2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2013-5704" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2014-04-15T10:55:11.150" ,
2023-11-07 21:03:21 +00:00
"lastModified" : "2023-11-07T02:16:45.247" ,
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "The mod_headers module in the Apache HTTP Server 2.2.22 allows remote attackers to bypass \"RequestHeader unset\" directives by placing a header in the trailer portion of data sent with chunked transfer coding. NOTE: the vendor states \"this is not a security issue in httpd as such.\""
} ,
{
"lang" : "es" ,
"value" : "El m\u00f3dulo mod_headers en el servidor de Apache HTTP 2.2.22 permite a atacantes remotos evadir directivas \"RequestHeader unset\" mediante la colocaci\u00f3n de una cabera en la porci\u00f3n \"trailer\" de datos enviados con codificaci\u00f3n de transferencia fragmentada. NOTA: el proveedor afirma que \"esto no es un problema de seguridad en httpd como tal.\""
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:N/I:P/A:N" ,
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "PARTIAL" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 5.0
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 2.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-noinfo"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "67AD11FB-529C-404E-A13B-284F145322B8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CCBBB7FE-35FC-4515-8393-5145339FCE4D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F519633F-AB68-495A-B85E-FD41F9F752CA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A894BED6-C97D-4DA4-A13D-9CB2B3306BC5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:http_server:2.2.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "49A81C75-4C54-43FE-9317-E15EDFEC06B6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:http_server:2.2.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "34A847D1-5AD5-4EFD-B165-7602AFC1E656"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:http_server:2.2.8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9AF3A0F5-4E5C-4278-9927-1F94F25CCAFC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:http_server:2.2.9:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AB63EBE5-CF14-491E-ABA5-67116DFE3E5B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:http_server:2.2.10:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8C2A33DE-F55F-4FD8-BB00-9C1E006CA65C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:http_server:2.2.11:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B1CF6394-95D9-42AF-A442-385EFF9CEFE1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:http_server:2.2.12:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "02B629FB-88C8-4E85-A137-28770F1E524E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:http_server:2.2.13:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "03550EF0-DF89-42FE-BF0E-994514EBD947"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:http_server:2.2.14:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4886CCAB-6D4E-45C7-B177-2E8DBEA15531"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:http_server:2.2.15:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C35631AC-7C35-4F6A-A95A-3B080E5210ED"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:http_server:2.2.16:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6CED2BA6-BE5E-4EF1-88EB-0DADD23D2EEF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:http_server:2.2.17:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A71F4154-AD20-4EEA-9E2E-D3385C357DA5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:http_server:2.2.18:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B0B8C9DB-401E-42B3-BAED-D09A96DE9A90"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:http_server:2.2.19:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "062C20A0-05A0-4164-8330-DF6ADFE607F4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:http_server:2.2.20:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D345BA35-93BB-406F-B5DC-86E49FB29C22"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:http_server:2.2.21:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7ED4892F-C829-4BEA-AB82-6A78F6F2426D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:http_server:2.2.22:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "00128AAD-E746-4DCD-8676-1381E5232220"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:http_server:2.2.23:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FE0D7ABB-DE11-40D6-8AAF-C626DD7E3914"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:http_server:2.2.24:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5252544F-7BDD-42EE-856E-B351B4B6D381"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:http_server:2.2.25:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "58375DE5-F7EC-400D-84A2-CD70B72C4F63"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:http_server:2.2.26:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "15233815-C037-41BB-A447-A078F83A93F6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:http_server:2.2.27:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5444C583-CF83-4ECD-8DF8-66D8C1FCF096"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:http_server:2.4.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6FCD3C8C-9BF8-4F30-981A-593EEAEB9EDD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:http_server:2.4.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "046487A3-752B-4D0F-8984-96486B828EAB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:http_server:2.4.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "89D2E052-51CD-4B57-A8B8-FAE51988D654"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:http_server:2.4.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EAA27058-BACF-4F94-8E3C-7D38EC302EC1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:http_server:2.4.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8FEAB0DF-04A9-4F99-8666-0BADC5D642B8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:http_server:2.4.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E7D924D1-8A36-4C43-9E56-52814F9A6350"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:http_server:2.4.9:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "39CDFECC-E26D-47E0-976F-6629040B3764"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:http_server:2.4.10:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E3ECBCB1-0675-41F5-857B-438F36925F63"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "33C068A4-3780-4EAB-A937-6082DF847564"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "807C024A-F8E8-4B48-A349-4C68CD252CA1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F96E3779-F56A-45FF-BB3D-4980527D721E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0CF73560-2F5B-4723-A8A1-9AADBB3ADA00"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5BF3C7A5-9117-42C7-BEA1-4AA378A582EF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "83737173-E12E-4641-BC49-0BD84A6B29D0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9BBCD86A-E6C7-4444-9D74-F861084090F0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "51EF4996-72F4-4FA4-814F-F5991E7A8318"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "98381E61-F082-4302-B51F-5648884F998B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D99A687E-EAE6-417E-A88E-D0082BC194CD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B353CE99-D57C-465B-AAB0-73EF581127D1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7431ABC1-9252-419E-8CC1-311B41360078"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "24C0F4E1-C52C-41E0-9F14-F83ADD5CC7ED"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B76AA310-FEC7-497F-AF04-C3EC1E76C4CC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "17F256A9-D3B9-4C72-B013-4EFD878BFEA8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E5ED5807-55B7-47C5-97A6-03233F4FBC3A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "825ECE2D-E232-46E0-A047-074B34DB1E97"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:jboss_enterprise_web_server:3.0.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8E2F2F98-DB90-43F6-8F28-3656207B6188"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "142AD0DD-4CF3-4D74-9442-459CE3347E3A"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:redhat:jboss_enterprise_web_server:2.0.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "681173DF-537E-4A64-8FC7-75F439CCAD0D"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1D8B549B-E57B-4DFE-8A13-CAB06B5356B3"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "142AD0DD-4CF3-4D74-9442-459CE3347E3A"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:enterprise_manager_ops_center:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "12.1.4" ,
"matchCriteriaId" : "A70BB445-EF2B-4C9D-8502-FDD6A19F8C30"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:enterprise_manager_ops_center:12.1.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BA2CF507-AA3F-464C-88DF-71E30672E623"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4725EA61-9BAB-4E72-9F92-ADE4624439CC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D0879FB1-58E2-4EC4-8111-044642E046BD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C7CF2929-4CBC-4B56-87AE-F45F53BD8DD6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:http_server:10.1.3.5.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A2E69311-C5B8-45FA-809F-ADAE4E35559D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:http_server:11.1.1.7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "911FBD5E-213D-482F-81A9-C3B8CE7D903A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:http_server:12.1.2.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DACC1F65-5AF7-4CD4-ACD2-46D941A19110"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:http_server:12.1.3.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DD4552F9-F5B9-4A52-BA5C-D32D49FABD28"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*" ,
"matchCriteriaId" : "D7B037A8-72A6-4DFF-94B2-D688A5F6F876"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0B1C288F-326B-497B-B26C-D26E01262DDB"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "10.10.4" ,
"matchCriteriaId" : "774F1A5C-2633-4A8F-8462-B53FE0291F04"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "5.0.3" ,
"matchCriteriaId" : "C13EC70E-5CB6-4414-B31A-556C9B8AE5AC"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*" ,
"matchCriteriaId" : "01EDA41C-6B2E-49AF-B503-EB3882265C11"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*" ,
"matchCriteriaId" : "CB66DB75-2B16-4EBF-9B93-CE49D8086E41"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*" ,
"matchCriteriaId" : "815D70A8-47D3-459C-A32C-9FEACA0659D1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "49A63F39-30BE-443F-AF10-6245587D3359"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "http://lists.apple.com/archives/security-announce/2015/Sep/msg00004.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "http://marc.info/?l=apache-httpd-dev&m=139636309822854&w=2" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "http://marc.info/?l=bugtraq&m=143403519711434&w=2" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Issue Tracking" ,
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "http://marc.info/?l=bugtraq&m=144493176821532&w=2" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Issue Tracking" ,
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "http://martin.swende.se/blog/HTTPChunked.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Broken Link" ,
"Exploit" ,
"Third Party Advisory"
]
} ,
{
"url" : "http://rhn.redhat.com/errata/RHSA-2015-0325.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1249.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "http://rhn.redhat.com/errata/RHSA-2015-2661.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Broken Link" ,
"Third Party Advisory"
]
} ,
{
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0061.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "http://rhn.redhat.com/errata/RHSA-2016-0062.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "http://svn.apache.org/repos/asf/httpd/httpd/branches/2.2.x/CHANGES" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Release Notes" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c?r1=1610674&r2=1610814&diff_format=h" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2014:174" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "http://www.securityfocus.com/bid/66550" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory" ,
"VDB Entry"
]
} ,
{
"url" : "http://www.ubuntu.com/usn/USN-2523-1" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://access.redhat.com/errata/RHSA-2015:2659" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://access.redhat.com/errata/RHSA-2015:2660" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://httpd.apache.org/security/vulnerabilities_24.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E" ,
"source" : "cve@mitre.org"
2023-04-24 12:24:31 +02:00
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E" ,
"source" : "cve@mitre.org"
2023-04-24 12:24:31 +02:00
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E" ,
"source" : "cve@mitre.org"
2023-04-24 12:24:31 +02:00
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E" ,
"source" : "cve@mitre.org"
2023-04-24 12:24:31 +02:00
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E" ,
"source" : "cve@mitre.org"
2023-04-24 12:24:31 +02:00
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E" ,
"source" : "cve@mitre.org"
2023-04-24 12:24:31 +02:00
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a%40%3Ccvs.httpd.apache.org%3E" ,
"source" : "cve@mitre.org"
2023-04-24 12:24:31 +02:00
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E" ,
"source" : "cve@mitre.org"
2023-04-24 12:24:31 +02:00
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E" ,
"source" : "cve@mitre.org"
2023-04-24 12:24:31 +02:00
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E" ,
"source" : "cve@mitre.org"
2023-04-24 12:24:31 +02:00
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3Ccvs.httpd.apache.org%3E" ,
"source" : "cve@mitre.org"
2023-04-24 12:24:31 +02:00
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E" ,
"source" : "cve@mitre.org"
2023-04-24 12:24:31 +02:00
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E" ,
"source" : "cve@mitre.org"
2023-04-24 12:24:31 +02:00
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E" ,
"source" : "cve@mitre.org"
2023-04-24 12:24:31 +02:00
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E" ,
"source" : "cve@mitre.org"
2023-04-24 12:24:31 +02:00
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E" ,
"source" : "cve@mitre.org"
2023-04-24 12:24:31 +02:00
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E" ,
"source" : "cve@mitre.org"
2023-04-24 12:24:31 +02:00
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E" ,
"source" : "cve@mitre.org"
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "https://security.gentoo.org/glsa/201504-03" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://support.apple.com/HT204659" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://support.apple.com/HT205219" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
}
]
}