U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2004-0398

Change History

Modified Analysis by NIST 10/09/2020 1:06:04 PM

Action Type Old Value New Value
Added CWE

								
							
							
						
NIST CWE-787
Removed CWE
NIST NVD-CWE-Other

								
						
Changed CPE Configuration
OR
     *cpe:2.3:a:cadaver:cadaver_webdav_client:0.20.0:*:*:*:*:*:*:*
     *cpe:2.3:a:cadaver:cadaver_webdav_client:0.20.1:*:*:*:*:*:*:*
     *cpe:2.3:a:cadaver:cadaver_webdav_client:0.20.2:*:*:*:*:*:*:*
     *cpe:2.3:a:cadaver:cadaver_webdav_client:0.20.3:*:*:*:*:*:*:*
     *cpe:2.3:a:cadaver:cadaver_webdav_client:0.20.4:*:*:*:*:*:*:*
     *cpe:2.3:a:cadaver:cadaver_webdav_client:0.20.5:*:*:*:*:*:*:*
     *cpe:2.3:a:cadaver:cadaver_webdav_client:0.21.0:*:*:*:*:*:*:*
     *cpe:2.3:a:cadaver:cadaver_webdav_client:0.22.0:*:*:*:*:*:*:*
     *cpe:2.3:a:cadaver:cadaver_webdav_client:0.22.1:*:*:*:*:*:*:*
     *cpe:2.3:a:neon:neon_client_library:0.19.3:*:*:*:*:*:*:*
     *cpe:2.3:a:neon:neon_client_library:0.23:*:*:*:*:*:*:*
     *cpe:2.3:a:neon:neon_client_library:0.23.1:*:*:*:*:*:*:*
     *cpe:2.3:a:neon:neon_client_library:0.23.2:*:*:*:*:*:*:*
     *cpe:2.3:a:neon:neon_client_library:0.23.3:*:*:*:*:*:*:*
     *cpe:2.3:a:neon:neon_client_library:0.23.4:*:*:*:*:*:*:*
     *cpe:2.3:a:neon:neon_client_library:0.23.5:*:*:*:*:*:*:*
     *cpe:2.3:a:neon:neon_client_library:0.23.6:*:*:*:*:*:*:*
     *cpe:2.3:a:neon:neon_client_library:0.23.7:*:*:*:*:*:*:*
     *cpe:2.3:a:neon:neon_client_library:0.23.8:*:*:*:*:*:*:*
     *cpe:2.3:a:neon:neon_client_library:0.24:*:*:*:*:*:*:*
     *cpe:2.3:a:neon:neon_client_library:0.24.1:*:*:*:*:*:*:*
     *cpe:2.3:a:neon:neon_client_library:0.24.2:*:*:*:*:*:*:*
     *cpe:2.3:a:neon:neon_client_library:0.24.3:*:*:*:*:*:*:*
     *cpe:2.3:a:neon:neon_client_library:0.24.4:*:*:*:*:*:*:*
     *cpe:2.3:a:openoffice:openoffice:1.1.2:*:*:*:*:*:*:*
     *cpe:2.3:a:subversion:subversion:*:*:*:*:*:*:*:*
OR
     *cpe:2.3:a:webdav:cadaver:*:*:*:*:*:*:*:* versions up to (excluding) 0.22.0
     *cpe:2.3:a:webdav:neon:*:*:*:*:*:*:*:* versions up to (including) 0.24.5
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
Changed Reference Type
http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0982.html Vendor Advisory
http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0982.html Broken Link
Changed Reference Type
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000841 Vendor Advisory
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000841 Broken Link
Changed Reference Type
http://marc.info/?l=bugtraq&m=108498433632333&w=2 No Types Assigned
http://marc.info/?l=bugtraq&m=108498433632333&w=2 Third Party Advisory
Changed Reference Type
http://marc.info/?l=bugtraq&m=108500057108022&w=2 No Types Assigned
http://marc.info/?l=bugtraq&m=108500057108022&w=2 Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/11638 Patch, Vendor Advisory
http://secunia.com/advisories/11638 Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/11650 Patch, Vendor Advisory
http://secunia.com/advisories/11650 Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/11673 Patch, Vendor Advisory
http://secunia.com/advisories/11673 Third Party Advisory
Changed Reference Type
http://security.gentoo.org/glsa/glsa-200405-13.xml Patch, Vendor Advisory
http://security.gentoo.org/glsa/glsa-200405-13.xml Third Party Advisory
Changed Reference Type
http://security.gentoo.org/glsa/glsa-200405-15.xml Patch, Vendor Advisory
http://security.gentoo.org/glsa/glsa-200405-15.xml Third Party Advisory
Changed Reference Type
http://www.ciac.org/ciac/bulletins/o-148.shtml Vendor Advisory
http://www.ciac.org/ciac/bulletins/o-148.shtml Broken Link
Changed Reference Type
http://www.debian.org/security/2004/dsa-506 Patch, Vendor Advisory
http://www.debian.org/security/2004/dsa-506 Third Party Advisory
Changed Reference Type
http://www.debian.org/security/2004/dsa-507 Patch, Vendor Advisory
http://www.debian.org/security/2004/dsa-507 Third Party Advisory
Changed Reference Type
http://www.mandriva.com/security/advisories?name=MDKSA-2004:049 No Types Assigned
http://www.mandriva.com/security/advisories?name=MDKSA-2004:049 Third Party Advisory
Changed Reference Type
http://www.osvdb.org/6302 No Types Assigned
http://www.osvdb.org/6302 Broken Link
Changed Reference Type
http://www.redhat.com/support/errata/RHSA-2004-191.html Patch, Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2004-191.html Third Party Advisory
Changed Reference Type
http://www.securityfocus.com/bid/10385 Patch
http://www.securityfocus.com/bid/10385 Third Party Advisory, VDB Entry
Changed Reference Type
https://bugzilla.fedora.us/show_bug.cgi?id=1552 Patch
https://bugzilla.fedora.us/show_bug.cgi?id=1552 Broken Link
Changed Reference Type
https://exchange.xforce.ibmcloud.com/vulnerabilities/16192 No Types Assigned
https://exchange.xforce.ibmcloud.com/vulnerabilities/16192 Third Party Advisory, VDB Entry