U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2004-1491

Change History

Modified Analysis by NIST 2/28/2022 1:18:07 PM

Action Type Old Value New Value
Changed CPE Configuration
OR
     *cpe:2.3:a:opera_software:opera_web_browser:7.54:*:*:*:*:*:*:*
OR
     *cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:* versions up to (including) 7.54
Changed CPE Configuration
OR
     *cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
     *cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:2.0:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:3.0:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:4.0:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:4.2:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:4.3:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:4.4:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:4.4.1:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:5.0:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:5.1:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:5.2:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:5.3:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:6.0:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:6.1:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:6.1:alpha:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:6.2:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:6.3:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:6.3:*:ppc:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:6.3:alpha:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:6.4:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:6.4:*:i386:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:6.4:*:ppc:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:6.4:alpha:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:7.0:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:7.0:*:i386:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:7.0:*:ppc:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:7.0:*:sparc:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:7.0:alpha:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:7.1:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:7.1:*:spa:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:7.1:*:sparc:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:7.1:*:x86:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:7.1:alpha:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:7.2:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:7.2:*:i386:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:7.3:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:7.3:*:i386:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:7.3:*:ppc:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:7.3:*:sparc:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:8.0:*:i386:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:8.2:*:personal:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:9.0:*:personal:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*
OR
     *cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
     *cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:2.0:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:3.0:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:4.0:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:4.2:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:4.3:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:4.4:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:4.4.1:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:5.0:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:5.1:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:5.2:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:5.3:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:6.0:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:6.1:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:6.1:alpha:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:6.2:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:6.3:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:6.3:alpha:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:6.4:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:6.4:alpha:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:7.0:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:7.0:alpha:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:7.1:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:7.1:alpha:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:7.2:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:7.3:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*
Added CWE

								
							
							
						
NIST NVD-CWE-noinfo
Removed CWE
NIST NVD-CWE-Other

								
						
Changed Reference Type
http://lists.suse.com/archive/suse-security-announce/2005-Mar/0007.html Vendor Advisory
http://lists.suse.com/archive/suse-security-announce/2005-Mar/0007.html Third Party Advisory, Vendor Advisory
Changed Reference Type
http://secunia.com/advisories/13447/ Patch, Vendor Advisory
http://secunia.com/advisories/13447/ Broken Link, Patch
Changed Reference Type
http://www.gentoo.org/security/en/glsa/glsa-200502-17.xml Patch, Vendor Advisory
http://www.gentoo.org/security/en/glsa/glsa-200502-17.xml Patch, Third Party Advisory, Vendor Advisory
Changed Reference Type
http://www.opera.com/linux/changelogs/754u2/ No Types Assigned
http://www.opera.com/linux/changelogs/754u2/ Broken Link
Changed Reference Type
http://www.securityfocus.com/bid/11901 Patch
http://www.securityfocus.com/bid/11901 Broken Link, Patch, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.zone-h.org/advisories/read/id=6503 Vendor Advisory
http://www.zone-h.org/advisories/read/id=6503 Third Party Advisory, Vendor Advisory
Changed Reference Type
https://exchange.xforce.ibmcloud.com/vulnerabilities/18457 No Types Assigned
https://exchange.xforce.ibmcloud.com/vulnerabilities/18457 Third Party Advisory, VDB Entry