{"containers":{"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2005-06-06T00:00:00.000Z","descriptions":[{"lang":"en","value":"The Apache HTTP server before 1.3.34, and 2.0.x before 2.0.55, when acting as an HTTP proxy, allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a \"Transfer-Encoding: chunked\" header and a Content-Length header, which causes Apache to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka \"HTTP Request Smuggling.\""}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2021-06-06T10:09:26.000Z","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"references":[{"name":"17319","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/17319"},{"name":"SUSE-SR:2005:018","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://www.novell.com/linux/security/advisories/2005_18_sr.html"},{"name":"RHSA-2005:582","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://www.redhat.com/support/errata/RHSA-2005-582.html"},{"name":"SUSE-SA:2005:046","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://www.novell.com/linux/security/advisories/2005_46_apache.html"},{"name":"USN-160-2","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"http://www.ubuntu.com/usn/usn-160-2"},{"name":"ADV-2005-2140","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2005/2140"},{"name":"17813","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/17813"},{"tags":["x_refsource_CONFIRM"],"url":"http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm"},{"name":"ADV-2005-2659","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2005/2659"},{"name":"TSLSA-2005-0059","tags":["vendor-advisory","x_refsource_TRUSTIX"],"url":"http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html"},{"name":"PK13959","tags":["vendor-advisory","x_refsource_AIXAPAR"],"url":"http://www-1.ibm.com/support/search.wss?rs=0&q=PK13959&apar=only"},{"name":"SSA:2005-310-04","tags":["vendor-advisory","x_refsource_SLACKWARE"],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.600000"},{"name":"oval:org.mitre.oval:def:840","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A840"},{"name":"ADV-2006-1018","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2006/1018"},{"name":"SSRT051251","tags":["vendor-advisory","x_refsource_HP"],"url":"http://www.securityfocus.com/archive/1/428138/100/0/threaded"},{"name":"MDKSA-2005:130","tags":["vendor-advisory","x_refsource_MANDRIVA"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:130"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.apache.org/dist/httpd/CHANGES_1.3"},{"name":"19185","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/19185"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.apache.org/dist/httpd/CHANGES_2.0"},{"name":"14530","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/14530"},{"name":"ADV-2006-4680","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2006/4680"},{"name":"604","tags":["third-party-advisory","x_refsource_SREASON"],"url":"http://securityreason.com/securityalert/604"},{"name":"17487","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/17487"},{"name":"HPSBUX02074","tags":["vendor-advisory","x_refsource_HP"],"url":"http://www.securityfocus.com/archive/1/428138/100/0/threaded"},{"name":"19317","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/19317"},{"name":"APPLE-SA-2005-11-29","tags":["vendor-advisory","x_refsource_APPLE"],"url":"http://docs.info.apple.com/article.html?artnum=302847"},{"name":"HPSBUX02101","tags":["vendor-advisory","x_refsource_HP"],"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00612828"},{"name":"oval:org.mitre.oval:def:1629","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1629"},{"name":"1014323","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://securitytracker.com/id?1014323"},{"name":"19072","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/19072"},{"name":"oval:org.mitre.oval:def:1237","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1237"},{"tags":["x_refsource_MISC"],"url":"http://www.securiteam.com/securityreviews/5GP0220G0U.html"},{"tags":["x_refsource_MISC"],"url":"http://www.watchfire.com/resources/HTTP-Request-Smuggling.pdf"},{"name":"PK16139","tags":["vendor-advisory","x_refsource_AIXAPAR"],"url":"http://www-1.ibm.com/support/search.wss?rs=0&q=PK16139&apar=only"},{"name":"DSA-805","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2005/dsa-805"},{"name":"19073","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/19073"},{"name":"[apache-httpd-announce] 20051014 Apache HTTP Server 2.0.55 Released","tags":["mailing-list","x_refsource_MLIST"],"url":"http://marc.info/?l=apache-httpd-announce&m=112931556417329&w=3"},{"name":"15647","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/15647"},{"tags":["x_refsource_CONFIRM"],"url":"https://secure-support.novell.com/KanisaPlatform/Publishing/741/3222109_f.SAL_Public.html"},{"name":"SSRT051128","tags":["vendor-advisory","x_refsource_HP"],"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00612828"},{"name":"14106","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/14106"},{"name":"20050606 A new whitepaper by Watchfire - HTTP Request Smuggling","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://seclists.org/lists/bugtraq/2005/Jun/0025.html"},{"name":"DSA-803","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2005/dsa-803"},{"name":"23074","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/23074"},{"name":"102197","tags":["vendor-advisory","x_refsource_SUNALERT"],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102197-1"},{"name":"oval:org.mitre.oval:def:1526","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1526"},{"name":"102198","tags":["vendor-advisory","x_refsource_SUNALERT"],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102198-1"},{"name":"oval:org.mitre.oval:def:11452","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11452"},{"name":"ADV-2006-0789","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2006/0789"},{"name":"[httpd-cvs] 20190815 svn commit: r1048742 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html","tags":["mailing-list","x_refsource_MLIST"],"url":"https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E"},{"name":"[httpd-cvs] 20190815 svn commit: r1048743 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html","tags":["mailing-list","x_refsource_MLIST"],"url":"https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E"},{"name":"[httpd-cvs] 20200401 svn commit: r1058586 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html","tags":["mailing-list","x_refsource_MLIST"],"url":"https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E"},{"name":"[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html","tags":["mailing-list","x_refsource_MLIST"],"url":"https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E"},{"name":"[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/","tags":["mailing-list","x_refsource_MLIST"],"url":"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E"},{"name":"[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/","tags":["mailing-list","x_refsource_MLIST"],"url":"https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab%40%3Ccvs.httpd.apache.org%3E"},{"name":"[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/","tags":["mailing-list","x_refsource_MLIST"],"url":"https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3%40%3Ccvs.httpd.apache.org%3E"},{"name":"[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html","tags":["mailing-list","x_refsource_MLIST"],"url":"https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E"},{"name":"[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/","tags":["mailing-list","x_refsource_MLIST"],"url":"https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E"},{"name":"[httpd-cvs] 20210330 svn commit: r1073149 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/","tags":["mailing-list","x_refsource_MLIST"],"url":"https://lists.apache.org/thread.html/r734a07156abf332d5ab27fb91d9d962cacfef4f3681e44056f064fa8%40%3Ccvs.httpd.apache.org%3E"},{"name":"[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/","tags":["mailing-list","x_refsource_MLIST"],"url":"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E"},{"name":"[httpd-cvs] 20210606 svn commit: r1075470 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html","tags":["mailing-list","x_refsource_MLIST"],"url":"https://lists.apache.org/thread.html/r5001ecf3d6b2bdd0b732e527654248abb264f08390045d30709a92f6%40%3Ccvs.httpd.apache.org%3E"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-07T22:15:37.424Z"},"title":"CVE Program Container","references":[{"name":"17319","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/17319"},{"name":"SUSE-SR:2005:018","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://www.novell.com/linux/security/advisories/2005_18_sr.html"},{"name":"RHSA-2005:582","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://www.redhat.com/support/errata/RHSA-2005-582.html"},{"name":"SUSE-SA:2005:046","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://www.novell.com/linux/security/advisories/2005_46_apache.html"},{"name":"USN-160-2","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"http://www.ubuntu.com/usn/usn-160-2"},{"name":"ADV-2005-2140","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2005/2140"},{"name":"17813","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/17813"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm"},{"name":"ADV-2005-2659","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2005/2659"},{"name":"TSLSA-2005-0059","tags":["vendor-advisory","x_refsource_TRUSTIX","x_transferred"],"url":"http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html"},{"name":"PK13959","tags":["vendor-advisory","x_refsource_AIXAPAR","x_transferred"],"url":"http://www-1.ibm.com/support/search.wss?rs=0&q=PK13959&apar=only"},{"name":"SSA:2005-310-04","tags":["vendor-advisory","x_refsource_SLACKWARE","x_transferred"],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.600000"},{"name":"oval:org.mitre.oval:def:840","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A840"},{"name":"ADV-2006-1018","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2006/1018"},{"name":"SSRT051251","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://www.securityfocus.com/archive/1/428138/100/0/threaded"},{"name":"MDKSA-2005:130","tags":["vendor-advisory","x_refsource_MANDRIVA","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:130"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.apache.org/dist/httpd/CHANGES_1.3"},{"name":"19185","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/19185"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.apache.org/dist/httpd/CHANGES_2.0"},{"name":"14530","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/14530"},{"name":"ADV-2006-4680","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2006/4680"},{"name":"604","tags":["third-party-advisory","x_refsource_SREASON","x_transferred"],"url":"http://securityreason.com/securityalert/604"},{"name":"17487","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/17487"},{"name":"HPSBUX02074","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://www.securityfocus.com/archive/1/428138/100/0/threaded"},{"name":"19317","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/19317"},{"name":"APPLE-SA-2005-11-29","tags":["vendor-advisory","x_refsource_APPLE","x_transferred"],"url":"http://docs.info.apple.com/article.html?artnum=302847"},{"name":"HPSBUX02101","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00612828"},{"name":"oval:org.mitre.oval:def:1629","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1629"},{"name":"1014323","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://securitytracker.com/id?1014323"},{"name":"19072","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/19072"},{"name":"oval:org.mitre.oval:def:1237","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1237"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://www.securiteam.com/securityreviews/5GP0220G0U.html"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://www.watchfire.com/resources/HTTP-Request-Smuggling.pdf"},{"name":"PK16139","tags":["vendor-advisory","x_refsource_AIXAPAR","x_transferred"],"url":"http://www-1.ibm.com/support/search.wss?rs=0&q=PK16139&apar=only"},{"name":"DSA-805","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2005/dsa-805"},{"name":"19073","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/19073"},{"name":"[apache-httpd-announce] 20051014 Apache HTTP Server 2.0.55 Released","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"http://marc.info/?l=apache-httpd-announce&m=112931556417329&w=3"},{"name":"15647","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/15647"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://secure-support.novell.com/KanisaPlatform/Publishing/741/3222109_f.SAL_Public.html"},{"name":"SSRT051128","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00612828"},{"name":"14106","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/14106"},{"name":"20050606 A new whitepaper by Watchfire - HTTP Request Smuggling","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://seclists.org/lists/bugtraq/2005/Jun/0025.html"},{"name":"DSA-803","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2005/dsa-803"},{"name":"23074","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/23074"},{"name":"102197","tags":["vendor-advisory","x_refsource_SUNALERT","x_transferred"],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102197-1"},{"name":"oval:org.mitre.oval:def:1526","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1526"},{"name":"102198","tags":["vendor-advisory","x_refsource_SUNALERT","x_transferred"],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102198-1"},{"name":"oval:org.mitre.oval:def:11452","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11452"},{"name":"ADV-2006-0789","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2006/0789"},{"name":"[httpd-cvs] 20190815 svn commit: r1048742 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E"},{"name":"[httpd-cvs] 20190815 svn commit: r1048743 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E"},{"name":"[httpd-cvs] 20200401 svn commit: r1058586 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E"},{"name":"[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E"},{"name":"[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E"},{"name":"[httpd-cvs] 20210330 svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab%40%3Ccvs.httpd.apache.org%3E"},{"name":"[httpd-cvs] 20210330 svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3%40%3Ccvs.httpd.apache.org%3E"},{"name":"[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E"},{"name":"[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E"},{"name":"[httpd-cvs] 20210330 svn commit: r1073149 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"https://lists.apache.org/thread.html/r734a07156abf332d5ab27fb91d9d962cacfef4f3681e44056f064fa8%40%3Ccvs.httpd.apache.org%3E"},{"name":"[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E"},{"name":"[httpd-cvs] 20210606 svn commit: r1075470 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"https://lists.apache.org/thread.html/r5001ecf3d6b2bdd0b732e527654248abb264f08390045d30709a92f6%40%3Ccvs.httpd.apache.org%3E"}]}]},"cveMetadata":{"assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","cveId":"CVE-2005-2088","datePublished":"2005-06-30T04:00:00.000Z","dateReserved":"2005-06-30T00:00:00.000Z","dateUpdated":"2024-08-07T22:15:37.424Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}