National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

Vulnerability Change Record for CVE-2006-0042

Change History

Modified Analysis - 11/29/2018 10:45:43 AM

Action Type Old Value New Value
Changed Reference Type
http://secunia.com/advisories/18846 Patch, Vendor Advisory
http://secunia.com/advisories/18846 Patch, Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/19139 Patch, Vendor Advisory
http://secunia.com/advisories/19139 Patch, Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/19658 Vendor Advisory
http://secunia.com/advisories/19658 Third Party Advisory
Changed Reference Type
http://securityreason.com/securityalert/737 No Types Assigned
http://securityreason.com/securityalert/737 Third Party Advisory
Changed Reference Type
http://svn.apache.org/viewcvs.cgi/httpd/apreq/tags/v2_07/CHANGES?rev=376998&view=markup No Types Assigned
http://svn.apache.org/viewcvs.cgi/httpd/apreq/tags/v2_07/CHANGES?rev=376998&view=markup Vendor Advisory
Changed Reference Type
http://www.debian.org/security/2006/dsa-1000 Patch, Vendor Advisory
http://www.debian.org/security/2006/dsa-1000 Patch, Third Party Advisory
Changed Reference Type
http://www.gentoo.org/security/en/glsa/glsa-200604-08.xml No Types Assigned
http://www.gentoo.org/security/en/glsa/glsa-200604-08.xml Third Party Advisory
Changed Reference Type
http://www.securityfocus.com/bid/16710 Patch
http://www.securityfocus.com/bid/16710 Patch, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.vupen.com/english/advisories/2006/0645 Vendor Advisory
http://www.vupen.com/english/advisories/2006/0645 Third Party Advisory
Changed Reference Type
https://exchange.xforce.ibmcloud.com/vulnerabilities/24917 No Types Assigned
https://exchange.xforce.ibmcloud.com/vulnerabilities/24917 Third Party Advisory, VDB Entry
Added CPE Configuration
OR
     *cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
     *cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
Changed CPE Configuration
OR
     *cpe:2.3:a:libapreq2:libapreq2:1.0:*:*:*:*:*:*:*
     *cpe:2.3:a:libapreq2:libapreq2:1.1:*:*:*:*:*:*:*
     *cpe:2.3:a:libapreq2:libapreq2:1.2:*:*:*:*:*:*:*
     *cpe:2.3:a:libapreq2:libapreq2:1.3:*:*:*:*:*:*:*
     *cpe:2.3:a:libapreq2:libapreq2:1.33:*:*:*:*:*:*:*
     *cpe:2.3:a:libapreq2:libapreq2:2.01_dev:*:*:*:*:*:*:*
     *cpe:2.3:a:libapreq2:libapreq2:2.02_dev:*:*:*:*:*:*:*
     *cpe:2.3:a:libapreq2:libapreq2:2.03_dev:*:*:*:*:*:*:*
     *cpe:2.3:a:libapreq2:libapreq2:2.04_dev:*:*:*:*:*:*:*
     *cpe:2.3:a:libapreq2:libapreq2:2.05_dev:*:*:*:*:*:*:*
     *cpe:2.3:a:libapreq2:libapreq2:2.06_dev:*:*:*:*:*:*:*
OR
     *cpe:2.3:a:apache:libapreq2:*:*:*:*:*:*:*:* versions up to (excluding) 2.07