U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2009-1903

Change History

Modified Analysis by NIST 2/13/2021 9:55:38 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*
     *cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*
Changed CPE Configuration
OR
     *cpe:2.3:a:modsecurity:modsecurity:1.9.4:*:*:*:*:*:*:*
     *cpe:2.3:a:modsecurity:modsecurity:1.9.5:*:*:*:*:*:*:*
     *cpe:2.3:a:modsecurity:modsecurity:2.1.7:*:*:*:*:*:*:*
     *cpe:2.3:a:trustwave:modsecurity:2.1.2:*:*:*:*:*:*:*
     *cpe:2.3:a:trustwave:modsecurity:2.1.3:*:*:*:*:*:*:*
     *cpe:2.3:a:trustwave:modsecurity:2.1.4:*:*:*:*:*:*:*
     *cpe:2.3:a:trustwave:modsecurity:2.1.5:*:*:*:*:*:*:*
     *cpe:2.3:a:trustwave:modsecurity:2.1.6:*:*:*:*:*:*:*
     *cpe:2.3:a:trustwave:modsecurity:2.5.0:*:*:*:*:*:*:*
     *cpe:2.3:a:trustwave:modsecurity:2.5.1:*:*:*:*:*:*:*
     *cpe:2.3:a:trustwave:modsecurity:2.5.2:*:*:*:*:*:*:*
     *cpe:2.3:a:trustwave:modsecurity:2.5.3:*:*:*:*:*:*:*
     *cpe:2.3:a:trustwave:modsecurity:2.5.4:*:*:*:*:*:*:*
     *cpe:2.3:a:trustwave:modsecurity:2.5.5:*:*:*:*:*:*:*
     *cpe:2.3:a:trustwave:modsecurity:2.5.6:*:*:*:*:*:*:*
     *cpe:2.3:a:trustwave:modsecurity:2.5.7:*:*:*:*:*:*:*
     *cpe:2.3:a:trustwave:modsecurity:*:*:*:*:*:*:*:* versions up to (including) 2.5.8
OR
     *cpe:2.3:a:trustwave:modsecurity:*:*:*:*:*:*:*:* versions up to (excluding) 2.5.8
Added CWE

								
							
							
						
NIST NVD-CWE-noinfo
Removed CWE
NIST CWE-16

								
						
Changed Reference Type
http://secunia.com/advisories/34256 Vendor Advisory
http://secunia.com/advisories/34256 Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/34311 Vendor Advisory
http://secunia.com/advisories/34311 Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/35687 No Types Assigned
http://secunia.com/advisories/35687 Third Party Advisory
Changed Reference Type
http://security.gentoo.org/glsa/glsa-200907-02.xml No Types Assigned
http://security.gentoo.org/glsa/glsa-200907-02.xml Third Party Advisory
Changed Reference Type
http://sourceforge.net/project/shownotes.php?release_id=667538 No Types Assigned
http://sourceforge.net/project/shownotes.php?release_id=667538 Broken Link
Changed Reference Type
http://www.osvdb.org/52552 No Types Assigned
http://www.osvdb.org/52552 Broken Link
Changed Reference Type
http://www.securityfocus.com/bid/34096 Exploit
http://www.securityfocus.com/bid/34096 Third Party Advisory, VDB Entry
Changed Reference Type
http://www.vupen.com/english/advisories/2009/0703 Patch, Vendor Advisory
http://www.vupen.com/english/advisories/2009/0703 Third Party Advisory
Changed Reference Type
https://exchange.xforce.ibmcloud.com/vulnerabilities/49211 No Types Assigned
https://exchange.xforce.ibmcloud.com/vulnerabilities/49211 Third Party Advisory, VDB Entry
Changed Reference Type
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00487.html Patch
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00487.html Third Party Advisory
Changed Reference Type
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00529.html Patch
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00529.html Third Party Advisory