U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2010-0425

Change History

Modified Analysis by NIST 7/24/2025 1:43:53 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:* versions from (including) 2.2.0 up to (excluding) 2.2.15
          *cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:* versions from (including) 2.0.37 up to (excluding) 2.0.64
          *cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:* versions from (including) 2.3.0 up to (excluding) 2.3.7
     OR
          cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:a:ibm:http_server:6.1:*:*:*:*:*:*:*
          *cpe:2.3:a:ibm:http_server:6.0.2:*:*:*:*:*:*:*
          *cpe:2.3:a:ibm:http_server:6.0.2.1:*:*:*:*:*:*:*
          *cpe:2.3:a:ibm:http_server:6.0.2.11:*:*:*:*:*:*:*
          *cpe:2.3:a:ibm:http_server:6.0.2.13:*:*:*:*:*:*:*
          *cpe:2.3:a:ibm:http_server:6.0.2.15:*:*:*:*:*:*:*
          *cpe:2.3:a:ibm:http_server:6.0.2.3:*:*:*:*:*:*:*
          *cpe:2.3:a:ibm:http_server:6.0.2.29:*:*:*:*:*:*:*
          *cpe:2.3:a:ibm:http_server:6.0.2.27:*:*:*:*:*:*:*
          *cpe:2.3:a:ibm:http_server:6.0.2.25:*:*:*:*:*:*:*
          *cpe:2.3:a:ibm:http_server:6.0.2.23:*:*:*:*:*:*:*
          *cpe:2.3:a:ibm:http_server:6.0.2.21:*:*:*:*:*:*:*
          *cpe:2.3:a:ibm:http_server:6.0.2.19:*:*:*:*:*:*:*
          *cpe:2.3:a:ibm:http_server:6.0.2.39:*:*:*:*:*:*:*
          *cpe:2.3:a:ibm:http_server:6.0.2.37:*:*:*:*:*:*:*
          *cpe:2.3:a:ibm:http_server:6.0.2.35:*:*:*:*:*:*:*
          *cpe:2.3:a:ibm:http_server:6.0.2.33:*:*:*:*:*:*:*
          *cpe:2.3:a:ibm:http_server:6.0.2.31:*:*:*:*:*:*:*
          *cpe:2.3:a:ibm:http_server:6.1.0.9:*:*:*:*:*:*:*
          *cpe:2.3:a:ibm:http_server:6.1.0.7:*:*:*:*:*:*:*
          *cpe:2.3:a:ibm:http_server:6.1.0.5:*:*:*:*:*:*:*
          *cpe:2.3:a:ibm:http_server:6.1.0.3:*:*:*:*:*:*:*
          *cpe:2.3:a:ibm:http_server:6.1.0.29:*:*:*:*:*:*:*
          *cpe:2.3:a:ibm:http_server:6.1.0.27:*:*:*:*:*:*:*
          *cpe:2.3:a:ibm:http_server:6.1.0.25:*:*:*:*:*:*:*
          *cpe:2.3:a:ibm:http_server:6.1.0.23:*:*:*:*:*:*:*
          *cpe:2.3:a:ibm:http_server:6.1.0.21:*:*:*:*:*:*:*
          *cpe:2.3:a:ibm:http_server:6.1.0.2:*:*:*:*:*:*:*
          *cpe:2.3:a:ibm:http_server:6.1.0.19:*:*:*:*:*:*:*
          *cpe:2.3:a:ibm:http_server:6.1.0.17:*:*:*:*:*:*:*
          *cpe:2.3:a:ibm:http_server:6.1.0.15:*:*:*:*:*:*:*
          *cpe:2.3:a:ibm:http_server:6.1.0.13:*:*:*:*:*:*:*
          *cpe:2.3:a:ibm:http_server:6.1.0.11:*:*:*:*:*:*:*
          *cpe:2.3:a:ibm:http_server:6.0.2.9:*:*:*:*:*:*:*
          *cpe:2.3:a:ibm:http_server:6.0.2.7:*:*:*:*:*:*:*
     OR
          cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
          *cpe:2.3:a:broadcom:vmware_ace_management_server:*:*:*:*:*:*:*:* versions up to (excluding) 2.7.2
Added CPE Configuration

								
							
							
						
OR
          *cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:*:z/os:*:* versions from (including) 6.1 up to (excluding) 6.1.0.31
Added CPE Configuration

								
							
							
						
OR
          *cpe:2.3:a:oracle:http_server:10.1.3.5.0:*:*:*:*:*:*:*
Removed CPE Configuration
AND
     OR
          *cpe:2.3:a:apache:http_server:2.0.42:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:http_server:2.0.58:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:http_server:2.0.47:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:http_server:2.0.56:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:http_server:2.0.50:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:http_server:2.0.35:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:http_server:2.0.37:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:http_server:2.0.55:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:http_server:2.0.44:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:http_server:2.0.39:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:http_server:2.0.52:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:http_server:2.0.53:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:http_server:2.0.57:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:http_server:2.0.51:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:http_server:2.0.28:beta:*:*:*:*:*:*
          *cpe:2.3:a:apache:http_server:2.0.63:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:http_server:2.0.41:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:http_server:2.0.49:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:http_server:2.0.9:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:http_server:2.0.34:beta:*:*:*:*:*:*
          *cpe:2.3:a:apache:http_server:2.0.61:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:http_server:2.0.32:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:http_server:2.0.38:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:http_server:2.0.48:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:http_server:2.0.45:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:http_server:2.0.40:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:http_server:2.0.36:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:http_server:2.0.46:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:http_server:2.0.54:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:http_server:2.0.43:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:http_server:2.0.59:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:http_server:2.0.28:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:http_server:2.0.32:beta:*:*:*:*:*:*
          *cpe:2.3:a:apache:http_server:2.0.60:*:*:*:*:*:*:*
     OR
          cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*

								
						
Removed CPE Configuration
AND
     OR
          *cpe:2.3:a:apache:http_server:2.2.11:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:http_server:2.2.10:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:http_server:2.2.13:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:http_server:2.2.8:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:http_server:2.2.14:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:http_server:2.2.7:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:http_server:2.2.6:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:http_server:2.2.9:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:http_server:2.2.12:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:http_server:2.2.1:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:http_server:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*

								
						
Removed CPE Configuration
AND
     OR
          *cpe:2.3:a:apache:http_server:2.3.4:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:http_server:2.3.1:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:http_server:2.3.5:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:http_server:2.3.2:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:http_server:2.3.3:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:http_server:2.3.0:*:*:*:*:*:*:*
          *cpe:2.3:a:apache:http_server:2.3.6:*:*:*:*:*:*:*
     OR
          cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*

								
						
Changed Reference Type
CVE: http://secunia.com/advisories/38978 Types: Vendor Advisory
CVE: http://secunia.com/advisories/38978 Types: Broken Link
Changed Reference Type
CVE: http://secunia.com/advisories/39628 Types: Vendor Advisory
CVE: http://secunia.com/advisories/39628 Types: Broken Link
Changed Reference Type
CVE: http://www.kb.cert.org/vuls/id/280613 Types: US Government Resource
CVE: http://www.kb.cert.org/vuls/id/280613 Types: Third Party Advisory, US Government Resource
Changed Reference Type
CVE: http://www.securityfocus.com/bid/38494 Types: Exploit
CVE: http://www.securityfocus.com/bid/38494 Types: Broken Link, Exploit
Changed Reference Type
CVE: http://www.senseofsecurity.com.au/advisories/SOS-10-002 Types: URL Repurposed
CVE: http://www.senseofsecurity.com.au/advisories/SOS-10-002 Types: Third Party Advisory, URL Repurposed
Changed Reference Type
CVE: http://www.vupen.com/english/advisories/2010/0634 Types: Vendor Advisory
CVE: http://www.vupen.com/english/advisories/2010/0634 Types: Broken Link, Vendor Advisory
Changed Reference Type
CVE: http://www.vupen.com/english/advisories/2010/0994 Types: Vendor Advisory
CVE: http://www.vupen.com/english/advisories/2010/0994 Types: Broken Link, Issue Tracking, Mailing List, Vendor Advisory
Changed Reference Type
Red Hat, Inc.: http://secunia.com/advisories/38978 Types: Vendor Advisory
Red Hat, Inc.: http://secunia.com/advisories/38978 Types: Broken Link
Changed Reference Type
Red Hat, Inc.: http://secunia.com/advisories/39628 Types: Vendor Advisory
Red Hat, Inc.: http://secunia.com/advisories/39628 Types: Broken Link
Changed Reference Type
Red Hat, Inc.: http://www.kb.cert.org/vuls/id/280613 Types: US Government Resource
Red Hat, Inc.: http://www.kb.cert.org/vuls/id/280613 Types: Third Party Advisory, US Government Resource
Changed Reference Type
Red Hat, Inc.: http://www.securityfocus.com/bid/38494 Types: Exploit
Red Hat, Inc.: http://www.securityfocus.com/bid/38494 Types: Broken Link, Exploit
Changed Reference Type
Red Hat, Inc.: http://www.senseofsecurity.com.au/advisories/SOS-10-002 Types: URL Repurposed
Red Hat, Inc.: http://www.senseofsecurity.com.au/advisories/SOS-10-002 Types: Third Party Advisory, URL Repurposed
Changed Reference Type
Red Hat, Inc.: http://www.vupen.com/english/advisories/2010/0634 Types: Vendor Advisory
Red Hat, Inc.: http://www.vupen.com/english/advisories/2010/0634 Types: Broken Link, Vendor Advisory
Changed Reference Type
Red Hat, Inc.: http://www.vupen.com/english/advisories/2010/0994 Types: Vendor Advisory
Red Hat, Inc.: http://www.vupen.com/english/advisories/2010/0994 Types: Broken Link, Issue Tracking, Mailing List, Vendor Advisory
Added Reference Type

								
							
							
						
CVE: http://httpd.apache.org/security/vulnerabilities_20.html Types: Vendor Advisory
Added Reference Type

								
							
							
						
CVE: http://httpd.apache.org/security/vulnerabilities_22.html Types: Vendor Advisory
Added Reference Type

								
							
							
						
CVE: http://lists.vmware.com/pipermail/security-announce/2010/000105.html Types: Broken Link
Added Reference Type

								
							
							
						
CVE: http://svn.apache.org/viewvc/httpd/httpd/trunk/CHANGES?r1=917870&r2=917869&pathrev=917870 Types: Permissions Required
Added Reference Type

								
							
							
						
CVE: http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/arch/win32/mod_isapi.c?r1=917870&r2=917869&pathrev=917870 Types: Permissions Required
Added Reference Type

								
							
							
						
CVE: http://svn.apache.org/viewvc?view=revision&revision=917870 Types: Permissions Required
Added Reference Type

								
							
							
						
CVE: http://www-01.ibm.com/support/docview.wss?uid=swg1PM09447 Types: Third Party Advisory
Added Reference Type

								
							
							
						
CVE: http://www-01.ibm.com/support/docview.wss?uid=swg1PM12247 Types: Third Party Advisory
Added Reference Type

								
							
							
						
CVE: http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html Types: Third Party Advisory
Added Reference Type

								
							
							
						
CVE: http://www.securitytracker.com/id?1023701 Types: Broken Link
Added Reference Type

								
							
							
						
CVE: http://www.vmware.com/security/advisories/VMSA-2010-0014.html Types: Third Party Advisory
Added Reference Type

								
							
							
						
CVE: https://exchange.xforce.ibmcloud.com/vulnerabilities/56624 Types: Third Party Advisory
Added Reference Type

								
							
							
						
CVE: https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E Types: Issue Tracking, Mailing List
Added Reference Type

								
							
							
						
CVE: https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E Types: Issue Tracking, Mailing List
Added Reference Type

								
							
							
						
CVE: https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E Types: Issue Tracking, Mailing List
Added Reference Type

								
							
							
						
CVE: https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E Types: Issue Tracking, Mailing List
Added Reference Type

								
							
							
						
CVE: https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E Types: Issue Tracking, Mailing List
Added Reference Type

								
							
							
						
CVE: https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e%40%3Ccvs.httpd.apache.org%3E Types: Issue Tracking, Mailing List
Added Reference Type

								
							
							
						
CVE: https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E Types: Issue Tracking, Mailing List
Added Reference Type

								
							
							
						
CVE: https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E Types: Issue Tracking, Mailing List
Added Reference Type

								
							
							
						
CVE: https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E Types: Issue Tracking, Mailing List
Added Reference Type

								
							
							
						
CVE: https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E Types: Issue Tracking, Mailing List
Added Reference Type

								
							
							
						
CVE: https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E Types: Issue Tracking, Mailing List
Added Reference Type

								
							
							
						
CVE: https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E Types: Issue Tracking, Mailing List
Added Reference Type

								
							
							
						
CVE: https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E Types: Issue Tracking, Mailing List
Added Reference Type

								
							
							
						
CVE: https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E Types: Issue Tracking, Mailing List
Added Reference Type

								
							
							
						
CVE: https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E Types: Issue Tracking, Mailing List
Added Reference Type

								
							
							
						
CVE: https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d%40%3Ccvs.httpd.apache.org%3E Types: Issue Tracking, Mailing List
Added Reference Type

								
							
							
						
CVE: https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E Types: Issue Tracking, Mailing List
Added Reference Type

								
							
							
						
CVE: https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E Types: Issue Tracking, Mailing List
Added Reference Type

								
							
							
						
CVE: https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7%40%3Ccvs.httpd.apache.org%3E Types: Issue Tracking, Mailing List
Added Reference Type

								
							
							
						
CVE: https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E Types: Issue Tracking, Mailing List
Added Reference Type

								
							
							
						
CVE: https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E Types: Issue Tracking, Mailing List
Added Reference Type

								
							
							
						
CVE: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8439 Types: Broken Link
Added Reference Type

								
							
							
						
CVE: https://www.exploit-db.com/exploits/11650 Types: Third Party Advisory
Added Reference Type

								
							
							
						
Red Hat, Inc.: http://httpd.apache.org/security/vulnerabilities_20.html Types: Vendor Advisory
Added Reference Type

								
							
							
						
Red Hat, Inc.: http://httpd.apache.org/security/vulnerabilities_22.html Types: Vendor Advisory
Added Reference Type

								
							
							
						
Red Hat, Inc.: http://lists.vmware.com/pipermail/security-announce/2010/000105.html Types: Broken Link
Added Reference Type

								
							
							
						
Red Hat, Inc.: http://svn.apache.org/viewvc/httpd/httpd/trunk/CHANGES?r1=917870&r2=917869&pathrev=917870 Types: Permissions Required
Added Reference Type

								
							
							
						
Red Hat, Inc.: http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/arch/win32/mod_isapi.c?r1=917870&r2=917869&pathrev=917870 Types: Permissions Required
Added Reference Type

								
							
							
						
Red Hat, Inc.: http://svn.apache.org/viewvc?view=revision&revision=917870 Types: Permissions Required
Added Reference Type

								
							
							
						
Red Hat, Inc.: http://www-01.ibm.com/support/docview.wss?uid=swg1PM09447 Types: Third Party Advisory
Added Reference Type

								
							
							
						
Red Hat, Inc.: http://www-01.ibm.com/support/docview.wss?uid=swg1PM12247 Types: Third Party Advisory
Added Reference Type

								
							
							
						
Red Hat, Inc.: http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html Types: Third Party Advisory
Added Reference Type

								
							
							
						
Red Hat, Inc.: http://www.securitytracker.com/id?1023701 Types: Broken Link
Added Reference Type

								
							
							
						
Red Hat, Inc.: http://www.vmware.com/security/advisories/VMSA-2010-0014.html Types: Third Party Advisory
Added Reference Type

								
							
							
						
Red Hat, Inc.: https://exchange.xforce.ibmcloud.com/vulnerabilities/56624 Types: Third Party Advisory
Added Reference Type

								
							
							
						
Red Hat, Inc.: https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E Types: Issue Tracking, Mailing List
Added Reference Type

								
							
							
						
Red Hat, Inc.: https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E Types: Issue Tracking, Mailing List
Added Reference Type

								
							
							
						
Red Hat, Inc.: https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E Types: Issue Tracking, Mailing List
Added Reference Type

								
							
							
						
Red Hat, Inc.: https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E Types: Issue Tracking, Mailing List
Added Reference Type

								
							
							
						
Red Hat, Inc.: https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E Types: Issue Tracking, Mailing List
Added Reference Type

								
							
							
						
Red Hat, Inc.: https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e%40%3Ccvs.httpd.apache.org%3E Types: Issue Tracking, Mailing List
Added Reference Type

								
							
							
						
Red Hat, Inc.: https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E Types: Issue Tracking, Mailing List
Added Reference Type

								
							
							
						
Red Hat, Inc.: https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E Types: Issue Tracking, Mailing List
Added Reference Type

								
							
							
						
Red Hat, Inc.: https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E Types: Issue Tracking, Mailing List
Added Reference Type

								
							
							
						
Red Hat, Inc.: https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E Types: Issue Tracking, Mailing List
Added Reference Type

								
							
							
						
Red Hat, Inc.: https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E Types: Issue Tracking, Mailing List
Added Reference Type

								
							
							
						
Red Hat, Inc.: https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E Types: Issue Tracking, Mailing List
Added Reference Type

								
							
							
						
Red Hat, Inc.: https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E Types: Issue Tracking, Mailing List
Added Reference Type

								
							
							
						
Red Hat, Inc.: https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E Types: Issue Tracking, Mailing List
Added Reference Type

								
							
							
						
Red Hat, Inc.: https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E Types: Issue Tracking, Mailing List
Added Reference Type

								
							
							
						
Red Hat, Inc.: https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d%40%3Ccvs.httpd.apache.org%3E Types: Issue Tracking, Mailing List
Added Reference Type

								
							
							
						
Red Hat, Inc.: https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E Types: Issue Tracking, Mailing List
Added Reference Type

								
							
							
						
Red Hat, Inc.: https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E Types: Issue Tracking, Mailing List
Added Reference Type

								
							
							
						
Red Hat, Inc.: https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7%40%3Ccvs.httpd.apache.org%3E Types: Issue Tracking, Mailing List
Added Reference Type

								
							
							
						
Red Hat, Inc.: https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E Types: Issue Tracking, Mailing List
Added Reference Type

								
							
							
						
Red Hat, Inc.: https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E Types: Issue Tracking, Mailing List
Added Reference Type

								
							
							
						
Red Hat, Inc.: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8439 Types: Broken Link
Added Reference Type

								
							
							
						
Red Hat, Inc.: https://www.exploit-db.com/exploits/11650 Types: Third Party Advisory