Versions Packages Information History CVEs Related Badges Report

Packages for apache

794 package(s) known

apache-httpd

2.4.46 Potentially vulnerable (2.4.46-r0)

apache-httpd-dbg

2.4.46 Potentially vulnerable (2.4.46-r0)

apache-httpd-dev

2.4.46 Potentially vulnerable (2.4.46-r0)

apache-httpd-doc

2.4.46 Potentially vulnerable (2.4.46-r0)

apache-httpd-http2

2.4.46 Potentially vulnerable (2.4.46-r0)

apache-httpd-icons

2.4.46 Potentially vulnerable (2.4.46-r0)

apache-httpd-ldap

2.4.46 Potentially vulnerable (2.4.46-r0)

apache-httpd-openrc

2.4.46 Potentially vulnerable (2.4.46-r0)

httpd

2.4.46 Potentially vulnerable (2.4.46-1)

httpd

2.4.43 Potentially vulnerable (2.4.43-1)

httpd

2.4.41 Potentially vulnerable (2.4.41-1)

httpd

2.4.39 Potentially vulnerable (2.4.39-1)

httpd

2.4.38 Potentially vulnerable (2.4.38-1)

httpd

2.4.37 Potentially vulnerable (2.4.37-1)

httpd

2.4.35 Potentially vulnerable (2.4.35-1)

httpd

2.4.34 Potentially vulnerable (2.4.34-1)

httpd

2.4.33 Potentially vulnerable (2.4.33-1)

httpd

2.4.29 Potentially vulnerable (2.4.29-1)

httpd

2.4.28 Potentially vulnerable (2.4.28-1)

httpd

2.4.27 Potentially vulnerable (2.4.27-2)

httpd

2.4.27 Potentially vulnerable (2.4.27-1)

httpd

2.4.25 Potentially vulnerable (2.4.25-1)

httpd

2.4.23 Potentially vulnerable (2.4.23-1)

httpd

2.4.23 Potentially vulnerable (2.4.23-2)

httpd

2.4.20 Potentially vulnerable (2.4.20-1)

httpd

2.4.18 Potentially vulnerable (2.4.18-1)

httpd

2.4.18 Potentially vulnerable (2.4.18-2)

httpd

2.4.17 Potentially vulnerable (2.4.17-1)

httpd

2.4.16 Potentially vulnerable (2.4.16-1)

httpd

2.4.12 Potentially vulnerable (2.4.12-1)

httpd

2.4.10 Potentially vulnerable (2.4.10-1)

httpd

2.4.9 Potentially vulnerable (2.4.9-1)

httpd

2.4.7 Potentially vulnerable (2.4.7-1)

httpd

2.4.6 Potentially vulnerable (2.4.6-1)

httpd

2.4.4 Potentially vulnerable (2.4.4-1)

httpd

2.4.4 Potentially vulnerable (2.4.4-2)

httpd

2.4.3 Potentially vulnerable (2.4.3-1)

httpd

2.4.2 Potentially vulnerable (2.4.2-4)

httpd

2.4.2 Potentially vulnerable (2.4.2-1)

httpd

2.4.2 Potentially vulnerable (2.4.2-2)

httpd

2.4.2 Potentially vulnerable (2.4.2-3)

httpd

2.4.1 Potentially vulnerable (2.4.1-2)

httpd

2.4.1 Potentially vulnerable (2.4.1-1)

httpd

2.4.1 Potentially vulnerable (2.4.1-3)

httpd

2.2.34 Potentially vulnerable (2.2.34-1)

httpd

2.2.32 Potentially vulnerable (2.2.32-1)

httpd

2.2.32 Potentially vulnerable (2.2.32-2)

httpd

2.2.31 Potentially vulnerable (2.2.31-1)

httpd

2.2.31 Potentially vulnerable (2.2.31-2)

httpd

2.2.31 Potentially vulnerable (2.2.31-3)

httpd

2.2.29 Potentially vulnerable (2.2.29-2)

httpd

2.2.27 Potentially vulnerable (2.2.27-1)

httpd

2.2.27 Potentially vulnerable (2.2.27-2)

httpd

2.2.26 Potentially vulnerable (2.2.26-1)

httpd

2.2.26 Potentially vulnerable (2.2.26-2)

httpd

2.2.25 Potentially vulnerable (2.2.25-1)

httpd

2.2.25 Potentially vulnerable (2.2.25-2)

httpd

2.2.24 Potentially vulnerable (2.2.24-1)

httpd

2.2.24 Potentially vulnerable (2.2.24-2)

httpd

2.2.23 Potentially vulnerable (2.2.23-1)

httpd

2.2.22 Potentially vulnerable (2.2.22-1)

httpd

2.2.22 Potentially vulnerable (2.2.22-2)

httpd

2.2.21 Potentially vulnerable (2.2.21-1)

httpd

2.2.21 Potentially vulnerable (2.2.21-2)

httpd

2.2.21 Potentially vulnerable (2.2.21-3)

httpd

2.2.20 Potentially vulnerable (2.2.20-1)

httpd

2.2.19 Potentially vulnerable (2.2.19-1)

httpd

2.2.19 Potentially vulnerable (2.2.19-2)

httpd

2.2.17 Potentially vulnerable (2.2.17-1)

httpd

2.2.17 Potentially vulnerable (2.2.17-2)

httpd

2.2.17 Potentially vulnerable (2.2.17-3)

httpd

2.2.17 Potentially vulnerable (2.2.17-4)

httpd

2.2.16 Potentially vulnerable (2.2.16-1)

httpd

2.2.15 Potentially vulnerable (2.2.15-1)

httpd

2.2.14 Potentially vulnerable (2.2.14-1)

httpd

2.2.14 Potentially vulnerable (2.2.14-2)

httpd

2.2.11 Potentially vulnerable (2.2.11-1)

httpd

2.2.10 Potentially vulnerable (2.2.10-1)

httpd

2.2.9 Potentially vulnerable (2.2.9-1)

httpd

2.2.8 Potentially vulnerable (2.2.8-1)

httpd

2.2.8 Potentially vulnerable (2.2.8-2)

httpd

2.2.6 Potentially vulnerable (2.2.6-2)

httpd

2.2.6 Potentially vulnerable (2.2.6-3)

httpd

2.2.6 Potentially vulnerable (2.2.6-1)

httpd

2.0.64 Potentially vulnerable (2.0.64-2)

httpd

2.0.64 Potentially vulnerable (2.0.64-3)

httpd

2.0.64 Potentially vulnerable (2.0.64-4)

httpd

2.0.64 Potentially vulnerable (2.0.64-1)

httpd

2.0.63 Potentially vulnerable (2.0.63-1)

httpd

2.0.61 Potentially vulnerable (2.0.61-1)

httpd

2.0.59 Potentially vulnerable (2.0.59-1)

httpd_64

2.4.46 Potentially vulnerable (2.4.46-1)

httpd_64

2.4.43 Potentially vulnerable (2.4.43-1)

httpd_64

2.4.41 Potentially vulnerable (2.4.41-1)

httpd_64

2.4.39 Potentially vulnerable (2.4.39-1)

httpd_64

2.4.38 Potentially vulnerable (2.4.38-1)

httpd_64

2.4.37 Potentially vulnerable (2.4.37-1)

httpd_64

2.4.35 Potentially vulnerable (2.4.35-1)

httpd_64

2.4.34 Potentially vulnerable (2.4.34-1)

httpd_64

2.4.33 Potentially vulnerable (2.4.33-1)

httpd_64

2.4.29 Potentially vulnerable (2.4.29-1)

httpd_64

2.4.28 Potentially vulnerable (2.4.28-1)

httpd_64

2.4.27 Potentially vulnerable (2.4.27-2)

httpd_64

2.4.27 Potentially vulnerable (2.4.27-1)

httpd_64

2.4.25 Potentially vulnerable (2.4.25-1)

httpd_64

2.4.23 Potentially vulnerable (2.4.23-1)

httpd_64

2.4.20 Potentially vulnerable (2.4.20-1)

httpd_64

2.4.18 Potentially vulnerable (2.4.18-2)

httpd_64

2.4.18 Potentially vulnerable (2.4.18-1)

httpd_64

2.4.17 Potentially vulnerable (2.4.17-1)

httpd_64

2.4.16 Potentially vulnerable (2.4.16-1)

httpd_64

2.4.12 Potentially vulnerable (2.4.12-1)

httpd_64

2.4.10 Potentially vulnerable (2.4.10-1)

httpd_64

2.4.9 Potentially vulnerable (2.4.9-1)

httpd_64

2.4.7 Potentially vulnerable (2.4.7-1)

httpd_64

2.4.6 Potentially vulnerable (2.4.6-1)

httpd_64

2.4.4 Potentially vulnerable (2.4.4-2)

httpd_64

2.2.34 Potentially vulnerable (2.2.34-1)

httpd_64

2.2.32 Potentially vulnerable (2.2.32-1)

httpd_64

2.2.32 Potentially vulnerable (2.2.32-2)

httpd_64

2.2.31 Potentially vulnerable (2.2.31-1)

httpd_64

2.2.31 Potentially vulnerable (2.2.31-2)

httpd_64

2.2.31 Potentially vulnerable (2.2.31-3)

httpd_64

2.2.29 Potentially vulnerable (2.2.29-2)

httpd_64

2.2.27 Potentially vulnerable (2.2.27-2)

httpd_64

2.2.27 Potentially vulnerable (2.2.27-1)

httpd_64

2.2.26 Potentially vulnerable (2.2.26-1)

httpd_64

2.2.26 Potentially vulnerable (2.2.26-2)

httpd_64

2.2.25 Potentially vulnerable (2.2.25-1)

httpd_64

2.2.25 Potentially vulnerable (2.2.25-2)

httpd_64

2.2.24 Potentially vulnerable (2.2.24-2)

httpd

2.4.46 Potentially vulnerable (2.4.46-1)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • Apache Software License
  • Links(s):

httpd

2.4.43 Potentially vulnerable (2.4.43-1)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • Apache Software License
  • Links(s):

httpd

2.4.43 Potentially vulnerable (2.4.43-2)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • Apache Software License
  • Links(s):

httpd

2.4.41 Potentially vulnerable (2.4.41-1)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • Apache Software License
  • Links(s):

httpd

2.4.39 Potentially vulnerable (2.4.39-2)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • Apache Software License
  • Links(s):

httpd

2.4.39 Potentially vulnerable (2.4.39-1)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • Apache Software License
  • Links(s):

httpd

2.4.38 Potentially vulnerable (2.4.38-1)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • Apache Software License
  • Links(s):

httpd

2.4.38 Potentially vulnerable (2.4.38-2)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • Apache Software License
  • Links(s):

httpd

2.4.37 Potentially vulnerable (2.4.37-1)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • Apache Software License
  • Links(s):

httpd

2.4.37 Potentially vulnerable (2.4.37-2)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • Apache Software License
  • Links(s):

httpd

2.4.34 Potentially vulnerable (2.4.34-1)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • Apache Software License
  • Links(s):

httpd

2.4.33 Potentially vulnerable (2.4.33-1)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • Apache Software License
  • Links(s):

httpd

2.4.29 Potentially vulnerable (2.4.29-2)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • Apache Software License
  • Links(s):
AlmaLinux 8
AppStream

httpd

2.4.37 Potentially vulnerable (2.4.37-47.module_el8.6.0+2872+fe0ff7aa.1.alma)
AlmaLinux 9
AppStream

httpd

2.4.51 Potentially vulnerable (2.4.51-7.el9_0)

apache2

2.4.43 Potentially vulnerable (2.4.43-r0)

apache2-ctl

2.4.43 Potentially vulnerable (2.4.43-r0)

apache2-dev

2.4.43 Potentially vulnerable (2.4.43-r0)

apache2-doc

2.4.43 Potentially vulnerable (2.4.43-r0)

apache2-error

2.4.43 Potentially vulnerable (2.4.43-r0)

apache2-http2

2.4.43 Potentially vulnerable (2.4.43-r0)

apache2-icons

2.4.43 Potentially vulnerable (2.4.43-r0)

apache2-ldap

2.4.43 Potentially vulnerable (2.4.43-r0)

apache2-lua

2.4.43 Potentially vulnerable (2.4.43-r0)

apache2-proxy

2.4.43 Potentially vulnerable (2.4.43-r0)

apache2-proxy-html

2.4.43 Potentially vulnerable (2.4.43-r0)

apache2-ssl

2.4.43 Potentially vulnerable (2.4.43-r0)

apache2-utils

2.4.43 Potentially vulnerable (2.4.43-r0)

apache2-webdav

2.4.43 Potentially vulnerable (2.4.43-r0)

apache2

2.4.46 Potentially vulnerable (2.4.46-r0)

apache2-ctl

2.4.46 Potentially vulnerable (2.4.46-r0)

apache2-dev

2.4.46 Potentially vulnerable (2.4.46-r0)

apache2-doc

2.4.46 Potentially vulnerable (2.4.46-r0)

apache2-error

2.4.46 Potentially vulnerable (2.4.46-r0)

apache2-http2

2.4.46 Potentially vulnerable (2.4.46-r0)

apache2-icons

2.4.46 Potentially vulnerable (2.4.46-r0)

apache2-ldap

2.4.46 Potentially vulnerable (2.4.46-r0)

apache2-lua

2.4.46 Potentially vulnerable (2.4.46-r0)

apache2-proxy

2.4.46 Potentially vulnerable (2.4.46-r0)

apache2-proxy-html

2.4.46 Potentially vulnerable (2.4.46-r0)

apache2-ssl

2.4.46 Potentially vulnerable (2.4.46-r0)

apache2-utils

2.4.46 Potentially vulnerable (2.4.46-r0)

apache2-webdav

2.4.46 Potentially vulnerable (2.4.46-r0)

apache2

2.4.48 Potentially vulnerable (2.4.48-r0)

apache2-ctl

2.4.48 Potentially vulnerable (2.4.48-r0)

apache2-dev

2.4.48 Potentially vulnerable (2.4.48-r0)

apache2-doc

2.4.48 Potentially vulnerable (2.4.48-r0)

apache2-error

2.4.48 Potentially vulnerable (2.4.48-r0)

apache2-http2

2.4.48 Potentially vulnerable (2.4.48-r0)

apache2-icons

2.4.48 Potentially vulnerable (2.4.48-r0)

apache2-ldap

2.4.48 Potentially vulnerable (2.4.48-r0)

apache2-lua

2.4.48 Potentially vulnerable (2.4.48-r0)

apache2-proxy

2.4.48 Potentially vulnerable (2.4.48-r0)

apache2-proxy-html

2.4.48 Potentially vulnerable (2.4.48-r0)

apache2-ssl

2.4.48 Potentially vulnerable (2.4.48-r0)

apache2-utils

2.4.48 Potentially vulnerable (2.4.48-r0)

apache2-webdav

2.4.48 Potentially vulnerable (2.4.48-r0)

apache2

2.4.51 Potentially vulnerable (2.4.51-r0)

apache2-ctl

2.4.51 Potentially vulnerable (2.4.51-r0)

apache2-dev

2.4.51 Potentially vulnerable (2.4.51-r0)

apache2-doc

2.4.51 Potentially vulnerable (2.4.51-r0)

apache2-error

2.4.51 Potentially vulnerable (2.4.51-r0)

apache2-http2

2.4.51 Potentially vulnerable (2.4.51-r0)

apache2-icons

2.4.51 Potentially vulnerable (2.4.51-r0)

apache2-ldap

2.4.51 Potentially vulnerable (2.4.51-r0)

apache2-lua

2.4.51 Potentially vulnerable (2.4.51-r0)

apache2-proxy

2.4.51 Potentially vulnerable (2.4.51-r0)

apache2-proxy-html

2.4.51 Potentially vulnerable (2.4.51-r0)

apache2-ssl

2.4.51 Potentially vulnerable (2.4.51-r0)

apache2-utils

2.4.51 Potentially vulnerable (2.4.51-r0)

apache2-webdav

2.4.51 Potentially vulnerable (2.4.51-r0)

apache2

2.4.53 (2.4.53-r0)

apache2-ctl

2.4.53 (2.4.53-r0)

apache2-dev

2.4.53 (2.4.53-r0)

apache2-doc

2.4.53 (2.4.53-r0)

apache2-error

2.4.53 (2.4.53-r0)

apache2-http2

2.4.53 (2.4.53-r0)

apache2-icons

2.4.53 (2.4.53-r0)

apache2-ldap

2.4.53 (2.4.53-r0)

apache2-lua

2.4.53 (2.4.53-r0)

apache2-proxy

2.4.53 (2.4.53-r0)

apache2-proxy-html

2.4.53 (2.4.53-r0)

apache2-ssl

2.4.53 (2.4.53-r0)

apache2-utils

2.4.53 (2.4.53-r0)

apache2-webdav

2.4.53 (2.4.53-r0)

apache2

2.4.53 (2.4.53-r0)

apache2-brotli

2.4.53 (2.4.53-r0)

apache2-ctl

2.4.53 (2.4.53-r0)

apache2-dev

2.4.53 (2.4.53-r0)

apache2-doc

2.4.53 (2.4.53-r0)

apache2-error

2.4.53 (2.4.53-r0)

apache2-http2

2.4.53 (2.4.53-r0)

apache2-icons

2.4.53 (2.4.53-r0)

apache2-ldap

2.4.53 (2.4.53-r0)

apache2-lua

2.4.53 (2.4.53-r0)

apache2-proxy

2.4.53 (2.4.53-r0)

apache2-proxy-html

2.4.53 (2.4.53-r0)

apache2-ssl

2.4.53 (2.4.53-r0)

apache2-utils

2.4.53 (2.4.53-r0)

apache2-webdav

2.4.53 (2.4.53-r0)

apache2

2.4.53 (2.4.53-r0)

apache2-brotli

2.4.53 (2.4.53-r0)

apache2-ctl

2.4.53 (2.4.53-r0)

apache2-dev

2.4.53 (2.4.53-r0)

apache2-doc

2.4.53 (2.4.53-r0)

apache2-error

2.4.53 (2.4.53-r0)

apache2-http2

2.4.53 (2.4.53-r0)

apache2-icons

2.4.53 (2.4.53-r0)

apache2-ldap

2.4.53 (2.4.53-r0)

apache2-lua

2.4.53 (2.4.53-r0)

apache2-proxy

2.4.53 (2.4.53-r0)

apache2-proxy-html

2.4.53 (2.4.53-r0)

apache2-ssl

2.4.53 (2.4.53-r0)

apache2-utils

2.4.53 (2.4.53-r0)

apache2-webdav

2.4.53 (2.4.53-r0)

apache2

2.4.53 (2.4.53-r0)

apache2-brotli

2.4.53 (2.4.53-r0)

apache2-ctl

2.4.53 (2.4.53-r0)

apache2-dev

2.4.53 (2.4.53-r0)

apache2-doc

2.4.53 (2.4.53-r0)

apache2-error

2.4.53 (2.4.53-r0)

apache2-http2

2.4.53 (2.4.53-r0)

apache2-icons

2.4.53 (2.4.53-r0)

apache2-ldap

2.4.53 (2.4.53-r0)

apache2-lua

2.4.53 (2.4.53-r0)

apache2-proxy

2.4.53 (2.4.53-r0)

apache2-proxy-html

2.4.53 (2.4.53-r0)

apache2-ssl

2.4.53 (2.4.53-r0)

apache2-utils

2.4.53 (2.4.53-r0)

apache2-webdav

2.4.53 (2.4.53-r0)

apache2

2.4.53 (2.4.53-r0)

apache2-brotli

2.4.53 (2.4.53-r0)

apache2-ctl

2.4.53 (2.4.53-r0)

apache2-dev

2.4.53 (2.4.53-r0)

apache2-doc

2.4.53 (2.4.53-r0)

apache2-error

2.4.53 (2.4.53-r0)

apache2-http2

2.4.53 (2.4.53-r0)

apache2-icons

2.4.53 (2.4.53-r0)

apache2-ldap

2.4.53 (2.4.53-r0)

apache2-lua

2.4.53 (2.4.53-r0)

apache2-proxy

2.4.53 (2.4.53-r0)

apache2-proxy-html

2.4.53 (2.4.53-r0)

apache2-ssl

2.4.53 (2.4.53-r0)

apache2-utils

2.4.53 (2.4.53-r0)

apache2-webdav

2.4.53 (2.4.53-r0)

apache2

2.4.53 (1:2.4.53-alt1)

apache2

2.4.53 (1:2.4.53-alt1)

apache2

2.4.53 (1:2.4.53-alt1)

httpd

2.2.34 Potentially vulnerable (2.2.34-1.16.amzn1)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Links(s):

httpd

2.4.53 (2.4.53-1.amzn2)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Links(s):

httpd

2.4.52 Potentially vulnerable (2.4.52-1.amzn2)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Links(s):

httpd

2.4.51 Potentially vulnerable (2.4.51-1.amzn2)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Links(s):

httpd

2.4.48 Potentially vulnerable (2.4.48-2.amzn2)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Links(s):

httpd

2.4.46 Potentially vulnerable (2.4.46-1.amzn2)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Links(s):

httpd

2.4.46 Potentially vulnerable (2.4.46-2.amzn2)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Links(s):

httpd

2.4.43 Potentially vulnerable (2.4.43-1.amzn2)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Links(s):

httpd

2.4.41 Potentially vulnerable (2.4.41-1.amzn2.0.1)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Links(s):

httpd

2.4.39 Potentially vulnerable (2.4.39-1.amzn2.0.1)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Links(s):

httpd

2.4.37 Potentially vulnerable (2.4.37-1.amzn2.0.1)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Links(s):

httpd

2.4.34 Potentially vulnerable (2.4.34-1.amzn2.1.0)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Links(s):

httpd

2.4.34 Potentially vulnerable (2.4.34-1.amzn2.1.1)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Links(s):

httpd

2.4.33 Potentially vulnerable (2.4.33-2.amzn2.0.2)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Links(s):

httpd

2.4.33 Potentially vulnerable (2.4.33-2.amzn2.0.3)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Links(s):

httpd

2.4.33 Potentially vulnerable (2.4.33-2.amzn2.1.0)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Links(s):

httpd

2.4.6 Potentially vulnerable (2.4.6-67.amzn2.6.1)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Links(s):

httpd

2.4.53
Apertis v2020
v2020/development

apache2

2.4.38 Potentially vulnerable (2.4.38-3+deb10u5+apertis1)
Apertis v2021
v2021/development

apache2

2.4.38 Potentially vulnerable (2.4.38-3+deb10u7+apertis0)
Apertis v2022
v2022/development

apache2

2.4.52 Potentially vulnerable (2.4.52-1~deb11u2+apertis0)
Apertis v2023 Development
v2023dev1/development

apache2

2.4.52 Potentially vulnerable (2.4.52-1~deb11u2+apertis0)
Arch
extra

apache

2.4.53 (2.4.53-1)

apache

2.4.53 (2.4.53-1.0)

apache

2.4.53 (2.4.53-1.0)

apache

2.4.53 (2.4.53-1.0)

apache

2.4.53 (2.4.53-1)

apache

2.4.53 (2.4.53-1)

apache

2.4.53 (2.4.53-1)
  • Summary:
    A high performance Unix-based HTTP server
  • License:
    • APACHE
  • Links(s):

apache

2.4.53 (2.4.53-1)
  • Summary:
    A high performance Unix-based HTTP server
  • License:
    • APACHE
  • Links(s):

apache

2.4.53 (2.4.53-1)
  • Summary:
    A high performance Unix-based HTTP server
  • License:
    • APACHE
  • Links(s):

apache-git

2.5.0.alpha.r2263.g939538607c (2.5.0.alpha.r2263.g939538607c-1)

apache-html-manual

2.4.46 Potentially vulnerable (2.4.46-1)

apache-tools

2.4.53 (2.4.53-1)

apache22

2.2.34 Potentially vulnerable (2.2.34-1)
Artix
world

apache

2.4.53 (2.4.53-1)
  • Summary:
    A high performance Unix-based HTTP server
  • License:
    • APACHE
  • Links(s):

apache2

2.4.46 Potentially vulnerable (2.4.46-1~bpo9+1)

apache

2.4.48 Potentially vulnerable

httpd

2.2.15 Potentially vulnerable (2.2.15-69.el6.centos)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Links(s):
CentOS 7
updates

httpd

2.4.6 Potentially vulnerable (2.4.6-97.el7.centos.2)
CentOS 7
updates

httpd

2.4.6 Potentially vulnerable (2.4.6-97.el7.centos.4)
CentOS 7
updates

httpd

2.4.6 Potentially vulnerable (2.4.6-97.el7.centos.5)
CentOS 7
updates

httpd

2.4.6 Potentially vulnerable (2.4.6-97.el7.centos)
CentOS 7
updates

httpd

2.4.6 Potentially vulnerable (2.4.6-97.el7.centos.1)

httpd

2.4.6 Potentially vulnerable (2.4.6-95.el7.centos)
CentOS 8
AppStream

httpd

2.4.37 Potentially vulnerable (2.4.37-43.module_el8.5.0+1022+b541f3b1)
CentOS 8
AppStream

httpd

2.4.37 Potentially vulnerable (2.4.37-41.module_el8.5.0+977+5653bbea)
CentOS Stream 8
AppStream

httpd

2.4.37 Potentially vulnerable (2.4.37-30.module_el8.3.0+462+ba287492.0.1)
CentOS Stream 8
AppStream

httpd

2.4.37 Potentially vulnerable (2.4.37-39.module_el8.4.0+778+c970deab)
CentOS Stream 8
AppStream

httpd

2.4.37 Potentially vulnerable (2.4.37-40.module_el8.5.0+852+0aafc63b)
CentOS Stream 8
AppStream

httpd

2.4.37 Potentially vulnerable (2.4.37-43.module_el8.5.0+1022+b541f3b1)
CentOS Stream 8
AppStream

httpd

2.4.37 Potentially vulnerable (2.4.37-47.module_el8.6.0+1111+ce6f4ceb.1)
CentOS Stream 9
AppStream

httpd

2.4.51 Potentially vulnerable (2.4.51-2.el9)
CentOS Stream 9
AppStream

httpd

2.4.51 Potentially vulnerable (2.4.51-3.el9)
CentOS Stream 9
AppStream

httpd

2.4.51 Potentially vulnerable (2.4.51-4.el9)
CentOS Stream 9
AppStream

httpd

2.4.51 Potentially vulnerable (2.4.51-5.el9)
CentOS Stream 9
AppStream

httpd

2.4.51 Potentially vulnerable (2.4.51-8.el9)
CentOS Stream 9
AppStream

httpd

2.4.48 Potentially vulnerable (2.4.48-17.el9)
CentOS Stream 9
AppStream

httpd

2.4.48 Potentially vulnerable (2.4.48-18.el9)

Apache HTTP Server Project

2.4.53

apache

2.4.39 Potentially vulnerable

apache

2.4.46 Potentially vulnerable

apache

2.4.53

httpd

2.4.39 Potentially vulnerable (2.4.39-1)

httpd-debuginfo

2.4.39 Potentially vulnerable (2.4.39-1)

httpd-devel

2.4.39 Potentially vulnerable (2.4.39-1)

httpd-manual

2.4.39 Potentially vulnerable (2.4.39-1)

httpd-mod_http2

2.4.39 Potentially vulnerable (2.4.39-1)

httpd-mod_ldap

2.4.39 Potentially vulnerable (2.4.39-1)

httpd-mod_lua

2.4.39 Potentially vulnerable (2.4.39-1)

httpd-mod_proxy_html

2.4.39 Potentially vulnerable (2.4.39-1)

httpd-mod_ssl

2.4.39 Potentially vulnerable (2.4.39-1)

httpd-tools

2.4.39 Potentially vulnerable (2.4.39-1)
Devuan 1.0
jessie/main

apache2

2.4.10 Potentially vulnerable (2.4.10-10+deb8u12)
Devuan 2.0
ascii/main

apache2

2.4.25 Potentially vulnerable (2.4.25-3+deb9u9)
Devuan 3.0
beowulf/main

apache2

2.4.38 Potentially vulnerable (2.4.38-3+deb10u7)
Devuan 4.0
chimaera/main

apache2

2.4.53 (2.4.53-1~deb11u1)
Devuan Unstable
unstable/main

apache2

2.4.53 (2.4.53-2)

httpd

2.4.53

www/apache24

2.4.53

www/htdigest

2.4.6 Potentially vulnerable (2.4.6_4)
Entware
armv7sf-k3.2

apache

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
mipssf-k3.4

apache

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
aarch64-k3.10

apache

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
armv5sf-k3.2

apache

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
armv7sf-k2.6

apache

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
mipselsf-k3.4

apache

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
x64-k3.2

apache

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
armv7sf-k3.2

apache-ab

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
mipssf-k3.4

apache-ab

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
aarch64-k3.10

apache-ab

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
armv5sf-k3.2

apache-ab

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
armv7sf-k2.6

apache-ab

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
mipselsf-k3.4

apache-ab

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
x64-k3.2

apache-ab

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
armv7sf-k3.2

apache-error

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
mipssf-k3.4

apache-error

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
armv5sf-k3.2

apache-error

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
aarch64-k3.10

apache-error

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
armv7sf-k2.6

apache-error

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
mipselsf-k3.4

apache-error

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
x64-k3.2

apache-error

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
armv7sf-k3.2

apache-icons

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
mipssf-k3.4

apache-icons

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
armv5sf-k3.2

apache-icons

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
aarch64-k3.10

apache-icons

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
armv7sf-k2.6

apache-icons

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
mipselsf-k3.4

apache-icons

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
x64-k3.2

apache-icons

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
aarch64-k3.10

apache-mod-deflate

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
armv5sf-k3.2

apache-mod-deflate

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
armv7sf-k2.6

apache-mod-deflate

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
armv7sf-k3.2

apache-mod-deflate

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
mipselsf-k3.4

apache-mod-deflate

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
mipssf-k3.4

apache-mod-deflate

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
x64-k3.2

apache-mod-deflate

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
aarch64-k3.10

apache-mod-http2

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
armv5sf-k3.2

apache-mod-http2

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
armv7sf-k2.6

apache-mod-http2

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
armv7sf-k3.2

apache-mod-http2

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
mipselsf-k3.4

apache-mod-http2

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
mipssf-k3.4

apache-mod-http2

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
x64-k3.2

apache-mod-http2

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
aarch64-k3.10

apache-mod-ldap

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
armv5sf-k3.2

apache-mod-ldap

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
armv7sf-k2.6

apache-mod-ldap

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
armv7sf-k3.2

apache-mod-ldap

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
mipselsf-k3.4

apache-mod-ldap

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
mipssf-k3.4

apache-mod-ldap

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
x64-k3.2

apache-mod-ldap

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
aarch64-k3.10

apache-mod-lua

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
armv5sf-k3.2

apache-mod-lua

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
armv7sf-k2.6

apache-mod-lua

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
armv7sf-k3.2

apache-mod-lua

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
mipselsf-k3.4

apache-mod-lua

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
mipssf-k3.4

apache-mod-lua

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
x64-k3.2

apache-mod-lua

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
aarch64-k3.10

apache-mod-md

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
armv5sf-k3.2

apache-mod-md

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
armv7sf-k2.6

apache-mod-md

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
armv7sf-k3.2

apache-mod-md

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
mipselsf-k3.4

apache-mod-md

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
mipssf-k3.4

apache-mod-md

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
x64-k3.2

apache-mod-md

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
aarch64-k3.10

apache-mod-proxy

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
armv5sf-k3.2

apache-mod-proxy

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
armv7sf-k2.6

apache-mod-proxy

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
armv7sf-k3.2

apache-mod-proxy

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
mipselsf-k3.4

apache-mod-proxy

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
x64-k3.2

apache-mod-proxy

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
mipssf-k3.4

apache-mod-proxy

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
aarch64-k3.10

apache-mod-proxy-html

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
armv5sf-k3.2

apache-mod-proxy-html

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
armv7sf-k2.6

apache-mod-proxy-html

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
armv7sf-k3.2

apache-mod-proxy-html

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
mipselsf-k3.4

apache-mod-proxy-html

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
mipssf-k3.4

apache-mod-proxy-html

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
x64-k3.2

apache-mod-proxy-html

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
aarch64-k3.10

apache-mod-session-crypto

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
armv5sf-k3.2

apache-mod-session-crypto

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
armv7sf-k2.6

apache-mod-session-crypto

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
armv7sf-k3.2

apache-mod-session-crypto

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
mipselsf-k3.4

apache-mod-session-crypto

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
mipssf-k3.4

apache-mod-session-crypto

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
x64-k3.2

apache-mod-session-crypto

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
aarch64-k3.10

apache-mod-ssl

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
armv5sf-k3.2

apache-mod-ssl

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
armv7sf-k2.6

apache-mod-ssl

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
armv7sf-k3.2

apache-mod-ssl

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
mipselsf-k3.4

apache-mod-ssl

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
mipssf-k3.4

apache-mod-ssl

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
x64-k3.2

apache-mod-ssl

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
aarch64-k3.10

apache-mod-suexec

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
armv5sf-k3.2

apache-mod-suexec

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
armv7sf-k2.6

apache-mod-suexec

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
armv7sf-k3.2

apache-mod-suexec

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
mipselsf-k3.4

apache-mod-suexec

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
mipssf-k3.4

apache-mod-suexec

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
x64-k3.2

apache-mod-suexec

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
aarch64-k3.10

apache-mod-webdav

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
armv5sf-k3.2

apache-mod-webdav

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
armv7sf-k2.6

apache-mod-webdav

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
armv7sf-k3.2

apache-mod-webdav

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
mipselsf-k3.4

apache-mod-webdav

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
mipssf-k3.4

apache-mod-webdav

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
x64-k3.2

apache-mod-webdav

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
aarch64-k3.10

apache-suexec

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
armv5sf-k3.2

apache-suexec

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
armv7sf-k2.6

apache-suexec

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
armv7sf-k3.2

apache-suexec

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
mipselsf-k3.4

apache-suexec

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
mipssf-k3.4

apache-suexec

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
x64-k3.2

apache-suexec

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
aarch64-k3.10

apache-utils

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
armv5sf-k3.2

apache-utils

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
armv7sf-k2.6

apache-utils

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
armv7sf-k3.2

apache-utils

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
mipselsf-k3.4

apache-utils

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
mipssf-k3.4

apache-utils

2.4.52 Potentially vulnerable (2.4.52-1)
Entware
x64-k3.2

apache-utils

2.4.52 Potentially vulnerable (2.4.52-1)
EuroLinux 8
appstream

httpd

2.4.37 Potentially vulnerable (2.4.37-39.module+el8.4.0+9658+b87b2deb)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Links(s):
EuroLinux 8
appstream

httpd

2.4.37 Potentially vulnerable (2.4.37-43.module+el8.5.0+13064+c4b14997)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Links(s):
EuroLinux 8
appstream

httpd

2.4.37 Potentially vulnerable (2.4.37-43.module+el8.5.0+13806+b30d9eec.1)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Links(s):
EuroLinux 8
appstream

httpd

2.4.37 Potentially vulnerable (2.4.37-43.module+el8.5.0+14370+51c6d843.2)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Links(s):
EuroLinux 8
appstream

httpd

2.4.37 Potentially vulnerable (2.4.37-43.module+el8.5.0+14530+6f259f31.3)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Links(s):
EuroLinux 8
appstream

httpd

2.4.37 Potentially vulnerable (2.4.37-47.module+el8.6.0+14529+083145da.1)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Links(s):
EuroLinux 8
appstream

httpd

2.4.37 Potentially vulnerable (2.4.37-30.module+el8.3.0+7001+0766b9e7)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Links(s):
EuroLinux 8
appstream

httpd

2.4.37 Potentially vulnerable (2.4.37-39.module+el8.4.0+12865+a7065a39.1)
  • Summary:
    Apache HTTP Server
  • Category:
    • System Environment/Daemons
  • License:
    • ASL 2.0
  • Links(s):

www-servers/apache

2.4.53
Fedora 26
updates

httpd

2.4.33 Potentially vulnerable (2.4.33-4.fc26)
Fedora 26
release

httpd

2.4.25 Potentially vulnerable (2.4.25-8.fc26)
Fedora 27
updates

httpd

2.4.34 Potentially vulnerable (2.4.34-3.fc27)
Fedora 27
release

httpd

2.4.28 Potentially vulnerable (2.4.28-1.fc27)
Fedora 28
updates

httpd

2.4.39 Potentially vulnerable (2.4.39-1.1.fc28)
Fedora 28
release

httpd

2.4.33 Potentially vulnerable (2.4.33-2.fc28)
Fedora 29
updates

httpd

2.4.41 Potentially vulnerable (2.4.41-5.fc29)
Fedora 29
release

httpd

2.4.34 Potentially vulnerable (2.4.34-8.fc29)
Fedora 30
updates

httpd

2.4.41 Potentially vulnerable (2.4.41-6.1.fc30)
Fedora 30
release

httpd

2.4.39 Potentially vulnerable (2.4.39-2.fc30)
Fedora 31
updates

httpd

2.4.46 Potentially vulnerable (2.4.46-1.fc31)
Fedora 31
release

httpd

2.4.41 Potentially vulnerable (2.4.41-5.fc31)
Fedora 32
updates

httpd

2.4.46 Potentially vulnerable (2.4.46-1.fc32)
Fedora 32
release

httpd

2.4.43 Potentially vulnerable (2.4.43-1.fc32)
Fedora 33
updates

httpd

2.4.51 Potentially vulnerable (2.4.51-1.fc33)
Fedora 33
release

httpd

2.4.46 Potentially vulnerable (2.4.46-1.fc33)
Fedora 34
updates

httpd

2.4.53 (2.4.53-1.fc34)
Fedora 34
release

httpd

2.4.46 Potentially vulnerable (2.4.46-10.fc34)
Fedora 35
updates

httpd

2.4.53 (2.4.53-1.fc35)
Fedora 35
release

httpd

2.4.51 Potentially vulnerable (2.4.51-2.fc35)
Fedora 36
release

httpd

2.4.53 (2.4.53-1.fc36)
Fedora Rawhide
development

httpd

2.4.53 (2.4.53-7.fc37)

www/apache24

2.4.53 (2.4.53_1)

www/htdigest

2.4.6 Potentially vulnerable (2.4.6_4)
Funtoo 1.4
core-server-kit

app-admin/apache-tools

2.4.46 Potentially vulnerable
Funtoo 1.4
core-server-kit

www-servers/apache

2.4.46 Potentially vulnerable

app-admin/apache-tools

2.4.53 (2.4.53-r1)

www-servers/apache

2.4.53 (2.4.53-r1)

www-servers/apache

2.4.53

HTTPD

2.4.37 Potentially vulnerable

httpd

2.4.53
HP-UX 11.31
ia64_64

apache

2.4.53
HP-UX 11.31
hppa_32

apache

2.4.46 Potentially vulnerable
HP-UX 11.31
ia64_64

apache

2.4.46 Potentially vulnerable
HP-UX 11.31
hppa_32

apache

2.4.27 Potentially vulnerable
HP-UX 11.31
ia64_32

apache

2.4.27 Potentially vulnerable
HP-UX 11.31
hppa_32

apache

2.4.7 Potentially vulnerable
KaOS
main

apache

2.4.53 (2.4.53-1)

app-admin/apache-tools

2.4.53

app-admin/apache-tools

2.4.52 Potentially vulnerable

www-servers/apache

2.4.53 (2.4.53-r1)

www-servers/apache

2.4.53

app-admin/apache-tools

2.4.53

app-admin/apache-tools

2.4.52 Potentially vulnerable

www-servers/apache

2.4.53

www-servers/apache

2.4.53 (2.4.53-r1)

apache2

2.4.53
Mageia 7
core/updates

apache

2.4.48 Potentially vulnerable (2.4.48-1.mga7)
Mageia 7
core/updates

apache

2.4.46 Potentially vulnerable (2.4.46-1.mga7)
Mageia 7
core/updates

apache

2.4.43 Potentially vulnerable (2.4.43-1.mga7)
Mageia 7
core/updates

apache

2.4.41 Potentially vulnerable (2.4.41-1.2.mga7)
Mageia 7
core/release

apache

2.4.39 Potentially vulnerable (2.4.39-1.mga7)
Mageia 8
core/updates

apache

2.4.53 (2.4.53-1.mga8)
  • Summary:
    The most widely used Web server on the Internet
  • Category:
    • System/Servers
  • License:
    • ASL 2.0
  • Links(s):
Mageia 8
core/updates

apache

2.4.52 Potentially vulnerable (2.4.52-1.mga8)
  • Summary:
    The most widely used Web server on the Internet
  • Category:
    • System/Servers
  • License:
    • ASL 2.0
  • Links(s):
Mageia 8
core/updates

apache

2.4.51 Potentially vulnerable (2.4.51-1.mga8)
  • Summary:
    The most widely used Web server on the Internet
  • Category:
    • System/Servers
  • License:
    • ASL 2.0
  • Links(s):
Mageia 8
core/updates

apache

2.4.50 Potentially vulnerable (2.4.50-1.mga8)
  • Summary:
    The most widely used Web server on the Internet
  • Category:
    • System/Servers
  • License:
    • ASL 2.0
  • Links(s):
Mageia 8
core/updates

apache

2.4.49 Potentially vulnerable (2.4.49-1.1.mga8)
  • Summary:
    The most widely used Web server on the Internet
  • Category:
    • System/Servers
  • License:
    • ASL 2.0
  • Links(s):
Mageia 8
core/updates

apache

2.4.49 Potentially vulnerable (2.4.49-1.mga8)
  • Summary:
    The most widely used Web server on the Internet
  • Category:
    • System/Servers
  • License:
    • ASL 2.0
  • Links(s):
Mageia 8
core/updates

apache

2.4.48 Potentially vulnerable (2.4.48-1.mga8)
  • Summary:
    The most widely used Web server on the Internet
  • Category:
    • System/Servers
  • License:
    • ASL 2.0
  • Links(s):
Mageia 8
core/release

apache

2.4.46 Potentially vulnerable (2.4.46-2.mga8)
  • Summary:
    The most widely used Web server on the Internet
  • Category:
    • System/Servers
  • License:
    • ASL 2.0
  • Links(s):
Mageia Cauldron
core/release

apache

2.4.53 (2.4.53-1.mga9)

apache

2.4.53 (2.4.53-1)
  • Summary:
    A high performance Unix-based HTTP server
  • License:
    • APACHE
  • Links(s):

apache

2.4.53 (2.4.53-1)
  • Summary:
    A high performance Unix-based HTTP server
  • License:
    • APACHE
  • Links(s):

apache

2.4.53 (2.4.53-1)
  • Summary:
    A high performance Unix-based HTTP server
  • License:
    • APACHE
  • Links(s):

www/apache24

2.4.53

apache-httpd

2.4.51 Potentially vulnerable

apache-httpd

2.4.53

apache-httpd

2.4.53

Apache HTTP Server 64 bit

2.4.53

Apache HTTP Server 64 bit

2.4.52 Potentially vulnerable

Apache HTTP Server 64 bit

2.4.51 Potentially vulnerable

Apache HTTP Server 64 bit

2.4.50 Potentially vulnerable

Apache HTTP Server 64 bit

2.4.49 Potentially vulnerable

Apache HTTP Server 64 bit

2.4.48 Potentially vulnerable

Apache HTTP Server 64 bit

2.4.46 Potentially vulnerable

Apache HTTP Server 64 bit

2.4.43 Potentially vulnerable

Apache HTTP Server 64 bit

2.4.41 Potentially vulnerable

www/apache-httpd

2.4.53 (2.4.53p2)

httpd

2.4.34 Potentially vulnerable (2.4.34-15.oe1)

apache2

2.4.53

apache2

2.4.53
openmamba
devel

apache

2.4.53 (1:2.4.53-1mamba)
OpenMandriva 4.0
main/release

apache

2.4.39 Potentially vulnerable (2.4.39-1)
OpenMandriva 4.1
main/release

apache

2.4.41 Potentially vulnerable (2.4.41-1)
OpenMandriva 4.2
main/release

apache

2.4.46 Potentially vulnerable (2.4.46-1)

apache

2.4.47 Potentially vulnerable (2.4.47-1)
OpenMandriva Cooker
main/release

apache

2.4.52 Potentially vulnerable (2.4.52-1)

apache

2.2.34 Potentially vulnerable
openSUSE Leap 42.3
updates/oss

apache2

2.4.23 Potentially vulnerable (2.4.23-13.1)
openSUSE Leap 42.3
updates/oss

apache2

2.4.23 Potentially vulnerable (2.4.23-16.1)
openSUSE Leap 42.3
updates/oss

apache2

2.4.23 Potentially vulnerable (2.4.23-19.1)
openSUSE Leap 42.3
updates/oss

apache2

2.4.23 Potentially vulnerable (2.4.23-22.1)
openSUSE Leap 42.3
updates/oss

apache2

2.4.23 Potentially vulnerable (2.4.23-25.1)
openSUSE Leap 42.3
updates/oss

apache2

2.4.23 Potentially vulnerable (2.4.23-28.1)
openSUSE Leap 42.3
updates/oss

apache2

2.4.23 Potentially vulnerable (2.4.23-31.1)
openSUSE Leap 42.3
updates/oss

apache2

2.4.23 Potentially vulnerable (2.4.23-34.1)
openSUSE Leap 42.3
updates/oss

apache2

2.4.23 Potentially vulnerable (2.4.23-37.1)
openSUSE Leap 42.3
updates/oss

apache2

2.4.23 Potentially vulnerable (2.4.23-40.1)
openSUSE Leap 42.3
updates/oss

apache2

2.4.23 Potentially vulnerable (2.4.23-45.1)
openSUSE Leap 42.3
updates/oss

apache2

2.4.23 Potentially vulnerable (2.4.23-49.1)

apache2

2.4.23 Potentially vulnerable (2.4.23-11.2)

apache2

2.4.33 Potentially vulnerable (2.4.33-lp150.1.2)
openSUSE Leap 15.0
updates/oss

apache2

2.4.33 Potentially vulnerable (2.4.33-lp150.2.14.1)
openSUSE Leap 15.0
updates/oss

apache2

2.4.33 Potentially vulnerable (2.4.33-lp150.2.17.1)
openSUSE Leap 15.0
updates/oss

apache2

2.4.33 Potentially vulnerable (2.4.33-lp150.2.20.1)
openSUSE Leap 15.0
updates/oss

apache2

2.4.33 Potentially vulnerable (2.4.33-lp150.2.23.1)
openSUSE Leap 15.0
updates/oss

apache2

2.4.33 Potentially vulnerable (2.4.33-lp150.2.3.1)
openSUSE Leap 15.0
updates/oss

apache2

2.4.33 Potentially vulnerable (2.4.33-lp150.2.6.1)
openSUSE Leap 15.0
updates/oss

apache2

2.4.33 Potentially vulnerable (2.4.33-lp150.2.9.1)

apache2

2.4.33 Potentially vulnerable (2.4.33-lp151.7.1)
openSUSE Leap 15.1
updates/oss

apache2

2.4.33 Potentially vulnerable (2.4.33-lp151.8.12.1)
openSUSE Leap 15.1
updates/oss

apache2

2.4.33 Potentially vulnerable (2.4.33-lp151.8.15.1)
openSUSE Leap 15.1
updates/oss

apache2

2.4.33 Potentially vulnerable (2.4.33-lp151.8.18.1)
openSUSE Leap 15.1
updates/oss

apache2

2.4.33 Potentially vulnerable (2.4.33-lp151.8.21.1)
openSUSE Leap 15.1
updates/oss

apache2

2.4.33 Potentially vulnerable (2.4.33-lp151.8.3.1)
openSUSE Leap 15.1
updates/oss

apache2

2.4.33 Potentially vulnerable (2.4.33-lp151.8.6.1)
  • Summary:
    The Apache Web Server Version 2.4
  • Category:
    • Productivity/Networking/Web/Servers
  • License: