U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2004-0816

Change History

Modified Analysis by NIST 2/08/2024 10:28:22 AM

Action Type Old Value New Value
Changed CPE Configuration
OR
     *cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*
OR
     *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions up to (excluding) 2.6.8
Added CVSS V3.1

								
							
							
						
NIST AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Added CWE

								
							
							
						
NIST CWE-191
Removed CWE
NIST NVD-CWE-Other

								
						
Changed Reference Type
http://secunia.com/advisories/11202/ No Types Assigned
http://secunia.com/advisories/11202/ Broken Link
Changed Reference Type
http://www.mandriva.com/security/advisories?name=MDKSA-2005:022 No Types Assigned
http://www.mandriva.com/security/advisories?name=MDKSA-2005:022 Broken Link
Changed Reference Type
http://www.novell.com/linux/security/advisories/2004_37_kernel.html No Types Assigned
http://www.novell.com/linux/security/advisories/2004_37_kernel.html Broken Link
Changed Reference Type
http://www.securityfocus.com/bid/11488 No Types Assigned
http://www.securityfocus.com/bid/11488 Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
https://exchange.xforce.ibmcloud.com/vulnerabilities/17800 No Types Assigned
https://exchange.xforce.ibmcloud.com/vulnerabilities/17800 Third Party Advisory, VDB Entry