| Reference | Source | Link | Tags |
|---|
| Pony Mail! |
|
lists.apache.org |
|
| Pony Mail! |
|
lists.apache.org |
|
| Pony Mail! |
|
lists.apache.org |
|
| [security-announce] openSUSE-SU-2020:1285-1: moderate: Security update f |
SUSE |
lists.opensuse.org |
Mailing List, Third Party Advisory |
| Pony Mail! |
MLIST |
lists.apache.org |
|
| Pony Mail! |
|
lists.apache.org |
|
| Pony Mail! |
MLIST |
lists.apache.org |
|
| Pony Mail! |
MLIST |
lists.apache.org |
|
| Pony Mail! |
MLIST |
lists.apache.org |
|
| Pony Mail! |
MLIST |
lists.apache.org |
|
| Debian -- Security Information -- DSA-4757-1 apache2 |
DEBIAN |
www.debian.org |
Third Party Advisory |
| oss-security - Re: CVE-2020-11984: Apache httpd: mod_uwsgi buffer
overlow |
MLIST |
www.openwall.com |
Mailing List, Third Party Advisory |
| Pony Mail! |
MLIST |
lists.apache.org |
Mailing List, Vendor Advisory |
| Pony Mail! |
MLIST |
lists.apache.org |
|
| Pony Mail! |
|
lists.apache.org |
|
| [SECURITY] [DLA 2362-1] uwsgi security update |
MLIST |
lists.debian.org |
Mailing List, Third Party Advisory |
| Pony Mail! |
|
lists.apache.org |
|
| Pony Mail! |
|
lists.apache.org |
|
| Pony Mail! |
|
lists.apache.org |
|
| Oracle Critical Patch Update Advisory - October 2020 |
MISC |
www.oracle.com |
Third Party Advisory |
| Pony Mail! |
|
lists.apache.org |
|
| Pony Mail! |
|
lists.apache.org |
|
| [SECURITY] Fedora 32 Update: httpd-2.4.46-1.fc32 - package-announce - Fedora Mailing-Lists |
|
lists.fedoraproject.org |
|
| August 2020 Apache HTTP Server Vulnerabilities in NetApp Products | NetApp Product Security |
CONFIRM |
security.netapp.com |
Third Party Advisory |
| oss-security - Re: CVE-2020-11984: Apache httpd: mod_uwsgi buffer
overlow |
MLIST |
www.openwall.com |
Mailing List, Third Party Advisory |
| Pony Mail! |
|
lists.apache.org |
|
| oss-security - Re: CVE-2020-11984: Apache httpd: mod_uwsgi buffer
overlow |
MLIST |
www.openwall.com |
Mailing List, Third Party Advisory |
| [security-announce] openSUSE-SU-2020:1293-1: moderate: Security update f |
SUSE |
lists.opensuse.org |
Mailing List, Third Party Advisory |
| Apache HTTP Server 2.4 vulnerabilities - The Apache HTTP Server Project |
MISC |
httpd.apache.org |
Vendor Advisory |
| oss-security - Re: CVE-2020-11984: Apache httpd: mod_uwsgi buffer
overlow |
MLIST |
www.openwall.com |
Mailing List, Vendor Advisory |
| Pony Mail! |
MLIST |
lists.apache.org |
Mailing List |
| Pony Mail! |
MLIST |
lists.apache.org |
|
| Pony Mail! |
MLIST |
lists.apache.org |
|
| [SECURITY] Fedora 31 Update: httpd-2.4.46-1.fc31 - package-announce - Fedora Mailing-Lists |
|
lists.fedoraproject.org |
|
| Pony Mail! |
MLIST |
lists.apache.org |
|
| Apache: Multiple vulnerabilities (GLSA 202008-04) — Gentoo security |
GENTOO |
security.gentoo.org |
Third Party Advisory |
| oss-security - Re: CVE-2020-11984: Apache httpd: mod_uwsgi buffer overlow |
MLIST |
www.openwall.com |
Mailing List, Third Party Advisory |
| Apache2 mod_proxy_uwsgi Incorrect Request Handling ≈ Packet Storm |
MISC |
packetstormsecurity.com |
Exploit, Third Party Advisory, VDB Entry |
| [httpd-cvs] 20210330 svn commit: r1888199 - /httpd/site/trunk/content/security/vulnerabilities-httpd.xml |
|
lists.apache.org |
|
| [SECURITY] Fedora 32 Update: httpd-2.4.46-1.fc32 - package-announce - Fedora Mailing-Lists |
FEDORA |
lists.fedoraproject.org |
Mailing List, Third Party Advisory |
| oss-security - Re: CVE-2020-11984: Apache httpd: mod_uwsgi buffer
overlow |
MLIST |
www.openwall.com |
Mailing List, Third Party Advisory |
| Pony Mail! |
MLIST |
lists.apache.org |
|
| Pony Mail! |
MLIST |
lists.apache.org |
|
| Pony Mail! |
|
lists.apache.org |
|
| USN-4458-1: Apache HTTP Server vulnerabilities | Ubuntu security notices | Ubuntu |
UBUNTU |
usn.ubuntu.com |
Third Party Advisory |
| Oracle Critical Patch Update Advisory - January 2021 |
MISC |
www.oracle.com |
Third Party Advisory |
| [SECURITY] Fedora 31 Update: httpd-2.4.46-1.fc31 - package-announce - Fedora Mailing-Lists |
FEDORA |
lists.fedoraproject.org |
Mailing List, Third Party Advisory |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |