httpd-cvs mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From build...@apache.org
Subject svn commit: r1075360 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
Date Thu, 03 Jun 2021 06:38:56 GMT
Modified: websites/staging/httpd/trunk/content/security/vulnerabilities_24.html
==============================================================================
--- websites/staging/httpd/trunk/content/security/vulnerabilities_24.html (original)
+++ websites/staging/httpd/trunk/content/security/vulnerabilities_24.html Thu Jun  3 06:38:56 2021
@@ -114,7 +114,7 @@ h2:hover > .headerlink, h3:hover > .head
 <table class="cve"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2021-01-26</td></tr>
 <tr><td class="cve-header">Issue public</td><td class="cve-value">--</td></tr>
 <tr><td class="cve-header">Update 2.4.48 released</td><td class="cve-value">--</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.9, 2.4.7, 2.4.6, 2.4.46, 2.4.43, 2.4.41, 2.4.4, 2.4.39, 2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.3, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.2, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.1, 2.4.0</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.46, 2.4.43, 2.4.41, 2.4.39, 2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.4.0</td></tr>
 </table></dd>
 </dl></br/>
 
@@ -127,7 +127,7 @@ h2:hover > .headerlink, h3:hover > .head
 <table class="cve"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2019-10-05</td></tr>
 <tr><td class="cve-header">Issue public</td><td class="cve-value">--</td></tr>
 <tr><td class="cve-header">Update 2.4.47 released</td><td class="cve-value">--</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.9, 2.4.7, 2.4.6, 2.4.46, 2.4.43, 2.4.41, 2.4.39, 2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.46, 2.4.43, 2.4.41, 2.4.39, 2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6</td></tr>
 </table></dd>
 <dt><h3 id="CVE-2020-13950">low: <name name="CVE-2020-13950">mod_proxy_http NULL pointer dereference</name>
 (<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13950">CVE-2020-13950</a>)</h3></dt>
@@ -145,7 +145,7 @@ h2:hover > .headerlink, h3:hover > .head
 <table class="cve"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2020-11-11</td></tr>
 <tr><td class="cve-header">Issue public</td><td class="cve-value">--</td></tr>
 <tr><td class="cve-header">Update 2.4.47 released</td><td class="cve-value">--</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.9, 2.4.7, 2.4.6, 2.4.46, 2.4.43, 2.4.41, 2.4.4, 2.4.39, 2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.3, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.2, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.1, 2.4.0</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.46, 2.4.43, 2.4.41, 2.4.39, 2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.4.0</td></tr>
 </table></dd>
 <dt><h3 id="CVE-2021-26690">low: <name name="CVE-2021-26690">mod_session NULL pointer dereference</name>
 (<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26690">CVE-2021-26690</a>)</h3></dt>
@@ -154,7 +154,7 @@ h2:hover > .headerlink, h3:hover > .head
 <table class="cve"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2021-02-08</td></tr>
 <tr><td class="cve-header">Issue public</td><td class="cve-value">--</td></tr>
 <tr><td class="cve-header">Update 2.4.47 released</td><td class="cve-value">--</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.9, 2.4.7, 2.4.6, 2.4.46, 2.4.43, 2.4.41, 2.4.4, 2.4.39, 2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.3, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.2, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.1, 2.4.0</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.46, 2.4.43, 2.4.41, 2.4.39, 2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.4.0</td></tr>
 </table></dd>
 <dt><h3 id="CVE-2021-26691">low: <name name="CVE-2021-26691">mod_session response handling heap overflow</name>
 (<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26691">CVE-2021-26691</a>)</h3></dt>
@@ -163,7 +163,7 @@ h2:hover > .headerlink, h3:hover > .head
 <table class="cve"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2021-03-01</td></tr>
 <tr><td class="cve-header">Issue public</td><td class="cve-value">--</td></tr>
 <tr><td class="cve-header">Update 2.4.47 released</td><td class="cve-value">--</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.9, 2.4.7, 2.4.6, 2.4.46, 2.4.43, 2.4.41, 2.4.4, 2.4.39, 2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.3, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.2, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.1, 2.4.0</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.46, 2.4.43, 2.4.41, 2.4.39, 2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.4.0</td></tr>
 </table></dd>
 <dt><h3 id="CVE-2021-30641">moderate: <name name="CVE-2021-30641">Unexpected URL matching with 'MergeSlashes OFF'</name>
 (<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30641">CVE-2021-30641</a>)</h3></dt>
@@ -225,7 +225,7 @@ h2:hover > .headerlink, h3:hover > .head
 <table class="cve"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2019-12-05</td></tr>
 <tr><td class="cve-header">Issue public</td><td class="cve-value">2020-04-01</td></tr>
 <tr><td class="cve-header">Update 2.4.42 released</td><td class="cve-value">2020-04-01</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.9, 2.4.7, 2.4.6, 2.4.41, 2.4.40, 2.4.4, 2.4.39, 2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.30, 2.4.3, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.2, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.1, 2.4.0</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.41, 2.4.40, 2.4.39, 2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.30, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.4.0</td></tr>
 </table></dd>
 <dt><h3 id="CVE-2020-1934">low: <name name="CVE-2020-1934">mod_proxy_ftp use of uninitialized value</name>
 (<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1934">CVE-2020-1934</a>)</h3></dt>
@@ -234,7 +234,7 @@ h2:hover > .headerlink, h3:hover > .head
 <table class="cve"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2020-01-03</td></tr>
 <tr><td class="cve-header">Issue public</td><td class="cve-value">2020-04-01</td></tr>
 <tr><td class="cve-header">Update 2.4.42 released</td><td class="cve-value">2020-04-01</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.9, 2.4.7, 2.4.6, 2.4.41, 2.4.40, 2.4.4, 2.4.39, 2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.30, 2.4.3, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.2, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.1, 2.4.0</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.41, 2.4.40, 2.4.39, 2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.30, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.4.0</td></tr>
 </table></dd>
 </dl></br/>
 
@@ -274,7 +274,7 @@ h2:hover > .headerlink, h3:hover > .head
 <table class="cve"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2019-07-09</td></tr>
 <tr><td class="cve-header">Issue public</td><td class="cve-value">2019-08-14</td></tr>
 <tr><td class="cve-header">Update 2.4.41 released</td><td class="cve-value">2019-08-14</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.39, 2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.30, 2.4.3, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.2, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.1, 2.4.0</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.39, 2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.30, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.4.0</td></tr>
 </table></dd>
 <dt><h3 id="CVE-2019-10097">moderate: <name name="CVE-2019-10097">CVE-2019-10097 mod_remoteip: Stack buffer overflow and NULL pointer dereference</name>
 (<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10097">CVE-2019-10097</a>)</h3></dt>
@@ -292,7 +292,7 @@ h2:hover > .headerlink, h3:hover > .head
 <table class="cve"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2019-03-26</td></tr>
 <tr><td class="cve-header">Issue public</td><td class="cve-value">2019-08-14</td></tr>
 <tr><td class="cve-header">Update 2.4.41 released</td><td class="cve-value">2019-08-14</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.39, 2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.30, 2.4.3, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.2, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.1, 2.4.0</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.39, 2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.30, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.4.0</td></tr>
 </table></dd>
 </dl></br/>
 
@@ -341,7 +341,7 @@ h2:hover > .headerlink, h3:hover > .head
 <table class="cve"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2019-01-29</td></tr>
 <tr><td class="cve-header">Issue public</td><td class="cve-value">2019-04-01</td></tr>
 <tr><td class="cve-header">Update 2.4.39 released</td><td class="cve-value">2019-04-01</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.30, 2.4.3, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.2, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.1, 2.4.0</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.30, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.4.0</td></tr>
 </table></dd>
 <dt><h3 id="CVE-2019-0220">low: <name name="CVE-2019-0220">Apache httpd URL normalization inconsistincy</name>
 (<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0220">CVE-2019-0220</a>)</h3></dt>
@@ -350,7 +350,7 @@ h2:hover > .headerlink, h3:hover > .head
 <table class="cve"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2019-01-20</td></tr>
 <tr><td class="cve-header">Issue public</td><td class="cve-value">2019-04-01</td></tr>
 <tr><td class="cve-header">Update 2.4.39 released</td><td class="cve-value">2019-04-01</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.30, 2.4.3, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.2, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.1, 2.4.0</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.30, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.4.0</td></tr>
 </table></dd>
 </dl></br/>
 
@@ -372,7 +372,7 @@ h2:hover > .headerlink, h3:hover > .head
 <table class="cve"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2018-10-08</td></tr>
 <tr><td class="cve-header">Issue public</td><td class="cve-value">2019-01-22</td></tr>
 <tr><td class="cve-header">Update 2.4.38 released</td><td class="cve-value">2019-02-28</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.30, 2.4.3, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.2, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.1, 2.4.0</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.30, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.4.0</td></tr>
 </table></dd>
 <dt><h3 id="CVE-2019-0190">important: <name name="CVE-2019-0190">mod_ssl 2.4.37 remote DoS when used with OpenSSL 1.1.1</name>
 (<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0190">CVE-2019-0190</a>)</h3></dt>
@@ -429,7 +429,7 @@ h2:hover > .headerlink, h3:hover > .head
 <table class="cve"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2017-12-07</td></tr>
 <tr><td class="cve-header">Issue public</td><td class="cve-value">2018-03-21</td></tr>
 <tr><td class="cve-header">Update 2.4.33 released</td><td class="cve-value">2018-03-21</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.2, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.1</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1</td></tr>
 </table></dd>
 <dt><h3 id="CVE-2017-15715">low: <name name="CVE-2017-15715">&lt;FilesMatch&gt; bypass with a trailing newline in the file name</name>
 (<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15715">CVE-2017-15715</a>)</h3></dt>
@@ -438,7 +438,7 @@ h2:hover > .headerlink, h3:hover > .head
 <table class="cve"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2017-11-24</td></tr>
 <tr><td class="cve-header">Issue public</td><td class="cve-value">2018-03-21</td></tr>
 <tr><td class="cve-header">Update 2.4.33 released</td><td class="cve-value">2018-03-21</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.2, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.1</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1</td></tr>
 </table></dd>
 <dt><h3 id="CVE-2018-1283">moderate: <name name="CVE-2018-1283">Tampering of mod_session data for CGI applications</name>
 (<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1283">CVE-2018-1283</a>)</h3></dt>
@@ -447,7 +447,7 @@ h2:hover > .headerlink, h3:hover > .head
 <table class="cve"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2017-11-14</td></tr>
 <tr><td class="cve-header">Issue public</td><td class="cve-value">2018-03-21</td></tr>
 <tr><td class="cve-header">Update 2.4.33 released</td><td class="cve-value">2018-03-21</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.2, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.1</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1</td></tr>
 </table></dd>
 <dt><h3 id="CVE-2018-1301">low: <name name="CVE-2018-1301">Possible out of bound access after failure in reading the HTTP request</name>
 (<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1301">CVE-2018-1301</a>)</h3></dt>
@@ -456,7 +456,7 @@ h2:hover > .headerlink, h3:hover > .head
 <table class="cve"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2018-01-23</td></tr>
 <tr><td class="cve-header">Issue public</td><td class="cve-value">2018-03-21</td></tr>
 <tr><td class="cve-header">Update 2.4.33 released</td><td class="cve-value">2018-03-21</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.2, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.1</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1</td></tr>
 </table></dd>
 <dt><h3 id="CVE-2018-1302">low: <name name="CVE-2018-1302">Possible write of after free on HTTP/2 stream shutdown</name>
 (<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1302">CVE-2018-1302</a>)</h3></dt>
@@ -474,7 +474,7 @@ h2:hover > .headerlink, h3:hover > .head
 <table class="cve"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2018-01-23</td></tr>
 <tr><td class="cve-header">Issue public</td><td class="cve-value">2018-03-21</td></tr>
 <tr><td class="cve-header">Update 2.4.33 released</td><td class="cve-value">2018-03-21</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.9, 2.4.7, 2.4.6, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6</td></tr>
 </table></dd>
 <dt><h3 id="CVE-2018-1312">low: <name name="CVE-2018-1312">Weak Digest auth nonce generation in mod_auth_digest</name>
 (<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1312">CVE-2018-1312</a>)</h3></dt>
@@ -483,7 +483,7 @@ h2:hover > .headerlink, h3:hover > .head
 <table class="cve"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2013-03-05</td></tr>
 <tr><td class="cve-header">Issue public</td><td class="cve-value">2018-03-21</td></tr>
 <tr><td class="cve-header">Update 2.4.33 released</td><td class="cve-value">2018-03-21</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.2, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.1</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1</td></tr>
 </table></dd>
 </dl></br/>
 
@@ -497,7 +497,7 @@ h2:hover > .headerlink, h3:hover > .head
 <tr><td class="cve-header">Issue public</td><td class="cve-value">2017-09-18</td></tr>
 <tr><td class="cve-header">Update 2.4.28 released</td><td class="cve-value">2017-10-05</td></tr>
 <tr><td class="cve-header">Update 2.2.35-never released</td><td class="cve-value">--</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.2, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.1, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.34, 2.2.32, 2.2.31, 2.2.3, 2.2.29, 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.2, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.0</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.2.34, 2.2.32, 2.2.31, 2.2.29, 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
 </table></dd>
 </dl></br/>
 
@@ -511,7 +511,7 @@ h2:hover > .headerlink, h3:hover > .head
 <tr><td class="cve-header">Issue public</td><td class="cve-value">2017-07-11</td></tr>
 <tr><td class="cve-header">Update 2.4.27 released</td><td class="cve-value">2017-07-11</td></tr>
 <tr><td class="cve-header">Update 2.2.34 released</td><td class="cve-value">2017-07-11</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.2, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.1, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.32, 2.2.31, 2.2.3, 2.2.29, 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.2, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.0</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.2.32, 2.2.31, 2.2.29, 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
 </table></dd>
 <dt><h3 id="CVE-2017-9789">important: <name name="CVE-2017-9789">Read after free in mod_http2</name>
 (<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9789">CVE-2017-9789</a>)</h3></dt>
@@ -534,7 +534,7 @@ h2:hover > .headerlink, h3:hover > .head
 <tr><td class="cve-header">Issue public</td><td class="cve-value">2017-06-19</td></tr>
 <tr><td class="cve-header">Update 2.4.26 released</td><td class="cve-value">2017-06-19</td></tr>
 <tr><td class="cve-header">Update 2.2.34 released</td><td class="cve-value">2017-07-11</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.25, 2.4.23, 2.4.20, 2.4.2, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.1, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.32, 2.2.31, 2.2.3, 2.2.29, 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.2, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.0</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.2.32, 2.2.31, 2.2.29, 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
 </table></dd>
 <dt><h3 id="CVE-2017-3169">important: <name name="CVE-2017-3169">mod_ssl Null Pointer Dereference</name>
 (<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3169">CVE-2017-3169</a>)</h3></dt>
@@ -544,7 +544,7 @@ h2:hover > .headerlink, h3:hover > .head
 <tr><td class="cve-header">Issue public</td><td class="cve-value">2017-06-19</td></tr>
 <tr><td class="cve-header">Update 2.4.26 released</td><td class="cve-value">2017-06-19</td></tr>
 <tr><td class="cve-header">Update 2.2.34 released</td><td class="cve-value">2017-07-11</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.25, 2.4.23, 2.4.20, 2.4.2, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.1, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.32, 2.2.31, 2.2.3, 2.2.29, 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.2, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.0</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.2.32, 2.2.31, 2.2.29, 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
 </table></dd>
 <dt><h3 id="CVE-2017-7659">important: <name name="CVE-2017-7659">mod_http2 Null Pointer Dereference</name>
 (<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7659">CVE-2017-7659</a>)</h3></dt>
@@ -573,7 +573,7 @@ h2:hover > .headerlink, h3:hover > .head
 <tr><td class="cve-header">Issue public</td><td class="cve-value">2017-06-19</td></tr>
 <tr><td class="cve-header">Update 2.4.26 released</td><td class="cve-value">2017-06-19</td></tr>
 <tr><td class="cve-header">Update 2.2.34 released</td><td class="cve-value">2017-07-11</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.25, 2.4.23, 2.4.20, 2.4.2, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.1, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.32, 2.2.31, 2.2.3, 2.2.29, 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.2, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.0</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.2.32, 2.2.31, 2.2.29, 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
 </table></dd>
 </dl></br/>
 
@@ -586,7 +586,7 @@ h2:hover > .headerlink, h3:hover > .head
 <table class="cve"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2016-01-20</td></tr>
 <tr><td class="cve-header">Issue public</td><td class="cve-value">2016-12-20</td></tr>
 <tr><td class="cve-header">Update 2.4.25 released</td><td class="cve-value">2016-12-20</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.23, 2.4.20, 2.4.2, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.1</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1</td></tr>
 </table></dd>
 <dt><h3 id="CVE-2016-2161">low: <name name="CVE-2016-2161">DoS vulnerability in mod_auth_digest</name>
 (<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2161">CVE-2016-2161</a>)</h3></dt>
@@ -595,7 +595,7 @@ h2:hover > .headerlink, h3:hover > .head
 <table class="cve"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2016-07-11</td></tr>
 <tr><td class="cve-header">Issue public</td><td class="cve-value">2016-12-20</td></tr>
 <tr><td class="cve-header">Update 2.4.25 released</td><td class="cve-value">2016-12-20</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.23, 2.4.20, 2.4.2, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.1</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1</td></tr>
 </table></dd>
 <dt><h3 id="CVE-2016-4975">moderate: <name name="CVE-2016-4975">mod_userdir CRLF injection</name>
 (<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4975">CVE-2016-4975</a>)</h3></dt>
@@ -605,7 +605,7 @@ h2:hover > .headerlink, h3:hover > .head
 <tr><td class="cve-header">Issue public</td><td class="cve-value">2018-08-14</td></tr>
 <tr><td class="cve-header">Update 2.4.25 released</td><td class="cve-value">2016-12-20</td></tr>
 <tr><td class="cve-header">Update 2.2.32 released</td><td class="cve-value">2017-01-13</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.23, 2.4.20, 2.4.2, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.1, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.31, 2.2.3, 2.2.29, 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.2, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.0</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.2.31, 2.2.29, 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
 </table></dd>
 <dt><h3 id="CVE-2016-5387">n/a: <name name="CVE-2016-5387">HTTP_PROXY environment variable "httpoxy" mitigation</name>
 (<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5387">CVE-2016-5387</a>)</h3></dt>
@@ -615,7 +615,7 @@ h2:hover > .headerlink, h3:hover > .head
 <tr><td class="cve-header">Issue public</td><td class="cve-value">2016-07-18</td></tr>
 <tr><td class="cve-header">Update 2.4.25 released</td><td class="cve-value">2016-12-20</td></tr>
 <tr><td class="cve-header">Update 2.2.32 released</td><td class="cve-value">2016-07-18</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.23, 2.4.20, 2.4.2, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.1, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.31, 2.2.3, 2.2.29, 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.2, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.0</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.2.31, 2.2.29, 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
 </table></dd>
 <dt><h3 id="CVE-2016-8740">low: <name name="CVE-2016-8740">HTTP/2 CONTINUATION denial of service</name>
 (<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8740">CVE-2016-8740</a>)</h3></dt>
@@ -634,7 +634,7 @@ h2:hover > .headerlink, h3:hover > .head
 <tr><td class="cve-header">Issue public</td><td class="cve-value">2016-12-20</td></tr>
 <tr><td class="cve-header">Update 2.4.25 released</td><td class="cve-value">2016-12-20</td></tr>
 <tr><td class="cve-header">Update 2.2.32 released</td><td class="cve-value">2017-01-13</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.23, 2.4.20, 2.4.2, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.1, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.31, 2.2.3, 2.2.29, 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.2, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.0</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.2.31, 2.2.29, 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
 </table></dd>
 <dt><h3 id="CVE-2020-11985">low: <name name="CVE-2020-11985">IP address spoofing when proxying using mod_remoteip and mod_rewrite</name>
 (<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11985">CVE-2020-11985</a>)</h3></dt>
@@ -642,7 +642,7 @@ h2:hover > .headerlink, h3:hover > .head
 <table class="cve"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2016-10-13</td></tr>
 <tr><td class="cve-header">Issue public</td><td class="cve-value">2020-08-07</td></tr>
 <tr><td class="cve-header">Update 2.4.25 released</td><td class="cve-value">2020-08-07</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.23, 2.4.20, 2.4.2, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.1</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1</td></tr>
 </table></dd>
 </dl></br/>
 
@@ -681,7 +681,7 @@ h2:hover > .headerlink, h3:hover > .head
 <table class="cve"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2015-01-28</td></tr>
 <tr><td class="cve-header">Issue public</td><td class="cve-value">2015-02-04</td></tr>
 <tr><td class="cve-header">Update 2.4.16 released</td><td class="cve-value">2015-07-15</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.9, 2.4.7, 2.4.12, 2.4.10</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.12, 2.4.10, 2.4.9, 2.4.7</td></tr>
 </table></dd>
 <dt><h3 id="CVE-2015-0253">low: <name name="CVE-2015-0253">Crash in ErrorDocument 400 handling</name>
 (<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0253">CVE-2015-0253</a>)</h3></dt>
@@ -699,7 +699,7 @@ h2:hover > .headerlink, h3:hover > .head
 <tr><td class="cve-header">Issue public</td><td class="cve-value">2015-06-09</td></tr>
 <tr><td class="cve-header">Update 2.4.16 released</td><td class="cve-value">2015-07-15</td></tr>
 <tr><td class="cve-header">Update 2.2.31 released</td><td class="cve-value">2015-07-16</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.12, 2.4.10, 2.4.1, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.29, 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.2, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.0</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.12, 2.4.10, 2.2.29, 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
 </table></dd>
 <dt><h3 id="CVE-2015-3185">low: <name name="CVE-2015-3185">ap_some_auth_required API unusable</name>
 (<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3185">CVE-2015-3185</a>)</h3></dt>
@@ -708,7 +708,7 @@ h2:hover > .headerlink, h3:hover > .head
 <table class="cve"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2013-08-05</td></tr>
 <tr><td class="cve-header">Issue public</td><td class="cve-value">2015-06-09</td></tr>
 <tr><td class="cve-header">Update 2.4.16 released</td><td class="cve-value">2015-07-15</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.9, 2.4.7, 2.4.6, 2.4.5, 2.4.4, 2.4.3, 2.4.2, 2.4.12, 2.4.10, 2.4.1, 2.4.0</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.5, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.4.0</td></tr>
 </table></dd>
 </dl></br/>
 
@@ -722,7 +722,7 @@ h2:hover > .headerlink, h3:hover > .head
 <tr><td class="cve-header">Issue public</td><td class="cve-value">2013-10-19</td></tr>
 <tr><td class="cve-header">Update 2.4.12 released</td><td class="cve-value">2015-01-30</td></tr>
 <tr><td class="cve-header">Update 2.2.29 released</td><td class="cve-value">2014-09-03</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.10, 2.4.1, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.2, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.0</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.10, 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
 </table></dd>
 <dt><h3 id="CVE-2014-3581">low: <name name="CVE-2014-3581">mod_cache crash with empty Content-Type header</name>
 (<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3581">CVE-2014-3581</a>)</h3></dt>
@@ -730,7 +730,7 @@ h2:hover > .headerlink, h3:hover > .head
 <table class="cve"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2014-09-08</td></tr>
 <tr><td class="cve-header">Issue public</td><td class="cve-value">2014-09-08</td></tr>
 <tr><td class="cve-header">Update 2.4.12 released</td><td class="cve-value">2015-01-30</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.10, 2.4.1</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1</td></tr>
 </table></dd>
 <dt><h3 id="CVE-2014-3583">low: <name name="CVE-2014-3583">mod_proxy_fcgi out-of-bounds memory read</name>
 (<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3583">CVE-2014-3583</a>)</h3></dt>
@@ -747,7 +747,7 @@ h2:hover > .headerlink, h3:hover > .head
 <table class="cve"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2014-11-09</td></tr>
 <tr><td class="cve-header">Issue public</td><td class="cve-value">2014-11-09</td></tr>
 <tr><td class="cve-header">Update 2.4.12 released</td><td class="cve-value">2015-01-30</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.10, 2.4.1</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1</td></tr>
 </table></dd>
 </dl></br/>
 
@@ -770,7 +770,7 @@ h2:hover > .headerlink, h3:hover > .head
 <tr><td class="cve-header">Issue public</td><td class="cve-value">2014-07-14</td></tr>
 <tr><td class="cve-header">Update 2.4.10 released</td><td class="cve-value">2014-07-15</td></tr>
 <tr><td class="cve-header">Update 2.2.29 released</td><td class="cve-value">2014-09-03</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.2, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.0</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
 </table></dd>
 <dt><h3 id="CVE-2014-0226">moderate: <name name="CVE-2014-0226">mod_status buffer overflow</name>
 (<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0226">CVE-2014-0226</a>)</h3></dt>
@@ -780,7 +780,7 @@ h2:hover > .headerlink, h3:hover > .head
 <tr><td class="cve-header">Issue public</td><td class="cve-value">2014-07-14</td></tr>
 <tr><td class="cve-header">Update 2.4.10 released</td><td class="cve-value">2014-07-15</td></tr>
 <tr><td class="cve-header">Update 2.2.29 released</td><td class="cve-value">2014-09-03</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.2, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.0</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
 </table></dd>
 <dt><h3 id="CVE-2014-0231">important: <name name="CVE-2014-0231">mod_cgid denial of service</name>
 (<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0231">CVE-2014-0231</a>)</h3></dt>
@@ -790,7 +790,7 @@ h2:hover > .headerlink, h3:hover > .head
 <tr><td class="cve-header">Issue public</td><td class="cve-value">2014-07-14</td></tr>
 <tr><td class="cve-header">Update 2.4.10 released</td><td class="cve-value">2014-07-15</td></tr>
 <tr><td class="cve-header">Update 2.2.29 released</td><td class="cve-value">2014-09-03</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.2, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.0</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
 </table></dd>
 <dt><h3 id="CVE-2014-3523">important: <name name="CVE-2014-3523">WinNT MPM denial of service</name>
 (<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3523">CVE-2014-3523</a>)</h3></dt>
@@ -813,7 +813,7 @@ h2:hover > .headerlink, h3:hover > .head
 <tr><td class="cve-header">Issue public</td><td class="cve-value">2014-03-17</td></tr>
 <tr><td class="cve-header">Update 2.4.9 released</td><td class="cve-value">2014-03-17</td></tr>
 <tr><td class="cve-header">Update 2.2.27 released</td><td class="cve-value">2014-03-26</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.2, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.0</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
 </table></dd>
 <dt><h3 id="CVE-2014-0098">low: <name name="CVE-2014-0098">mod_log_config crash</name>
 (<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0098">CVE-2014-0098</a>)</h3></dt>
@@ -823,7 +823,7 @@ h2:hover > .headerlink, h3:hover > .head
 <tr><td class="cve-header">Issue public</td><td class="cve-value">2014-03-17</td></tr>
 <tr><td class="cve-header">Update 2.4.9 released</td><td class="cve-value">2014-03-17</td></tr>
 <tr><td class="cve-header">Update 2.2.27 released</td><td class="cve-value">2014-03-26</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.2, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.0</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
 </table></dd>
 </dl></br/>
 
@@ -849,7 +849,7 @@ h2:hover > .headerlink, h3:hover > .head
 <tr><td class="cve-header">Issue public</td><td class="cve-value">2013-05-23</td></tr>
 <tr><td class="cve-header">Update 2.4.6 released</td><td class="cve-value">2013-07-22</td></tr>
 <tr><td class="cve-header">Update 2.2.25 released</td><td class="cve-value">2013-07-22</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.2, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.0</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
 </table></dd>
 <dt><h3 id="CVE-2013-2249">moderate: <name name="CVE-2013-2249">mod_session_dbd session fixation flaw</name>
 (<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2249">CVE-2013-2249</a>)</h3></dt>
@@ -872,7 +872,7 @@ h2:hover > .headerlink, h3:hover > .head
 <tr><td class="cve-header">Issue public</td><td class="cve-value">2013-02-18</td></tr>
 <tr><td class="cve-header">Update 2.4.4 released</td><td class="cve-value">2013-02-25</td></tr>
 <tr><td class="cve-header">Update 2.2.24 released</td><td class="cve-value">2013-02-25</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.3, 2.4.2, 2.4.1, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.2, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.0</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.4.3, 2.4.2, 2.4.1, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
 </table></dd>
 <dt><h3 id="CVE-2012-4558">moderate: <name name="CVE-2012-4558">XSS in mod_proxy_balancer</name>
 (<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4558">CVE-2012-4558</a>)</h3></dt>
@@ -882,7 +882,7 @@ h2:hover > .headerlink, h3:hover > .head
 <tr><td class="cve-header">Issue public</td><td class="cve-value">2013-02-18</td></tr>
 <tr><td class="cve-header">Update 2.4.4 released</td><td class="cve-value">2013-02-25</td></tr>
 <tr><td class="cve-header">Update 2.2.24 released</td><td class="cve-value">2013-02-25</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.3, 2.4.2, 2.4.1, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.2, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.0</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.4.3, 2.4.2, 2.4.1, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
 </table></dd>
 </dl></br/>
 
@@ -895,7 +895,7 @@ h2:hover > .headerlink, h3:hover > .head
 <tr><td class="cve-header">Issue public</td><td class="cve-value">2012-06-13</td></tr>
 <tr><td class="cve-header">Update 2.2.23 released</td><td class="cve-value">2012-09-13</td></tr>
 <tr><td class="cve-header">Update 2.4.3 released</td><td class="cve-value">2012-08-21</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.2, 2.4.1, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.22, 2.2.21, 2.2.20, 2.2.2, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.0</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.4.2, 2.4.1, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
 </table></dd>
 <dt><h3 id="CVE-2012-3502">important: <name name="CVE-2012-3502">Response mixup when using mod_proxy_ajp or mod_proxy_http</name>
 (<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3502">CVE-2012-3502</a>)</h3></dt>
@@ -916,7 +916,7 @@ h2:hover > .headerlink, h3:hover > .head
 <tr><td class="cve-header">Issue public</td><td class="cve-value">2012-03-02</td></tr>
 <tr><td class="cve-header">Update 2.4.2 released</td><td class="cve-value">2012-04-17</td></tr>
 <tr><td class="cve-header">Update 2.2.23 released</td><td class="cve-value">2012-09-13</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.1, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.22, 2.2.21, 2.2.20, 2.2.2, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.0</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.4.1, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
 </table></dd>
 </dl></br/>
 



Mime
View raw message