U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2004-0940

Change History

Modified Analysis by NIST 2/01/2024 10:05:26 PM

Action Type Old Value New Value
Changed CPE Configuration
OR
     *cpe:2.3:a:apache:http_server:1.3:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:http_server:1.3.1:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:http_server:1.3.3:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:http_server:1.3.4:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:http_server:1.3.6:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:http_server:1.3.7:*:dev:*:*:*:*:*
     *cpe:2.3:a:apache:http_server:1.3.9:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:http_server:1.3.11:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:http_server:1.3.12:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:http_server:1.3.14:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:http_server:1.3.17:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:http_server:1.3.18:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:http_server:1.3.19:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:http_server:1.3.20:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:http_server:1.3.22:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:http_server:1.3.23:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:http_server:1.3.24:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:http_server:1.3.25:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:http_server:1.3.26:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:http_server:1.3.27:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:http_server:1.3.28:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:http_server:1.3.29:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:http_server:1.3.31:*:*:*:*:*:*:*
     *cpe:2.3:a:apache:http_server:1.3.32:*:*:*:*:*:*:*
     *cpe:2.3:a:openpkg:openpkg:2.0:*:*:*:*:*:*:*
     *cpe:2.3:a:openpkg:openpkg:2.1:*:*:*:*:*:*:*
     *cpe:2.3:a:openpkg:openpkg:2.2:*:*:*:*:*:*:*
     *cpe:2.3:a:openpkg:openpkg:current:*:*:*:*:*:*:*
OR
     *cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:* versions from (including) 1.3 up to (including) 1.3.32
     *cpe:2.3:a:openpkg:openpkg:2.0:*:*:*:*:*:*:*
     *cpe:2.3:a:openpkg:openpkg:2.1:*:*:*:*:*:*:*
     *cpe:2.3:a:openpkg:openpkg:2.2:*:*:*:*:*:*:*
Changed CPE Configuration
OR
     *cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*
     *cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*
     *cpe:2.3:o:hp:hp-ux:11.20:*:*:*:*:*:*:*
     *cpe:2.3:o:hp:hp-ux:11.22:*:*:*:*:*:*:*
     *cpe:2.3:o:slackware:slackware_linux:8.0:*:*:*:*:*:*:*
     *cpe:2.3:o:slackware:slackware_linux:8.1:*:*:*:*:*:*:*
     *cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*
     *cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*
     *cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*
     *cpe:2.3:o:slackware:slackware_linux:current:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*
     *cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*
OR
     *cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*
     *cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*
     *cpe:2.3:o:hp:hp-ux:11.20:*:*:*:*:*:*:*
     *cpe:2.3:o:hp:hp-ux:11.22:*:*:*:*:*:*:*
     *cpe:2.3:o:slackware:slackware_linux:8.0:*:*:*:*:*:*:*
     *cpe:2.3:o:slackware:slackware_linux:8.1:*:*:*:*:*:*:*
     *cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*
     *cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*
     *cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*
     *cpe:2.3:o:slackware:slackware_linux:current:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*
     *cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*
Added CVSS V3.1

								
							
							
						
NIST AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Added CWE

								
							
							
						
NIST CWE-131
Removed CWE
NIST CWE-119

								
						
Changed Reference Type
http://marc.info/?l=bugtraq&m=109906660225051&w=2 No Types Assigned
http://marc.info/?l=bugtraq&m=109906660225051&w=2 Mailing List, Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/12898/ No Types Assigned
http://secunia.com/advisories/12898/ Broken Link
Changed Reference Type
http://secunia.com/advisories/19073 No Types Assigned
http://secunia.com/advisories/19073 Broken Link
Changed Reference Type
http://securitytracker.com/id?1011783 No Types Assigned
http://securitytracker.com/id?1011783 Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102197-1 No Types Assigned
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102197-1 Broken Link
Changed Reference Type
http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm No Types Assigned
http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm Third Party Advisory
Changed Reference Type
http://www.apacheweek.com/features/security-13 No Types Assigned
http://www.apacheweek.com/features/security-13 Product
Changed Reference Type
http://www.debian.org/security/2004/dsa-594 No Types Assigned
http://www.debian.org/security/2004/dsa-594 Mailing List, Third Party Advisory
Changed Reference Type
http://www.mandriva.com/security/advisories?name=MDKSA-2004:134 No Types Assigned
http://www.mandriva.com/security/advisories?name=MDKSA-2004:134 Third Party Advisory
Changed Reference Type
http://www.redhat.com/support/errata/RHSA-2004-600.html No Types Assigned
http://www.redhat.com/support/errata/RHSA-2004-600.html Broken Link
Changed Reference Type
http://www.redhat.com/support/errata/RHSA-2005-816.html No Types Assigned
http://www.redhat.com/support/errata/RHSA-2005-816.html Broken Link
Changed Reference Type
http://www.securityfocus.com/bid/11471 Exploit, Patch, Vendor Advisory
http://www.securityfocus.com/bid/11471 Broken Link, Exploit, Patch, Third Party Advisory, VDB Entry, Vendor Advisory
Changed Reference Type
http://www.vupen.com/english/advisories/2006/0789 No Types Assigned
http://www.vupen.com/english/advisories/2006/0789 Broken Link
Changed Reference Type
https://exchange.xforce.ibmcloud.com/vulnerabilities/17785 No Types Assigned
https://exchange.xforce.ibmcloud.com/vulnerabilities/17785 Third Party Advisory, VDB Entry
Changed Reference Type
https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E No Types Assigned
https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E Mailing List, Patch
Changed Reference Type
https://lists.apache.org/thread.html/r734a07156abf332d5ab27fb91d9d962cacfef4f3681e44056f064fa8%40%3Ccvs.httpd.apache.org%3E No Types Assigned
https://lists.apache.org/thread.html/r734a07156abf332d5ab27fb91d9d962cacfef4f3681e44056f064fa8%40%3Ccvs.httpd.apache.org%3E Mailing List, Patch
Changed Reference Type
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E No Types Assigned
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E Mailing List, Patch
Changed Reference Type
https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3%40%3Ccvs.httpd.apache.org%3E No Types Assigned
https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3%40%3Ccvs.httpd.apache.org%3E Mailing List, Patch
Changed Reference Type
https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab%40%3Ccvs.httpd.apache.org%3E No Types Assigned
https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab%40%3Ccvs.httpd.apache.org%3E Mailing List, Patch
Changed Reference Type
https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E No Types Assigned
https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E Mailing List, Patch
Changed Reference Type
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E No Types Assigned
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E Mailing List, Patch