U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2009-3257

Change History

Reanalysis by NIST 11/22/2017 11:06:06 AM

Action Type Old Value New Value
Changed CPE Configuration
OR
     *cpe:2.3:a:vtiger:vtiger_crm:1.0:*:*:*:*:*:*:*
     *cpe:2.3:a:vtiger:vtiger_crm:2.0:*:*:*:*:*:*:*
     *cpe:2.3:a:vtiger:vtiger_crm:2.0.1:*:*:*:*:*:*:*
     *cpe:2.3:a:vtiger:vtiger_crm:2.1:*:*:*:*:*:*:*
     *cpe:2.3:a:vtiger:vtiger_crm:3:*:*:*:*:*:*:*
     *cpe:2.3:a:vtiger:vtiger_crm:3.0:beta:*:*:*:*:*:*
     *cpe:2.3:a:vtiger:vtiger_crm:3.2:*:*:*:*:*:*:*
     *cpe:2.3:a:vtiger:vtiger_crm:4:*:*:*:*:*:*:*
     *cpe:2.3:a:vtiger:vtiger_crm:4:beta:*:*:*:*:*:*
     *cpe:2.3:a:vtiger:vtiger_crm:4:beta:*:italian:*:*:*:*
     *cpe:2.3:a:vtiger:vtiger_crm:4:rc1:*:*:*:*:*:*
     *cpe:2.3:a:vtiger:vtiger_crm:4.0:*:*:*:*:*:*:*
     *cpe:2.3:a:vtiger:vtiger_crm:4.0.1:*:*:*:*:*:*:*
     *cpe:2.3:a:vtiger:vtiger_crm:4.2:*:*:*:*:*:*:*
     *cpe:2.3:a:vtiger:vtiger_crm:4.2:*:validation:*:*:*:*:*
     *cpe:2.3:a:vtiger:vtiger_crm:4.2.4:*:*:*:*:*:*:*
     *cpe:2.3:a:vtiger:vtiger_crm:5:*:*:*:*:*:*:*
     *cpe:2.3:a:vtiger:vtiger_crm:5.0.3:*:*:*:*:*:*:*
     *cpe:2.3:a:vtiger:vtiger_crm:5.0.4:*:*:*:*:*:*:*
     *cpe:2.3:a:vtiger:vtiger_crm:5.0.4:rc:*:*:*:*:*:*
     *cpe:2.3:a:vtiger:vtiger_crm:*:rc:*:*:*:*:*:* versions up to (including) 5.1.0
OR
     *cpe:2.3:a:vtiger:vtiger_crm:*:rc:*:*:*:*:*:* versions up to (excluding) 5.1.0
Changed Reference Type
http://secunia.com/advisories/36309 Vendor Advisory
http://secunia.com/advisories/36309 Third Party Advisory
Changed Reference Type
http://trac.vtiger.com/cgi-bin/trac.cgi/ticket/5055 No Types Assigned
http://trac.vtiger.com/cgi-bin/trac.cgi/ticket/5055 Exploit, Vendor Advisory