U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2007-0071

Change History

Modified Analysis by NIST 10/17/2018 2:38:58 PM

Action Type Old Value New Value
Changed CPE Configuration
OR
     *cpe:2.3:a:adobe:air:1.0:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:flash_player:8.0:*:basic:*:*:*:*:*
     *cpe:2.3:a:adobe:flash_player:8.0:*:pro:*:*:*:*:*
     *cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:* versions up to (including) 8.0.39.0
     *cpe:2.3:a:adobe:flash_player:9:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*
     *cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:* versions up to (including) 9.0.115.0
     *cpe:2.3:a:adobe:flex:3.0:*:*:*:*:*:*:*
OR
     *cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:* versions from (including) 8.0 up to (including) 8.0.39.0
     *cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:* versions from (including) 9.0 up to (including) 9.0.115.0
Changed Reference Type
http://blogs.adobe.com/psirt/2008/05/potential_flash_player_issue.html No Types Assigned
http://blogs.adobe.com/psirt/2008/05/potential_flash_player_issue.html Vendor Advisory
Changed Reference Type
http://documents.iss.net/whitepapers/IBM_X-Force_WP_final.pdf Exploit
http://documents.iss.net/whitepapers/IBM_X-Force_WP_final.pdf Broken Link
Changed Reference Type
http://isc.sans.org/diary.html?storyid=4465 No Types Assigned
http://isc.sans.org/diary.html?storyid=4465 Third Party Advisory
Changed Reference Type
http://lists.apple.com/archives/security-announce/2008//May/msg00001.html No Types Assigned
http://lists.apple.com/archives/security-announce/2008//May/msg00001.html Mailing List
Changed Reference Type
http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00006.html No Types Assigned
http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00006.html Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/29763 Vendor Advisory
http://secunia.com/advisories/29763 Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/29865 Vendor Advisory
http://secunia.com/advisories/29865 Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/30404 Vendor Advisory
http://secunia.com/advisories/30404 Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/30430 Vendor Advisory
http://secunia.com/advisories/30430 Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/30507 Vendor Advisory
http://secunia.com/advisories/30507 Third Party Advisory
Changed Reference Type
http://sunsolve.sun.com/search/document.do?assetkey=1-26-238305-1 No Types Assigned
http://sunsolve.sun.com/search/document.do?assetkey=1-26-238305-1 Broken Link
Changed Reference Type
http://www.gentoo.org/security/en/glsa/glsa-200804-21.xml No Types Assigned
http://www.gentoo.org/security/en/glsa/glsa-200804-21.xml Third Party Advisory
Changed Reference Type
http://www.iss.net/threats/289.html No Types Assigned
http://www.iss.net/threats/289.html Broken Link
Changed Reference Type
http://www.kb.cert.org/vuls/id/159523 US Government Resource
http://www.kb.cert.org/vuls/id/159523 Third Party Advisory, US Government Resource
Changed Reference Type
http://www.kb.cert.org/vuls/id/395473 US Government Resource
http://www.kb.cert.org/vuls/id/395473 Third Party Advisory, US Government Resource
Changed Reference Type
http://www.matasano.com/log/1032/this-new-vulnerability-dowds-inhuman-flash-exploit/ No Types Assigned
http://www.matasano.com/log/1032/this-new-vulnerability-dowds-inhuman-flash-exploit/ Third Party Advisory
Changed Reference Type
http://www.osvdb.org/44282 No Types Assigned
http://www.osvdb.org/44282 Broken Link
Changed Reference Type
http://www.redhat.com/support/errata/RHSA-2008-0221.html No Types Assigned
http://www.redhat.com/support/errata/RHSA-2008-0221.html Third Party Advisory
Changed Reference Type
http://www.securityfocus.com/bid/28695 No Types Assigned
http://www.securityfocus.com/bid/28695 Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securityfocus.com/bid/29386 No Types Assigned
http://www.securityfocus.com/bid/29386 Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securitytracker.com/id?1019811 No Types Assigned
http://www.securitytracker.com/id?1019811 Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securitytracker.com/id?1020114 No Types Assigned
http://www.securitytracker.com/id?1020114 Third Party Advisory, VDB Entry
Changed Reference Type
http://www.us-cert.gov/cas/techalerts/TA08-100A.html US Government Resource
http://www.us-cert.gov/cas/techalerts/TA08-100A.html Third Party Advisory, US Government Resource
Changed Reference Type
http://www.us-cert.gov/cas/techalerts/TA08-149A.html US Government Resource
http://www.us-cert.gov/cas/techalerts/TA08-149A.html Third Party Advisory, US Government Resource
Changed Reference Type
http://www.us-cert.gov/cas/techalerts/TA08-150A.html US Government Resource
http://www.us-cert.gov/cas/techalerts/TA08-150A.html Third Party Advisory, US Government Resource
Changed Reference Type
http://www.vupen.com/english/advisories/2008/1662/references Vendor Advisory
http://www.vupen.com/english/advisories/2008/1662/references Third Party Advisory
Changed Reference Type
http://www.vupen.com/english/advisories/2008/1697 Vendor Advisory
http://www.vupen.com/english/advisories/2008/1697 Third Party Advisory
Changed Reference Type
http://www.vupen.com/english/advisories/2008/1724/references Vendor Advisory
http://www.vupen.com/english/advisories/2008/1724/references Third Party Advisory
Changed Reference Type
http://www.zerodayinitiative.com/advisories/ZDI-08-032/ No Types Assigned
http://www.zerodayinitiative.com/advisories/ZDI-08-032/ Third Party Advisory, VDB Entry
Changed Reference Type
https://exchange.xforce.ibmcloud.com/vulnerabilities/37277 No Types Assigned
https://exchange.xforce.ibmcloud.com/vulnerabilities/37277 Third Party Advisory, VDB Entry
Changed Reference Type
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10379 No Types Assigned
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10379 Third Party Advisory