NIST CWE-367
Removed CWE
NIST NVD-CWE-Other

								
						
Changed Reference Type
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000847 No Types Assigned
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000847 Broken Link
Changed Reference Type
http://lists.grok.org.uk/pipermail/full-disclosure/2004-July/023908.html No Types Assigned
http://lists.grok.org.uk/pipermail/full-disclosure/2004-July/023908.html Broken Link, URL Repurposed
Changed Reference Type
http://marc.info/?l=bugtraq&m=108981780109154&w=2 No Types Assigned
http://marc.info/?l=bugtraq&m=108981780109154&w=2 Third Party Advisory
Changed Reference Type
http://marc.info/?l=bugtraq&m=108982983426031&w=2 No Types Assigned
http://marc.info/?l=bugtraq&m=108982983426031&w=2 Third Party Advisory
Changed Reference Type
http://marc.info/?l=bugtraq&m=109051444105182&w=2 No Types Assigned
http://marc.info/?l=bugtraq&m=109051444105182&w=2 Third Party Advisory
Changed Reference Type
http://marc.info/?l=bugtraq&m=109181600614477&w=2 No Types Assigned
http://marc.info/?l=bugtraq&m=109181600614477&w=2 Third Party Advisory
Changed Reference Type
http://www.debian.org/security/2004/dsa-531 No Types Assigned
http://www.debian.org/security/2004/dsa-531 Broken Link
Changed Reference Type
http://www.debian.org/security/2005/dsa-669 No Types Assigned
http://www.debian.org/security/2005/dsa-669 Mailing List
Changed Reference Type
http://www.gentoo.org/security/en/glsa/glsa-200407-13.xml No Types Assigned
http://www.gentoo.org/security/en/glsa/glsa-200407-13.xml Third Party Advisory
Changed Reference Type
http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:068 No Types Assigned
http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:068 Broken Link
Changed Reference Type
http://www.novell.com/linux/security/advisories/2004_21_php4.html No Types Assigned
http://www.novell.com/linux/security/advisories/2004_21_php4.html Broken Link
Changed Reference Type
http://www.redhat.com/support/errata/RHSA-2004-392.html No Types Assigned
http://www.redhat.com/support/errata/RHSA-2004-392.html Broken Link
Changed Reference Type
http://www.redhat.com/support/errata/RHSA-2004-395.html No Types Assigned
http://www.redhat.com/support/errata/RHSA-2004-395.html Broken Link
Changed Reference Type
http://www.redhat.com/support/errata/RHSA-2004-405.html No Types Assigned
http://www.redhat.com/support/errata/RHSA-2004-405.html Broken Link
Changed Reference Type
http://www.redhat.com/support/errata/RHSA-2005-816.html No Types Assigned
http://www.redhat.com/support/errata/RHSA-2005-816.html Broken Link
Changed Reference Type
http://www.securityfocus.com/bid/10725 No Types Assigned
http://www.securityfocus.com/bid/10725 Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.trustix.org/errata/2004/0039/ No Types Assigned
http://www.trustix.org/errata/2004/0039/ Broken Link
Changed Reference Type
https://exchange.xforce.ibmcloud.com/vulnerabilities/16693 No Types Assigned
https://exchange.xforce.ibmcloud.com/vulnerabilities/16693 Third Party Advisory, VDB Entry
Changed Reference Type
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10896 No Types Assigned
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10896 Broken Link