ID CVE-2012-0031
Summary scoreboard.c in the Apache HTTP Server 2.2.21 and earlier might allow local users to cause a denial of service (daemon crash during shutdown) or possibly have unspecified other impact by modifying a certain type field within a scoreboard shared memory segment, leading to an invalid call to the free function.
References
Vulnerable Configurations
  • cpe:2.3:a:apache:http_server:2.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.9:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.10:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.10:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.11:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.11:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.12:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.12:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.13:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.13:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.14:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.14:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.15:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.15:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.16:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.16:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.17:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.17:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.18:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.18:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.19:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.19:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.20:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.20:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.21:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.21:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.22:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.22:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.23:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.23:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.24:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.24:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.25:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.25:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.26:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.26:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.27:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.27:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.28:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.28:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.28:beta:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.28:beta:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.29:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.29:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.30:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.30:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.31:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.31:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.32:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.32:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.32:beta:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.32:beta:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.33:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.33:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.34:-:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.34:-:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.34:beta:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.34:beta:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.35:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.35:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.36:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.36:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.37:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.37:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.38:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.38:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.39:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.39:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.40:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.40:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.41:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.41:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.42:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.42:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.43:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.43:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.44:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.44:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.45:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.45:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.46:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.46:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.47:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.47:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.48:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.48:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.49:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.49:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.50:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.50:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.51:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.51:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.52:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.52:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.53:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.53:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.54:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.54:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.55:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.55:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.56:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.56:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.57:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.57:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.58:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.58:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.59:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.59:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.60:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.60:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.61:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.61:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.62:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.62:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.63:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.63:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.0.64:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.64:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.2.5:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.2.6:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.2.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.2.7:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.2.7:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.2.8:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.2.8:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.2.9:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.2.9:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.2.10:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.2.10:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.2.11:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.2.11:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.2.12:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.2.12:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.2.13:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.2.13:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.2.14:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.2.14:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.2.15:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.2.15:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.2.15-60:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.2.15-60:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.2.16:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.2.16:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.2.17:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.2.17:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.2.18:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.2.18:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.2.19:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.2.19:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.2.20:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.2.20:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.2.21:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.2.21:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
  • cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
    cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
  • cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*
    cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*
  • cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:*
    cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:*
  • cpe:2.3:a:redhat:jboss_enterprise_web_server:1.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:jboss_enterprise_web_server:1.0.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:redhat:storage:2.0:*:*:*:*:*:*:*
    cpe:2.3:a:redhat:storage:2.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_eus:6.2:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:enterprise_linux_eus:6.2:*:*:*:*:*:*:*
CVSS
Base: 4.6 (as of 14-09-2022 - 19:51)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:L/AC:L/Au:N/C:P/I:P/A:P
redhat via4
advisories
  • rhsa
    id RHSA-2012:0128
  • rhsa
    id RHSA-2012:0542
  • rhsa
    id RHSA-2012:0543
rpms
  • httpd-0:2.2.15-15.el6_2.1
  • httpd-debuginfo-0:2.2.15-15.el6_2.1
  • httpd-devel-0:2.2.15-15.el6_2.1
  • httpd-manual-0:2.2.15-15.el6_2.1
  • httpd-tools-0:2.2.15-15.el6_2.1
  • mod_ssl-1:2.2.15-15.el6_2.1
  • httpd-0:2.2.3-63.el5_8.1
  • httpd-debuginfo-0:2.2.3-63.el5_8.1
  • httpd-devel-0:2.2.3-63.el5_8.1
  • httpd-manual-0:2.2.3-63.el5_8.1
  • mod_ssl-1:2.2.3-63.el5_8.1
  • httpd-0:2.2.17-15.4.ep5.el5
  • httpd-0:2.2.17-15.4.ep5.el6
  • httpd-debuginfo-0:2.2.17-15.4.ep5.el5
  • httpd-debuginfo-0:2.2.17-15.4.ep5.el6
  • httpd-devel-0:2.2.17-15.4.ep5.el5
  • httpd-devel-0:2.2.17-15.4.ep5.el6
  • httpd-manual-0:2.2.17-15.4.ep5.el5
  • httpd-manual-0:2.2.17-15.4.ep5.el6
  • httpd-tools-0:2.2.17-15.4.ep5.el6
  • mod_ssl-1:2.2.17-15.4.ep5.el5
  • mod_ssl-1:2.2.17-15.4.ep5.el6
refmap via4
apple APPLE-SA-2012-09-19-2
bid 51407
confirm
debian DSA-2405
hp
  • HPSBMU02748
  • HPSBMU02786
  • HPSBOV02822
  • HPSBUX02761
  • SSRT100772
  • SSRT100823
  • SSRT100877
  • SSRT100966
mandriva
  • MDVSA-2012:012
  • MDVSA-2013:150
misc http://www.halfdog.net/Security/2011/ApacheScoreboardInvalidFreeOnShutdown/
mlist
  • [httpd-cvs] 20190815 svn commit: r1048742 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
  • [httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
  • [httpd-cvs] 20190815 svn commit: r1048743 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
  • [httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
  • [httpd-cvs] 20200401 svn commit: r1058586 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
  • [httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
  • [httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
  • [httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
secunia
  • 47410
  • 48551
suse
  • SUSE-SU-2012:0323
  • openSUSE-SU-2012:0314
Last major update 14-09-2022 - 19:51
Published 18-01-2012 - 20:55
Last modified 14-09-2022 - 19:51
Back to Top