U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2010-0440

Change History

Modified Analysis by NIST 11/15/2018 1:52:59 PM

Action Type Old Value New Value
Changed CPE Configuration
AND
     OR
          *cpe:2.3:a:cisco:secure_desktop:3.1:*:*:*:*:*:*:*
          *cpe:2.3:a:cisco:secure_desktop:3.1.1:*:*:*:*:*:*:*
          *cpe:2.3:a:cisco:secure_desktop:3.1.1.27:*:*:*:*:*:*:*
          *cpe:2.3:a:cisco:secure_desktop:3.1.1.33:*:*:*:*:*:*:*
          *cpe:2.3:a:cisco:secure_desktop:3.2:*:*:*:*:*:*:*
          *cpe:2.3:a:cisco:secure_desktop:3.2.1:*:*:*:*:*:*:*
          *cpe:2.3:a:cisco:secure_desktop:3.3:*:*:*:*:*:*:*
          *cpe:2.3:a:cisco:secure_desktop:3.4:*:*:*:*:*:*:*
          *cpe:2.3:a:cisco:secure_desktop:3.4.1:*:*:*:*:*:*:*
          *cpe:2.3:a:cisco:secure_desktop:*:*:*:*:*:*:*:* versions up to (including) 3.4.2
     OR
          cpe:2.3:h:cisco:asa_5500:6.3:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:asa_5500:7.0:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:asa_5500:7.0\(4\):*:*:*:*:*:*:*
          cpe:2.3:h:cisco:asa_5500:7.0.4.3:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:asa_5500:7.1:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:asa_5500:7.2:*:*:*:*:*:*:*
          cpe:2.3:h:cisco:asa_5500:7.2\(2\):*:*:*:*:*:*:*
          cpe:2.3:h:cisco:asa_5500:*:*:*:*:*:*:*:* versions up to (including) 8.0
          cpe:2.3:h:cisco:asa_5500:*:*:*:*:*:*:*:* versions up to (including) 8.1
          cpe:2.3:h:cisco:asa_5500:*:*:*:*:*:*:*:* versions up to (including) 8.2
OR
     *cpe:2.3:a:cisco:secure_desktop:*:*:*:*:*:*:*:* versions up to (excluding) 3.5
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:a:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:* versions from (including) 8.0 up to (excluding) 8.0\(5\)
          *cpe:2.3:a:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:* versions from (including) 8.1 up to (excluding) 8.1\(2.7\)
          *cpe:2.3:a:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:* versions from (including) 8.2 up to (excluding) 8.2\(1\)
     OR
          cpe:2.3:h:cisco:asa_5500:-:*:*:*:*:*:*:*
Changed Reference Type
http://secunia.com/advisories/38397 Vendor Advisory
http://secunia.com/advisories/38397 Third Party Advisory
Changed Reference Type
http://www.coresecurity.com/content/cisco-secure-desktop-xss Exploit
http://www.coresecurity.com/content/cisco-secure-desktop-xss Exploit, Third Party Advisory
Changed Reference Type
http://www.securityfocus.com/archive/1/509290/100/0/threaded No Types Assigned
http://www.securityfocus.com/archive/1/509290/100/0/threaded Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securityfocus.com/bid/37960 Exploit
http://www.securityfocus.com/bid/37960 Exploit, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.vupen.com/english/advisories/2010/0273 Vendor Advisory
http://www.vupen.com/english/advisories/2010/0273 Third Party Advisory