U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2013-7345

Change History

Modified Analysis by NIST 10/31/2022 10:56:14 AM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:php:php:*:*:*:*:*:*:*:* versions from (including) 5.4.0 up to (excluding) 5.4.27
     *cpe:2.3:a:php:php:*:*:*:*:*:*:*:* versions from (including) 5.5.0 up to (excluding) 5.5.11
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
     *cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
     *cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
Changed CPE Configuration
OR
     *cpe:2.3:a:christos_zoulas:file:5.00:*:*:*:*:*:*:*
     *cpe:2.3:a:christos_zoulas:file:5.01:*:*:*:*:*:*:*
     *cpe:2.3:a:christos_zoulas:file:5.02:*:*:*:*:*:*:*
     *cpe:2.3:a:christos_zoulas:file:5.03:*:*:*:*:*:*:*
     *cpe:2.3:a:christos_zoulas:file:5.04:*:*:*:*:*:*:*
     *cpe:2.3:a:christos_zoulas:file:5.05:*:*:*:*:*:*:*
     *cpe:2.3:a:christos_zoulas:file:5.06:*:*:*:*:*:*:*
     *cpe:2.3:a:christos_zoulas:file:5.07:*:*:*:*:*:*:*
     *cpe:2.3:a:christos_zoulas:file:5.08:*:*:*:*:*:*:*
     *cpe:2.3:a:christos_zoulas:file:5.09:*:*:*:*:*:*:*
     *cpe:2.3:a:christos_zoulas:file:5.10:*:*:*:*:*:*:*
     *cpe:2.3:a:christos_zoulas:file:5.11:*:*:*:*:*:*:*
     *cpe:2.3:a:christos_zoulas:file:5.12:*:*:*:*:*:*:*
     *cpe:2.3:a:christos_zoulas:file:5.13:*:*:*:*:*:*:*
     *cpe:2.3:a:christos_zoulas:file:*:*:*:*:*:*:*:* versions up to (including) 5.14
OR
     *cpe:2.3:a:christos_zoulas:file:*:*:*:*:*:*:*:* versions up to (excluding) 5.15
Added CWE

								
							
							
						
NIST NVD-CWE-noinfo
Removed CWE
NIST CWE-264

								
						
Changed Reference Type
http://bugs.gw.com/view.php?id=164 Exploit, Patch
http://bugs.gw.com/view.php?id=164 Broken Link, Exploit, Issue Tracking, Patch, Third Party Advisory
Changed Reference Type
http://rhn.redhat.com/errata/RHSA-2014-1765.html No Types Assigned
http://rhn.redhat.com/errata/RHSA-2014-1765.html Third Party Advisory
Changed Reference Type
http://support.apple.com/kb/HT6443 No Types Assigned
http://support.apple.com/kb/HT6443 Third Party Advisory
Changed Reference Type
http://www.debian.org/security/2014/dsa-2873 No Types Assigned
http://www.debian.org/security/2014/dsa-2873 Third Party Advisory
Changed Reference Type
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=703993 No Types Assigned
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=703993 Issue Tracking, Third Party Advisory
Changed Reference Type
https://github.com/file/file/commit/ef2329cf71acb59204dd981e2c6cce6c81fe467c Exploit, Patch
https://github.com/file/file/commit/ef2329cf71acb59204dd981e2c6cce6c81fe467c Exploit, Patch, Third Party Advisory