U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2007-1088

Change History

Modified Analysis by NIST 5/23/2019 1:06:48 PM

Action Type Old Value New Value
Added CWE

								
							
							
						
CWE-119
Removed CWE
NVD-CWE-Other

								
						
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:ibm:db2:8.0:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:db2:8.0:fp13:*:*:*:*:*:*
     *cpe:2.3:a:ibm:db2:8.0:fp14:*:*:*:*:*:*
     *cpe:2.3:a:ibm:db2:8.0:fp8:*:*:*:*:*:*
     *cpe:2.3:a:ibm:db2:8.0:fp9:*:*:*:*:*:*
     *cpe:2.3:a:ibm:db2:8.1:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:db2:8.1:fp13:*:*:*:*:*:*
     *cpe:2.3:a:ibm:db2:8.1:fp14:*:*:*:*:*:*
     *cpe:2.3:a:ibm:db2:8.1.4:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:db2:8.1.5:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:db2:8.1.6:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:db2:8.1.6c:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:db2:8.1.7:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:db2:8.1.7b:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:db2:8.1.8:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:db2:8.1.8a:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:db2:8.1.9:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:db2:8.1.9a:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:db2:9.1:*:*:*:*:*:*:*
     *cpe:2.3:a:ibm:db2:9.1:fp1:*:*:*:*:*:*
Removed CPE Configuration
AND
     OR
          cpe:2.3:o:hp:hp-ux:*:*:*:*:*:*:*:*
          cpe:2.3:o:ibm:aix:*:*:*:*:*:*:*:*
          cpe:2.3:o:linux:linux_kernel:2.6.18.0:*:*:*:*:*:*:*
          cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*
          cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*
          cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*
          cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*
          cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*
          cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*
          cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*
          cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*
          cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*
          cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*
          cpe:2.3:o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*
          cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*
          cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*
          cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_xp:*:*:*:*:*:*:*:*
          cpe:2.3:o:sun:solaris:*:*:*:*:*:*:*:*
     OR
          *cpe:2.3:a:ibm:db2_universal_database:*:*:linux:*:*:*:*:* versions up to (including) 8.0
          *cpe:2.3:a:ibm:db2_universal_database:*:fp13:*:*:*:*:*:* versions up to (including) 8.0
          *cpe:2.3:a:ibm:db2_universal_database:*:fp14:*:*:*:*:*:* versions up to (including) 8.0
          *cpe:2.3:a:ibm:db2_universal_database:*:fp9:*:*:*:*:*:* versions up to (including) 8.0
          *cpe:2.3:a:ibm:db2_universal_database:*:*:aix:*:*:*:*:* versions up to (including) 8.1
          *cpe:2.3:a:ibm:db2_universal_database:*:*:fp10:*:*:*:*:* versions up to (including) 8.1
          *cpe:2.3:a:ibm:db2_universal_database:*:*:fp11:*:*:*:*:* versions up to (including) 8.1
          *cpe:2.3:a:ibm:db2_universal_database:*:*:fp8:*:*:*:*:* versions up to (including) 8.1
          *cpe:2.3:a:ibm:db2_universal_database:*:*:*:*:*:*:*:* versions up to (including) 8.1.4
          *cpe:2.3:a:ibm:db2_universal_database:*:*:*:*:*:*:*:* versions up to (including) 8.1.5
          *cpe:2.3:a:ibm:db2_universal_database:*:*:*:*:*:*:*:* versions up to (including) 8.1.6
          *cpe:2.3:a:ibm:db2_universal_database:*:*:*:*:*:*:*:* versions up to (including) 8.1.6c
          *cpe:2.3:a:ibm:db2_universal_database:*:*:*:*:*:*:*:* versions up to (including) 8.1.7
          *cpe:2.3:a:ibm:db2_universal_database:*:*:*:*:*:*:*:* versions up to (including) 8.1.7b
          *cpe:2.3:a:ibm:db2_universal_database:*:*:*:*:*:*:*:* versions up to (including) 8.1.8
          *cpe:2.3:a:ibm:db2_universal_database:*:*:*:*:*:*:*:* versions up to (including) 8.1.8a
          *cpe:2.3:a:ibm:db2_universal_database:*:*:*:*:*:*:*:* versions up to (including) 8.1.9
          *cpe:2.3:a:ibm:db2_universal_database:*:*:*:*:*:*:*:* versions up to (including) 8.1.9a
          *cpe:2.3:a:ibm:db2_universal_database:*:*:*:*:*:*:*:* versions up to (including) 8.10
          *cpe:2.3:a:ibm:db2_universal_database:*:*:*:*:*:*:*:* versions up to (including) 8.12
          *cpe:2.3:a:ibm:db2_universal_database:*:*:hp_ux:*:*:*:*:* versions up to (including) 9.1

								
						
Changed Reference Type
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=481 Patch
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=481 Broken Link
Changed Reference Type
http://osvdb.org/40971 No Types Assigned
http://osvdb.org/40971 Broken Link
Changed Reference Type
http://www-1.ibm.com/support/docview.wss?uid=swg21255747 Patch
http://www-1.ibm.com/support/docview.wss?uid=swg21255747 Patch, Vendor Advisory
Changed Reference Type
http://www.attrition.org/pipermail/vim/2007-August/001765.html No Types Assigned
http://www.attrition.org/pipermail/vim/2007-August/001765.html Third Party Advisory
Changed Reference Type
http://www.securityfocus.com/bid/22677 Patch
http://www.securityfocus.com/bid/22677 Patch, Third Party Advisory, VDB Entry
Changed Reference Type
https://exchange.xforce.ibmcloud.com/vulnerabilities/32652 No Types Assigned
https://exchange.xforce.ibmcloud.com/vulnerabilities/32652 Third Party Advisory, VDB Entry