U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2007-2764

Change History

Modified Analysis by NIST 8/14/2019 7:29:05 AM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:brocade:silkworm_12000_director:-:*:*:*:*:*:*:*
          cpe:2.3:h:brocade:silkworm_200e_switch:-:*:*:*:*:*:*:*
          cpe:2.3:h:brocade:silkworm_24000_director:-:*:*:*:*:*:*:*
          cpe:2.3:h:brocade:silkworm_3250_fabric_switch:-:*:*:*:*:*:*:*
          cpe:2.3:h:brocade:silkworm_3850_fabric_switch:-:*:*:*:*:*:*:*
          cpe:2.3:h:brocade:silkworm_3900_switch:-:*:*:*:*:*:*:*
          cpe:2.3:h:brocade:silkworm_48000_director:-:*:*:*:*:*:*:*
          cpe:2.3:h:brocade:silkworm_4900_fibre_channel_switch:-:*:*:*:*:*:*:*
Removed CPE Configuration
AND
     OR
          cpe:2.3:o:brocade:fabric_os:*:*:*:*:*:*:*:* versions up to (including) 5.0.5b
          cpe:2.3:o:brocade:fabric_os:*:*:*:*:*:*:*:* versions up to (including) 5.2.0a
     OR
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

								
						
Changed Reference Type
http://osvdb.org/39117 No Types Assigned
http://osvdb.org/39117 Broken Link
Changed Reference Type
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102752-1 Patch
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102752-1 Broken Link, Patch
Changed Reference Type
http://www.securityfocus.com/bid/24036 Patch
http://www.securityfocus.com/bid/24036 Patch, Third Party Advisory, VDB Entry
Changed Reference Type
https://exchange.xforce.ibmcloud.com/vulnerabilities/34495 No Types Assigned
https://exchange.xforce.ibmcloud.com/vulnerabilities/34495 Third Party Advisory, VDB Entry