Search for packages
| purl | pkg:rpm/redhat/httpd24-httpd@2.4.34-22?arch=el7 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 4.4 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-t67v-c4gx-ukbj
Aliases: CVE-2020-11984 |
In Apache HTTP Server versions 2.4.32 to 2.4.43, mod_proxy_uwsgi has a information disclosure and possible RCE | There are no reported fixed by versions. |
|
VCID-yz3c-arnr-y3cs
Aliases: CVE-2020-11993 |
In Apache HTTP Server versions 2.4.20 to 2.4.43, when trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns, logging statements were made on the wrong connection, causing concurrent use of memory pools. Configuring the LogLevel of mod_http2 above "info" will mitigate this vulnerability for unpatched servers. | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T14:05:04.412547+00:00 | RedHat Importer | Affected by | VCID-yz3c-arnr-y3cs | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-11993.json | 38.0.0 |
| 2026-04-01T14:05:03.842511+00:00 | RedHat Importer | Affected by | VCID-t67v-c4gx-ukbj | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-11984.json | 38.0.0 |