Versions Packages Information History CVEs Related Badges Report

Versions for apache

772 package(s) known

Repository Package name Version Category Maintainer(s)
Adélie Linux current
user
apache-httpd-openrc 2.4.46 Potentially vulnerable - adelie@aerdan.vulpine.house
Adélie Linux current
user
apache-httpd-http2 2.4.46 Potentially vulnerable - adelie@aerdan.vulpine.house
Adélie Linux current
user
apache-httpd 2.4.46 Potentially vulnerable - adelie@aerdan.vulpine.house
Adélie Linux current
user
apache-httpd-dev 2.4.46 Potentially vulnerable - adelie@aerdan.vulpine.house
Adélie Linux current
user
apache-httpd-ldap 2.4.46 Potentially vulnerable - adelie@aerdan.vulpine.house
Adélie Linux current
user
apache-httpd-dbg 2.4.46 Potentially vulnerable - adelie@aerdan.vulpine.house
Adélie Linux current
user
apache-httpd-doc 2.4.46 Potentially vulnerable - adelie@aerdan.vulpine.house
Adélie Linux current
user
apache-httpd-icons 2.4.46 Potentially vulnerable - adelie@aerdan.vulpine.house
AIX Open Source Packages httpd 2.4.46 Potentially vulnerable - -
AIX Open Source Packages httpd_64 2.4.46 Potentially vulnerable - -
AIX Open Source Packages httpd 2.4.43 Potentially vulnerable - -
AIX Open Source Packages httpd_64 2.4.43 Potentially vulnerable - -
AIX Open Source Packages httpd 2.4.41 Potentially vulnerable - -
AIX Open Source Packages httpd_64 2.4.41 Potentially vulnerable - -
AIX Open Source Packages httpd 2.4.39 Potentially vulnerable - -
AIX Open Source Packages httpd_64 2.4.39 Potentially vulnerable - -
AIX Open Source Packages httpd 2.4.38 Potentially vulnerable - -
AIX Open Source Packages httpd_64 2.4.38 Potentially vulnerable - -
AIX Open Source Packages httpd 2.4.37 Potentially vulnerable - -
AIX Open Source Packages httpd_64 2.4.37 Potentially vulnerable - -
AIX Open Source Packages httpd 2.4.35 Potentially vulnerable - -
AIX Open Source Packages httpd_64 2.4.35 Potentially vulnerable - -
AIX Open Source Packages httpd 2.4.34 Potentially vulnerable - -
AIX Open Source Packages httpd_64 2.4.34 Potentially vulnerable - -
AIX Open Source Packages httpd 2.4.33 Potentially vulnerable - -
AIX Open Source Packages httpd_64 2.4.33 Potentially vulnerable - -
AIX Open Source Packages httpd 2.4.29 Potentially vulnerable - -
AIX Open Source Packages httpd_64 2.4.29 Potentially vulnerable - -
AIX Open Source Packages httpd 2.4.28 Potentially vulnerable - -
AIX Open Source Packages httpd_64 2.4.28 Potentially vulnerable - -
AIX Open Source Packages httpd 2.4.27 Potentially vulnerable - -
AIX Open Source Packages httpd 2.4.27 Potentially vulnerable - -
AIX Open Source Packages httpd_64 2.4.27 Potentially vulnerable - -
AIX Open Source Packages httpd_64 2.4.27 Potentially vulnerable - -
AIX Open Source Packages httpd 2.4.25 Potentially vulnerable - -
AIX Open Source Packages httpd_64 2.4.25 Potentially vulnerable - -
AIX Open Source Packages httpd 2.4.23 Potentially vulnerable - -
AIX Open Source Packages httpd 2.4.23 Potentially vulnerable - -
AIX Open Source Packages httpd_64 2.4.23 Potentially vulnerable - -
AIX Open Source Packages httpd 2.4.20 Potentially vulnerable - -
AIX Open Source Packages httpd_64 2.4.20 Potentially vulnerable - -
AIX Open Source Packages httpd_64 2.4.18 Potentially vulnerable - -
AIX Open Source Packages httpd_64 2.4.18 Potentially vulnerable - -
AIX Open Source Packages httpd 2.4.18 Potentially vulnerable - -
AIX Open Source Packages httpd 2.4.18 Potentially vulnerable - -
AIX Open Source Packages httpd 2.4.17 Potentially vulnerable - -
AIX Open Source Packages httpd_64 2.4.17 Potentially vulnerable - -
AIX Open Source Packages httpd 2.4.16 Potentially vulnerable - -
AIX Open Source Packages httpd_64 2.4.16 Potentially vulnerable - -
AIX Open Source Packages httpd 2.4.12 Potentially vulnerable - -
AIX Open Source Packages httpd_64 2.4.12 Potentially vulnerable - -
AIX Open Source Packages httpd_64 2.4.10 Potentially vulnerable - -
AIX Open Source Packages httpd 2.4.10 Potentially vulnerable - -
AIX Open Source Packages httpd 2.4.9 Potentially vulnerable - -
AIX Open Source Packages httpd_64 2.4.9 Potentially vulnerable - -
AIX Open Source Packages httpd 2.4.7 Potentially vulnerable - -
AIX Open Source Packages httpd_64 2.4.7 Potentially vulnerable - -
AIX Open Source Packages httpd 2.4.6 Potentially vulnerable - -
AIX Open Source Packages httpd_64 2.4.6 Potentially vulnerable - -
AIX Open Source Packages httpd 2.4.4 Potentially vulnerable - -
AIX Open Source Packages httpd 2.4.4 Potentially vulnerable - -
AIX Open Source Packages httpd_64 2.4.4 Potentially vulnerable - -
AIX Open Source Packages httpd 2.4.3 Potentially vulnerable - -
AIX Open Source Packages httpd 2.4.2 Potentially vulnerable - -
AIX Open Source Packages httpd 2.4.2 Potentially vulnerable - -
AIX Open Source Packages httpd 2.4.2 Potentially vulnerable - -
AIX Open Source Packages httpd 2.4.2 Potentially vulnerable - -
AIX Open Source Packages httpd 2.4.1 Potentially vulnerable - -
AIX Open Source Packages httpd 2.4.1 Potentially vulnerable - -
AIX Open Source Packages httpd 2.4.1 Potentially vulnerable - -
AIX Open Source Packages httpd 2.2.34 Potentially vulnerable - -
AIX Open Source Packages httpd_64 2.2.34 Potentially vulnerable - -
AIX Open Source Packages httpd 2.2.32 Potentially vulnerable - -
AIX Open Source Packages httpd 2.2.32 Potentially vulnerable - -
AIX Open Source Packages httpd_64 2.2.32 Potentially vulnerable - -
AIX Open Source Packages httpd_64 2.2.32 Potentially vulnerable - -
AIX Open Source Packages httpd 2.2.31 Potentially vulnerable - -
AIX Open Source Packages httpd 2.2.31 Potentially vulnerable - -
AIX Open Source Packages httpd 2.2.31 Potentially vulnerable - -
AIX Open Source Packages httpd_64 2.2.31 Potentially vulnerable - -
AIX Open Source Packages httpd_64 2.2.31 Potentially vulnerable - -
AIX Open Source Packages httpd_64 2.2.31 Potentially vulnerable - -
AIX Open Source Packages httpd 2.2.29 Potentially vulnerable - -
AIX Open Source Packages httpd_64 2.2.29 Potentially vulnerable - -
AIX Open Source Packages httpd 2.2.27 Potentially vulnerable - -
AIX Open Source Packages httpd 2.2.27 Potentially vulnerable - -
AIX Open Source Packages httpd_64 2.2.27 Potentially vulnerable - -
AIX Open Source Packages httpd_64 2.2.27 Potentially vulnerable - -
AIX Open Source Packages httpd_64 2.2.26 Potentially vulnerable - -
AIX Open Source Packages httpd 2.2.26 Potentially vulnerable - -
AIX Open Source Packages httpd 2.2.26 Potentially vulnerable - -
AIX Open Source Packages httpd_64 2.2.26 Potentially vulnerable - -
AIX Open Source Packages httpd 2.2.25 Potentially vulnerable - -
AIX Open Source Packages httpd 2.2.25 Potentially vulnerable - -
AIX Open Source Packages httpd_64 2.2.25 Potentially vulnerable - -
AIX Open Source Packages httpd_64 2.2.25 Potentially vulnerable - -
AIX Open Source Packages httpd 2.2.24 Potentially vulnerable - -
AIX Open Source Packages httpd 2.2.24 Potentially vulnerable - -
AIX Open Source Packages httpd_64 2.2.24 Potentially vulnerable - -
AIX Open Source Packages httpd 2.2.23 Potentially vulnerable - -
AIX Open Source Packages httpd 2.2.22 Potentially vulnerable - -
AIX Open Source Packages httpd 2.2.22 Potentially vulnerable - -
AIX Open Source Packages httpd 2.2.21 Potentially vulnerable - -
AIX Open Source Packages httpd 2.2.21 Potentially vulnerable - -
AIX Open Source Packages httpd 2.2.21 Potentially vulnerable - -
AIX Open Source Packages httpd 2.2.20 Potentially vulnerable - -
AIX Open Source Packages httpd 2.2.19 Potentially vulnerable - -
AIX Open Source Packages httpd 2.2.19 Potentially vulnerable - -
AIX Open Source Packages httpd 2.2.17 Potentially vulnerable - -
AIX Open Source Packages httpd 2.2.17 Potentially vulnerable - -
AIX Open Source Packages httpd 2.2.17 Potentially vulnerable - -
AIX Open Source Packages httpd 2.2.17 Potentially vulnerable - -
AIX Open Source Packages httpd 2.2.16 Potentially vulnerable - -
AIX Open Source Packages httpd 2.2.15 Potentially vulnerable - -
AIX Open Source Packages httpd 2.2.14 Potentially vulnerable - -
AIX Open Source Packages httpd 2.2.14 Potentially vulnerable - -
AIX Open Source Packages httpd 2.2.11 Potentially vulnerable - -
AIX Open Source Packages httpd 2.2.10 Potentially vulnerable - -
AIX Open Source Packages httpd 2.2.9 Potentially vulnerable - -
AIX Open Source Packages httpd 2.2.8 Potentially vulnerable - -
AIX Open Source Packages httpd 2.2.8 Potentially vulnerable - -
AIX Open Source Packages httpd 2.2.6 Potentially vulnerable - -
AIX Open Source Packages httpd 2.2.6 Potentially vulnerable - -
AIX Open Source Packages httpd 2.2.6 Potentially vulnerable - -
AIX Open Source Packages httpd 2.0.64 Potentially vulnerable - -
AIX Open Source Packages httpd 2.0.64 Potentially vulnerable - -
AIX Open Source Packages httpd 2.0.64 Potentially vulnerable - -
AIX Open Source Packages httpd 2.0.64 Potentially vulnerable - -
AIX Open Source Packages httpd 2.0.63 Potentially vulnerable - -
AIX Open Source Packages httpd 2.0.61 Potentially vulnerable - -
AIX Open Source Packages httpd 2.0.59 Potentially vulnerable - -
AIX Toolbox httpd 2.4.46 Potentially vulnerable System Environment/Daemons -
AIX Toolbox httpd 2.4.43 Potentially vulnerable System Environment/Daemons -
AIX Toolbox httpd 2.4.43 Potentially vulnerable System Environment/Daemons -
AIX Toolbox httpd 2.4.41 Potentially vulnerable System Environment/Daemons -
AIX Toolbox httpd 2.4.39 Potentially vulnerable System Environment/Daemons -
AIX Toolbox httpd 2.4.39 Potentially vulnerable System Environment/Daemons -
AIX Toolbox httpd 2.4.38 Potentially vulnerable System Environment/Daemons -
AIX Toolbox httpd 2.4.38 Potentially vulnerable System Environment/Daemons -
AIX Toolbox httpd 2.4.37 Potentially vulnerable System Environment/Daemons -
AIX Toolbox httpd 2.4.37 Potentially vulnerable System Environment/Daemons -
AIX Toolbox httpd 2.4.34 Potentially vulnerable System Environment/Daemons -
AIX Toolbox httpd 2.4.33 Potentially vulnerable System Environment/Daemons -
AIX Toolbox httpd 2.4.29 Potentially vulnerable System Environment/Daemons -
AlmaLinux 8
AppStream
httpd 2.4.37 Potentially vulnerable System Environment/Daemons packager@almalinux.org
AlmaLinux 8
AppStream
httpd 2.4.37 Potentially vulnerable System Environment/Daemons packager@almalinux.org
Alpine Linux 3.8
main
apache2-doc 2.4.43 Potentially vulnerable - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.8
main
apache2-ssl 2.4.43 Potentially vulnerable - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.8
main
apache2-dev 2.4.43 Potentially vulnerable - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.8
main
apache2-http2 2.4.43 Potentially vulnerable - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.8
main
apache2-ctl 2.4.43 Potentially vulnerable - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.8
main
apache2-proxy-html 2.4.43 Potentially vulnerable - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.8
main
apache2-webdav 2.4.43 Potentially vulnerable - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.8
main
apache2-lua 2.4.43 Potentially vulnerable - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.8
main
apache2-error 2.4.43 Potentially vulnerable - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.8
main
apache2-proxy 2.4.43 Potentially vulnerable - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.8
main
apache2-ldap 2.4.43 Potentially vulnerable - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.8
main
apache2-icons 2.4.43 Potentially vulnerable - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.8
main
apache2-utils 2.4.43 Potentially vulnerable - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.8
main
apache2 2.4.43 Potentially vulnerable - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.9
main
apache2-error 2.4.46 Potentially vulnerable - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.9
main
apache2-dev 2.4.46 Potentially vulnerable - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.9
main
apache2-webdav 2.4.46 Potentially vulnerable - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.9
main
apache2-proxy-html 2.4.46 Potentially vulnerable - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.9
main
apache2-http2 2.4.46 Potentially vulnerable - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.9
main
apache2-ldap 2.4.46 Potentially vulnerable - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.9
main
apache2-lua 2.4.46 Potentially vulnerable - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.9
main
apache2 2.4.46 Potentially vulnerable - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.9
main
apache2-doc 2.4.46 Potentially vulnerable - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.9
main
apache2-icons 2.4.46 Potentially vulnerable - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.9
main
apache2-utils 2.4.46 Potentially vulnerable - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.9
main
apache2-ctl 2.4.46 Potentially vulnerable - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.9
main
apache2-ssl 2.4.46 Potentially vulnerable - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.9
main
apache2-proxy 2.4.46 Potentially vulnerable - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.10
main
apache2-utils 2.4.48 Potentially vulnerable - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.10
main
apache2-dev 2.4.48 Potentially vulnerable - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.10
main
apache2-error 2.4.48 Potentially vulnerable - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.10
main
apache2-lua 2.4.48 Potentially vulnerable - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.10
main
apache2-doc 2.4.48 Potentially vulnerable - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.10
main
apache2-ctl 2.4.48 Potentially vulnerable - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.10
main
apache2-ldap 2.4.48 Potentially vulnerable - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.10
main
apache2-http2 2.4.48 Potentially vulnerable - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.10
main
apache2-webdav 2.4.48 Potentially vulnerable - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.10
main
apache2-icons 2.4.48 Potentially vulnerable - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.10
main
apache2-ssl 2.4.48 Potentially vulnerable - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.10
main
apache2-proxy-html 2.4.48 Potentially vulnerable - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.10
main
apache2-proxy 2.4.48 Potentially vulnerable - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.10
main
apache2 2.4.48 Potentially vulnerable - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.11
main
apache2-icons 2.4.51 Potentially vulnerable - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.11
main
apache2-proxy-html 2.4.51 Potentially vulnerable - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.11
main
apache2-http2 2.4.51 Potentially vulnerable - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.11
main
apache2-doc 2.4.51 Potentially vulnerable - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.11
main
apache2-ctl 2.4.51 Potentially vulnerable - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.11
main
apache2-dev 2.4.51 Potentially vulnerable - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.11
main
apache2 2.4.51 Potentially vulnerable - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.11
main
apache2-utils 2.4.51 Potentially vulnerable - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.11
main
apache2-proxy 2.4.51 Potentially vulnerable - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.11
main
apache2-error 2.4.51 Potentially vulnerable - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.11
main
apache2-ldap 2.4.51 Potentially vulnerable - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.11
main
apache2-webdav 2.4.51 Potentially vulnerable - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.11
main
apache2-lua 2.4.51 Potentially vulnerable - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.11
main
apache2-ssl 2.4.51 Potentially vulnerable - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.12
main
apache2 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.12
main
apache2-ctl 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.12
main
apache2-ssl 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.12
main
apache2-dev 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.12
main
apache2-icons 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.12
main
apache2-proxy 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.12
main
apache2-error 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.12
main
apache2-lua 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.12
main
apache2-utils 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.12
main
apache2-webdav 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.12
main
apache2-proxy-html 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.12
main
apache2-ldap 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.12
main
apache2-http2 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.12
main
apache2-doc 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.13
main
apache2-brotli 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.13
main
apache2-icons 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.13
main
apache2-proxy-html 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.13
main
apache2-error 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.13
main
apache2-ldap 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.13
main
apache2-webdav 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.13
main
apache2-doc 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.13
main
apache2-lua 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.13
main
apache2 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.13
main
apache2-dev 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.13
main
apache2-proxy 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.13
main
apache2-utils 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.13
main
apache2-ssl 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.13
main
apache2-http2 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.13
main
apache2-ctl 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.14
main
apache2-dev 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.14
main
apache2-http2 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.14
main
apache2-ctl 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.14
main
apache2 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.14
main
apache2-utils 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.14
main
apache2-proxy 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.14
main
apache2-error 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.14
main
apache2-ssl 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.14
main
apache2-icons 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.14
main
apache2-proxy-html 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.14
main
apache2-doc 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.14
main
apache2-lua 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.14
main
apache2-ldap 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.14
main
apache2-webdav 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.14
main
apache2-brotli 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.15
main
apache2-brotli 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.15
main
apache2-utils 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.15
main
apache2-http2 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.15
main
apache2-doc 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.15
main
apache2-icons 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.15
main
apache2-error 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.15
main
apache2-ssl 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.15
main
apache2-ldap 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.15
main
apache2-webdav 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.15
main
apache2-proxy-html 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.15
main
apache2-dev 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.15
main
apache2-lua 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.15
main
apache2-proxy 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.15
main
apache2-ctl 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux 3.15
main
apache2 2.4.52 - kaarle.ritvanen@datakunkku.fi
Alpine Linux Edge
main
apache2-brotli 2.4.52 - kunkku@alpinelinux.org
Alpine Linux Edge
main
apache2-webdav 2.4.52 - kunkku@alpinelinux.org
Alpine Linux Edge
main
apache2-lua 2.4.52 - kunkku@alpinelinux.org
Alpine Linux Edge
main
apache2-ctl 2.4.52 - kunkku@alpinelinux.org
Alpine Linux Edge
main
apache2-proxy 2.4.52 - kunkku@alpinelinux.org
Alpine Linux Edge
main
apache2-ldap 2.4.52 - kunkku@alpinelinux.org
Alpine Linux Edge
main
apache2 2.4.52 - kunkku@alpinelinux.org
Alpine Linux Edge
main
apache2-icons 2.4.52 - kunkku@alpinelinux.org
Alpine Linux Edge
main
apache2-error 2.4.52 - kunkku@alpinelinux.org
Alpine Linux Edge
main
apache2-http2 2.4.52 - kunkku@alpinelinux.org
Alpine Linux Edge
main
apache2-proxy-html 2.4.52 - kunkku@alpinelinux.org
Alpine Linux Edge
main
apache2-utils 2.4.52 - kunkku@alpinelinux.org
Alpine Linux Edge
main
apache2-ssl 2.4.52 - kunkku@alpinelinux.org
Alpine Linux Edge
main
apache2-doc 2.4.52 - kunkku@alpinelinux.org
Alpine Linux Edge
main
apache2-dev 2.4.52 - kunkku@alpinelinux.org
ALT Linux p9 apache2 2.4.51 Potentially vulnerable System/Servers rider@altlinux.org
ALT Linux p10 apache2 2.4.52 System/Servers rider@altlinux.org
ALT Sisyphus apache2 2.4.52 System/Servers rider@altlinux.org
Amazon Linux 1
main
httpd 2.2.34 Potentially vulnerable System Environment/Daemons -
Amazon Linux 2 httpd 2.4.52 System Environment/Daemons -
Amazon Linux 2 httpd 2.4.51 Potentially vulnerable System Environment/Daemons -
Amazon Linux 2 httpd 2.4.48 Potentially vulnerable System Environment/Daemons -
Amazon Linux 2 httpd 2.4.46 Potentially vulnerable System Environment/Daemons -
Amazon Linux 2 httpd 2.4.46 Potentially vulnerable System Environment/Daemons -
Amazon Linux 2 httpd 2.4.43 Potentially vulnerable System Environment/Daemons -
Amazon Linux 2 httpd 2.4.41 Potentially vulnerable System Environment/Daemons -
Amazon Linux 2 httpd 2.4.39 Potentially vulnerable System Environment/Daemons -
Amazon Linux 2 httpd 2.4.37 Potentially vulnerable System Environment/Daemons -
Amazon Linux 2 httpd 2.4.34 Potentially vulnerable System Environment/Daemons -
Amazon Linux 2 httpd 2.4.34 Potentially vulnerable System Environment/Daemons -
Amazon Linux 2 httpd 2.4.33 Potentially vulnerable System Environment/Daemons -
Amazon Linux 2 httpd 2.4.33 Potentially vulnerable System Environment/Daemons -
Amazon Linux 2 httpd 2.4.33 Potentially vulnerable System Environment/Daemons -
Amazon Linux 2 httpd 2.4.6 Potentially vulnerable System Environment/Daemons -
AOSC httpd 2.4.52 net fallback-mnt-aosc@repology
Apertis v2020
v2020/development
apache2 2.4.38 Potentially vulnerable main debian-apache@lists.debian.org, arno@debian.org, ondrej@debian.org, sf@debian.org, yadd@debian.org
Apertis v2021
v2021/development
apache2 2.4.38 Potentially vulnerable main debian-apache@lists.debian.org, arno@debian.org, ondrej@debian.org, sf@debian.org, yadd@debian.org
Apertis v2022 Development
v2022dev2/development
apache2 2.4.46 Potentially vulnerable main debian-apache@lists.debian.org, arno@debian.org, ondrej@debian.org, sf@debian.org, yadd@debian.org
Arch
extra
apache 2.4.52 - -
AUR apache-git 2.5.0.alpha.r2263.g939538607c - chocobo1@aur
AUR apache-tools 2.4.51 Potentially vulnerable - fordprefect@aur
AUR apache-html-manual 2.4.46 Potentially vulnerable - dracorp@aur
AUR apache22 2.2.34 Potentially vulnerable - fallback-mnt-aur@repology
Artix
world
apache 2.4.52 - -
Astra Orel Stable
main
apache2 2.4.46 Potentially vulnerable httpd debian-apache@lists.debian.org, arno@debian.org, ondrej@debian.org, sf@debian.org, yadd@debian.org
Ataraxia GNU/Linux apache 2.4.48 Potentially vulnerable httpd nagakamira@gmail.com
CentOS 6
os
httpd 2.2.15 Potentially vulnerable System Environment/Daemons -
CentOS 7
os
httpd 2.4.6 Potentially vulnerable System Environment/Daemons -
CentOS 7
updates
httpd 2.4.6 Potentially vulnerable System Environment/Daemons -
CentOS 7
updates
httpd 2.4.6 Potentially vulnerable System Environment/Daemons -
CentOS 7
updates
httpd 2.4.6 Potentially vulnerable System Environment/Daemons -
CentOS 8
AppStream
httpd 2.4.37 Potentially vulnerable System Environment/Daemons bugs@centos.org
CentOS 8
AppStream
httpd 2.4.37 Potentially vulnerable System Environment/Daemons bugs@centos.org
CentOS 8 Stream
AppStream
httpd 2.4.37 Potentially vulnerable System Environment/Daemons bugs@centos.org
CentOS 8 Stream
AppStream
httpd 2.4.37 Potentially vulnerable System Environment/Daemons bugs@centos.org
Chocolatey Apache HTTP Server Project 2.4.52 - -
CRUX 3.4
opt
apache 2.4.39 Potentially vulnerable - jue@crux.nu
CRUX 3.5
opt
apache 2.4.46 Potentially vulnerable - jue@crux.nu
CRUX 3.6
opt
apache 2.4.52 - jue@crux.nu
Cygwin httpd-mod_ldap 2.4.39 Potentially vulnerable Web orphaned@cygwin
Cygwin httpd-devel 2.4.39 Potentially vulnerable Web orphaned@cygwin
Cygwin httpd-mod_lua 2.4.39 Potentially vulnerable Web orphaned@cygwin
Cygwin httpd 2.4.39 Potentially vulnerable Web orphaned@cygwin
Cygwin httpd-debuginfo 2.4.39 Potentially vulnerable Debug orphaned@cygwin
Cygwin httpd-manual 2.4.39 Potentially vulnerable Web orphaned@cygwin
Cygwin httpd-mod_http2 2.4.39 Potentially vulnerable Web orphaned@cygwin
Cygwin httpd-mod_proxy_html 2.4.39 Potentially vulnerable Web orphaned@cygwin
Cygwin httpd-mod_ssl 2.4.39 Potentially vulnerable Web orphaned@cygwin
Cygwin httpd-tools 2.4.39 Potentially vulnerable Web orphaned@cygwin
Debian 8
jessie/main
apache2 2.4.10 Potentially vulnerable httpd debian-apache@lists.debian.org, arno@debian.org, sf@debian.org
Debian 9
stretch/main
apache2 2.4.25 Potentially vulnerable httpd debian-apache@lists.debian.org, arno@debian.org, sf@debian.org
Debian 10
buster/main
apache2 2.4.38 Potentially vulnerable httpd debian-apache@lists.debian.org, arno@debian.org, ondrej@debian.org, sf@debian.org, yadd@debian.org
Debian 10 Backports
buster-backports/main
apache2 2.4.51 Potentially vulnerable misc debian-apache@lists.debian.org, arno@debian.org, ondrej@debian.org, sf@debian.org, yadd@debian.org
Debian 11
bullseye/main
apache2 2.4.51 Potentially vulnerable httpd debian-apache@lists.debian.org, arno@debian.org, ondrej@debian.org, sf@debian.org, yadd@debian.org
Debian 12
bookworm/main
apache2 2.4.52 httpd debian-apache@lists.debian.org, arno@debian.org, ondrej@debian.org, sf@debian.org, yadd@debian.org
Debian Unstable
sid/main
apache2 2.4.52 httpd debian-apache@lists.debian.org, arno@debian.org, ondrej@debian.org, sf@debian.org, yadd@debian.org
Debian Experimental
experimental/main
apache2 2.4.52 httpd debian-apache@lists.debian.org, arno@debian.org, ondrej@debian.org, sf@debian.org, yadd@debian.org
Deepin
main
apache2 2.4.40.2 Potentially vulnerable - debian-apache@lists.debian.org, arno@debian.org, ondrej@debian.org, sf@debian.org, yadd@debian.org
Devuan 1.0
jessie/main
apache2 2.4.10 Potentially vulnerable httpd debian-apache@lists.debian.org, arno@debian.org, sf@debian.org
Devuan 2.0
ascii/main
apache2 2.4.25 Potentially vulnerable httpd debian-apache@lists.debian.org, arno@debian.org, sf@debian.org
Devuan 3.0
beowulf/main
apache2 2.4.38 Potentially vulnerable httpd debian-apache@lists.debian.org, arno@debian.org, ondrej@debian.org, sf@debian.org, yadd@debian.org
Devuan 4.0
chimaera/main
apache2 2.4.51 Potentially vulnerable httpd debian-apache@lists.debian.org, arno@debian.org, ondrej@debian.org, sf@debian.org, yadd@debian.org
Devuan Unstable
unstable/main
apache2 2.4.52 httpd debian-apache@lists.debian.org, arno@debian.org, ondrej@debian.org, sf@debian.org, yadd@debian.org
DistroWatch.com httpd 2.4.52 - -
DPorts www/apache24 2.4.52 www apache@freebsd.org
DPorts www/htdigest 2.4.6 Potentially vulnerable www crees@freebsd.org
Entware
aarch64-k3.10
apache-mod-ssl 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
aarch64-k3.10
apache-mod-suexec 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
aarch64-k3.10
apache 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
aarch64-k3.10
apache-ab 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
aarch64-k3.10
apache-error 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
aarch64-k3.10
apache-icons 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
aarch64-k3.10
apache-mod-deflate 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
aarch64-k3.10
apache-mod-http2 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
aarch64-k3.10
apache-mod-ldap 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
aarch64-k3.10
apache-mod-lua 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
aarch64-k3.10
apache-mod-md 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
aarch64-k3.10
apache-mod-proxy 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
aarch64-k3.10
apache-mod-proxy-html 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
aarch64-k3.10
apache-mod-session-crypto 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
aarch64-k3.10
apache-mod-webdav 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
aarch64-k3.10
apache-suexec 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
aarch64-k3.10
apache-utils 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
armv5sf-k3.2
apache 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
armv5sf-k3.2
apache-ab 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
armv5sf-k3.2
apache-error 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
armv5sf-k3.2
apache-icons 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
armv5sf-k3.2
apache-mod-deflate 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
armv5sf-k3.2
apache-mod-http2 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
armv5sf-k3.2
apache-mod-ldap 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
armv5sf-k3.2
apache-mod-lua 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
armv5sf-k3.2
apache-mod-md 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
armv5sf-k3.2
apache-mod-proxy 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
armv5sf-k3.2
apache-mod-proxy-html 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
armv5sf-k3.2
apache-mod-session-crypto 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
armv5sf-k3.2
apache-mod-ssl 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
armv5sf-k3.2
apache-mod-suexec 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
armv5sf-k3.2
apache-mod-webdav 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
armv5sf-k3.2
apache-suexec 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
armv5sf-k3.2
apache-utils 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
armv7sf-k2.6
apache 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
armv7sf-k2.6
apache-ab 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
armv7sf-k2.6
apache-error 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
armv7sf-k2.6
apache-icons 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
armv7sf-k2.6
apache-mod-deflate 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
armv7sf-k2.6
apache-mod-http2 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
armv7sf-k2.6
apache-mod-ldap 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
armv7sf-k2.6
apache-mod-lua 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
armv7sf-k2.6
apache-mod-md 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
armv7sf-k2.6
apache-mod-proxy 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
armv7sf-k2.6
apache-mod-proxy-html 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
armv7sf-k2.6
apache-mod-session-crypto 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
armv7sf-k2.6
apache-mod-ssl 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
armv7sf-k2.6
apache-mod-suexec 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
armv7sf-k2.6
apache-mod-webdav 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
armv7sf-k2.6
apache-suexec 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
armv7sf-k2.6
apache-utils 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
armv7sf-k3.2
apache 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
armv7sf-k3.2
apache-ab 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
armv7sf-k3.2
apache-error 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
armv7sf-k3.2
apache-icons 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
armv7sf-k3.2
apache-mod-deflate 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
armv7sf-k3.2
apache-mod-http2 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
armv7sf-k3.2
apache-mod-ldap 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
armv7sf-k3.2
apache-mod-lua 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
armv7sf-k3.2
apache-mod-md 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
armv7sf-k3.2
apache-mod-proxy 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
armv7sf-k3.2
apache-mod-proxy-html 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
armv7sf-k3.2
apache-mod-session-crypto 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
armv7sf-k3.2
apache-mod-ssl 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
armv7sf-k3.2
apache-mod-suexec 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
armv7sf-k3.2
apache-mod-webdav 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
armv7sf-k3.2
apache-suexec 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
armv7sf-k3.2
apache-utils 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
mipselsf-k3.4
apache 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
mipselsf-k3.4
apache-ab 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
mipselsf-k3.4
apache-error 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
mipselsf-k3.4
apache-icons 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
mipselsf-k3.4
apache-mod-deflate 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
mipselsf-k3.4
apache-mod-http2 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
mipselsf-k3.4
apache-mod-ldap 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
mipselsf-k3.4
apache-mod-lua 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
mipselsf-k3.4
apache-mod-md 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
mipselsf-k3.4
apache-mod-proxy 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
mipselsf-k3.4
apache-mod-proxy-html 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
mipselsf-k3.4
apache-mod-session-crypto 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
mipselsf-k3.4
apache-mod-ssl 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
mipselsf-k3.4
apache-mod-suexec 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
mipselsf-k3.4
apache-mod-webdav 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
mipselsf-k3.4
apache-suexec 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
mipselsf-k3.4
apache-utils 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
mipssf-k3.4
apache 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
mipssf-k3.4
apache-ab 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
mipssf-k3.4
apache-error 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
mipssf-k3.4
apache-icons 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
mipssf-k3.4
apache-mod-deflate 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
mipssf-k3.4
apache-mod-http2 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
mipssf-k3.4
apache-mod-ldap 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
mipssf-k3.4
apache-mod-lua 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
mipssf-k3.4
apache-mod-md 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
mipssf-k3.4
apache-mod-proxy 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
mipssf-k3.4
apache-mod-proxy-html 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
mipssf-k3.4
apache-mod-session-crypto 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
mipssf-k3.4
apache-mod-ssl 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
mipssf-k3.4
apache-mod-suexec 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
mipssf-k3.4
apache-mod-webdav 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
mipssf-k3.4
apache-suexec 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
mipssf-k3.4
apache-utils 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
x64-k3.2
apache 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
x64-k3.2
apache-ab 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
x64-k3.2
apache-error 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
x64-k3.2
apache-icons 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
x64-k3.2
apache-mod-deflate 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
x64-k3.2
apache-mod-http2 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
x64-k3.2
apache-mod-ldap 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
x64-k3.2
apache-mod-lua 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
x64-k3.2
apache-mod-md 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
x64-k3.2
apache-mod-proxy 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
x64-k3.2
apache-mod-proxy-html 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
x64-k3.2
apache-mod-session-crypto 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
x64-k3.2
apache-mod-ssl 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
x64-k3.2
apache-mod-suexec 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
x64-k3.2
apache-mod-webdav 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
x64-k3.2
apache-suexec 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Entware
x64-k3.2
apache-utils 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
Exherbo
net
www-servers/apache 2.4.52 www-servers fallback-mnt-exherbo@repology
Fedora 26
updates
httpd 2.4.33 Potentially vulnerable System Environment/Daemons -
Fedora 26
release
httpd 2.4.25 Potentially vulnerable System Environment/Daemons -
Fedora 27
updates
httpd 2.4.34 Potentially vulnerable System Environment/Daemons -
Fedora 27
release
httpd 2.4.28 Potentially vulnerable System Environment/Daemons -
Fedora 28
updates
httpd 2.4.39 Potentially vulnerable System Environment/Daemons -
Fedora 28
release
httpd 2.4.33 Potentially vulnerable System Environment/Daemons -
Fedora 29
updates
httpd 2.4.41 Potentially vulnerable Unspecified -
Fedora 29
release
httpd 2.4.34 Potentially vulnerable System Environment/Daemons -
Fedora 30
updates
httpd 2.4.41 Potentially vulnerable Unspecified -
Fedora 30
release
httpd 2.4.39 Potentially vulnerable Unspecified -
Fedora 31
updates
httpd 2.4.46 Potentially vulnerable Unspecified -
Fedora 31
release
httpd 2.4.41 Potentially vulnerable Unspecified -
Fedora 32
updates
httpd 2.4.46 Potentially vulnerable Unspecified -
Fedora 32
release
httpd 2.4.43 Potentially vulnerable Unspecified -
Fedora 33
updates
httpd 2.4.51 Potentially vulnerable Unspecified -
Fedora 33
release
httpd 2.4.46 Potentially vulnerable Unspecified -
Fedora 34
updates
httpd 2.4.51 Potentially vulnerable Unspecified -
Fedora 34
release
httpd 2.4.46 Potentially vulnerable Unspecified -
Fedora 35
updates
httpd 2.4.52 Unspecified -
Fedora 35
development
httpd 2.4.51 Potentially vulnerable Unspecified -
Fedora Rawhide httpd 2.4.52 Unspecified -
FreeBSD Ports www/apache24 2.4.52 www apache@freebsd.org
FreeBSD Ports www/htdigest 2.4.6 Potentially vulnerable www crees@freebsd.org
Funtoo 1.4
core-server-kit
app-admin/apache-tools 2.4.46 Potentially vulnerable app-admin polynomial-c@gentoo.org, apache-bugs@gentoo.org
Funtoo 1.4
core-server-kit
www-servers/apache 2.4.46 Potentially vulnerable www-servers polynomial-c@gentoo.org, apache-bugs@gentoo.org
Gentoo app-admin/apache-tools 2.4.52 app-admin apache-bugs@gentoo.org
Gentoo www-servers/apache 2.4.52 www-servers apache-bugs@gentoo.org
Gentoo app-admin/apache-tools 2.4.51 Potentially vulnerable app-admin apache-bugs@gentoo.org
Gentoo app-admin/apache-tools 2.4.51 Potentially vulnerable app-admin apache-bugs@gentoo.org
Gentoo www-servers/apache 2.4.51 Potentially vulnerable www-servers apache-bugs@gentoo.org
Gentoo www-servers/apache 2.4.51 Potentially vulnerable www-servers apache-bugs@gentoo.org
Gentoo www-servers/apache 2.4.51 Potentially vulnerable www-servers apache-bugs@gentoo.org
GNU Guix httpd 2.4.52 - -
GoboLinux HTTPD 2.4.37 Potentially vulnerable - -
HaikuPorts master www-servers/apache 2.4.50 Potentially vulnerable www-servers -
Homebrew httpd 2.4.52 - -
HP-UX 11.31
ia64_64
apache 2.4.52 - -
HP-UX 11.31
ia64_64
apache 2.4.51 Potentially vulnerable - -
HP-UX 11.31
hppa_32
apache 2.4.46 Potentially vulnerable - -
HP-UX 11.31
ia64_64
apache 2.4.46 Potentially vulnerable - -
HP-UX 11.31
hppa_32
apache 2.4.27 Potentially vulnerable - -
HP-UX 11.31
ia64_32
apache 2.4.27 Potentially vulnerable - -
HP-UX 11.31
hppa_32
apache 2.4.7 Potentially vulnerable - -
Hyperbola
extra
apache 2.4.43 Potentially vulnerable - -
Kali Linux Rolling
main
apache2 2.4.52 httpd debian-apache@lists.debian.org, arno@debian.org, ondrej@debian.org, sf@debian.org, yadd@debian.org
KaOS
main
apache 2.4.52 - demm@kaosx.us
LiGurOS stable www-servers/apache 2.4.52 www-servers apache-bugs@gentoo.org
LiGurOS stable app-admin/apache-tools 2.4.52 app-admin dev@liguros.net, polynomial-c@gentoo.org, apache-bugs@gentoo.org
LiGurOS stable www-servers/apache 2.4.51 Potentially vulnerable www-servers apache-bugs@gentoo.org
LiGurOS stable www-servers/apache 2.4.51 Potentially vulnerable www-servers apache-bugs@gentoo.org
LiGurOS stable www-servers/apache 2.4.51 Potentially vulnerable www-servers apache-bugs@gentoo.org
LiGurOS stable app-admin/apache-tools 2.4.51 Potentially vulnerable app-admin dev@liguros.net, polynomial-c@gentoo.org, apache-bugs@gentoo.org
LiGurOS develop app-admin/apache-tools 2.4.52 app-admin dev@liguros.net, polynomial-c@gentoo.org, apache-bugs@gentoo.org
LiGurOS develop www-servers/apache 2.4.52 www-servers apache-bugs@gentoo.org
LiGurOS develop app-admin/apache-tools 2.4.51 Potentially vulnerable app-admin dev@liguros.net, polynomial-c@gentoo.org, apache-bugs@gentoo.org
LiGurOS develop www-servers/apache 2.4.51 Potentially vulnerable www-servers apache-bugs@gentoo.org
LiGurOS develop www-servers/apache 2.4.51 Potentially vulnerable www-servers apache-bugs@gentoo.org
LiGurOS develop www-servers/apache 2.4.51 Potentially vulnerable www-servers apache-bugs@gentoo.org
MacPorts apache2 2.4.52 www ryandesign@macports, ryandesign@github, mps@macports, schamschula@github
Mageia 7
core/updates
apache 2.4.48 Potentially vulnerable System/Servers -
Mageia 7
core/updates
apache 2.4.46 Potentially vulnerable System/Servers -
Mageia 7
core/updates
apache 2.4.43 Potentially vulnerable System/Servers -
Mageia 7
core/updates
apache 2.4.41 Potentially vulnerable System/Servers -
Mageia 7
core/release
apache 2.4.39 Potentially vulnerable System/Servers -
Mageia 8
core/updates
apache 2.4.52 System/Servers -
Mageia 8
core/updates
apache 2.4.51 Potentially vulnerable System/Servers -
Mageia 8
core/updates
apache 2.4.50 Potentially vulnerable System/Servers -
Mageia 8
core/updates
apache 2.4.49 Potentially vulnerable System/Servers -
Mageia 8
core/updates
apache 2.4.49 Potentially vulnerable System/Servers -
Mageia 8
core/updates
apache 2.4.48 Potentially vulnerable System/Servers -
Mageia 8
core/release
apache 2.4.46 Potentially vulnerable System/Servers -
Mageia Cauldron
core/release
apache 2.4.52 System/Servers -
Manjaro Stable
extra
apache 2.4.52 - -
Manjaro Testing
extra
apache 2.4.52 - -
Manjaro Unstable
extra
apache 2.4.52 - -
MidnightBSD mports www/apache24 2.4.51 Potentially vulnerable www -
nixpkgs stable 21.05 apache-httpd 2.4.51 Potentially vulnerable - jason@oconal.id.au, simons@cryp.to
nixpkgs stable 21.11 apache-httpd 2.4.52 - jason@oconal.id.au
nixpkgs unstable apache-httpd 2.4.52 - jason@oconal.id.au
Npackd Stable64 Apache HTTP Server 64 bit 2.4.52 Development -
Npackd Stable64 Apache HTTP Server 64 bit 2.4.51 Potentially vulnerable Development -
Npackd Stable64 Apache HTTP Server 64 bit 2.4.50 Potentially vulnerable Development -
Npackd Stable64 Apache HTTP Server 64 bit 2.4.49 Potentially vulnerable Development -
Npackd Stable64 Apache HTTP Server 64 bit 2.4.48 Potentially vulnerable Development -
Npackd Stable64 Apache HTTP Server 64 bit 2.4.46 Potentially vulnerable Development -
Npackd Stable64 Apache HTTP Server 64 bit 2.4.43 Potentially vulnerable Development -
Npackd Stable64 Apache HTTP Server 64 bit 2.4.41 Potentially vulnerable Development -
OpenBSD Ports www/apache-httpd 2.4.52 www giovanni@openbsd.org
openEuler 20.03
source
httpd 2.4.34 Potentially vulnerable Unspecified -
OpenIndiana packages
hipster
apache2 2.4.52 Web Services/Application and Web Servers -
OpenIndiana packages
hipster
apache2 2.4.52 Web Services/Application and Web Servers -
OpenIndiana packages
hipster
apache2 2.4.51 Potentially vulnerable Web Services/Application and Web Servers -
OpenIndiana packages
hipster
apache2 2.4.51 Potentially vulnerable Web Services/Application and Web Servers -
OpenIndiana packages
hipster
apache2 2.4.50 Potentially vulnerable Web Services/Application and Web Servers -
OpenIndiana packages
hipster
apache2 2.4.50 Potentially vulnerable Web Services/Application and Web Servers -
OpenIndiana packages
hipster
apache2 2.4.49 Potentially vulnerable Web Services/Application and Web Servers -
OpenIndiana packages
hipster
apache2 2.4.49 Potentially vulnerable Web Services/Application and Web Servers -
OpenIndiana packages
hipster
apache2 2.4.48 Potentially vulnerable Web Services/Application and Web Servers -
OpenIndiana packages
hipster
apache2 2.4.48 Potentially vulnerable Web Services/Application and Web Servers -
openmamba
devel
apache 2.4.52 System/Servers silvan.calarco@mambasoft.it
OpenMandriva 4.0
main/release
apache 2.4.39 Potentially vulnerable System/Servers bero@lindev.ch
OpenMandriva Cooker
main/release
apache 2.4.47 Potentially vulnerable System/Servers bero+massbuild@lindev.ch
OpenPKG apache 2.2.34 Potentially vulnerable Web -
openSUSE Leap 42.3
main/oss
apache2 2.4.23 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 42.3
updates/oss
apache2 2.4.23 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 42.3
updates/oss
apache2 2.4.23 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 42.3
updates/oss
apache2 2.4.23 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 42.3
updates/oss
apache2 2.4.23 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 42.3
updates/oss
apache2 2.4.23 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 42.3
updates/oss
apache2 2.4.23 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 42.3
updates/oss
apache2 2.4.23 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 42.3
updates/oss
apache2 2.4.23 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 42.3
updates/oss
apache2 2.4.23 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 42.3
updates/oss
apache2 2.4.23 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 42.3
updates/oss
apache2 2.4.23 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 42.3
updates/oss
apache2 2.4.23 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 15.0
updates/oss
apache2 2.4.33 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 15.0
updates/oss
apache2 2.4.33 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 15.0
updates/oss
apache2 2.4.33 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 15.0
updates/oss
apache2 2.4.33 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 15.0
updates/oss
apache2 2.4.33 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 15.0
updates/oss
apache2 2.4.33 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 15.0
updates/oss
apache2 2.4.33 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 15.0
main/oss
apache2 2.4.33 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 15.1
updates/oss
apache2 2.4.33 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 15.1
updates/oss
apache2 2.4.33 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 15.1
updates/oss
apache2 2.4.33 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 15.1
updates/oss
apache2 2.4.33 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 15.1
updates/oss
apache2 2.4.33 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 15.1
updates/oss
apache2 2.4.33 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 15.1
updates/oss
apache2 2.4.33 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 15.1
main/oss
apache2 2.4.33 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 15.2
main/oss
apache2 2.4.43 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 15.2
updates/oss
apache2 2.4.43 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 15.2
updates/oss
apache2 2.4.43 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 15.2
updates/oss
apache2 2.4.43 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 15.2
updates/oss
apache2 2.4.43 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 15.2
updates/oss
apache2 2.4.43 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 15.2
updates/oss
apache2 2.4.43 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 15.2
updates/oss
apache2 2.4.43 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 15.3
main/oss
apache2 2.4.43 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Leap 15.4
main/oss
apache2 2.4.51 Potentially vulnerable Productivity/Networking/Web/Servers -
openSUSE Tumbleweed
src-oss
apache2 2.4.52 Productivity/Networking/Web/Servers -
OpenWrt 17.01 x86_64
packages
apache-icons 2.4.25 Potentially vulnerable net heil@terminal-consulting.de
OpenWrt 17.01 x86_64
packages
apache 2.4.25 Potentially vulnerable net heil@terminal-consulting.de
OpenWrt 18.06 x86_64
packages
apache-icons 2.4.28 Potentially vulnerable net heil@terminal-consulting.de
OpenWrt 18.06 x86_64
packages
apache 2.4.28 Potentially vulnerable net heil@terminal-consulting.de
OpenWrt 19.07 x86_64
packages
apache-ab 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
OpenWrt 19.07 x86_64
packages
apache-error 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
OpenWrt 19.07 x86_64
packages
apache-icons 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
OpenWrt 19.07 x86_64
packages
apache-mod-deflate 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
OpenWrt 19.07 x86_64
packages
apache-mod-http2 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
OpenWrt 19.07 x86_64
packages
apache-mod-ldap 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
OpenWrt 19.07 x86_64
packages
apache-mod-lua 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
OpenWrt 19.07 x86_64
packages
apache-mod-md 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
OpenWrt 19.07 x86_64
packages
apache-mod-proxy-html 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
OpenWrt 19.07 x86_64
packages
apache-mod-proxy 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
OpenWrt 19.07 x86_64
packages
apache-mod-session-crypto 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
OpenWrt 19.07 x86_64
packages
apache-mod-ssl 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
OpenWrt 19.07 x86_64
packages
apache-mod-suexec 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
OpenWrt 19.07 x86_64
packages
apache-mod-webdav 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
OpenWrt 19.07 x86_64
packages
apache-suexec 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
OpenWrt 19.07 x86_64
packages
apache-utils 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
OpenWrt 19.07 x86_64
packages
apache 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
OpenWrt 21.02 x86_64
packages
apache-ab 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
OpenWrt 21.02 x86_64
packages
apache-error 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
OpenWrt 21.02 x86_64
packages
apache-icons 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
OpenWrt 21.02 x86_64
packages
apache-mod-deflate 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
OpenWrt 21.02 x86_64
packages
apache-mod-http2 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
OpenWrt 21.02 x86_64
packages
apache-mod-ldap 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
OpenWrt 21.02 x86_64
packages
apache-mod-lua 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
OpenWrt 21.02 x86_64
packages
apache-mod-md 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
OpenWrt 21.02 x86_64
packages
apache-mod-proxy-html 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
OpenWrt 21.02 x86_64
packages
apache-mod-proxy 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
OpenWrt 21.02 x86_64
packages
apache-mod-session-crypto 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
OpenWrt 21.02 x86_64
packages
apache-mod-ssl 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
OpenWrt 21.02 x86_64
packages
apache-mod-suexec 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
OpenWrt 21.02 x86_64
packages
apache-mod-webdav 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
OpenWrt 21.02 x86_64
packages
apache-suexec 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
OpenWrt 21.02 x86_64
packages
apache-utils 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
OpenWrt 21.02 x86_64
packages
apache 2.4.51 Potentially vulnerable net heil@terminal-consulting.de
OS4Depot apache 1.3.34 Potentially vulnerable network/server/http -
Parabola
extra
apache 2.4.52 - -
Pardus 17
updates/main
apache2 2.4.25 Potentially vulnerable httpd debian-apache@lists.debian.org, arno@debian.org, sf@debian.org
Pardus 17
updates/main
apache2 2.4.25 Potentially vulnerable httpd debian-apache@lists.debian.org, arno@debian.org, sf@debian.org
Pardus 17
updates/main
apache2 2.4.25 Potentially vulnerable httpd debian-apache@lists.debian.org, arno@debian.org, sf@debian.org
Pardus 17
main
apache2 2.4.25 Potentially vulnerable httpd debian-apache@lists.debian.org, arno@debian.org, sf@debian.org
Pardus 19
main
apache2 2.4.38 Potentially vulnerable httpd debian-apache@lists.debian.org, arno@debian.org, ondrej@debian.org, sf@debian.org, yadd@debian.org
Pardus 19
updates/main
apache2 2.4.38 Potentially vulnerable httpd debian-apache@lists.debian.org, arno@debian.org, ondrej@debian.org, sf@debian.org, yadd@debian.org
Pardus 21
updates/main
apache2 2.4.52 httpd debian-apache@lists.debian.org, arno@debian.org, ondrej@debian.org, sf@debian.org, yadd@debian.org
Pardus 21
main
apache2 2.4.51 Potentially vulnerable httpd debian-apache@lists.debian.org, arno@debian.org, ondrej@debian.org, sf@debian.org, yadd@debian.org
Parrot LTS
lts-updates/main
apache2 2.4.52 httpd debian-apache@lists.debian.org, arno@debian.org, ondrej@debian.org, sf@debian.org, yadd@debian.org
Parrot LTS
lts/main
apache2 2.4.52 httpd debian-apache@lists.debian.org, arno@debian.org, ondrej@debian.org, sf@debian.org, yadd@debian.org
Parrot Rolling
rolling/main
apache2 2.4.52 httpd debian-apache@lists.debian.org, arno@debian.org, ondrej@debian.org, sf@debian.org, yadd@debian.org
PCLinuxOS apache 2.4.38 Potentially vulnerable System/Servers -
PCLinuxOS apache-doc 2.2.24 Potentially vulnerable System/Servers -
Pisi Linux
main
apache 2.4.51 Potentially vulnerable service admins@pisilinux.org
pkgsrc current www/apache24 2.4.52 www ryoon@netbsd.org
PLD Linux apache 2.4.52 - -
PLD Linux apache1 1.3.42 Potentially vulnerable - -
PureOS Amber apache2 2.4.38 Potentially vulnerable misc debian-apache@lists.debian.org, arno@debian.org, ondrej@debian.org, sf@debian.org, yadd@debian.org
PureOS Amber apache2 2.4.38 Potentially vulnerable misc debian-apache@lists.debian.org, arno@debian.org, ondrej@debian.org, sf@debian.org, yadd@debian.org
PureOS landing apache2 2.4.51 Potentially vulnerable misc debian-apache@lists.debian.org, arno@debian.org, ondrej@debian.org, sf@debian.org, yadd@debian.org
PureOS landing apache2 2.4.48 Potentially vulnerable misc debian-apache@lists.debian.org, arno@debian.org, ondrej@debian.org, sf@debian.org, yadd@debian.org
Raspbian Oldstable
main
apache2 2.4.38 Potentially vulnerable httpd debian-apache@lists.debian.org, arno@debian.org, ondrej@debian.org, sf@debian.org, yadd@debian.org
Raspbian Stable
main
apache2 2.4.52 httpd debian-apache@lists.debian.org, arno@debian.org, ondrej@debian.org, sf@debian.org, yadd@debian.org
Raspbian Testing
main
apache2 2.4.52 httpd debian-apache@lists.debian.org, arno@debian.org, ondrej@debian.org, sf@debian.org, yadd@debian.org
Ravenports apache 2.4.52 www fallback-mnt-ravenports@repology
Rocky Linux 8
AppStream
httpd 2.4.37 Potentially vulnerable System Environment/Daemons infrastructure@rockylinux.org
Rocky Linux 8
AppStream
httpd 2.4.37 Potentially vulnerable System Environment/Daemons infrastructure@rockylinux.org
Rosa 2014.1
main/updates
apache 2.4.41 Potentially vulnerable - -
Rosa 2014.1
main/release
apache 2.4.10 Potentially vulnerable - -
Rosa 2016.1
main/updates
apache 2.4.43 Potentially vulnerable - -
Rosa 2016.1
main/release
apache 2.4.25 Potentially vulnerable - -
Rosa 2019.1
main/release
apache 2.4.52 System/Servers alexander@mezon.ru
Rosa Server 6.9
base/release
httpd 2.2.15 Potentially vulnerable System Environment/Daemons andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/release
httpd 2.2.15 Potentially vulnerable System Environment/Daemons andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/release
httpd 2.2.15 Potentially vulnerable System Environment/Daemons andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/release
httpd 2.2.15 Potentially vulnerable System Environment/Daemons andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/updates
httpd 2.2.15 Potentially vulnerable System Environment/Daemons andrew.lukoshko@rosalab.ru
Rosa Server 7.3
base/release
httpd 2.4.6 Potentially vulnerable System Environment/Daemons alex2048@mail.ru
Rosa Server 7.5
base/release
httpd 2.4.6 Potentially vulnerable System Environment/Daemons alex2048@mail.ru
Rosa Server 7.5
base/release
httpd 2.4.6 Potentially vulnerable System Environment/Daemons alex2048@mail.ru
Sabayon for-gentoo www-servers/apache 2.4.41 Potentially vulnerable www-servers fallback-mnt-sabayon@repology
Scientific Linux 7.x httpd 2.4.6 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x httpd 2.4.6 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x httpd 2.4.6 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x httpd 2.4.6 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x httpd 2.4.6 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x httpd 2.4.6 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x httpd 2.4.6 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x httpd 2.4.6 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x httpd 2.4.6 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x httpd 2.4.6 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x httpd 2.4.6 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x httpd 2.4.6 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x httpd 2.4.6 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x httpd 2.4.6 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x httpd 2.4.6 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x httpd 2.4.6 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x httpd 2.4.6 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x httpd 2.4.6 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x httpd 2.4.6 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x httpd 2.4.6 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x httpd 2.4.6 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x httpd 2.4.6 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x httpd 2.4.6 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x httpd 2.4.6 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x httpd 2.4.6 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x httpd 2.4.6 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x httpd 2.4.6 Potentially vulnerable System Environment/Daemons -
Scientific Linux 7.x httpd 2.4.6 Potentially vulnerable System Environment/Daemons -
Scoop
main
apache 2.4.52 - -
Slackware 14.2
patches
httpd 2.4.52 - volkerdi@slackware.com
Slackware 14.2
slackware
httpd 2.4.20 Potentially vulnerable - volkerdi@slackware.com
Slackware current
slackware
httpd 2.4.52 - volkerdi@slackware.com
Slackware64 14.2
patches
httpd 2.4.52 - volkerdi@slackware.com
Slackware64 14.2
slackware64
httpd 2.4.20 Potentially vulnerable - volkerdi@slackware.com
Slackware64 current
slackware64
httpd 2.4.52 - volkerdi@slackware.com
Slackwarearm 14.2
patches
httpd 2.4.52 - volkerdi@slackware.com
Slackwarearm 14.2
slackware
httpd 2.4.20 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm current
slackware
httpd 2.4.52 - volkerdi@slackware.com
SliTaz Cooking apache 2.4.43 Potentially vulnerable network pascal.bellard@slitaz.org
SliTaz Cooking apache-dev 2.4.43 Potentially vulnerable development pascal.bellard@slitaz.org
SliTaz Cooking apache-doc 2.4.43 Potentially vulnerable development pascal.bellard@slitaz.org
SliTaz Next apache-dev 2.4.28 Potentially vulnerable development pascal.bellard@slitaz.org
SliTaz Next apache-doc 2.4.28 Potentially vulnerable development pascal.bellard@slitaz.org
SliTaz Next apache 2.4.28 Potentially vulnerable network pascal.bellard@slitaz.org
Solus httpd 2.4.51 Potentially vulnerable programming solene@perso.pw
Solus httpd-dbginfo 2.4.51 Potentially vulnerable debug solene@perso.pw
Solus httpd-devel 2.4.51 Potentially vulnerable programming.devel solene@perso.pw
Spack httpd 2.4.43 Potentially vulnerable - fallback-mnt-spack@repology
T2 SDE apache 2.4.52 extra/server rene@t2-project.org
Termux apache2 2.4.52 - termux@github
Trisquel 6.0
toutatis/main
apache2 2.2.22 Potentially vulnerable httpd trisquel-devel@listas.trisquel.info, debian@toell.net, sesse@debian.org, sf@debian.org
Trisquel 6.0
toutatis-updates/main
apache2 2.2.22 Potentially vulnerable httpd ubuntu-devel-discuss@lists.ubuntu.com, debian@toell.net, sesse@debian.org, sf@debian.org
Trisquel 7.0
belenos-updates/main
apache2 2.4.7 Potentially vulnerable httpd ubuntu-devel-discuss@lists.ubuntu.com, arno@debian.org, sf@debian.org
Trisquel 7.0
belenos/main
apache2 2.4.7 Potentially vulnerable httpd trisquel-devel@listas.trisquel.info, arno@debian.org, sf@debian.org
Trisquel 8.0
flidas-updates/main
apache2 2.4.18 Potentially vulnerable httpd ubuntu-devel-discuss@lists.ubuntu.com, arno@debian.org, sf@debian.org
Trisquel 9.0
etiona-updates/main
apache2 2.4.29 Potentially vulnerable httpd ubuntu-devel-discuss@lists.ubuntu.com, arno@debian.org, sf@debian.org
Trisquel 9.0
etiona/main
apache2 2.4.29 Potentially vulnerable httpd ubuntu-devel-discuss@lists.ubuntu.com, arno@debian.org, sf@debian.org
Trisquel 10.0
nabia-updates/main
apache2 2.4.41 Potentially vulnerable httpd ubuntu-devel-discuss@lists.ubuntu.com, arno@debian.org, ondrej@debian.org, sf@debian.org, yadd@debian.org
Trisquel 10.0
nabia-updates/main
apache2 2.4.41 Potentially vulnerable web ubuntu-devel-discuss@lists.ubuntu.com, arno@debian.org, ondrej@debian.org, sf@debian.org, yadd@debian.org
Trisquel 10.0
nabia/main
apache2 2.4.41 Potentially vulnerable httpd ubuntu-devel-discuss@lists.ubuntu.com, arno@debian.org, ondrej@debian.org, sf@debian.org, yadd@debian.org
UBI 8
appstream
httpd 2.4.37 Potentially vulnerable System Environment/Daemons -
UBI 8
appstream
httpd 2.4.37 Potentially vulnerable System Environment/Daemons -
Ubuntu 14.04
trusty/main
apache2 2.4.7 Potentially vulnerable web ubuntu-devel-discuss@lists.ubuntu.com, arno@debian.org, sf@debian.org
Ubuntu 14.04
trusty-updates/main
apache2 2.4.7 Potentially vulnerable web ubuntu-devel-discuss@lists.ubuntu.com, arno@debian.org, sf@debian.org
Ubuntu 14.04 Backports
trusty-backports/main
apache2 2.4.10 Potentially vulnerable web ubuntu-devel-discuss@lists.ubuntu.com, arno@debian.org, sf@debian.org
Ubuntu 16.04
xenial/main
apache2 2.4.18 Potentially vulnerable web ubuntu-devel-discuss@lists.ubuntu.com, arno@debian.org, sf@debian.org
Ubuntu 16.04
xenial-updates/main
apache2 2.4.18 Potentially vulnerable web ubuntu-devel-discuss@lists.ubuntu.com, arno@debian.org, sf@debian.org
Ubuntu 18.04
bionic/main
apache2 2.4.29 Potentially vulnerable web ubuntu-devel-discuss@lists.ubuntu.com, arno@debian.org, sf@debian.org
Ubuntu 18.04
bionic-updates/main
apache2 2.4.29 Potentially vulnerable web ubuntu-devel-discuss@lists.ubuntu.com, arno@debian.org, sf@debian.org
Ubuntu 20.04
focal/main
apache2 2.4.41 Potentially vulnerable web ubuntu-devel-discuss@lists.ubuntu.com, arno@debian.org, ondrej@debian.org, sf@debian.org, yadd@debian.org
Ubuntu 20.04
focal-updates/main
apache2 2.4.41 Potentially vulnerable web ubuntu-devel-discuss@lists.ubuntu.com, arno@debian.org, ondrej@debian.org, sf@debian.org, yadd@debian.org
Ubuntu 21.04
hirsute/main
apache2 2.4.46 Potentially vulnerable web ubuntu-devel-discuss@lists.ubuntu.com, arno@debian.org, ondrej@debian.org, sf@debian.org, yadd@debian.org
Ubuntu 21.04
hirsute-updates/main
apache2 2.4.46 Potentially vulnerable web ubuntu-devel-discuss@lists.ubuntu.com, arno@debian.org, ondrej@debian.org, sf@debian.org, yadd@debian.org
Ubuntu 21.10
impish-updates/main
apache2 2.4.48 Potentially vulnerable web ubuntu-devel-discuss@lists.ubuntu.com, arno@debian.org, ondrej@debian.org, sf@debian.org, yadd@debian.org
Ubuntu 21.10
impish/main
apache2 2.4.48 Potentially vulnerable web ubuntu-devel-discuss@lists.ubuntu.com, arno@debian.org, ondrej@debian.org, sf@debian.org, yadd@debian.org
Ubuntu 22.04
jammy/main
apache2 2.4.51 Potentially vulnerable web ubuntu-devel-discuss@lists.ubuntu.com, arno@debian.org, ondrej@debian.org, sf@debian.org, yadd@debian.org
Void Linux x86_64
x86_64
apache 2.4.52 - orphan@voidlinux.org
Void Linux x86_64
x86_64
apache-devel 2.4.52 - orphan@voidlinux.org
Void Linux x86_64
x86_64
apache-htpasswd 2.4.52 - orphan@voidlinux.org
Wikidata Apache HTTP Server 2.4.52 - -
yiffOS Knot httpd 2.4.52 - evie@uwueviee.live