U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2008-2540

Change History

Modified Analysis by NIST 11/22/2017 9:10:15 AM

Action Type Old Value New Value
Changed CPE Configuration
AND
     OR
          cpe:2.3:o:microsoft:windows-nt:xp:*:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows-nt:xp:*:pro:*:*:*:*:*
          cpe:2.3:o:microsoft:windows-nt:xp:*:x32:*:*:*:*:*
          cpe:2.3:o:microsoft:windows-nt:xp:*:x64:*:*:*:*:*
          cpe:2.3:o:microsoft:windows-nt:xp:sp2:home:*:*:*:*:*
          cpe:2.3:o:microsoft:windows-nt:xp:sp2:pro:x64:*:*:*:*
          cpe:2.3:o:microsoft:windows-nt:xp:sp3:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows-nt:xp:sp3:home:*:*:*:*:*
          cpe:2.3:o:microsoft:windows-nt:xp:sp3:media_center:*:*:*:*:*
          cpe:2.3:o:microsoft:windows-nt:xp:sp3:pro:*:*:*:*:*
          cpe:2.3:o:microsoft:windows-nt:xp:sp3:pro:x64:*:*:*:*
          cpe:2.3:o:microsoft:windows-nt:xp:sp3:tablet_pc:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_xp:*:sp1:media_center:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_xp:*:sp1:tablet_pc:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_xp:*:sp2:media_center:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_xp:*:sp2:x64:*:*:*:*:*
     OR
          *cpe:2.3:a:apple:safari:3.0:*:windows:*:*:*:*:*
          *cpe:2.3:a:apple:safari:3.0.1:*:windows:*:*:*:*:*
          *cpe:2.3:a:apple:safari:3.0.2:*:windows:*:*:*:*:*
          *cpe:2.3:a:apple:safari:3.0.3:*:windows:*:*:*:*:*
          *cpe:2.3:a:apple:safari:3.0.4_beta:*:windows:*:*:*:*:*
          *cpe:2.3:a:apple:safari:3.1:*:*:*:*:*:*:*
          *cpe:2.3:a:apple:safari:3.1.1:*:*:*:*:*:*:*
AND
     OR
          cpe:2.3:o:microsoft:windows-nt:xp:*:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows-nt:xp:*:*:*:*:*:x64:*
          cpe:2.3:o:microsoft:windows-nt:xp:*:*:*:*:*:x86:*
          cpe:2.3:o:microsoft:windows-nt:xp:*:*:*:pro:*:*:*
          cpe:2.3:o:microsoft:windows-nt:xp:sp2:*:*:home:*:*:*
          cpe:2.3:o:microsoft:windows-nt:xp:sp2:*:*:pro:*:x64:*
          cpe:2.3:o:microsoft:windows-nt:xp:sp3:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows-nt:xp:sp3:*:*:*:home:*:*
          cpe:2.3:o:microsoft:windows-nt:xp:sp3:*:*:media_center:*:*:*
          cpe:2.3:o:microsoft:windows-nt:xp:sp3:*:*:pro:*:*:*
          cpe:2.3:o:microsoft:windows-nt:xp:sp3:*:*:pro:*:x64:*
          cpe:2.3:o:microsoft:windows-nt:xp:sp3:*:*:tablet_pc:*:*:*
          cpe:2.3:o:microsoft:windows_xp:*:sp1:*:*:media_center:*:*:*
          cpe:2.3:o:microsoft:windows_xp:*:sp1:*:*:tablet_pc:*:*:*
          cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:x64:*
          cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:media_center:*:*:*
          cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:tablet_pc:*:*:*
     OR
          *cpe:2.3:a:apple:safari:3.0:*:*:*:*:windows:*:*
          *cpe:2.3:a:apple:safari:3.0.1:*:*:*:*:windows:*:*
          *cpe:2.3:a:apple:safari:3.0.2:*:*:*:*:windows:*:*
          *cpe:2.3:a:apple:safari:3.0.3:*:*:*:*:windows:*:*
          *cpe:2.3:a:apple:safari:3.0.4_beta:*:*:*:*:windows:*:*
          *cpe:2.3:a:apple:safari:3.1:*:*:*:*:*:*:*
          *cpe:2.3:a:apple:safari:3.1.1:*:*:*:*:*:*:*
Changed Reference Type
http://lists.apple.com/archives/security-announce/2008//Jun/msg00001.html Third Party Advisory
http://lists.apple.com/archives/security-announce/2008//Jun/msg00001.html Mailing List, Vendor Advisory
Changed Reference Type
http://secunia.com/advisories/30467 Permissions Required, Vendor Advisory
http://secunia.com/advisories/30467 Third Party Advisory
Changed Reference Type
https://exchange.xforce.ibmcloud.com/vulnerabilities/42765 No Types Assigned
https://exchange.xforce.ibmcloud.com/vulnerabilities/42765 Third Party Advisory, VDB Entry
Changed Reference Type
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5782 No Types Assigned
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5782 Third Party Advisory
Changed Reference Type
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6108 No Types Assigned
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6108 Third Party Advisory
Changed Reference Type
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8509 No Types Assigned
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8509 Third Party Advisory