U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2008-2575

Change History

Modified Analysis by NIST 2/02/2024 10:13:58 AM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:fedoraproject:fedora:7:*:*:*:*:*:*:*
     *cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:*
     *cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*
Changed CPE Configuration
OR
     *cpe:2.3:a:jcoppens:cbrpager:0.9.2:*:*:*:*:*:*:*
     *cpe:2.3:a:jcoppens:cbrpager:0.9.3:*:*:*:*:*:*:*
     *cpe:2.3:a:jcoppens:cbrpager:0.9.4:*:*:*:*:*:*:*
     *cpe:2.3:a:jcoppens:cbrpager:0.9.5:*:*:*:*:*:*:*
     *cpe:2.3:a:jcoppens:cbrpager:0.9.6:*:*:*:*:*:*:*
     *cpe:2.3:a:jcoppens:cbrpager:0.9.7:*:*:*:*:*:*:*
     *cpe:2.3:a:jcoppens:cbrpager:0.9.8:*:*:*:*:*:*:*
     *cpe:2.3:a:jcoppens:cbrpager:0.9.9:*:*:*:*:*:*:*
     *cpe:2.3:a:jcoppens:cbrpager:0.9.10:*:*:*:*:*:*:*
     *cpe:2.3:a:jcoppens:cbrpager:0.9.11:*:*:*:*:*:*:*
     *cpe:2.3:a:jcoppens:cbrpager:0.9.12:*:*:*:*:*:*:*
     *cpe:2.3:a:jcoppens:cbrpager:0.9.13:*:*:*:*:*:*:*
     *cpe:2.3:a:jcoppens:cbrpager:0.9.14:*:*:*:*:*:*:*
     *cpe:2.3:a:jcoppens:cbrpager:0.9.15:*:*:*:*:*:*:*
     *cpe:2.3:a:jcoppens:cbrpager:0.9.16:*:*:*:*:*:*:*
OR
     *cpe:2.3:a:jcoppens:cbrpager:*:*:*:*:*:*:*:* versions up to (excluding) 0.9.17
Added CWE

								
							
							
						
NIST CWE-78
Removed CWE
NIST CWE-94

								
						
Changed Reference Type
http://cvs.fedoraproject.org/viewcvs/rpms/cbrpager/devel/cbrpager-0.9.16-filen-shell-escaping.patch?rev=1.2 Exploit
http://cvs.fedoraproject.org/viewcvs/rpms/cbrpager/devel/cbrpager-0.9.16-filen-shell-escaping.patch?rev=1.2 Broken Link, Exploit
Changed Reference Type
http://secunia.com/advisories/30417 Vendor Advisory
http://secunia.com/advisories/30417 Broken Link, Vendor Advisory
Changed Reference Type
http://secunia.com/advisories/30438 Vendor Advisory
http://secunia.com/advisories/30438 Broken Link, Vendor Advisory
Changed Reference Type
http://secunia.com/advisories/30701 No Types Assigned
http://secunia.com/advisories/30701 Broken Link
Changed Reference Type
http://security.gentoo.org/glsa/glsa-200806-05.xml No Types Assigned
http://security.gentoo.org/glsa/glsa-200806-05.xml Third Party Advisory
Changed Reference Type
http://sourceforge.net/forum/forum.php?forum_id=827120 Patch
http://sourceforge.net/forum/forum.php?forum_id=827120 Broken Link, Patch
Changed Reference Type
http://www.jcoppens.com/soft/cbrpager/log.en.php No Types Assigned
http://www.jcoppens.com/soft/cbrpager/log.en.php Release Notes
Changed Reference Type
http://www.vupen.com/english/advisories/2008/1693/references No Types Assigned
http://www.vupen.com/english/advisories/2008/1693/references Broken Link
Changed Reference Type
https://bugzilla.redhat.com/show_bug.cgi?id=448285 No Types Assigned
https://bugzilla.redhat.com/show_bug.cgi?id=448285 Issue Tracking, Third Party Advisory
Changed Reference Type
https://exchange.xforce.ibmcloud.com/vulnerabilities/42741 No Types Assigned
https://exchange.xforce.ibmcloud.com/vulnerabilities/42741 Third Party Advisory, VDB Entry