U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2006-6276

Change History

Modified Analysis by NIST 2/08/2024 9:34:42 PM

Action Type Old Value New Value
Changed CPE Configuration
OR
     *cpe:2.3:a:sun:java_system_application_server:7.0:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:java_system_application_server:7.0:ur1:enterprise:*:*:*:*:*
     *cpe:2.3:a:sun:java_system_application_server:7.0:ur1:standard:*:*:*:*:*
     *cpe:2.3:a:sun:java_system_application_server:7.0:ur2:enterprise:*:*:*:*:*
     *cpe:2.3:a:sun:java_system_application_server:7.0:ur2:standard:*:*:*:*:*
     *cpe:2.3:a:sun:java_system_application_server:7.0:ur3:enterprise:*:*:*:*:*
     *cpe:2.3:a:sun:java_system_application_server:7.0:ur3:standard:*:*:*:*:*
     *cpe:2.3:a:sun:java_system_application_server:8.1:*:enterprise:*:*:*:*:*
     *cpe:2.3:a:sun:java_system_application_server:8.1:*:platform:*:*:*:*:*
     *cpe:2.3:a:sun:java_system_application_server:8.1:*:standard:*:*:*:*:*
     *cpe:2.3:a:sun:java_system_application_server:8.1:ur1:platform:*:*:*:*:*
     *cpe:2.3:a:sun:java_system_web_proxy_server:3.6:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp1:*:*:*:*:*:*
     *cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp2:*:*:*:*:*:*
     *cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp3:*:*:*:*:*:*
     *cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp4:*:*:*:*:*:*
     *cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp5:*:*:*:*:*:*
     *cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp6:*:*:*:*:*:*
     *cpe:2.3:a:sun:java_system_web_proxy_server:3.6:sp7:*:*:*:*:*:*
     *cpe:2.3:a:sun:java_system_web_proxy_server:4.0:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:java_system_web_server:6.0:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:java_system_web_server:6.0:sp1:*:*:*:*:*:*
     *cpe:2.3:a:sun:java_system_web_server:6.0:sp2:*:*:*:*:*:*
     *cpe:2.3:a:sun:java_system_web_server:6.0:sp3:*:*:*:*:*:*
     *cpe:2.3:a:sun:java_system_web_server:6.0:sp4:*:*:*:*:*:*
     *cpe:2.3:a:sun:java_system_web_server:6.0:sp5:*:*:*:*:*:*
     *cpe:2.3:a:sun:java_system_web_server:6.0:sp6:*:*:*:*:*:*
     *cpe:2.3:a:sun:java_system_web_server:6.0:sp7:*:*:*:*:*:*
     *cpe:2.3:a:sun:java_system_web_server:6.0:sp8:*:*:*:*:*:*
     *cpe:2.3:a:sun:java_system_web_server:6.0:sp9:*:*:*:*:*:*
     *cpe:2.3:a:sun:java_system_web_server:6.1:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:java_system_web_server:6.1:sp1:*:*:*:*:*:*
     *cpe:2.3:a:sun:java_system_web_server:6.1:sp2:*:*:*:*:*:*
     *cpe:2.3:a:sun:java_system_web_server:6.1:sp3:*:*:*:*:*:*
     *cpe:2.3:a:sun:java_system_web_server:6.1:sp4:*:*:*:*:*:*
     *cpe:2.3:a:sun:one_application_server:7.0:*:platform:*:*:*:*:*
     *cpe:2.3:a:sun:one_application_server:7.0:*:standard:*:*:*:*:*
     *cpe:2.3:a:sun:one_application_server:7.0:update_3:*:*:*:*:*:*
     *cpe:2.3:a:sun:one_application_server:7.0:ur1:platform:*:*:*:*:*
     *cpe:2.3:a:sun:one_application_server:7.0:ur1:standard:*:*:*:*:*
     *cpe:2.3:a:sun:one_application_server:7.0:ur2:platform:*:*:*:*:*
     *cpe:2.3:a:sun:one_application_server:7.0:ur2:standard:*:*:*:*:*
     *cpe:2.3:a:sun:one_application_server:7.0:ur6:platform:*:*:*:*:*
     *cpe:2.3:a:sun:one_application_server:7.0:ur6:standard:*:*:*:*:*
     *cpe:2.3:a:sun:one_application_server:7.0:ur7:platform:*:*:*:*:*
     *cpe:2.3:a:sun:one_application_server:7.0:ur7:standard:*:*:*:*:*
OR
     *cpe:2.3:a:sun:java_system_application_server:7.0:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:java_system_application_server:8.1:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:java_system_web_proxy_server:-:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:java_system_web_proxy_server:3.6:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:java_system_web_proxy_server:4.0:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:java_system_web_server:6.0:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:java_system_web_server:6.1:*:*:*:*:*:*:*
     *cpe:2.3:a:sun:one_application_server:7.0:*:*:*:*:*:*:*
Added CWE

								
							
							
						
NIST CWE-444
Removed CWE
NIST NVD-CWE-Other

								
						
Changed Reference Type
http://secunia.com/advisories/23186 No Types Assigned
http://secunia.com/advisories/23186 Broken Link
Changed Reference Type
http://securitytracker.com/id?1017322 No Types Assigned
http://securitytracker.com/id?1017322 Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
http://securitytracker.com/id?1017323 No Types Assigned
http://securitytracker.com/id?1017323 Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
http://securitytracker.com/id?1017324 No Types Assigned
http://securitytracker.com/id?1017324 Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102733-1 Patch
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102733-1 Broken Link, Patch
Changed Reference Type
http://www.securityfocus.com/bid/21371 Patch
http://www.securityfocus.com/bid/21371 Broken Link, Patch, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.vupen.com/english/advisories/2006/4793 No Types Assigned
http://www.vupen.com/english/advisories/2006/4793 Broken Link
Changed Reference Type
https://exchange.xforce.ibmcloud.com/vulnerabilities/30662 No Types Assigned
https://exchange.xforce.ibmcloud.com/vulnerabilities/30662 Third Party Advisory, VDB Entry