IPv6 logo

You are connected to Repology using legacy IPv4 protocol. Due to IPv4 address exhaustion it may become too expensive or impossible for Repology to support IPv4 in the nearest future. Time to switch to IPv6!

Versions Packages Information History CVEs Related Badges Report

Packages for apmod:wsgi

209 package(s) known

mod_wsgi

4.7.1 Potentially vulnerable (4.7.1-1)
AlmaLinux 8
AppStream

mod_wsgi

4.7.1 Potentially vulnerable (4.7.1-5.module_el8.7.0+3344+df07b58a)
AlmaLinux 8
AppStream

mod_wsgi

4.6.8 Potentially vulnerable (4.6.8-4.module_el8.7.0+3344+99a6a656)
AlmaLinux 8
AppStream

mod_wsgi

4.6.4 Potentially vulnerable (4.6.4-5.el8)
AlmaLinux 9
AppStream

mod_wsgi

4.7.1 Potentially vulnerable (4.7.1-11.el9)

apache2-mod-wsgi

4.5.24 Potentially vulnerable (4.5.24-r0)

apache2-mod-wsgi-doc

4.5.24 Potentially vulnerable (4.5.24-r0)

apache2-mod-wsgi

4.5.24 Potentially vulnerable (4.5.24-r0)

apache2-mod-wsgi-doc

4.5.24 Potentially vulnerable (4.5.24-r0)

apache2-mod-wsgi

4.6.5 Potentially vulnerable (4.6.5-r0)

apache2-mod-wsgi-doc

4.6.5 Potentially vulnerable (4.6.5-r0)

apache2-mod-wsgi

4.6.7 Potentially vulnerable (4.6.7-r1)

apache2-mod-wsgi-doc

4.6.7 Potentially vulnerable (4.6.7-r1)

apache2-mod-wsgi

4.7.1 Potentially vulnerable (4.7.1-r0)

apache2-mod-wsgi-doc

4.7.1 Potentially vulnerable (4.7.1-r0)

apache2-mod-wsgi

4.7.1 Potentially vulnerable (4.7.1-r0)

apache2-mod-wsgi-doc

4.7.1 Potentially vulnerable (4.7.1-r0)

apache2-mod-wsgi

4.7.1 Potentially vulnerable (4.7.1-r1)

apache2-mod-wsgi-doc

4.7.1 Potentially vulnerable (4.7.1-r1)

apache2-mod-wsgi

4.7.1 Potentially vulnerable (4.7.1-r1)

apache2-mod-wsgi-doc

4.7.1 Potentially vulnerable (4.7.1-r1)

apache2-mod-wsgi

4.9.0 Potentially vulnerable (4.9.0-r0)

apache2-mod-wsgi-doc

4.9.0 Potentially vulnerable (4.9.0-r0)

apache2-mod-wsgi

4.9.4 (4.9.4-r0)

apache2-mod-wsgi-doc

4.9.4 (4.9.4-r0)

apache2-mod-wsgi

4.9.4 (4.9.4-r2)

apache2-mod-wsgi-doc

4.9.4 (4.9.4-r2)

apache2-mod-wsgi

4.9.4 (4.9.4-r2)

apache2-mod-wsgi-doc

4.9.4 (4.9.4-r2)

apache2-mod_wsgi

4.6.5 Potentially vulnerable (4.6.5-alt1)

apache2-mod_wsgi

4.8.0 Potentially vulnerable (4.8.0-alt1)

apache2-mod_wsgi

4.9.4 (4.9.4-alt1)

mod24_wsgi

3.5 Potentially vulnerable (3.5-1.24.amzn1)

mod24_wsgi

3.5 Potentially vulnerable (3.5-1.25.amzn1)

mod_wsgi

3.2 Potentially vulnerable (3.2-6.11.amzn1)

mod_wsgi

3.2 Potentially vulnerable (3.2-6.12.amzn1)

mod_wsgi

3.4 Potentially vulnerable (3.4-12.amzn2.0.1)

mod_wsgi

3.4 Potentially vulnerable (3.4-12.amzn2.0.3)

mod_wsgi

3.4 Potentially vulnerable (3.4-12.amzn2)

mod_wsgi

3.4 Potentially vulnerable (3.4-12.amzn2.0.2)

mod_wsgi

4.9.4 (4.9.4-2)

mod_wsgi

3.2 Potentially vulnerable (3.2-7.el6)

mod_wsgi

3.4 Potentially vulnerable (3.4-18.el7)
CentOS 8
AppStream

mod_wsgi

4.7.1 Potentially vulnerable (4.7.1-4.module_el8.5.0+738+dc19af12)
CentOS 8
AppStream

mod_wsgi

4.6.8 Potentially vulnerable (4.6.8-3.module_el8.5.0+742+dbad1979)
CentOS 8
AppStream

mod_wsgi

4.6.4 Potentially vulnerable (4.6.4-4.el8)
CentOS Stream 8
AppStream

mod_wsgi

4.7.1 Potentially vulnerable (4.7.1-4.module_el8.4.0+680+7b309a77)
CentOS Stream 8
AppStream

mod_wsgi

4.7.1 Potentially vulnerable (4.7.1-4.module_el8.5.0+738+dc19af12)
CentOS Stream 8
AppStream

mod_wsgi

4.7.1 Potentially vulnerable (4.7.1-5.module_el8.7.0+1213+291b6551)
CentOS Stream 8
AppStream

mod_wsgi

4.6.8 Potentially vulnerable (4.6.8-3.module_el8.4.0+647+0ba99ce8)
CentOS Stream 8
AppStream

mod_wsgi

4.6.8 Potentially vulnerable (4.6.8-3.module_el8.5.0+742+dbad1979)
CentOS Stream 8
AppStream

mod_wsgi

4.6.8 Potentially vulnerable (4.6.8-4.module_el8.7.0+1212+d1a8dd9e)
CentOS Stream 8
AppStream

mod_wsgi

4.6.4 Potentially vulnerable (4.6.4-4.el8)
CentOS Stream 8
AppStream

mod_wsgi

4.6.4 Potentially vulnerable (4.6.4-5.el8)
CentOS Stream 9
AppStream

mod_wsgi

4.7.1 Potentially vulnerable (4.7.1-10.el9)
CentOS Stream 9
AppStream

mod_wsgi

4.7.1 Potentially vulnerable (4.7.1-11.el9)
CentOS Stream 9
AppStream

mod_wsgi

4.7.1 Potentially vulnerable (4.7.1-8.el9)
CentOS Stream 9
AppStream

mod_wsgi

4.7.1 Potentially vulnerable (4.7.1-9.el9)
CRUX 3.4
contrib

mod_wsgi

4.4.10 Potentially vulnerable
CRUX 3.5
contrib

mod_wsgi

4.7.1 Potentially vulnerable
CRUX 3.6
contrib

mod_wsgi

4.9.0 Potentially vulnerable
CRUX 3.7
contrib

mod_wsgi

4.9.4
Deepin
main

mod-wsgi

4.6.5 Potentially vulnerable (4.6.5-1)
Devuan 3.0
beowulf/main

mod-wsgi

4.6.5 Potentially vulnerable (4.6.5-1)
Devuan 4.0
chimaera/main

mod-wsgi

4.7.1 Potentially vulnerable (4.7.1-3+deb11u1)
Devuan Unstable
unstable/main

mod-wsgi

4.9.4 (4.9.4-1)

www/mod_wsgi4

4.9.2 Potentially vulnerable
EuroLinux 8
appstream

mod_wsgi

4.7.1 Potentially vulnerable (4.7.1-4.module+el8.4.0+9822+20bf1249)
  • Summary:
    A WSGI interface for Python web applications in Apache
  • Category:
    • Unspecified
  • License:
    • ASL 2.0
  • Link(s):
EuroLinux 8
appstream

mod_wsgi

4.7.1 Potentially vulnerable (4.7.1-5.module+el8.7.0+16654+645aad7f)
  • Summary:
    A WSGI interface for Python web applications in Apache
  • Category:
    • Unspecified
  • License:
    • ASL 2.0
  • Link(s):
EuroLinux 8
appstream

mod_wsgi

4.6.8 Potentially vulnerable (4.6.8-3.module+el8.2.0+5234+f98739b6)
  • Summary:
    A WSGI interface for Python web applications in Apache
  • Category:
    • Unspecified
  • License:
    • ASL 2.0
  • Link(s):
EuroLinux 8
appstream

mod_wsgi

4.6.8 Potentially vulnerable (4.6.8-3.module+el8.4.0+8888+89bc7e79)
  • Summary:
    A WSGI interface for Python web applications in Apache
  • Category:
    • Unspecified
  • License:
    • ASL 2.0
  • Link(s):
EuroLinux 8
appstream

mod_wsgi

4.6.8 Potentially vulnerable (4.6.8-4.module+el8.7.0+16653+23ccaf52)
  • Summary:
    A WSGI interface for Python web applications in Apache
  • Category:
    • Unspecified
  • License:
    • ASL 2.0
  • Link(s):
EuroLinux 8
appstream

mod_wsgi

4.6.4 Potentially vulnerable (4.6.4-3.el8)
  • Summary:
    A WSGI interface for Python web applications in Apache
  • Category:
    • System Environment/Libraries
  • License:
    • ASL 2.0
  • Link(s):
EuroLinux 8
appstream

mod_wsgi

4.6.4 Potentially vulnerable (4.6.4-4.el8)
  • Summary:
    A WSGI interface for Python web applications in Apache
  • Category:
    • System Environment/Libraries
  • License:
    • ASL 2.0
  • Link(s):
EuroLinux 8
appstream

mod_wsgi

4.6.4 Potentially vulnerable (4.6.4-5.el8)
  • Summary:
    A WSGI interface for Python web applications in Apache
  • Category:
    • System Environment/Libraries
  • License:
    • ASL 2.0
  • Link(s):
EuroLinux 9
appstream

mod_wsgi

4.7.1 Potentially vulnerable (4.7.1-11.el9)
  • Summary:
    A WSGI interface for Python web applications in Apache
  • Category:
    • Unspecified
  • License:
    • ASL 2.0
  • Link(s):
EuroLinux 9
appstream

mod_wsgi

4.7.1 Potentially vulnerable (4.7.1-8.el9)
  • Summary:
    A WSGI interface for Python web applications in Apache
  • Category:
    • Unspecified
  • License:
    • ASL 2.0
  • Link(s):
EuroLinux 9
appstream

mod_wsgi

4.7.1 Potentially vulnerable (4.7.1-9.el9)
  • Summary:
    A WSGI interface for Python web applications in Apache
  • Category:
    • Unspecified
  • License:
    • ASL 2.0
  • Link(s):

mod_wsgi

4.7.1 Potentially vulnerable (4.7.1-9.el9)
  • Summary:
    A WSGI interface for Python web applications in Apache
  • Category:
    • Unspecified
  • License:
    • ASL 2.0
  • Link(s):
EuroLinux 9
appstream

mod_wsgi

4.7.1 Potentially vulnerable (4.7.1-10.el9)
  • Summary:
    A WSGI interface for Python web applications in Apache
  • Category:
    • Unspecified
  • License:
    • ASL 2.0
  • Link(s):

apache-mod/mod_wsgi

4.9.4 (4.9.4-r1)
Fedora 26
updates

mod_wsgi

4.5.15 Potentially vulnerable (4.5.15-1.fc26)
Fedora 26
release

mod_wsgi

4.5.13 Potentially vulnerable (4.5.13-3.fc26)
Fedora 27
release

mod_wsgi

4.5.15 Potentially vulnerable (4.5.15-4.fc27)
Fedora 28
release

mod_wsgi

4.5.20 Potentially vulnerable (4.5.20-4.fc28)
Fedora 29
release

mod_wsgi

4.6.4 Potentially vulnerable (4.6.4-2.fc29)
Fedora 30
release

mod_wsgi

4.6.4 Potentially vulnerable (4.6.4-3.fc30)
Fedora 31
release

mod_wsgi

4.6.6 Potentially vulnerable (4.6.6-2.fc31)
Fedora 32
release

mod_wsgi

4.6.8 Potentially vulnerable (4.6.8-2.fc32)
Fedora 33
release

mod_wsgi

4.7.1 Potentially vulnerable (4.7.1-3.fc33)
Fedora 34
release

mod_wsgi

4.7.1 Potentially vulnerable (4.7.1-4.fc34)
Fedora 35
release

mod_wsgi

4.9.0 Potentially vulnerable (4.9.0-1.fc35)
Fedora 35
updates

mod_wsgi

4.9.0 Potentially vulnerable (4.9.0-2.fc35)
Fedora 36
updates

mod_wsgi

4.9.0 Potentially vulnerable (4.9.0-3.fc36)
Fedora 36
release

mod_wsgi

4.9.0 Potentially vulnerable (4.9.0-2.fc36)
Fedora 37
release

mod_wsgi

4.9.1 Potentially vulnerable (4.9.1-4.fc37)
Fedora 38
release

mod_wsgi

4.9.4 (4.9.4-2.fc38)
Fedora Rawhide
development

mod_wsgi

4.9.4 (4.9.4-2.fc38)

www/mod_wsgi4

4.9.2 Potentially vulnerable

www-apache/mod_wsgi

4.9.4 (4.9.4-r1)

www-apache/mod_wsgi

4.9.0 Potentially vulnerable

mod-wsgi

4.9.4

Mod_WSGI

2.3 Potentially vulnerable

mod-wsgi

4.9.4 (4.9.4-1)

www-apache/mod_wsgi

4.9.4 (4.9.4-r1)

www-apache/mod_wsgi

4.9.0 Potentially vulnerable

www-apache/mod_wsgi

4.9.4 (4.9.4-r1)

www-apache/mod_wsgi

4.9.0 Potentially vulnerable
Mageia 7
core/release

apache-mod_wsgi

4.6.5 Potentially vulnerable (4.6.5-1.mga7)
Mageia 8
core/updates

apache-mod_wsgi

4.6.8 Potentially vulnerable (4.6.8-4.1.mga8)
Mageia 8
core/release

apache-mod_wsgi

4.6.8 Potentially vulnerable (4.6.8-4.mga8)
Mageia Cauldron
core/release

apache-mod_wsgi

4.9.3 (4.9.3-1.mga9)

www/mod_wsgi4

4.9.4

mod_wsgi

4.9.0 Potentially vulnerable

mod_wsgi

4.9.0 Potentially vulnerable

mod_wsgi

4.9.0 Potentially vulnerable

mod_wsgi

4.9.0 Potentially vulnerable

mod_wsgi

4.9.4

mod_wsgi

4.9.4

mod_wsgi

4.9.4

mod_wsgi

4.9.4

www/ap2-mod_wsgi

4.9.4 (4.9.4p0)

mod_wsgi

4.9.4

mod_wsgi

4.9.4

mod_wsgi

4.9.4
openmamba
devel

apache-mod_wsgi

4.9.4 (4.9.4-2mamba)
OpenMandriva 4.0
unsupported/release

apache-mod_wsgi

3.4 Potentially vulnerable (3.4-2)
OpenMandriva 4.1
unsupported/release

apache-mod_wsgi

3.4 Potentially vulnerable (3.4-2)
OpenMandriva 4.2
unsupported/release

apache-mod_wsgi

3.4 Potentially vulnerable (3.4-2)
OpenMandriva 4.3
unsupported/release

apache-mod_wsgi

3.4 Potentially vulnerable (3.4-2)
OpenMandriva Rolling
unsupported/release

apache-mod_wsgi

4.9.4 (4.9.4-1)
OpenMandriva Cooker
unsupported/release

apache-mod_wsgi

4.9.4 (4.9.4-1)

apache2-mod_wsgi

4.4.8 Potentially vulnerable (4.4.8-6.2)

apache2-mod_wsgi-python3

4.4.8 Potentially vulnerable (4.4.8-6.2)

apache2-mod_wsgi

4.5.18 Potentially vulnerable (4.5.18-lp150.2.3)

apache2-mod_wsgi-python3

4.5.18 Potentially vulnerable (4.5.18-lp150.2.3)

apache2-mod_wsgi

4.5.18 Potentially vulnerable (4.5.18-lp151.3.3)

apache2-mod_wsgi-python3

4.5.18 Potentially vulnerable (4.5.18-lp151.3.3)
openSUSE Leap 15.2
updates/oss

apache2-mod_wsgi

4.5.18 Potentially vulnerable (4.5.18-lp152.5.3.1)

apache2-mod_wsgi

4.5.18 Potentially vulnerable (4.5.18-lp152.4.7)
openSUSE Leap 15.2
updates/oss

apache2-mod_wsgi-python3

4.5.18 Potentially vulnerable (4.5.18-lp152.5.3.1)

apache2-mod_wsgi-python3

4.5.18 Potentially vulnerable (4.5.18-lp152.4.7)

apache2-mod_wsgi

4.5.18 Potentially vulnerable (4.5.18-2.27)

apache2-mod_wsgi-python3

4.5.18 Potentially vulnerable (4.5.18-2.27)

apache2-mod_wsgi

4.7.1 Potentially vulnerable (4.7.1-150400.1.52)

apache2-mod_wsgi-python3

4.5.18 Potentially vulnerable (4.5.18-4.3.1)

apache2-mod_wsgi

4.7.1 Potentially vulnerable (4.7.1-150400.3.3.1)

apache2-mod_wsgi-python3

4.5.18 Potentially vulnerable (4.5.18-150000.4.6.1)

apache2-mod_wsgi

4.9.4 (4.9.4-1.3)

mod-wsgi

4.7.1 Potentially vulnerable (4.7.1-3+deb11u1)
Parrot
parrot/main

mod-wsgi

4.7.1 Potentially vulnerable (4.7.1-3+deb11u1)
Parrot
parrot-updates/main

mod-wsgi

4.7.1 Potentially vulnerable (4.7.1-3+deb11u1)

apache-mod_wsgi

4.9.0 Potentially vulnerable (4.9.0-1)

mod-wsgi

4.6.5 Potentially vulnerable (4.6.5-1)

mod-wsgi

4.7.1 Potentially vulnerable (4.7.1-3+deb11u1)

mod-wsgi

4.6.5 Potentially vulnerable (4.6.5-1+deb10u1)

mod-wsgi

4.7.1 Potentially vulnerable (4.7.1-3+deb11u1)

mod-wsgi

4.9.4 (4.9.4-1)
Rocky Linux 8
AppStream

mod_wsgi

4.7.1 Potentially vulnerable (4.7.1-5.module+el8.7.0+1064+ad564229)
Rocky Linux 8
AppStream

mod_wsgi

4.6.8 Potentially vulnerable (4.6.8-4.module+el8.7.0+1063+20f2b9a4)
Rocky Linux 8
AppStream

mod_wsgi

4.6.4 Potentially vulnerable (4.6.4-5.el8)
Rocky Linux 9
AppStream

mod_wsgi

4.7.1 Potentially vulnerable (4.7.1-11.el9)
Rosa 2014.1
contrib/release

apache-mod_wsgi

3.4 Potentially vulnerable (3.4-2)
Rosa 2014.1
contrib/updates

apache-mod_wsgi

3.4 Potentially vulnerable (3.4-3)
Rosa 2016.1
contrib/release

apache-mod_wsgi

3.4 Potentially vulnerable (3.4-5)
Rosa 2021.1
main/release

apache-mod_wsgi

4.9.0 Potentially vulnerable (4.9.0-1)
Rosa 2021.1
contrib/release

apache-mod_wsgi

4.7.1 Potentially vulnerable (4.7.1-1)
Rosa Server 6.9
base/release

mod_wsgi

3.2 Potentially vulnerable (3.2-7.res6)
Rosa Server 7.3
base/release

mod_wsgi

3.4 Potentially vulnerable (3.4-12.res7)
Rosa Server 7.5
base/release

mod_wsgi

3.4 Potentially vulnerable (3.4-12.res7)

mod_wsgi

3.4 Potentially vulnerable (3.4-11.el7)

mod_wsgi

3.4 Potentially vulnerable (3.4-12.el7_0)

mod_wsgi

3.4 Potentially vulnerable (3.4-13.el7_5.1)

mod_wsgi

3.4 Potentially vulnerable (3.4-18.el7)
  • Summary:
    A WSGI interface for Python web applications in Apache
  • Category:
    • System Environment/Libraries
  • License:
    • ASL 2.0
  • Link(s):

mod_wsgi

3.4 Potentially vulnerable (3.4-8.el7)

apache-mod-wsgi

4.6.5 Potentially vulnerable

apache-mod-wsgi

4.6.4 Potentially vulnerable

apache-mod-wsgi

4.6.4 Potentially vulnerable
Trisquel 10.0
nabia/main

mod-wsgi

4.6.8 Potentially vulnerable (4.6.8-1ubuntu3)
Trisquel 10.0
nabia-updates/main

mod-wsgi

4.6.8 Potentially vulnerable (4.6.8-1ubuntu3.1)
Trisquel 10.0
nabia-security/main

mod-wsgi

4.6.8 Potentially vulnerable (4.6.8-1ubuntu3.1)
Trisquel 11.0
aramo-updates/main

mod-wsgi

4.9.0 Potentially vulnerable (4.9.0-1ubuntu0.1)
Trisquel 11.0
aramo-security/main

mod-wsgi

4.9.0 Potentially vulnerable (4.9.0-1ubuntu0.1)
Trisquel 11.0
aramo/main

mod-wsgi

4.9.0 Potentially vulnerable (4.9.0-1build1)
UBI 8
appstream

mod_wsgi

4.7.1 Potentially vulnerable (4.7.1-5.module+el8.7.0+16654+645aad7f)
  • Summary:
    A WSGI interface for Python web applications in Apache
  • Category:
    • Unspecified
  • License:
    • ASL 2.0
  • Link(s):
UBI 8
appstream

mod_wsgi

4.6.8 Potentially vulnerable (4.6.8-4.module+el8.7.0+16653+23ccaf52)
  • Summary:
    A WSGI interface for Python web applications in Apache
  • Category:
    • Unspecified
  • License:
    • ASL 2.0
  • Link(s):
UBI 8
appstream

mod_wsgi

4.6.4 Potentially vulnerable (4.6.4-5.el8)
  • Summary:
    A WSGI interface for Python web applications in Apache
  • Category:
    • System Environment/Libraries
  • License:
    • ASL 2.0
  • Link(s):
Ubuntu 18.04
bionic-updates/main

mod-wsgi

4.5.17 Potentially vulnerable (4.5.17-1ubuntu1.1)

mod_wsgi

4.9.4 (4.9.4_2)

mod_wsgi

4.9.4