IPv6 logo

You are connected to Repology using legacy IPv4 protocol. Due to IPv4 address exhaustion it may become too expensive or impossible for Repology to support IPv4 in the nearest future. Time to switch to IPv6!

Versions Packages Information History CVEs Related Badges Report

Packages for apache

912 package(s) known

apache-httpd

2.4.55 Potentially vulnerable (2.4.55-r0)

apache-httpd-dbg

2.4.55 Potentially vulnerable (2.4.55-r0)

apache-httpd-dev

2.4.55 Potentially vulnerable (2.4.55-r0)

apache-httpd-doc

2.4.55 Potentially vulnerable (2.4.55-r0)

apache-httpd-http2

2.4.55 Potentially vulnerable (2.4.55-r0)

apache-httpd-icons

2.4.55 Potentially vulnerable (2.4.55-r0)

apache-httpd-ldap

2.4.55 Potentially vulnerable (2.4.55-r0)

apache-httpd-openrc

2.4.55 Potentially vulnerable (2.4.55-r0)

httpd

2.4.46 Potentially vulnerable (2.4.46-1)

httpd

2.4.43 Potentially vulnerable (2.4.43-1)

httpd

2.4.41 Potentially vulnerable (2.4.41-1)

httpd

2.4.39 Potentially vulnerable (2.4.39-1)

httpd

2.4.38 Potentially vulnerable (2.4.38-1)

httpd

2.4.37 Potentially vulnerable (2.4.37-1)

httpd

2.4.35 Potentially vulnerable (2.4.35-1)

httpd

2.4.34 Potentially vulnerable (2.4.34-1)

httpd

2.4.33 Potentially vulnerable (2.4.33-1)

httpd

2.4.29 Potentially vulnerable (2.4.29-1)

httpd

2.4.28 Potentially vulnerable (2.4.28-1)

httpd

2.4.27 Potentially vulnerable (2.4.27-1)

httpd

2.4.27 Potentially vulnerable (2.4.27-2)

httpd

2.4.25 Potentially vulnerable (2.4.25-1)

httpd

2.4.23 Potentially vulnerable (2.4.23-1)

httpd

2.4.23 Potentially vulnerable (2.4.23-2)

httpd

2.4.20 Potentially vulnerable (2.4.20-1)

httpd

2.4.18 Potentially vulnerable (2.4.18-1)

httpd

2.4.18 Potentially vulnerable (2.4.18-2)

httpd

2.4.17 Potentially vulnerable (2.4.17-1)

httpd

2.4.16 Potentially vulnerable (2.4.16-1)

httpd

2.4.12 Potentially vulnerable (2.4.12-1)

httpd

2.4.10 Potentially vulnerable (2.4.10-1)

httpd

2.4.9 Potentially vulnerable (2.4.9-1)

httpd

2.4.7 Potentially vulnerable (2.4.7-1)

httpd

2.4.6 Potentially vulnerable (2.4.6-1)

httpd

2.4.4 Potentially vulnerable (2.4.4-1)

httpd

2.4.4 Potentially vulnerable (2.4.4-2)

httpd

2.4.3 Potentially vulnerable (2.4.3-1)

httpd

2.4.2 Potentially vulnerable (2.4.2-1)

httpd

2.4.2 Potentially vulnerable (2.4.2-2)

httpd

2.4.2 Potentially vulnerable (2.4.2-3)

httpd

2.4.2 Potentially vulnerable (2.4.2-4)

httpd

2.4.1 Potentially vulnerable (2.4.1-1)

httpd

2.4.1 Potentially vulnerable (2.4.1-2)

httpd

2.4.1 Potentially vulnerable (2.4.1-3)

httpd

2.2.34 Potentially vulnerable (2.2.34-1)

httpd

2.2.32 Potentially vulnerable (2.2.32-1)

httpd

2.2.32 Potentially vulnerable (2.2.32-2)

httpd

2.2.31 Potentially vulnerable (2.2.31-1)

httpd

2.2.31 Potentially vulnerable (2.2.31-2)

httpd

2.2.31 Potentially vulnerable (2.2.31-3)

httpd

2.2.29 Potentially vulnerable (2.2.29-2)

httpd

2.2.27 Potentially vulnerable (2.2.27-1)

httpd

2.2.27 Potentially vulnerable (2.2.27-2)

httpd

2.2.26 Potentially vulnerable (2.2.26-1)

httpd

2.2.26 Potentially vulnerable (2.2.26-2)

httpd

2.2.25 Potentially vulnerable (2.2.25-2)

httpd

2.2.25 Potentially vulnerable (2.2.25-1)

httpd

2.2.24 Potentially vulnerable (2.2.24-1)

httpd

2.2.24 Potentially vulnerable (2.2.24-2)

httpd

2.2.23 Potentially vulnerable (2.2.23-1)

httpd

2.2.22 Potentially vulnerable (2.2.22-1)

httpd

2.2.22 Potentially vulnerable (2.2.22-2)

httpd

2.2.21 Potentially vulnerable (2.2.21-1)

httpd

2.2.21 Potentially vulnerable (2.2.21-2)

httpd

2.2.21 Potentially vulnerable (2.2.21-3)

httpd

2.2.20 Potentially vulnerable (2.2.20-1)

httpd

2.2.19 Potentially vulnerable (2.2.19-1)

httpd

2.2.19 Potentially vulnerable (2.2.19-2)

httpd

2.2.17 Potentially vulnerable (2.2.17-4)

httpd

2.2.17 Potentially vulnerable (2.2.17-1)

httpd

2.2.17 Potentially vulnerable (2.2.17-2)

httpd

2.2.17 Potentially vulnerable (2.2.17-3)

httpd

2.2.16 Potentially vulnerable (2.2.16-1)

httpd

2.2.15 Potentially vulnerable (2.2.15-1)

httpd

2.2.14 Potentially vulnerable (2.2.14-1)

httpd

2.2.14 Potentially vulnerable (2.2.14-2)

httpd

2.2.11 Potentially vulnerable (2.2.11-1)

httpd

2.2.10 Potentially vulnerable (2.2.10-1)

httpd

2.2.9 Potentially vulnerable (2.2.9-1)

httpd

2.2.8 Potentially vulnerable (2.2.8-1)

httpd

2.2.8 Potentially vulnerable (2.2.8-2)

httpd

2.2.6 Potentially vulnerable (2.2.6-1)

httpd

2.2.6 Potentially vulnerable (2.2.6-2)

httpd

2.2.6 Potentially vulnerable (2.2.6-3)

httpd

2.0.64 Potentially vulnerable (2.0.64-1)

httpd

2.0.64 Potentially vulnerable (2.0.64-2)

httpd

2.0.64 Potentially vulnerable (2.0.64-3)

httpd

2.0.64 Potentially vulnerable (2.0.64-4)

httpd

2.0.63 Potentially vulnerable (2.0.63-1)

httpd

2.0.61 Potentially vulnerable (2.0.61-1)

httpd

2.0.59 Potentially vulnerable (2.0.59-1)

httpd_64

2.4.46 Potentially vulnerable (2.4.46-1)

httpd_64

2.4.43 Potentially vulnerable (2.4.43-1)

httpd_64

2.4.41 Potentially vulnerable (2.4.41-1)

httpd_64

2.4.39 Potentially vulnerable (2.4.39-1)

httpd_64

2.4.38 Potentially vulnerable (2.4.38-1)

httpd_64

2.4.37 Potentially vulnerable (2.4.37-1)

httpd_64

2.4.35 Potentially vulnerable (2.4.35-1)

httpd_64

2.4.34 Potentially vulnerable (2.4.34-1)

httpd_64

2.4.33 Potentially vulnerable (2.4.33-1)

httpd_64

2.4.29 Potentially vulnerable (2.4.29-1)

httpd_64

2.4.28 Potentially vulnerable (2.4.28-1)

httpd_64

2.4.27 Potentially vulnerable (2.4.27-1)

httpd_64

2.4.27 Potentially vulnerable (2.4.27-2)

httpd_64

2.4.25 Potentially vulnerable (2.4.25-1)

httpd_64

2.4.23 Potentially vulnerable (2.4.23-1)

httpd_64

2.4.20 Potentially vulnerable (2.4.20-1)

httpd_64

2.4.18 Potentially vulnerable (2.4.18-1)

httpd_64

2.4.18 Potentially vulnerable (2.4.18-2)

httpd_64

2.4.17 Potentially vulnerable (2.4.17-1)

httpd_64

2.4.16 Potentially vulnerable (2.4.16-1)

httpd_64

2.4.12 Potentially vulnerable (2.4.12-1)

httpd_64

2.4.10 Potentially vulnerable (2.4.10-1)

httpd_64

2.4.9 Potentially vulnerable (2.4.9-1)

httpd_64

2.4.7 Potentially vulnerable (2.4.7-1)

httpd_64

2.4.6 Potentially vulnerable (2.4.6-1)

httpd_64

2.4.4 Potentially vulnerable (2.4.4-2)

httpd_64

2.2.34 Potentially vulnerable (2.2.34-1)

httpd_64

2.2.32 Potentially vulnerable (2.2.32-1)

httpd_64

2.2.32 Potentially vulnerable (2.2.32-2)

httpd_64

2.2.31 Potentially vulnerable (2.2.31-1)

httpd_64

2.2.31 Potentially vulnerable (2.2.31-2)

httpd_64

2.2.31 Potentially vulnerable (2.2.31-3)

httpd_64

2.2.29 Potentially vulnerable (2.2.29-2)

httpd_64

2.2.27 Potentially vulnerable (2.2.27-1)

httpd_64

2.2.27 Potentially vulnerable (2.2.27-2)

httpd_64

2.2.26 Potentially vulnerable (2.2.26-1)

httpd_64

2.2.26 Potentially vulnerable (2.2.26-2)

httpd_64

2.2.25 Potentially vulnerable (2.2.25-1)

httpd_64

2.2.25 Potentially vulnerable (2.2.25-2)

httpd_64

2.2.24 Potentially vulnerable (2.2.24-2)

httpd

2.4.56 (2.4.56-1)

httpd

2.4.55 Potentially vulnerable (2.4.55-1)

httpd

2.4.54 Potentially vulnerable (2.4.54-1)

httpd

2.4.54 Potentially vulnerable (2.4.54-2)

httpd

2.4.54 Potentially vulnerable (2.4.54-3)

httpd

2.4.53 Potentially vulnerable (2.4.53-1)

httpd

2.4.52 Potentially vulnerable (2.4.52-1)

httpd

2.4.51 Potentially vulnerable (2.4.51-1)

httpd

2.4.48 Potentially vulnerable (2.4.48-1)

httpd

2.4.46 Potentially vulnerable (2.4.46-1)

httpd

2.4.46 Potentially vulnerable (2.4.46-2)

httpd

2.4.43 Potentially vulnerable (2.4.43-1)

httpd

2.4.43 Potentially vulnerable (2.4.43-2)

httpd

2.4.41 Potentially vulnerable (2.4.41-1)

httpd

2.4.39 Potentially vulnerable (2.4.39-1)

httpd

2.4.39 Potentially vulnerable (2.4.39-2)

httpd

2.4.38 Potentially vulnerable (2.4.38-1)

httpd

2.4.38 Potentially vulnerable (2.4.38-2)

httpd

2.4.37 Potentially vulnerable (2.4.37-1)

httpd

2.4.37 Potentially vulnerable (2.4.37-2)

httpd

2.4.34 Potentially vulnerable (2.4.34-1)

httpd

2.4.33 Potentially vulnerable (2.4.33-1)

httpd

2.4.29 Potentially vulnerable (2.4.29-2)
AlmaLinux 8
AppStream

httpd

2.4.37 Potentially vulnerable (2.4.37-56.module_el8.8.0+3554+ec1058a7.4)
AlmaLinux 8
AppStream

httpd

2.4.37 Potentially vulnerable (2.4.37-56.module_el8.8.0+3560+c8e5e57e.6)
AlmaLinux 9
AppStream

httpd

2.4.53 Potentially vulnerable (2.4.53-11.el9_2.4)
AlmaLinux 9
AppStream

httpd

2.4.53 Potentially vulnerable (2.4.53-11.el9_2.5)

apache2

2.4.43 Potentially vulnerable (2.4.43-r0)

apache2-dev

2.4.43 Potentially vulnerable (2.4.43-r0)

apache2-doc

2.4.43 Potentially vulnerable (2.4.43-r0)

apache2-error

2.4.43 Potentially vulnerable (2.4.43-r0)

apache2-http2

2.4.43 Potentially vulnerable (2.4.43-r0)

apache2-icons

2.4.43 Potentially vulnerable (2.4.43-r0)

apache2-ldap

2.4.43 Potentially vulnerable (2.4.43-r0)

apache2-lua

2.4.43 Potentially vulnerable (2.4.43-r0)

apache2-proxy

2.4.43 Potentially vulnerable (2.4.43-r0)

apache2-proxy-html

2.4.43 Potentially vulnerable (2.4.43-r0)

apache2-ssl

2.4.43 Potentially vulnerable (2.4.43-r0)

apache2-utils

2.4.43 Potentially vulnerable (2.4.43-r0)

apache2-webdav

2.4.43 Potentially vulnerable (2.4.43-r0)

apache2

2.4.46 Potentially vulnerable (2.4.46-r0)

apache2-dev

2.4.46 Potentially vulnerable (2.4.46-r0)

apache2-doc

2.4.46 Potentially vulnerable (2.4.46-r0)

apache2-error

2.4.46 Potentially vulnerable (2.4.46-r0)

apache2-http2

2.4.46 Potentially vulnerable (2.4.46-r0)

apache2-icons

2.4.46 Potentially vulnerable (2.4.46-r0)

apache2-ldap

2.4.46 Potentially vulnerable (2.4.46-r0)

apache2-lua

2.4.46 Potentially vulnerable (2.4.46-r0)

apache2-proxy

2.4.46 Potentially vulnerable (2.4.46-r0)

apache2-proxy-html

2.4.46 Potentially vulnerable (2.4.46-r0)

apache2-ssl

2.4.46 Potentially vulnerable (2.4.46-r0)

apache2-utils

2.4.46 Potentially vulnerable (2.4.46-r0)

apache2-webdav

2.4.46 Potentially vulnerable (2.4.46-r0)

apache2

2.4.48 Potentially vulnerable (2.4.48-r0)

apache2-ctl

2.4.48 Potentially vulnerable (2.4.48-r0)

apache2-dev

2.4.48 Potentially vulnerable (2.4.48-r0)

apache2-doc

2.4.48 Potentially vulnerable (2.4.48-r0)

apache2-error

2.4.48 Potentially vulnerable (2.4.48-r0)

apache2-http2

2.4.48 Potentially vulnerable (2.4.48-r0)

apache2-icons

2.4.48 Potentially vulnerable (2.4.48-r0)

apache2-ldap

2.4.48 Potentially vulnerable (2.4.48-r0)

apache2-lua

2.4.48 Potentially vulnerable (2.4.48-r0)

apache2-proxy

2.4.48 Potentially vulnerable (2.4.48-r0)

apache2-proxy-html

2.4.48 Potentially vulnerable (2.4.48-r0)

apache2-ssl

2.4.48 Potentially vulnerable (2.4.48-r0)

apache2-utils

2.4.48 Potentially vulnerable (2.4.48-r0)

apache2-webdav

2.4.48 Potentially vulnerable (2.4.48-r0)

apache2

2.4.51 Potentially vulnerable (2.4.51-r0)

apache2-ctl

2.4.51 Potentially vulnerable (2.4.51-r0)

apache2-dev

2.4.51 Potentially vulnerable (2.4.51-r0)

apache2-doc

2.4.51 Potentially vulnerable (2.4.51-r0)

apache2-error

2.4.51 Potentially vulnerable (2.4.51-r0)

apache2-http2

2.4.51 Potentially vulnerable (2.4.51-r0)

apache2-icons

2.4.51 Potentially vulnerable (2.4.51-r0)

apache2-ldap

2.4.51 Potentially vulnerable (2.4.51-r0)

apache2-lua

2.4.51 Potentially vulnerable (2.4.51-r0)

apache2-proxy

2.4.51 Potentially vulnerable (2.4.51-r0)

apache2-proxy-html

2.4.51 Potentially vulnerable (2.4.51-r0)

apache2-ssl

2.4.51 Potentially vulnerable (2.4.51-r0)

apache2-utils

2.4.51 Potentially vulnerable (2.4.51-r0)

apache2-webdav

2.4.51 Potentially vulnerable (2.4.51-r0)

apache2

2.4.53 Potentially vulnerable (2.4.53-r0)

apache2-ctl

2.4.53 Potentially vulnerable (2.4.53-r0)

apache2-dev

2.4.53 Potentially vulnerable (2.4.53-r0)

apache2-doc

2.4.53 Potentially vulnerable (2.4.53-r0)

apache2-error

2.4.53 Potentially vulnerable (2.4.53-r0)

apache2-http2

2.4.53 Potentially vulnerable (2.4.53-r0)

apache2-icons

2.4.53 Potentially vulnerable (2.4.53-r0)

apache2-ldap

2.4.53 Potentially vulnerable (2.4.53-r0)

apache2-lua

2.4.53 Potentially vulnerable (2.4.53-r0)

apache2-proxy

2.4.53 Potentially vulnerable (2.4.53-r0)

apache2-proxy-html

2.4.53 Potentially vulnerable (2.4.53-r0)

apache2-ssl

2.4.53 Potentially vulnerable (2.4.53-r0)

apache2-utils

2.4.53 Potentially vulnerable (2.4.53-r0)

apache2-webdav

2.4.53 Potentially vulnerable (2.4.53-r0)

apache2

2.4.54 Potentially vulnerable (2.4.54-r0)

apache2-brotli

2.4.54 Potentially vulnerable (2.4.54-r0)

apache2-ctl

2.4.54 Potentially vulnerable (2.4.54-r0)

apache2-dev

2.4.54 Potentially vulnerable (2.4.54-r0)

apache2-doc

2.4.54 Potentially vulnerable (2.4.54-r0)

apache2-error

2.4.54 Potentially vulnerable (2.4.54-r0)

apache2-http2

2.4.54 Potentially vulnerable (2.4.54-r0)

apache2-icons

2.4.54 Potentially vulnerable (2.4.54-r0)

apache2-ldap

2.4.54 Potentially vulnerable (2.4.54-r0)

apache2-lua

2.4.54 Potentially vulnerable (2.4.54-r0)

apache2-proxy

2.4.54 Potentially vulnerable (2.4.54-r0)

apache2-proxy-html

2.4.54 Potentially vulnerable (2.4.54-r0)

apache2-ssl

2.4.54 Potentially vulnerable (2.4.54-r0)

apache2-utils

2.4.54 Potentially vulnerable (2.4.54-r0)

apache2-webdav

2.4.54 Potentially vulnerable (2.4.54-r0)

apache2

2.4.56 (2.4.56-r0)

apache2-brotli

2.4.56 (2.4.56-r0)

apache2-ctl

2.4.56 (2.4.56-r0)

apache2-dev

2.4.56 (2.4.56-r0)

apache2-doc

2.4.56 (2.4.56-r0)

apache2-error

2.4.56 (2.4.56-r0)

apache2-http2

2.4.56 (2.4.56-r0)

apache2-icons

2.4.56 (2.4.56-r0)

apache2-ldap

2.4.56 (2.4.56-r0)

apache2-lua

2.4.56 (2.4.56-r0)

apache2-proxy

2.4.56 (2.4.56-r0)

apache2-proxy-html

2.4.56 (2.4.56-r0)

apache2-ssl

2.4.56 (2.4.56-r0)

apache2-utils

2.4.56 (2.4.56-r0)

apache2-webdav

2.4.56 (2.4.56-r0)

apache2

2.4.56 (2.4.56-r0)

apache2-brotli

2.4.56 (2.4.56-r0)

apache2-ctl

2.4.56 (2.4.56-r0)

apache2-dev

2.4.56 (2.4.56-r0)

apache2-doc

2.4.56 (2.4.56-r0)

apache2-error

2.4.56 (2.4.56-r0)

apache2-http2

2.4.56 (2.4.56-r0)

apache2-icons

2.4.56 (2.4.56-r0)

apache2-ldap

2.4.56 (2.4.56-r0)

apache2-lua

2.4.56 (2.4.56-r0)

apache2-proxy

2.4.56 (2.4.56-r0)

apache2-proxy-html

2.4.56 (2.4.56-r0)

apache2-ssl

2.4.56 (2.4.56-r0)

apache2-utils

2.4.56 (2.4.56-r0)

apache2-webdav

2.4.56 (2.4.56-r0)

apache2

2.4.56 (2.4.56-r0)

apache2-brotli

2.4.56 (2.4.56-r0)

apache2-ctl

2.4.56 (2.4.56-r0)

apache2-dev

2.4.56 (2.4.56-r0)

apache2-doc

2.4.56 (2.4.56-r0)

apache2-error

2.4.56 (2.4.56-r0)

apache2-http2

2.4.56 (2.4.56-r0)

apache2-icons

2.4.56 (2.4.56-r0)

apache2-ldap

2.4.56 (2.4.56-r0)

apache2-lua

2.4.56 (2.4.56-r0)

apache2-proxy

2.4.56 (2.4.56-r0)

apache2-proxy-html

2.4.56 (2.4.56-r0)

apache2-ssl

2.4.56 (2.4.56-r0)

apache2-utils

2.4.56 (2.4.56-r0)

apache2-webdav

2.4.56 (2.4.56-r0)

apache2

2.4.57 (2.4.57-r0)

apache2-brotli

2.4.57 (2.4.57-r0)

apache2-ctl

2.4.57 (2.4.57-r0)

apache2-dev

2.4.57 (2.4.57-r0)

apache2-doc

2.4.57 (2.4.57-r0)

apache2-error

2.4.57 (2.4.57-r0)

apache2-http2

2.4.57 (2.4.57-r0)

apache2-icons

2.4.57 (2.4.57-r0)

apache2-ldap

2.4.57 (2.4.57-r0)

apache2-lua

2.4.57 (2.4.57-r0)

apache2-proxy

2.4.57 (2.4.57-r0)

apache2-proxy-html

2.4.57 (2.4.57-r0)

apache2-ssl

2.4.57 (2.4.57-r0)

apache2-utils

2.4.57 (2.4.57-r0)

apache2-webdav

2.4.57 (2.4.57-r0)

apache2

2.4.57 (2.4.57-r2)

apache2-brotli

2.4.57 (2.4.57-r2)

apache2-ctl

2.4.57 (2.4.57-r2)

apache2-dev

2.4.57 (2.4.57-r2)

apache2-doc

2.4.57 (2.4.57-r2)

apache2-error

2.4.57 (2.4.57-r2)

apache2-http2

2.4.57 (2.4.57-r2)

apache2-icons

2.4.57 (2.4.57-r2)

apache2-ldap

2.4.57 (2.4.57-r2)

apache2-lua

2.4.57 (2.4.57-r2)

apache2-proxy

2.4.57 (2.4.57-r2)

apache2-proxy-html

2.4.57 (2.4.57-r2)

apache2-ssl

2.4.57 (2.4.57-r2)

apache2-utils

2.4.57 (2.4.57-r2)

apache2-webdav

2.4.57 (2.4.57-r2)

apache2

2.4.57 (2.4.57-r2)

apache2-brotli

2.4.57 (2.4.57-r2)

apache2-ctl

2.4.57 (2.4.57-r2)

apache2-dev

2.4.57 (2.4.57-r2)

apache2-doc

2.4.57 (2.4.57-r2)

apache2-error

2.4.57 (2.4.57-r2)

apache2-http2

2.4.57 (2.4.57-r2)

apache2-icons

2.4.57 (2.4.57-r2)

apache2-ldap

2.4.57 (2.4.57-r2)

apache2-lua

2.4.57 (2.4.57-r2)

apache2-proxy

2.4.57 (2.4.57-r2)

apache2-proxy-html

2.4.57 (2.4.57-r2)

apache2-ssl

2.4.57 (2.4.57-r2)

apache2-utils

2.4.57 (2.4.57-r2)

apache2-webdav

2.4.57 (2.4.57-r2)

apache2

2.4.55 Potentially vulnerable (1:2.4.55-alt1)

apache2

2.4.57 (1:2.4.57-alt1)

apache2

2.4.57 (1:2.4.57-alt2)

httpd

2.2.34 Potentially vulnerable (2.2.34-1.16.amzn1)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Link(s):

httpd

2.4.57 (2.4.57-1.amzn2)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Link(s):

httpd

2.4.56 (2.4.56-1.amzn2)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Link(s):

httpd

2.4.55 Potentially vulnerable (2.4.55-1.amzn2)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Link(s):

httpd

2.4.54 Potentially vulnerable (2.4.54-1.amzn2)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Link(s):

httpd

2.4.53 Potentially vulnerable (2.4.53-1.amzn2)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Link(s):

httpd

2.4.52 Potentially vulnerable (2.4.52-1.amzn2)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Link(s):

httpd

2.4.51 Potentially vulnerable (2.4.51-1.amzn2)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Link(s):

httpd

2.4.48 Potentially vulnerable (2.4.48-2.amzn2)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Link(s):

httpd

2.4.46 Potentially vulnerable (2.4.46-1.amzn2)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Link(s):

httpd

2.4.46 Potentially vulnerable (2.4.46-2.amzn2)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Link(s):

httpd

2.4.43 Potentially vulnerable (2.4.43-1.amzn2)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Link(s):

httpd

2.4.41 Potentially vulnerable (2.4.41-1.amzn2.0.1)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Link(s):

httpd

2.4.39 Potentially vulnerable (2.4.39-1.amzn2.0.1)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Link(s):

httpd

2.4.37 Potentially vulnerable (2.4.37-1.amzn2.0.1)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Link(s):

httpd

2.4.34 Potentially vulnerable (2.4.34-1.amzn2.1.1)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Link(s):

httpd

2.4.34 Potentially vulnerable (2.4.34-1.amzn2.1.0)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Link(s):

httpd

2.4.33 Potentially vulnerable (2.4.33-2.amzn2.0.2)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Link(s):

httpd

2.4.33 Potentially vulnerable (2.4.33-2.amzn2.1.0)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Link(s):

httpd

2.4.33 Potentially vulnerable (2.4.33-2.amzn2.0.3)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Link(s):

httpd

2.4.6 Potentially vulnerable (2.4.6-67.amzn2.6.1)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Link(s):

httpd

2.4.55 Potentially vulnerable
Apertis v2020
v2020/development

apache2

2.4.38 Potentially vulnerable (2.4.38-3+deb10u5+apertis1)
Apertis v2021
v2021/development

apache2

2.4.38 Potentially vulnerable (2.4.38-3+deb10u8+apertis0)
Apertis v2022
v2022/development

apache2

2.4.56 (2.4.56-1~deb11u1+apertis0)
Apertis v2022
v2022-updates/development

apache2

2.4.56 (2.4.56-1~deb11u1+apertis0)
Apertis v2023
v2023/development

apache2

2.4.56 (2.4.56-1~deb11u1+apertis0)
Apertis v2023
v2023-updates/development

apache2

2.4.56 (2.4.56-1~deb11u1+apertis0)
Apertis v2024 Development
v2024dev1/development

apache2

2.4.56 (2.4.56-1~deb11u1+apertis0)
Arch
extra

apache

2.4.57 (2.4.57-1)

apache

2.4.57 (2.4.57-1.0)

apache

2.4.57 (2.4.57-1.0)

apache

2.4.57 (2.4.57-1.0)

apache

2.4.57 (2.4.57-1)

apache

2.4.57 (2.4.57-1)

apache

2.4.56 (2.4.56-1)

apache

2.4.56 (2.4.56-1)

apache

2.4.56 (2.4.56-1)

apache-git

2.4.57.r11251.g14aa4f56d7 (2.4.57.r11251.g14aa4f56d7-1)

apache-html-manual

2.4.46 Potentially vulnerable (2.4.46-1)

apache-tools

2.4.57 (2.4.57-1)
Artix
world

apache

2.4.57 (2.4.57-1)

apache

2.4.48 Potentially vulnerable

httpd

2.2.15 Potentially vulnerable (2.2.15-69.el6.centos)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Link(s):

httpd

2.4.6 Potentially vulnerable (2.4.6-95.el7.centos)
CentOS 7
updates

httpd

2.4.6 Potentially vulnerable (2.4.6-97.el7.centos.1)
CentOS 7
updates

httpd

2.4.6 Potentially vulnerable (2.4.6-97.el7.centos.2)
CentOS 7
updates

httpd

2.4.6 Potentially vulnerable (2.4.6-97.el7.centos.4)
CentOS 7
updates

httpd

2.4.6 Potentially vulnerable (2.4.6-97.el7.centos.5)
CentOS 7
updates

httpd

2.4.6 Potentially vulnerable (2.4.6-97.el7.centos)
CentOS 7
updates

httpd

2.4.6 Potentially vulnerable (2.4.6-98.el7.centos.6)
CentOS 7
updates

httpd

2.4.6 Potentially vulnerable (2.4.6-98.el7.centos.7)
CentOS 7
updates

httpd

2.4.6 Potentially vulnerable (2.4.6-99.el7.centos.1)
CentOS 8
AppStream

httpd

2.4.37 Potentially vulnerable (2.4.37-41.module_el8.5.0+977+5653bbea)
CentOS 8
AppStream

httpd

2.4.37 Potentially vulnerable (2.4.37-43.module_el8.5.0+1022+b541f3b1)
CentOS Stream 8
AppStream

httpd

2.4.37 Potentially vulnerable (2.4.37-47.module_el8.6.0+1111+ce6f4ceb.1)
CentOS Stream 8
AppStream

httpd

2.4.37 Potentially vulnerable (2.4.37-54.module_el8.8.0+1256+e1598b50)
CentOS Stream 8
AppStream

httpd

2.4.37 Potentially vulnerable (2.4.37-30.module_el8.3.0+462+ba287492.0.1)
CentOS Stream 8
AppStream

httpd

2.4.37 Potentially vulnerable (2.4.37-39.module_el8.4.0+778+c970deab)
CentOS Stream 8
AppStream

httpd

2.4.37 Potentially vulnerable (2.4.37-40.module_el8.5.0+852+0aafc63b)
CentOS Stream 8
AppStream

httpd

2.4.37 Potentially vulnerable (2.4.37-43.module_el8.5.0+1022+b541f3b1)
CentOS Stream 9
AppStream

httpd

2.4.57 (2.4.57-2.el9)
CentOS Stream 9
AppStream

httpd

2.4.53 Potentially vulnerable (2.4.53-10.el9)
CentOS Stream 9
AppStream

httpd

2.4.53 Potentially vulnerable (2.4.53-11.el9)
CentOS Stream 9
AppStream

httpd

2.4.53 Potentially vulnerable (2.4.53-7.el9)
CentOS Stream 9
AppStream

httpd

2.4.53 Potentially vulnerable (2.4.53-9.el9)

Apache HTTP Server Project

2.4.55 Potentially vulnerable

apache

2.4.57

httpd

2.4.39 Potentially vulnerable (2.4.39-1)

httpd-debuginfo

2.4.39 Potentially vulnerable (2.4.39-1)

httpd-devel

2.4.39 Potentially vulnerable (2.4.39-1)

httpd-manual

2.4.39 Potentially vulnerable (2.4.39-1)

httpd-mod_http2

2.4.39 Potentially vulnerable (2.4.39-1)

httpd-mod_ldap

2.4.39 Potentially vulnerable (2.4.39-1)

httpd-mod_lua

2.4.39 Potentially vulnerable (2.4.39-1)

httpd-mod_proxy_html

2.4.39 Potentially vulnerable (2.4.39-1)

httpd-mod_ssl

2.4.39 Potentially vulnerable (2.4.39-1)

httpd-tools

2.4.39 Potentially vulnerable (2.4.39-1)
Devuan 3.0
beowulf/main

apache2

2.4.38 Potentially vulnerable (2.4.38-3+deb10u8)
Devuan 4.0
chimaera/main

apache2

2.4.56 (2.4.56-1~deb11u2)
Devuan Unstable
unstable/main

apache2

2.4.57 (2.4.57-2)

httpd

2.4.57

www/apache24

2.4.56

www/htdigest

2.4.6 Potentially vulnerable (2.4.6_4)
Entware
mipselsf-k3.4

apache

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
mipssf-k3.4

apache

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
x64-k3.2

apache

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
aarch64-k3.10

apache

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
armv5sf-k3.2

apache

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
armv7sf-k2.6

apache

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
armv7sf-k3.2

apache

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
mipselsf-k3.4

apache-ab

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
mipssf-k3.4

apache-ab

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
x64-k3.2

apache-ab

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
aarch64-k3.10

apache-ab

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
armv5sf-k3.2

apache-ab

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
armv7sf-k2.6

apache-ab

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
armv7sf-k3.2

apache-ab

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
mipselsf-k3.4

apache-error

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
mipssf-k3.4

apache-error

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
x64-k3.2

apache-error

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
aarch64-k3.10

apache-error

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
armv5sf-k3.2

apache-error

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
armv7sf-k2.6

apache-error

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
armv7sf-k3.2

apache-error

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
mipselsf-k3.4

apache-icons

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
mipssf-k3.4

apache-icons

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
x64-k3.2

apache-icons

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
aarch64-k3.10

apache-icons

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
armv5sf-k3.2

apache-icons

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
armv7sf-k2.6

apache-icons

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
armv7sf-k3.2

apache-icons

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
mipselsf-k3.4

apache-mod-deflate

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
mipssf-k3.4

apache-mod-deflate

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
x64-k3.2

apache-mod-deflate

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
aarch64-k3.10

apache-mod-deflate

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
armv5sf-k3.2

apache-mod-deflate

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
armv7sf-k2.6

apache-mod-deflate

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
armv7sf-k3.2

apache-mod-deflate

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
mipselsf-k3.4

apache-mod-http2

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
mipssf-k3.4

apache-mod-http2

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
x64-k3.2

apache-mod-http2

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
aarch64-k3.10

apache-mod-http2

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
armv5sf-k3.2

apache-mod-http2

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
armv7sf-k2.6

apache-mod-http2

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
armv7sf-k3.2

apache-mod-http2

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
mipselsf-k3.4

apache-mod-ldap

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
mipssf-k3.4

apache-mod-ldap

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
x64-k3.2

apache-mod-ldap

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
aarch64-k3.10

apache-mod-ldap

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
armv5sf-k3.2

apache-mod-ldap

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
armv7sf-k2.6

apache-mod-ldap

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
armv7sf-k3.2

apache-mod-ldap

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
mipselsf-k3.4

apache-mod-lua

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
mipssf-k3.4

apache-mod-lua

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
x64-k3.2

apache-mod-lua

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
aarch64-k3.10

apache-mod-lua

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
armv5sf-k3.2

apache-mod-lua

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
armv7sf-k2.6

apache-mod-lua

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
armv7sf-k3.2

apache-mod-lua

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
mipssf-k3.4

apache-mod-md

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
mipselsf-k3.4

apache-mod-md

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
x64-k3.2

apache-mod-md

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
aarch64-k3.10

apache-mod-md

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
armv5sf-k3.2

apache-mod-md

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
armv7sf-k2.6

apache-mod-md

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
armv7sf-k3.2

apache-mod-md

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
mipssf-k3.4

apache-mod-proxy

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
mipselsf-k3.4

apache-mod-proxy

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
x64-k3.2

apache-mod-proxy

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
aarch64-k3.10

apache-mod-proxy

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
armv5sf-k3.2

apache-mod-proxy

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
armv7sf-k2.6

apache-mod-proxy

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
armv7sf-k3.2

apache-mod-proxy

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
mipssf-k3.4

apache-mod-proxy-html

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
mipselsf-k3.4

apache-mod-proxy-html

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
x64-k3.2

apache-mod-proxy-html

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
aarch64-k3.10

apache-mod-proxy-html

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
armv5sf-k3.2

apache-mod-proxy-html

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
armv7sf-k2.6

apache-mod-proxy-html

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
armv7sf-k3.2

apache-mod-proxy-html

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
mipssf-k3.4

apache-mod-session-crypto

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
mipselsf-k3.4

apache-mod-session-crypto

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
x64-k3.2

apache-mod-session-crypto

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
aarch64-k3.10

apache-mod-session-crypto

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
armv5sf-k3.2

apache-mod-session-crypto

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
armv7sf-k2.6

apache-mod-session-crypto

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
armv7sf-k3.2

apache-mod-session-crypto

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
mipssf-k3.4

apache-mod-ssl

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
mipselsf-k3.4

apache-mod-ssl

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
x64-k3.2

apache-mod-ssl

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
aarch64-k3.10

apache-mod-ssl

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
armv5sf-k3.2

apache-mod-ssl

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
armv7sf-k2.6

apache-mod-ssl

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
armv7sf-k3.2

apache-mod-ssl

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
mipssf-k3.4

apache-mod-suexec

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
mipselsf-k3.4

apache-mod-suexec

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
x64-k3.2

apache-mod-suexec

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
aarch64-k3.10

apache-mod-suexec

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
armv5sf-k3.2

apache-mod-suexec

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
armv7sf-k2.6

apache-mod-suexec

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
armv7sf-k3.2

apache-mod-suexec

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
mipssf-k3.4

apache-mod-webdav

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
mipselsf-k3.4

apache-mod-webdav

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
x64-k3.2

apache-mod-webdav

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
aarch64-k3.10

apache-mod-webdav

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
armv5sf-k3.2

apache-mod-webdav

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
armv7sf-k2.6

apache-mod-webdav

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
armv7sf-k3.2

apache-mod-webdav

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
mipssf-k3.4

apache-suexec

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
mipselsf-k3.4

apache-suexec

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
x64-k3.2

apache-suexec

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
aarch64-k3.10

apache-suexec

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
armv5sf-k3.2

apache-suexec

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
armv7sf-k2.6

apache-suexec

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
armv7sf-k3.2

apache-suexec

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
mipselsf-k3.4

apache-utils

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
mipssf-k3.4

apache-utils

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
x64-k3.2

apache-utils

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
aarch64-k3.10

apache-utils

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
armv5sf-k3.2

apache-utils

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
armv7sf-k2.6

apache-utils

2.4.52 Potentially vulnerable (2.4.52-1a)
Entware
armv7sf-k3.2

apache-utils

2.4.52 Potentially vulnerable (2.4.52-1a)
EuroLinux 8
appstream

httpd

2.4.37 Potentially vulnerable (2.4.37-30.module+el8.3.0+7001+0766b9e7)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Link(s):
EuroLinux 8
appstream

httpd

2.4.37 Potentially vulnerable (2.4.37-39.module+el8.4.0+12865+a7065a39.1)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Link(s):
EuroLinux 8
appstream

httpd

2.4.37 Potentially vulnerable (2.4.37-39.module+el8.4.0+9658+b87b2deb)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Link(s):
EuroLinux 8
appstream

httpd

2.4.37 Potentially vulnerable (2.4.37-43.module+el8.5.0+13064+c4b14997)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Link(s):
EuroLinux 8
appstream

httpd

2.4.37 Potentially vulnerable (2.4.37-43.module+el8.5.0+13806+b30d9eec.1)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Link(s):
EuroLinux 8
appstream

httpd

2.4.37 Potentially vulnerable (2.4.37-43.module+el8.5.0+14370+51c6d843.2)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Link(s):
EuroLinux 8
appstream

httpd

2.4.37 Potentially vulnerable (2.4.37-43.module+el8.5.0+14530+6f259f31.3)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Link(s):
EuroLinux 8
appstream

httpd

2.4.37 Potentially vulnerable (2.4.37-47.module+el8.6.0+14529+083145da.1)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Link(s):
EuroLinux 8
appstream

httpd

2.4.37 Potentially vulnerable (2.4.37-47.module+el8.6.0+15654+427eba2e.2)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Link(s):
EuroLinux 8
appstream

httpd

2.4.37 Potentially vulnerable (2.4.37-51.module+el8.7.0+18026+7b169787.1)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Link(s):
EuroLinux 8
appstream

httpd

2.4.37 Potentially vulnerable (2.4.37-56.module+el8.8.0+18556+a66138c1.4)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Link(s):

httpd

2.4.37 Potentially vulnerable (2.4.37-47.module+el8.6.0+15654+427eba2e.2)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Link(s):
EuroLinux 9
appstream

httpd

2.4.53 Potentially vulnerable (2.4.53-7.el9_1.5)
  • Summary:
    Apache HTTP Server
  • Category:
    • Unspecified
  • License:
    • ASL 2.0
  • Link(s):
EuroLinux 9
appstream

httpd

2.4.53 Potentially vulnerable (2.4.53-11.el9)
  • Summary:
    Apache HTTP Server
  • Category:
    • Unspecified
  • License:
    • ASL 2.0
  • Link(s):
EuroLinux 9
appstream

httpd

2.4.53 Potentially vulnerable (2.4.53-11.el9_2.4)
  • Summary:
    Apache HTTP Server
  • Category:
    • Unspecified
  • License:
    • ASL 2.0
  • Link(s):
EuroLinux 9
appstream

httpd

2.4.53 Potentially vulnerable (2.4.53-11.el9_2.5)
  • Summary:
    Apache HTTP Server
  • Category:
    • Unspecified
  • License:
    • ASL 2.0
  • Link(s):
EuroLinux 9
appstream

httpd

2.4.53 Potentially vulnerable (2.4.53-7.el9)
  • Summary:
    Apache HTTP Server
  • Category:
    • Unspecified
  • License:
    • ASL 2.0
  • Link(s):
EuroLinux 9
appstream

httpd

2.4.53 Potentially vulnerable (2.4.53-7.el9_1.1)
  • Summary:
    Apache HTTP Server
  • Category:
    • Unspecified
  • License:
    • ASL 2.0
  • Link(s):
EuroLinux 9
appstream

httpd

2.4.51 Potentially vulnerable (2.4.51-4.el9)
  • Summary:
    Apache HTTP Server
  • Category:
    • Unspecified
  • License:
    • ASL 2.0
  • Link(s):
EuroLinux 9
appstream

httpd

2.4.51 Potentially vulnerable (2.4.51-5.el9)
  • Summary:
    Apache HTTP Server
  • Category:
    • Unspecified
  • License:
    • ASL 2.0
  • Link(s):
EuroLinux 9
appstream

httpd

2.4.51 Potentially vulnerable (2.4.51-7.el9_0)
  • Summary:
    Apache HTTP Server
  • Category:
    • Unspecified
  • License:
    • ASL 2.0
  • Link(s):

www-servers/apache

2.4.57 (2.4.57-r1)
Fedora 26
updates

httpd

2.4.33 Potentially vulnerable (2.4.33-4.fc26)
Fedora 26
release

httpd

2.4.25 Potentially vulnerable (2.4.25-8.fc26)
Fedora 27
updates

httpd

2.4.34 Potentially vulnerable (2.4.34-3.fc27)
Fedora 27
release

httpd

2.4.28 Potentially vulnerable (2.4.28-1.fc27)
Fedora 28
updates

httpd

2.4.39 Potentially vulnerable (2.4.39-1.1.fc28)
Fedora 28
release

httpd

2.4.33 Potentially vulnerable (2.4.33-2.fc28)
Fedora 29
updates

httpd

2.4.41 Potentially vulnerable (2.4.41-5.fc29)
Fedora 29
release

httpd

2.4.34 Potentially vulnerable (2.4.34-8.fc29)
Fedora 30
updates

httpd

2.4.41 Potentially vulnerable (2.4.41-6.1.fc30)
Fedora 30
release

httpd

2.4.39 Potentially vulnerable (2.4.39-2.fc30)
Fedora 31
updates

httpd

2.4.46 Potentially vulnerable (2.4.46-1.fc31)
Fedora 31
release

httpd

2.4.41 Potentially vulnerable (2.4.41-5.fc31)
Fedora 32
updates

httpd

2.4.46 Potentially vulnerable (2.4.46-1.fc32)
Fedora 32
release

httpd

2.4.43 Potentially vulnerable (2.4.43-1.fc32)
Fedora 33
updates

httpd

2.4.51 Potentially vulnerable (2.4.51-1.fc33)
Fedora 33
release

httpd

2.4.46 Potentially vulnerable (2.4.46-1.fc33)
Fedora 34
updates

httpd

2.4.53 Potentially vulnerable (2.4.53-1.fc34)
Fedora 34
release

httpd

2.4.46 Potentially vulnerable (2.4.46-10.fc34)
Fedora 35
updates

httpd

2.4.54 Potentially vulnerable (2.4.54-1.fc35)
Fedora 35
release

httpd

2.4.51 Potentially vulnerable (2.4.51-2.fc35)
Fedora 36
updates

httpd

2.4.57 (2.4.57-1.fc36)
Fedora 36
release

httpd

2.4.53 Potentially vulnerable (2.4.53-1.fc36)
Fedora 37
updates

httpd

2.4.57 (2.4.57-1.fc37)
Fedora 37
release

httpd

2.4.54 Potentially vulnerable (2.4.54-5.fc37)
Fedora 38
updates

httpd

2.4.57 (2.4.57-1.fc38)
Fedora 38
release

httpd

2.4.56 (2.4.56-1.fc38)