You are viewing a plain text version of this content. The canonical link for it is here.
Posted to cvs@httpd.apache.org by mj...@apache.org on 2021/03/30 10:13:34 UTC

svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/

Added: httpd/site/trunk/content/security/json/CVE-2018-1333.json
URL: http://svn.apache.org/viewvc/httpd/site/trunk/content/security/json/CVE-2018-1333.json?rev=1888194&view=auto
==============================================================================
--- httpd/site/trunk/content/security/json/CVE-2018-1333.json (added)
+++ httpd/site/trunk/content/security/json/CVE-2018-1333.json Tue Mar 30 10:13:32 2021
@@ -0,0 +1,138 @@
+{
+  "data_type": "CVE",
+  "data_format": "MITRE",
+  "data_version": "4.0",
+  "generator": {
+    "engine": "xmltojsonmjc 1.0"
+  },
+  "references": {},
+  "timeline": [
+    {
+      "time": "2018-05-08",
+      "lang": "eng",
+      "value": "reported"
+    },
+    {
+      "time": "2018-07-18",
+      "lang": "eng",
+      "value": "public"
+    },
+    {
+      "time": "2018-07-15",
+      "lang": "eng",
+      "value": "2.4.34 released"
+    }
+  ],
+  "CNA_private": {
+    "owner": "httpd"
+  },
+  "CVE_data_meta": {
+    "ASSIGNER": "security@apache.org",
+    "AKA": "",
+    "STATE": "PUBLIC",
+    "DATE_PUBLIC": "2018-07-18",
+    "ID": "CVE-2018-1333",
+    "TITLE": "DoS for HTTP/2 connections by crafted requests"
+  },
+  "source": {
+    "defect": [],
+    "advisory": "",
+    "discovery": "UNKNOWN"
+  },
+  "problemtype": {
+    "problemtype_data": [
+      {
+        "description": [
+          {
+            "lang": "eng",
+            "value": "DoS for HTTP/2 connections by crafted requests"
+          }
+        ]
+      }
+    ]
+  },
+  "credit": [
+    {
+      "lang": "eng",
+      "value": "The issue was discovered by Craig Young of Tripwire VERT."
+    }
+  ],
+  "description": {
+    "description_data": [
+      {
+        "lang": "eng",
+        "value": "By specially crafting HTTP/2 requests, workers would be allocated 60 seconds longer than necessary, leading to worker exhaustion and a denial of service. This issue only affects servers that have configured and enabled HTTP/2 support, which is not the default"
+      }
+    ]
+  },
+  "impact": [
+    {
+      "other": "low"
+    }
+  ],
+  "affects": {
+    "vendor": {
+      "vendor_data": [
+        {
+          "vendor_name": "Apache Software Foundation",
+          "product": {
+            "product_data": [
+              {
+                "product_name": "Apache HTTP Server",
+                "version": {
+                  "version_data": [
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.33"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.29"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.28"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.27"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.26"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.25"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.23"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.20"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.18"
+                    }
+                  ]
+                }
+              }
+            ]
+          }
+        }
+      ]
+    }
+  }
+}
\ No newline at end of file

Added: httpd/site/trunk/content/security/json/CVE-2018-17189.json
URL: http://svn.apache.org/viewvc/httpd/site/trunk/content/security/json/CVE-2018-17189.json?rev=1888194&view=auto
==============================================================================
--- httpd/site/trunk/content/security/json/CVE-2018-17189.json (added)
+++ httpd/site/trunk/content/security/json/CVE-2018-17189.json Tue Mar 30 10:13:32 2021
@@ -0,0 +1,163 @@
+{
+  "data_type": "CVE",
+  "data_format": "MITRE",
+  "data_version": "4.0",
+  "generator": {
+    "engine": "xmltojsonmjc 1.0"
+  },
+  "references": {},
+  "timeline": [
+    {
+      "time": "2018-10-16",
+      "lang": "eng",
+      "value": "reported"
+    },
+    {
+      "time": "2019-01-22",
+      "lang": "eng",
+      "value": "public"
+    },
+    {
+      "time": "2019-02-28",
+      "lang": "eng",
+      "value": "2.4.38 released"
+    }
+  ],
+  "CNA_private": {
+    "owner": "httpd"
+  },
+  "CVE_data_meta": {
+    "ASSIGNER": "security@apache.org",
+    "AKA": "",
+    "STATE": "PUBLIC",
+    "DATE_PUBLIC": "2019-01-22",
+    "ID": "CVE-2018-17189",
+    "TITLE": "DoS for HTTP/2 connections via slow request bodies"
+  },
+  "source": {
+    "defect": [],
+    "advisory": "",
+    "discovery": "UNKNOWN"
+  },
+  "problemtype": {
+    "problemtype_data": [
+      {
+        "description": [
+          {
+            "lang": "eng",
+            "value": "DoS for HTTP/2 connections via slow request bodies"
+          }
+        ]
+      }
+    ]
+  },
+  "credit": [
+    {
+      "lang": "eng",
+      "value": "The issue was discovered by Gal Goldshtein of F5 Networks."
+    }
+  ],
+  "description": {
+    "description_data": [
+      {
+        "lang": "eng",
+        "value": "By sending request bodies in a slow loris way to plain resources, the h2 stream for that request unnecessarily occupied a server thread cleaning up that incoming data. This affects only HTTP/2 connections. A possible mitigation is to not enable the h2 protocol."
+      }
+    ]
+  },
+  "impact": [
+    {
+      "other": "low"
+    }
+  ],
+  "affects": {
+    "vendor": {
+      "vendor_data": [
+        {
+          "vendor_name": "Apache Software Foundation",
+          "product": {
+            "product_data": [
+              {
+                "product_name": "Apache HTTP Server",
+                "version": {
+                  "version_data": [
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.37"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.35"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.34"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.33"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.30"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.29"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.28"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.27"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.26"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.25"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.23"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.20"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.18"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.17"
+                    }
+                  ]
+                }
+              }
+            ]
+          }
+        }
+      ]
+    }
+  }
+}
\ No newline at end of file

Added: httpd/site/trunk/content/security/json/CVE-2018-17199.json
URL: http://svn.apache.org/viewvc/httpd/site/trunk/content/security/json/CVE-2018-17199.json?rev=1888194&view=auto
==============================================================================
--- httpd/site/trunk/content/security/json/CVE-2018-17199.json (added)
+++ httpd/site/trunk/content/security/json/CVE-2018-17199.json Tue Mar 30 10:13:32 2021
@@ -0,0 +1,218 @@
+{
+  "data_type": "CVE",
+  "data_format": "MITRE",
+  "data_version": "4.0",
+  "generator": {
+    "engine": "xmltojsonmjc 1.0"
+  },
+  "references": {},
+  "timeline": [
+    {
+      "time": "2018-10-08",
+      "lang": "eng",
+      "value": "reported"
+    },
+    {
+      "time": "2019-01-22",
+      "lang": "eng",
+      "value": "public"
+    },
+    {
+      "time": "2019-02-28",
+      "lang": "eng",
+      "value": "2.4.38 released"
+    }
+  ],
+  "CNA_private": {
+    "owner": "httpd"
+  },
+  "CVE_data_meta": {
+    "ASSIGNER": "security@apache.org",
+    "AKA": "",
+    "STATE": "PUBLIC",
+    "DATE_PUBLIC": "2019-01-22",
+    "ID": "CVE-2018-17199",
+    "TITLE": "mod_session_cookie does not respect expiry time"
+  },
+  "source": {
+    "defect": [],
+    "advisory": "",
+    "discovery": "UNKNOWN"
+  },
+  "problemtype": {
+    "problemtype_data": [
+      {
+        "description": [
+          {
+            "lang": "eng",
+            "value": "mod_session_cookie does not respect expiry time"
+          }
+        ]
+      }
+    ]
+  },
+  "credit": [
+    {
+      "lang": "eng",
+      "value": "The issue was discovered by Diego Angulo from ImExHS."
+    }
+  ],
+  "description": {
+    "description_data": [
+      {
+        "lang": "eng",
+        "value": "In Apache HTTP Server 2.4 release 2.4.37 and prior, mod_session checks the session expiry time before decoding the session. This causes session expiry time to be ignored for mod_session_cookie sessions since the expiry time is loaded when the session is decoded."
+      }
+    ]
+  },
+  "impact": [
+    {
+      "other": "low"
+    }
+  ],
+  "affects": {
+    "vendor": {
+      "vendor_data": [
+        {
+          "vendor_name": "Apache Software Foundation",
+          "product": {
+            "product_data": [
+              {
+                "product_name": "Apache HTTP Server",
+                "version": {
+                  "version_data": [
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.37"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.35"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.34"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.33"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.30"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.29"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.28"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.27"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.26"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.25"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.23"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.20"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.18"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.17"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.16"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.12"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.10"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.9"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.7"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.6"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.4"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.3"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.2"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.1"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.0"
+                    }
+                  ]
+                }
+              }
+            ]
+          }
+        }
+      ]
+    }
+  }
+}
\ No newline at end of file

Added: httpd/site/trunk/content/security/json/CVE-2018-8011.json
URL: http://svn.apache.org/viewvc/httpd/site/trunk/content/security/json/CVE-2018-8011.json?rev=1888194&view=auto
==============================================================================
--- httpd/site/trunk/content/security/json/CVE-2018-8011.json (added)
+++ httpd/site/trunk/content/security/json/CVE-2018-8011.json Tue Mar 30 10:13:32 2021
@@ -0,0 +1,98 @@
+{
+  "data_type": "CVE",
+  "data_format": "MITRE",
+  "data_version": "4.0",
+  "generator": {
+    "engine": "xmltojsonmjc 1.0"
+  },
+  "references": {},
+  "timeline": [
+    {
+      "time": "2018-06-29",
+      "lang": "eng",
+      "value": "reported"
+    },
+    {
+      "time": "2018-07-18",
+      "lang": "eng",
+      "value": "public"
+    },
+    {
+      "time": "2018-07-15",
+      "lang": "eng",
+      "value": "2.4.34 released"
+    }
+  ],
+  "CNA_private": {
+    "owner": "httpd"
+  },
+  "CVE_data_meta": {
+    "ASSIGNER": "security@apache.org",
+    "AKA": "",
+    "STATE": "PUBLIC",
+    "DATE_PUBLIC": "2018-07-18",
+    "ID": "CVE-2018-8011",
+    "TITLE": "mod_md, DoS via Coredumps on specially crafted requests"
+  },
+  "source": {
+    "defect": [],
+    "advisory": "",
+    "discovery": "UNKNOWN"
+  },
+  "problemtype": {
+    "problemtype_data": [
+      {
+        "description": [
+          {
+            "lang": "eng",
+            "value": "mod_md, DoS via Coredumps on specially crafted requests"
+          }
+        ]
+      }
+    ]
+  },
+  "credit": [
+    {
+      "lang": "eng",
+      "value": "The issue was discovered by Daniel Caminada <da...@ergon.ch>."
+    }
+  ],
+  "description": {
+    "description_data": [
+      {
+        "lang": "eng",
+        "value": "By specially crafting HTTP requests, the mod_md challenge handler would dereference a NULL pointer and cause the child process to segfault. This could be used to DoS the server."
+      }
+    ]
+  },
+  "impact": [
+    {
+      "other": "moderate"
+    }
+  ],
+  "affects": {
+    "vendor": {
+      "vendor_data": [
+        {
+          "vendor_name": "Apache Software Foundation",
+          "product": {
+            "product_data": [
+              {
+                "product_name": "Apache HTTP Server",
+                "version": {
+                  "version_data": [
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.33"
+                    }
+                  ]
+                }
+              }
+            ]
+          }
+        }
+      ]
+    }
+  }
+}
\ No newline at end of file

Added: httpd/site/trunk/content/security/json/CVE-2019-0190.json
URL: http://svn.apache.org/viewvc/httpd/site/trunk/content/security/json/CVE-2019-0190.json?rev=1888194&view=auto
==============================================================================
--- httpd/site/trunk/content/security/json/CVE-2019-0190.json (added)
+++ httpd/site/trunk/content/security/json/CVE-2019-0190.json Tue Mar 30 10:13:32 2021
@@ -0,0 +1,98 @@
+{
+  "data_type": "CVE",
+  "data_format": "MITRE",
+  "data_version": "4.0",
+  "generator": {
+    "engine": "xmltojsonmjc 1.0"
+  },
+  "references": {},
+  "timeline": [
+    {
+      "time": "2019-01-01",
+      "lang": "eng",
+      "value": "reported"
+    },
+    {
+      "time": "2019-01-22",
+      "lang": "eng",
+      "value": "public"
+    },
+    {
+      "time": "2019-02-28",
+      "lang": "eng",
+      "value": "2.4.38 released"
+    }
+  ],
+  "CNA_private": {
+    "owner": "httpd"
+  },
+  "CVE_data_meta": {
+    "ASSIGNER": "security@apache.org",
+    "AKA": "",
+    "STATE": "PUBLIC",
+    "DATE_PUBLIC": "2019-01-22",
+    "ID": "CVE-2019-0190",
+    "TITLE": "mod_ssl 2.4.37 remote DoS when used with OpenSSL 1.1.1"
+  },
+  "source": {
+    "defect": [],
+    "advisory": "",
+    "discovery": "UNKNOWN"
+  },
+  "problemtype": {
+    "problemtype_data": [
+      {
+        "description": [
+          {
+            "lang": "eng",
+            "value": "mod_ssl 2.4.37 remote DoS when used with OpenSSL 1.1.1"
+          }
+        ]
+      }
+    ]
+  },
+  "credit": [
+    {
+      "lang": "eng",
+      "value": "The issue was discovered through user bug reports."
+    }
+  ],
+  "description": {
+    "description_data": [
+      {
+        "lang": "eng",
+        "value": "A bug exists in the way mod_ssl handled client renegotiations. A remote attacker could send a carefully crafted request that would cause mod_ssl to enter a loop leading to a denial of service. This bug can be only triggered with Apache HTTP Server version 2.4.37 when using OpenSSL version 1.1.1 or later, due to an interaction in changes to handling of renegotiation attempts."
+      }
+    ]
+  },
+  "impact": [
+    {
+      "other": "important"
+    }
+  ],
+  "affects": {
+    "vendor": {
+      "vendor_data": [
+        {
+          "vendor_name": "Apache Software Foundation",
+          "product": {
+            "product_data": [
+              {
+                "product_name": "Apache HTTP Server",
+                "version": {
+                  "version_data": [
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.37"
+                    }
+                  ]
+                }
+              }
+            ]
+          }
+        }
+      ]
+    }
+  }
+}
\ No newline at end of file

Added: httpd/site/trunk/content/security/json/CVE-2019-0196.json
URL: http://svn.apache.org/viewvc/httpd/site/trunk/content/security/json/CVE-2019-0196.json?rev=1888194&view=auto
==============================================================================
--- httpd/site/trunk/content/security/json/CVE-2019-0196.json (added)
+++ httpd/site/trunk/content/security/json/CVE-2019-0196.json Tue Mar 30 10:13:32 2021
@@ -0,0 +1,168 @@
+{
+  "data_type": "CVE",
+  "data_format": "MITRE",
+  "data_version": "4.0",
+  "generator": {
+    "engine": "xmltojsonmjc 1.0"
+  },
+  "references": {},
+  "timeline": [
+    {
+      "time": "2019-01-29",
+      "lang": "eng",
+      "value": "reported"
+    },
+    {
+      "time": "2019-04-01",
+      "lang": "eng",
+      "value": "public"
+    },
+    {
+      "time": "2019-04-01",
+      "lang": "eng",
+      "value": "2.4.39 released"
+    }
+  ],
+  "CNA_private": {
+    "owner": "httpd"
+  },
+  "CVE_data_meta": {
+    "ASSIGNER": "security@apache.org",
+    "AKA": "",
+    "STATE": "PUBLIC",
+    "DATE_PUBLIC": "2019-04-01",
+    "ID": "CVE-2019-0196",
+    "TITLE": "mod_http2, read-after-free on a string compare"
+  },
+  "source": {
+    "defect": [],
+    "advisory": "",
+    "discovery": "UNKNOWN"
+  },
+  "problemtype": {
+    "problemtype_data": [
+      {
+        "description": [
+          {
+            "lang": "eng",
+            "value": "mod_http2, read-after-free on a string compare"
+          }
+        ]
+      }
+    ]
+  },
+  "credit": [
+    {
+      "lang": "eng",
+      "value": "The issue was discovered by Craig Young, <vu...@secur3.us>."
+    }
+  ],
+  "description": {
+    "description_data": [
+      {
+        "lang": "eng",
+        "value": "Using fuzzed network input, the http/2 request handling could be made to access freed memory in string comparision when determining the method of a request and thus process the request incorrectly."
+      }
+    ]
+  },
+  "impact": [
+    {
+      "other": "low"
+    }
+  ],
+  "affects": {
+    "vendor": {
+      "vendor_data": [
+        {
+          "vendor_name": "Apache Software Foundation",
+          "product": {
+            "product_data": [
+              {
+                "product_name": "Apache HTTP Server",
+                "version": {
+                  "version_data": [
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.38"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.37"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.35"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.34"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.33"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.30"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.29"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.28"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.27"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.26"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.25"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.23"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.20"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.18"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.17"
+                    }
+                  ]
+                }
+              }
+            ]
+          }
+        }
+      ]
+    }
+  }
+}
\ No newline at end of file

Added: httpd/site/trunk/content/security/json/CVE-2019-0197.json
URL: http://svn.apache.org/viewvc/httpd/site/trunk/content/security/json/CVE-2019-0197.json?rev=1888194&view=auto
==============================================================================
--- httpd/site/trunk/content/security/json/CVE-2019-0197.json (added)
+++ httpd/site/trunk/content/security/json/CVE-2019-0197.json Tue Mar 30 10:13:32 2021
@@ -0,0 +1,113 @@
+{
+  "data_type": "CVE",
+  "data_format": "MITRE",
+  "data_version": "4.0",
+  "generator": {
+    "engine": "xmltojsonmjc 1.0"
+  },
+  "references": {},
+  "timeline": [
+    {
+      "time": "2019-01-29",
+      "lang": "eng",
+      "value": "reported"
+    },
+    {
+      "time": "2019-04-01",
+      "lang": "eng",
+      "value": "public"
+    },
+    {
+      "time": "2019-04-01",
+      "lang": "eng",
+      "value": "2.4.39 released"
+    }
+  ],
+  "CNA_private": {
+    "owner": "httpd"
+  },
+  "CVE_data_meta": {
+    "ASSIGNER": "security@apache.org",
+    "AKA": "",
+    "STATE": "PUBLIC",
+    "DATE_PUBLIC": "2019-04-01",
+    "ID": "CVE-2019-0197",
+    "TITLE": "mod_http2, possible crash on late upgrade"
+  },
+  "source": {
+    "defect": [],
+    "advisory": "",
+    "discovery": "UNKNOWN"
+  },
+  "problemtype": {
+    "problemtype_data": [
+      {
+        "description": [
+          {
+            "lang": "eng",
+            "value": "mod_http2, possible crash on late upgrade"
+          }
+        ]
+      }
+    ]
+  },
+  "credit": [
+    {
+      "lang": "eng",
+      "value": "The issue was discovered by Stefan Eissing, greenbytes.de."
+    }
+  ],
+  "description": {
+    "description_data": [
+      {
+        "lang": "eng",
+        "value": "When HTTP/2 was enabled for a http: host or H2Upgrade was enabled for h2 on a https: host, an Upgrade request from http/1.1 to http/2 that was not the first request on a connection could lead to a misconfiguration and crash. A server that never enabled the h2 protocol or that only enabled it for https: and did not configure the \"H2Upgrade on\" is unaffected by this."
+      }
+    ]
+  },
+  "impact": [
+    {
+      "other": "low"
+    }
+  ],
+  "affects": {
+    "vendor": {
+      "vendor_data": [
+        {
+          "vendor_name": "Apache Software Foundation",
+          "product": {
+            "product_data": [
+              {
+                "product_name": "Apache HTTP Server",
+                "version": {
+                  "version_data": [
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.38"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.37"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.35"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.34"
+                    }
+                  ]
+                }
+              }
+            ]
+          }
+        }
+      ]
+    }
+  }
+}
\ No newline at end of file

Added: httpd/site/trunk/content/security/json/CVE-2019-0211.json
URL: http://svn.apache.org/viewvc/httpd/site/trunk/content/security/json/CVE-2019-0211.json?rev=1888194&view=auto
==============================================================================
--- httpd/site/trunk/content/security/json/CVE-2019-0211.json (added)
+++ httpd/site/trunk/content/security/json/CVE-2019-0211.json Tue Mar 30 10:13:32 2021
@@ -0,0 +1,168 @@
+{
+  "data_type": "CVE",
+  "data_format": "MITRE",
+  "data_version": "4.0",
+  "generator": {
+    "engine": "xmltojsonmjc 1.0"
+  },
+  "references": {},
+  "timeline": [
+    {
+      "time": "2019-02-22",
+      "lang": "eng",
+      "value": "reported"
+    },
+    {
+      "time": "2019-04-01",
+      "lang": "eng",
+      "value": "public"
+    },
+    {
+      "time": "2019-04-01",
+      "lang": "eng",
+      "value": "2.4.39 released"
+    }
+  ],
+  "CNA_private": {
+    "owner": "httpd"
+  },
+  "CVE_data_meta": {
+    "ASSIGNER": "security@apache.org",
+    "AKA": "",
+    "STATE": "PUBLIC",
+    "DATE_PUBLIC": "2019-04-01",
+    "ID": "CVE-2019-0211",
+    "TITLE": "Apache HTTP Server privilege escalation from modules' scripts"
+  },
+  "source": {
+    "defect": [],
+    "advisory": "",
+    "discovery": "UNKNOWN"
+  },
+  "problemtype": {
+    "problemtype_data": [
+      {
+        "description": [
+          {
+            "lang": "eng",
+            "value": "Apache HTTP Server privilege escalation from modules' scripts"
+          }
+        ]
+      }
+    ]
+  },
+  "credit": [
+    {
+      "lang": "eng",
+      "value": "The issue was discovered by Charles Fol."
+    }
+  ],
+  "description": {
+    "description_data": [
+      {
+        "lang": "eng",
+        "value": "In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event, worker or prefork, code executing in less-privileged child processes or threads (including scripts executed by an in-process scripting interpreter) could execute arbitrary code with the privileges of the parent process (usually root) by manipulating the scoreboard. Non-Unix systems are not affected."
+      }
+    ]
+  },
+  "impact": [
+    {
+      "other": "important"
+    }
+  ],
+  "affects": {
+    "vendor": {
+      "vendor_data": [
+        {
+          "vendor_name": "Apache Software Foundation",
+          "product": {
+            "product_data": [
+              {
+                "product_name": "Apache HTTP Server",
+                "version": {
+                  "version_data": [
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.38"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.37"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.35"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.34"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.33"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.30"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.29"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.28"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.27"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.26"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.25"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.23"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.20"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.18"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.17"
+                    }
+                  ]
+                }
+              }
+            ]
+          }
+        }
+      ]
+    }
+  }
+}
\ No newline at end of file

Added: httpd/site/trunk/content/security/json/CVE-2019-0215.json
URL: http://svn.apache.org/viewvc/httpd/site/trunk/content/security/json/CVE-2019-0215.json?rev=1888194&view=auto
==============================================================================
--- httpd/site/trunk/content/security/json/CVE-2019-0215.json (added)
+++ httpd/site/trunk/content/security/json/CVE-2019-0215.json Tue Mar 30 10:13:32 2021
@@ -0,0 +1,103 @@
+{
+  "data_type": "CVE",
+  "data_format": "MITRE",
+  "data_version": "4.0",
+  "generator": {
+    "engine": "xmltojsonmjc 1.0"
+  },
+  "references": {},
+  "timeline": [
+    {
+      "time": "2019-01-23",
+      "lang": "eng",
+      "value": "reported"
+    },
+    {
+      "time": "2019-04-01",
+      "lang": "eng",
+      "value": "public"
+    },
+    {
+      "time": "2019-04-01",
+      "lang": "eng",
+      "value": "2.4.39 released"
+    }
+  ],
+  "CNA_private": {
+    "owner": "httpd"
+  },
+  "CVE_data_meta": {
+    "ASSIGNER": "security@apache.org",
+    "AKA": "",
+    "STATE": "PUBLIC",
+    "DATE_PUBLIC": "2019-04-01",
+    "ID": "CVE-2019-0215",
+    "TITLE": "mod_ssl access control bypass"
+  },
+  "source": {
+    "defect": [],
+    "advisory": "",
+    "discovery": "UNKNOWN"
+  },
+  "problemtype": {
+    "problemtype_data": [
+      {
+        "description": [
+          {
+            "lang": "eng",
+            "value": "mod_ssl access control bypass"
+          }
+        ]
+      }
+    ]
+  },
+  "credit": [
+    {
+      "lang": "eng",
+      "value": "The issue was discovered by Michael Kaufmann."
+    }
+  ],
+  "description": {
+    "description_data": [
+      {
+        "lang": "eng",
+        "value": "In Apache HTTP Server 2.4 releases 2.4.37 and 2.4.38, a bug in mod_ssl when using per-location client certificate verification with TLSv1.3 allowed a client supporting Post-Handshake Authentication to bypass configured access control restrictions."
+      }
+    ]
+  },
+  "impact": [
+    {
+      "other": "important"
+    }
+  ],
+  "affects": {
+    "vendor": {
+      "vendor_data": [
+        {
+          "vendor_name": "Apache Software Foundation",
+          "product": {
+            "product_data": [
+              {
+                "product_name": "Apache HTTP Server",
+                "version": {
+                  "version_data": [
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.38"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.37"
+                    }
+                  ]
+                }
+              }
+            ]
+          }
+        }
+      ]
+    }
+  }
+}
\ No newline at end of file

Added: httpd/site/trunk/content/security/json/CVE-2019-0217.json
URL: http://svn.apache.org/viewvc/httpd/site/trunk/content/security/json/CVE-2019-0217.json?rev=1888194&view=auto
==============================================================================
--- httpd/site/trunk/content/security/json/CVE-2019-0217.json (added)
+++ httpd/site/trunk/content/security/json/CVE-2019-0217.json Tue Mar 30 10:13:32 2021
@@ -0,0 +1,223 @@
+{
+  "data_type": "CVE",
+  "data_format": "MITRE",
+  "data_version": "4.0",
+  "generator": {
+    "engine": "xmltojsonmjc 1.0"
+  },
+  "references": {},
+  "timeline": [
+    {
+      "time": "2019-01-29",
+      "lang": "eng",
+      "value": "reported"
+    },
+    {
+      "time": "2019-04-01",
+      "lang": "eng",
+      "value": "public"
+    },
+    {
+      "time": "2019-04-01",
+      "lang": "eng",
+      "value": "2.4.39 released"
+    }
+  ],
+  "CNA_private": {
+    "owner": "httpd"
+  },
+  "CVE_data_meta": {
+    "ASSIGNER": "security@apache.org",
+    "AKA": "",
+    "STATE": "PUBLIC",
+    "DATE_PUBLIC": "2019-04-01",
+    "ID": "CVE-2019-0217",
+    "TITLE": "mod_auth_digest access control bypass"
+  },
+  "source": {
+    "defect": [],
+    "advisory": "",
+    "discovery": "UNKNOWN"
+  },
+  "problemtype": {
+    "problemtype_data": [
+      {
+        "description": [
+          {
+            "lang": "eng",
+            "value": "mod_auth_digest access control bypass"
+          }
+        ]
+      }
+    ]
+  },
+  "credit": [
+    {
+      "lang": "eng",
+      "value": "The issue was discovered by Simon Kappel."
+    }
+  ],
+  "description": {
+    "description_data": [
+      {
+        "lang": "eng",
+        "value": "In Apache HTTP Server 2.4 release 2.4.38 and prior, a race condition in mod_auth_digest when running in a threaded server could allow a user with valid credentials to authenticate using another username, bypassing configured access control restrictions."
+      }
+    ]
+  },
+  "impact": [
+    {
+      "other": "important"
+    }
+  ],
+  "affects": {
+    "vendor": {
+      "vendor_data": [
+        {
+          "vendor_name": "Apache Software Foundation",
+          "product": {
+            "product_data": [
+              {
+                "product_name": "Apache HTTP Server",
+                "version": {
+                  "version_data": [
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.38"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.37"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.35"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.34"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.33"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.30"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.29"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.28"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.27"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.26"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.25"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.23"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.20"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.18"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.17"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.16"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.12"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.10"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.9"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.7"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.6"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.4"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.3"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.2"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.1"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.0"
+                    }
+                  ]
+                }
+              }
+            ]
+          }
+        }
+      ]
+    }
+  }
+}
\ No newline at end of file

Added: httpd/site/trunk/content/security/json/CVE-2019-0220.json
URL: http://svn.apache.org/viewvc/httpd/site/trunk/content/security/json/CVE-2019-0220.json?rev=1888194&view=auto
==============================================================================
--- httpd/site/trunk/content/security/json/CVE-2019-0220.json (added)
+++ httpd/site/trunk/content/security/json/CVE-2019-0220.json Tue Mar 30 10:13:32 2021
@@ -0,0 +1,223 @@
+{
+  "data_type": "CVE",
+  "data_format": "MITRE",
+  "data_version": "4.0",
+  "generator": {
+    "engine": "xmltojsonmjc 1.0"
+  },
+  "references": {},
+  "timeline": [
+    {
+      "time": "2019-01-20",
+      "lang": "eng",
+      "value": "reported"
+    },
+    {
+      "time": "2019-04-01",
+      "lang": "eng",
+      "value": "public"
+    },
+    {
+      "time": "2019-04-01",
+      "lang": "eng",
+      "value": "2.4.39 released"
+    }
+  ],
+  "CNA_private": {
+    "owner": "httpd"
+  },
+  "CVE_data_meta": {
+    "ASSIGNER": "security@apache.org",
+    "AKA": "",
+    "STATE": "PUBLIC",
+    "DATE_PUBLIC": "2019-04-01",
+    "ID": "CVE-2019-0220",
+    "TITLE": "Apache httpd URL normalization inconsistincy"
+  },
+  "source": {
+    "defect": [],
+    "advisory": "",
+    "discovery": "UNKNOWN"
+  },
+  "problemtype": {
+    "problemtype_data": [
+      {
+        "description": [
+          {
+            "lang": "eng",
+            "value": "Apache httpd URL normalization inconsistincy"
+          }
+        ]
+      }
+    ]
+  },
+  "credit": [
+    {
+      "lang": "eng",
+      "value": "The issue was discovered by Bernhard Lorenz <be...@alphastrike.io> of Alpha Strike Labs GmbH."
+    }
+  ],
+  "description": {
+    "description_data": [
+      {
+        "lang": "eng",
+        "value": "When the path component of a request URL contains multiple consecutive slashes ('/'), directives such as LocationMatch and RewriteRule must account for duplicates in regular expressions while other aspects of the servers processing will implicitly collapse them."
+      }
+    ]
+  },
+  "impact": [
+    {
+      "other": "low"
+    }
+  ],
+  "affects": {
+    "vendor": {
+      "vendor_data": [
+        {
+          "vendor_name": "Apache Software Foundation",
+          "product": {
+            "product_data": [
+              {
+                "product_name": "Apache HTTP Server",
+                "version": {
+                  "version_data": [
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.38"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.37"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.35"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.34"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.33"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.30"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.29"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.28"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.27"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.26"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.25"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.23"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.20"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.18"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.17"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.16"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.12"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.10"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.9"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.7"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.6"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.4"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.3"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.2"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.1"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.0"
+                    }
+                  ]
+                }
+              }
+            ]
+          }
+        }
+      ]
+    }
+  }
+}
\ No newline at end of file

Added: httpd/site/trunk/content/security/json/CVE-2019-10081.json
URL: http://svn.apache.org/viewvc/httpd/site/trunk/content/security/json/CVE-2019-10081.json?rev=1888194&view=auto
==============================================================================
--- httpd/site/trunk/content/security/json/CVE-2019-10081.json (added)
+++ httpd/site/trunk/content/security/json/CVE-2019-10081.json Tue Mar 30 10:13:32 2021
@@ -0,0 +1,163 @@
+{
+  "data_type": "CVE",
+  "data_format": "MITRE",
+  "data_version": "4.0",
+  "generator": {
+    "engine": "xmltojsonmjc 1.0"
+  },
+  "references": {},
+  "timeline": [
+    {
+      "time": "2019-04-10",
+      "lang": "eng",
+      "value": "reported"
+    },
+    {
+      "time": "2019-08-14",
+      "lang": "eng",
+      "value": "public"
+    },
+    {
+      "time": "2019-08-14",
+      "lang": "eng",
+      "value": "2.4.41 released"
+    }
+  ],
+  "CNA_private": {
+    "owner": "httpd"
+  },
+  "CVE_data_meta": {
+    "ASSIGNER": "security@apache.org",
+    "AKA": "",
+    "STATE": "PUBLIC",
+    "DATE_PUBLIC": "2019-08-14",
+    "ID": "CVE-2019-10081",
+    "TITLE": "mod_http2, memory corruption on early pushes"
+  },
+  "source": {
+    "defect": [],
+    "advisory": "",
+    "discovery": "UNKNOWN"
+  },
+  "problemtype": {
+    "problemtype_data": [
+      {
+        "description": [
+          {
+            "lang": "eng",
+            "value": "mod_http2, memory corruption on early pushes"
+          }
+        ]
+      }
+    ]
+  },
+  "credit": [
+    {
+      "lang": "eng",
+      "value": "The issue was discovered by Craig Young of Tripwire VERT, <vu...@secur3.us>."
+    }
+  ],
+  "description": {
+    "description_data": [
+      {
+        "lang": "eng",
+        "value": "HTTP/2 very early pushes, for example configured with \"H2PushResource\", could lead to an overwrite of memory in the pushing request's pool, leading to crashes. The memory copied is that of the configured push link header values, not data supplied by the client."
+      }
+    ]
+  },
+  "impact": [
+    {
+      "other": "moderate"
+    }
+  ],
+  "affects": {
+    "vendor": {
+      "vendor_data": [
+        {
+          "vendor_name": "Apache Software Foundation",
+          "product": {
+            "product_data": [
+              {
+                "product_name": "Apache HTTP Server",
+                "version": {
+                  "version_data": [
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.39"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.38"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.37"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.35"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.34"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.33"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.32"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.29"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.28"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.27"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.26"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.25"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.23"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.20"
+                    }
+                  ]
+                }
+              }
+            ]
+          }
+        }
+      ]
+    }
+  }
+}
\ No newline at end of file

Added: httpd/site/trunk/content/security/json/CVE-2019-10082.json
URL: http://svn.apache.org/viewvc/httpd/site/trunk/content/security/json/CVE-2019-10082.json?rev=1888194&view=auto
==============================================================================
--- httpd/site/trunk/content/security/json/CVE-2019-10082.json (added)
+++ httpd/site/trunk/content/security/json/CVE-2019-10082.json Tue Mar 30 10:13:32 2021
@@ -0,0 +1,168 @@
+{
+  "data_type": "CVE",
+  "data_format": "MITRE",
+  "data_version": "4.0",
+  "generator": {
+    "engine": "xmltojsonmjc 1.0"
+  },
+  "references": {},
+  "timeline": [
+    {
+      "time": "2019-04-12",
+      "lang": "eng",
+      "value": "reported"
+    },
+    {
+      "time": "2019-08-14",
+      "lang": "eng",
+      "value": "public"
+    },
+    {
+      "time": "2019-08-14",
+      "lang": "eng",
+      "value": "2.4.41 released"
+    }
+  ],
+  "CNA_private": {
+    "owner": "httpd"
+  },
+  "CVE_data_meta": {
+    "ASSIGNER": "security@apache.org",
+    "AKA": "",
+    "STATE": "PUBLIC",
+    "DATE_PUBLIC": "2019-08-14",
+    "ID": "CVE-2019-10082",
+    "TITLE": "mod_http2, read-after-free in h2 connection shutdown"
+  },
+  "source": {
+    "defect": [],
+    "advisory": "",
+    "discovery": "UNKNOWN"
+  },
+  "problemtype": {
+    "problemtype_data": [
+      {
+        "description": [
+          {
+            "lang": "eng",
+            "value": "mod_http2, read-after-free in h2 connection shutdown"
+          }
+        ]
+      }
+    ]
+  },
+  "credit": [
+    {
+      "lang": "eng",
+      "value": "The issue was discovered by Craig Young of Tripwire VERT, <vu...@secur3.us>."
+    }
+  ],
+  "description": {
+    "description_data": [
+      {
+        "lang": "eng",
+        "value": "Using fuzzed network input, the http/2 session handling could be made to read memory after being freed, during connection shutdown."
+      }
+    ]
+  },
+  "impact": [
+    {
+      "other": "moderate"
+    }
+  ],
+  "affects": {
+    "vendor": {
+      "vendor_data": [
+        {
+          "vendor_name": "Apache Software Foundation",
+          "product": {
+            "product_data": [
+              {
+                "product_name": "Apache HTTP Server",
+                "version": {
+                  "version_data": [
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.39"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.38"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.37"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.35"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.34"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.33"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.32"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.29"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.28"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.27"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.26"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.25"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.23"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.20"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.18"
+                    }
+                  ]
+                }
+              }
+            ]
+          }
+        }
+      ]
+    }
+  }
+}
\ No newline at end of file

Added: httpd/site/trunk/content/security/json/CVE-2019-10092.json
URL: http://svn.apache.org/viewvc/httpd/site/trunk/content/security/json/CVE-2019-10092.json?rev=1888194&view=auto
==============================================================================
--- httpd/site/trunk/content/security/json/CVE-2019-10092.json (added)
+++ httpd/site/trunk/content/security/json/CVE-2019-10092.json Tue Mar 30 10:13:32 2021
@@ -0,0 +1,228 @@
+{
+  "data_type": "CVE",
+  "data_format": "MITRE",
+  "data_version": "4.0",
+  "generator": {
+    "engine": "xmltojsonmjc 1.0"
+  },
+  "references": {},
+  "timeline": [
+    {
+      "time": "2019-07-09",
+      "lang": "eng",
+      "value": "reported"
+    },
+    {
+      "time": "2019-08-14",
+      "lang": "eng",
+      "value": "public"
+    },
+    {
+      "time": "2019-08-14",
+      "lang": "eng",
+      "value": "2.4.41 released"
+    }
+  ],
+  "CNA_private": {
+    "owner": "httpd"
+  },
+  "CVE_data_meta": {
+    "ASSIGNER": "security@apache.org",
+    "AKA": "",
+    "STATE": "PUBLIC",
+    "DATE_PUBLIC": "2019-08-14",
+    "ID": "CVE-2019-10092",
+    "TITLE": "Limited cross-site scripting in mod_proxy error page"
+  },
+  "source": {
+    "defect": [],
+    "advisory": "",
+    "discovery": "UNKNOWN"
+  },
+  "problemtype": {
+    "problemtype_data": [
+      {
+        "description": [
+          {
+            "lang": "eng",
+            "value": "Limited cross-site scripting in mod_proxy error page"
+          }
+        ]
+      }
+    ]
+  },
+  "credit": [
+    {
+      "lang": "eng",
+      "value": "This issue was reported by Matei \"Mal\" Badanoiu"
+    }
+  ],
+  "description": {
+    "description_data": [
+      {
+        "lang": "eng",
+        "value": "A limited cross-site scripting issue was reported affecting the mod_proxy error page. An attacker could cause the link on the error page to be malfomed and instead point to a page of their choice. This would only be exploitable where a server was set up with proxying enabled but was misconfigured in such a way that the Proxy Error page was displayed. We have taken this opportunity to also remove request data from many other in-built error messages. Note however this issue did not affect them directly and their output was already escaped to prevent cross-site scripting attacks."
+      }
+    ]
+  },
+  "impact": [
+    {
+      "other": "low"
+    }
+  ],
+  "affects": {
+    "vendor": {
+      "vendor_data": [
+        {
+          "vendor_name": "Apache Software Foundation",
+          "product": {
+            "product_data": [
+              {
+                "product_name": "Apache HTTP Server",
+                "version": {
+                  "version_data": [
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.39"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.38"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.37"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.35"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.34"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.33"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.30"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.29"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.28"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.27"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.26"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.25"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.23"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.20"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.18"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.17"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.16"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.12"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.10"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.9"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.7"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.6"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.4"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.3"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.2"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.1"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.0"
+                    }
+                  ]
+                }
+              }
+            ]
+          }
+        }
+      ]
+    }
+  }
+}
\ No newline at end of file

Added: httpd/site/trunk/content/security/json/CVE-2019-10097.json
URL: http://svn.apache.org/viewvc/httpd/site/trunk/content/security/json/CVE-2019-10097.json?rev=1888194&view=auto
==============================================================================
--- httpd/site/trunk/content/security/json/CVE-2019-10097.json (added)
+++ httpd/site/trunk/content/security/json/CVE-2019-10097.json Tue Mar 30 10:13:32 2021
@@ -0,0 +1,118 @@
+{
+  "data_type": "CVE",
+  "data_format": "MITRE",
+  "data_version": "4.0",
+  "generator": {
+    "engine": "xmltojsonmjc 1.0"
+  },
+  "references": {},
+  "timeline": [
+    {
+      "time": "2019-07-23",
+      "lang": "eng",
+      "value": "reported"
+    },
+    {
+      "time": "2019-08-14",
+      "lang": "eng",
+      "value": "public"
+    },
+    {
+      "time": "2019-08-14",
+      "lang": "eng",
+      "value": "2.4.41 released"
+    }
+  ],
+  "CNA_private": {
+    "owner": "httpd"
+  },
+  "CVE_data_meta": {
+    "ASSIGNER": "security@apache.org",
+    "AKA": "",
+    "STATE": "PUBLIC",
+    "DATE_PUBLIC": "2019-08-14",
+    "ID": "CVE-2019-10097",
+    "TITLE": "CVE-2019-10097 mod_remoteip: Stack buffer overflow and NULL pointer dereference"
+  },
+  "source": {
+    "defect": [],
+    "advisory": "",
+    "discovery": "UNKNOWN"
+  },
+  "problemtype": {
+    "problemtype_data": [
+      {
+        "description": [
+          {
+            "lang": "eng",
+            "value": "CVE-2019-10097 mod_remoteip: Stack buffer overflow and NULL pointer dereference"
+          }
+        ]
+      }
+    ]
+  },
+  "credit": [
+    {
+      "lang": "eng",
+      "value": "The issue was discovered by Daniel McCarney <cp...@letsencrypt.org> Let's Encrypt / Internet Security Research Group (ISRG)"
+    }
+  ],
+  "description": {
+    "description_data": [
+      {
+        "lang": "eng",
+        "value": "When mod_remoteip was configured to use a trusted intermediary proxy server using the \"PROXY\" protocol, a specially crafted PROXY header could trigger a stack buffer overflow or NULL pointer deference. This vulnerability could only be triggered by a trusted proxy and not by untrusted HTTP clients."
+      }
+    ]
+  },
+  "impact": [
+    {
+      "other": "moderate"
+    }
+  ],
+  "affects": {
+    "vendor": {
+      "vendor_data": [
+        {
+          "vendor_name": "Apache Software Foundation",
+          "product": {
+            "product_data": [
+              {
+                "product_name": "Apache HTTP Server",
+                "version": {
+                  "version_data": [
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.38"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.37"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.35"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.34"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.33"
+                    }
+                  ]
+                }
+              }
+            ]
+          }
+        }
+      ]
+    }
+  }
+}
\ No newline at end of file

Added: httpd/site/trunk/content/security/json/CVE-2019-10098.json
URL: http://svn.apache.org/viewvc/httpd/site/trunk/content/security/json/CVE-2019-10098.json?rev=1888194&view=auto
==============================================================================
--- httpd/site/trunk/content/security/json/CVE-2019-10098.json (added)
+++ httpd/site/trunk/content/security/json/CVE-2019-10098.json Tue Mar 30 10:13:32 2021
@@ -0,0 +1,228 @@
+{
+  "data_type": "CVE",
+  "data_format": "MITRE",
+  "data_version": "4.0",
+  "generator": {
+    "engine": "xmltojsonmjc 1.0"
+  },
+  "references": {},
+  "timeline": [
+    {
+      "time": "2019-03-26",
+      "lang": "eng",
+      "value": "reported"
+    },
+    {
+      "time": "2019-08-14",
+      "lang": "eng",
+      "value": "public"
+    },
+    {
+      "time": "2019-08-14",
+      "lang": "eng",
+      "value": "2.4.41 released"
+    }
+  ],
+  "CNA_private": {
+    "owner": "httpd"
+  },
+  "CVE_data_meta": {
+    "ASSIGNER": "security@apache.org",
+    "AKA": "",
+    "STATE": "PUBLIC",
+    "DATE_PUBLIC": "2019-08-14",
+    "ID": "CVE-2019-10098",
+    "TITLE": "mod_rewrite potential open redirect"
+  },
+  "source": {
+    "defect": [],
+    "advisory": "",
+    "discovery": "UNKNOWN"
+  },
+  "problemtype": {
+    "problemtype_data": [
+      {
+        "description": [
+          {
+            "lang": "eng",
+            "value": "mod_rewrite potential open redirect"
+          }
+        ]
+      }
+    ]
+  },
+  "credit": [
+    {
+      "lang": "eng",
+      "value": "The issue was discovered by Yukitsugu Sasaki"
+    }
+  ],
+  "description": {
+    "description_data": [
+      {
+        "lang": "eng",
+        "value": "Redirects configured with mod_rewrite that were intended to be self-referential might be fooled by encoded newlines and redirect instead to an an unexpected URL within the request URL."
+      }
+    ]
+  },
+  "impact": [
+    {
+      "other": "low"
+    }
+  ],
+  "affects": {
+    "vendor": {
+      "vendor_data": [
+        {
+          "vendor_name": "Apache Software Foundation",
+          "product": {
+            "product_data": [
+              {
+                "product_name": "Apache HTTP Server",
+                "version": {
+                  "version_data": [
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.39"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.38"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.37"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.35"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.34"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.33"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.30"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.29"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.28"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.27"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.26"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.25"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.23"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.20"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.18"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.17"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.16"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.12"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.10"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.9"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.7"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.6"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.4"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.3"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.2"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.1"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.0"
+                    }
+                  ]
+                }
+              }
+            ]
+          }
+        }
+      ]
+    }
+  }
+}
\ No newline at end of file

Added: httpd/site/trunk/content/security/json/CVE-2019-9517.json
URL: http://svn.apache.org/viewvc/httpd/site/trunk/content/security/json/CVE-2019-9517.json?rev=1888194&view=auto
==============================================================================
--- httpd/site/trunk/content/security/json/CVE-2019-9517.json (added)
+++ httpd/site/trunk/content/security/json/CVE-2019-9517.json Tue Mar 30 10:13:32 2021
@@ -0,0 +1,163 @@
+{
+  "data_type": "CVE",
+  "data_format": "MITRE",
+  "data_version": "4.0",
+  "generator": {
+    "engine": "xmltojsonmjc 1.0"
+  },
+  "references": {},
+  "timeline": [
+    {
+      "time": "2019-04-10",
+      "lang": "eng",
+      "value": "reported"
+    },
+    {
+      "time": "2019-08-14",
+      "lang": "eng",
+      "value": "public"
+    },
+    {
+      "time": "2019-08-14",
+      "lang": "eng",
+      "value": "2.4.41 released"
+    }
+  ],
+  "CNA_private": {
+    "owner": "httpd"
+  },
+  "CVE_data_meta": {
+    "ASSIGNER": "security@apache.org",
+    "AKA": "",
+    "STATE": "PUBLIC",
+    "DATE_PUBLIC": "2019-08-14",
+    "ID": "CVE-2019-9517",
+    "TITLE": "mod_http2, DoS attack by exhausting h2 workers."
+  },
+  "source": {
+    "defect": [],
+    "advisory": "",
+    "discovery": "UNKNOWN"
+  },
+  "problemtype": {
+    "problemtype_data": [
+      {
+        "description": [
+          {
+            "lang": "eng",
+            "value": "mod_http2, DoS attack by exhausting h2 workers."
+          }
+        ]
+      }
+    ]
+  },
+  "credit": [
+    {
+      "lang": "eng",
+      "value": "The issue was discovered by Jonathan Looney of Netflix."
+    }
+  ],
+  "description": {
+    "description_data": [
+      {
+        "lang": "eng",
+        "value": "A malicious client could perform a DoS attack by flooding a connection with requests and basically never reading responses on the TCP connection. Depending on h2 worker dimensioning, it was possible to block those with relatively few connections."
+      }
+    ]
+  },
+  "impact": [
+    {
+      "other": "moderate"
+    }
+  ],
+  "affects": {
+    "vendor": {
+      "vendor_data": [
+        {
+          "vendor_name": "Apache Software Foundation",
+          "product": {
+            "product_data": [
+              {
+                "product_name": "Apache HTTP Server",
+                "version": {
+                  "version_data": [
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.39"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.38"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.37"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.35"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.34"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.33"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.32"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.29"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.28"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.27"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.26"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.25"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.23"
+                    },
+                    {
+                      "version_name": "2.4",
+                      "version_affected": "=",
+                      "version_value": "2.4.20"
+                    }
+                  ]
+                }
+              }
+            ]
+          }
+        }
+      ]
+    }
+  }
+}
\ No newline at end of file