Vulnerability Name: | CVE-2008-0455 (CCN-39867) |
Assigned: | 2008-01-25 |
Published: | 2008-01-25 |
Updated: | 2021-06-06 |
Summary: | Cross-site scripting (XSS) vulnerability in the mod_negotiation module in the Apache HTTP Server 2.2.6 and earlier in the 2.2.x series, 2.0.61 and earlier in the 2.0.x series, and 1.3.39 and earlier in the 1.3.x series allows remote authenticated users to inject arbitrary web script or HTML by uploading a file with a name containing XSS sequences and a file extension, which leads to injection within a (1) "406 Not Acceptable" or (2) "300 Multiple Choices" HTTP response when the extension is omitted in a request for the file. |
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): None Integrity (I): Low Availibility (A): None |
|
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N) 3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:H/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Medium Authentication (Au): None | Impact Metrics: | Confidentiality (C): None Integrity (I): Partial Availibility (A): None | 4.3 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N) 3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:H/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Medium Athentication (Au): None
| Impact Metrics: | Confidentiality (C): None Integrity (I): Partial Availibility (A): None | 2.6 Low (REDHAT CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N) 2.2 Low (REDHAT Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N/E:H/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): High Authentication (Au): None | Impact Metrics: | Confidentiality (C): None Integrity (I): Partial Availibility (A): None |
|
Vulnerability Type: | CWE-79
|
Vulnerability Consequences: | Gain Access |
References: | Source: CCN Type: Apache Web site Apache
Source: CCN Type: Gentoo Bugzilla Bug 209899 www-servers/apache mod_negotiation XSS and CRLF injection (CVE-2008-{0455,0456})
Source: MITRE Type: CNA CVE-2008-0455
Source: CCN Type: RHSA-2012-1591 Important: JBoss Enterprise Application Platform 6.0.1 update
Source: REDHAT Type: UNKNOWN RHSA-2012:1591
Source: CCN Type: RHSA-2012-1592 Important: JBoss Enterprise Application Platform 6.0.1 update
Source: REDHAT Type: UNKNOWN RHSA-2012:1592
Source: CCN Type: RHSA-2012-1594 Important: JBoss Enterprise Application Platform 6.0.1 update
Source: REDHAT Type: UNKNOWN RHSA-2012:1594
Source: CCN Type: RHSA-2013-0130 Low: httpd security, bug fix, and enhancement update
Source: REDHAT Type: UNKNOWN RHSA-2013:0130
Source: CCN Type: RHSA-2013-0512 Low: httpd security, bug fix, and enhancement update
Source: CCN Type: Full-Disclosure Mailing List, Tue, 22 Jan 2008 23:16:09 +0100 Apache mod_negotiation Xss and Http Response Splitting
Source: SECUNIA Type: UNKNOWN 29348
Source: SECUNIA Type: UNKNOWN 51607
Source: GENTOO Type: UNKNOWN GLSA-200803-19
Source: SREASON Type: UNKNOWN 3575
Source: CCN Type: SECTRACK ID: 1019256 Apache mod_negotiation Input Validation Hole Permits Cross-Site Scripting Attacks
Source: SECTRACK Type: Exploit 1019256
Source: CCN Type: GLSA-200803-19 Apache: Multiple vulnerabilities
Source: MISC Type: Exploit http://www.mindedsecurity.com/MSA01150108.html
Source: CCN Type: OSVDB ID: 41019 Apache HTTP Server mod_negotiation Module Multi-Line Filename Upload XSS
Source: BUGTRAQ Type: UNKNOWN 20080122 Apache mod_negotiation Xss and Http Response Splitting
Source: BID Type: Exploit 27409
Source: CCN Type: BID-27409 Apache 'mod_negotiation' HTML Injection and HTTP Response Splitting Vulnerability
Source: XF Type: UNKNOWN apache-modnegotiation-xss(39867)
Source: XF Type: UNKNOWN apache-modnegotiation-xss(39867)
Source: MLIST Type: UNKNOWN [httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
Source: MLIST Type: UNKNOWN [httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
Source: MLIST Type: UNKNOWN [httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
Source: MLIST Type: UNKNOWN [httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
Source: MLIST Type: UNKNOWN [httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/
Source: MLIST Type: UNKNOWN [httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
Source: MLIST Type: UNKNOWN [httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
Source: MLIST Type: UNKNOWN [httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/
Source: MLIST Type: UNKNOWN [httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
Source: MLIST Type: UNKNOWN [httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html
Source: MLIST Type: UNKNOWN [httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
Source: MLIST Type: UNKNOWN [httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html
Source: MLIST Type: UNKNOWN [httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
|
Vulnerable Configuration: | Configuration 1: cpe:/a:apache:http_server:1.3.12:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:1.3.14:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:1.3.24:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:1.3.25:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:1.3.33:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:1.3.34:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.28:beta:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.32:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.41:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.42:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.43:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.50:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.51:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.59:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.60:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.2.6:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:1.3.17:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:1.3.18:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:1.3.26:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:1.3.27:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:1.3.28:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:1.3.35:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:1.3.36:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.35:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.36:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.44:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.45:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.52:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.53:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.61:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.9:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:1.3.1:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:1.3.11:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:1.3.22:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:1.3.23:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:1.3.31:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:1.3.32:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.28:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.39:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.40:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.48:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.49:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.56:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.58:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.2.3:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.2.4:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:-:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:1.3:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:1.3.19:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:1.3.20:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:1.3.29:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:1.3.3:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:1.3.37:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:1.3.39:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.37:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.38:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.46:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.47:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.54:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.55:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.2.0:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.2.2:*:*:*:*:*:*:* Configuration RedHat 1: cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:* Configuration RedHat 2: cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:* Configuration RedHat 3: cpe:/o:redhat:enterprise_linux:5::client_workstation:*:*:*:*:* Configuration RedHat 4: cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:* Configuration RedHat 5: cpe:/o:redhat:enterprise_linux:6:*:*:*:*:*:*:* Configuration RedHat 6: cpe:/o:redhat:enterprise_linux:6::client:*:*:*:*:* Configuration RedHat 7: cpe:/o:redhat:enterprise_linux:6::computenode:*:*:*:*:* Configuration RedHat 8: cpe:/o:redhat:enterprise_linux:6::server:*:*:*:*:* Configuration RedHat 9: cpe:/o:redhat:enterprise_linux:6::workstation:*:*:*:*:* Configuration CCN 1: cpe:/a:apache:http_server:2.0.28:beta:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.38:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.39:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.42:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.47:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.60:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.49:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.48:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.51:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:1.3.33:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.52:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.40:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:1.3.37:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.59:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.2.4:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.46:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.55:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.2.3:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.2.0:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.2.2:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.2.6:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:1.3.39:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:1.3.3:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:1.3.36:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:1.3.35:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:1.3.34:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:1.3.32:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:1.3.31:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.28:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.32:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.35:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.36:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.37:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.41:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:1.3.30:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:1.3.38:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.32:beta:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.34:beta:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.43:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.44:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.45:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.50:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.53:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.54:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.56:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.57:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.58:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.60:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.0.61:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.2:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.2.1:*:*:*:*:*:*:*AND cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:*OR cpe:/a:redhat:rhel_application_server:2:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:6:*:server:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:6:*:workstation:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux_desktop:6:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux_hpc_node:6:*:*:*:*:*:*:*
Denotes that component is vulnerable |
Oval Definitions |
Definition ID | Class | Title | Last Modified |
---|
oval:org.opensuse.security:def:20080455 | V | CVE-2008-0455 | 2015-11-16 | oval:org.mitre.oval:def:23042 | P | ELSA-2013:0130: httpd security, bug fix, and enhancement update (Low) | 2014-05-26 | oval:org.mitre.oval:def:23943 | P | ELSA-2013:0512: httpd security, bug fix, and enhancement update (Low) | 2014-05-26 | oval:org.mitre.oval:def:21017 | P | RHSA-2013:0130: httpd security, bug fix, and enhancement update (Low) | 2014-02-17 | oval:org.mitre.oval:def:21066 | P | RHSA-2013:0512: httpd security, bug fix, and enhancement update (Low) | 2014-02-17 | oval:com.redhat.rhsa:def:20130512 | P | RHSA-2013:0512: httpd security, bug fix, and enhancement update (Low) | 2013-02-21 | oval:com.redhat.rhsa:def:20130130 | P | RHSA-2013:0130: httpd security, bug fix, and enhancement update (Low) | 2013-01-08 |
|
BACK |
apache http server 1.3.12
apache http server 1.3.14
apache http server 1.3.24
apache http server 1.3.25
apache http server 1.3.33
apache http server 1.3.34
apache http server 2.0.28 beta
apache http server 2.0.32
apache http server 2.0.41
apache http server 2.0.42
apache http server 2.0.43
apache http server 2.0.50
apache http server 2.0.51
apache http server 2.0.59
apache http server 2.0.60
apache http server 2.2.6
apache http server 1.3.17
apache http server 1.3.18
apache http server 1.3.26
apache http server 1.3.27
apache http server 1.3.28
apache http server 1.3.35
apache http server 1.3.36
apache http server 2.0.35
apache http server 2.0.36
apache http server 2.0.44
apache http server 2.0.45
apache http server 2.0.52
apache http server 2.0.53
apache http server 2.0.61
apache http server 2.0.9
apache http server 1.3.1
apache http server 1.3.11
apache http server 1.3.22
apache http server 1.3.23
apache http server 1.3.31
apache http server 1.3.32
apache http server 2.0
apache http server 2.0.28
apache http server 2.0.39
apache http server 2.0.40
apache http server 2.0.48
apache http server 2.0.49
apache http server 2.0.56
apache http server 2.0.58
apache http server 2.2.3
apache http server 2.2.4
apache http server -
apache http server 1.3
apache http server 1.3.19
apache http server 1.3.20
apache http server 1.3.29
apache http server 1.3.3
apache http server 1.3.37
apache http server 1.3.39
apache http server 2.0.37
apache http server 2.0.38
apache http server 2.0.46
apache http server 2.0.47
apache http server 2.0.54
apache http server 2.0.55
apache http server 2.2.0
apache http server 2.2.2
apache http server 2.0.28 beta
apache http server 2.0
apache http server 2.0.38
apache http server 2.0.39
apache http server 2.0.42
apache http server 2.0.47
apache http server 2.0.60
apache http server 2.0.49
apache http server 2.0.48
apache http server 2.0.51
apache http server 1.3.33
apache http server 2.0.52
apache http server 2.0.40
apache http server 1.3.37
apache http server 2.0.59
apache http server 2.2.4
apache http server 2.0.46
apache http server 2.0.55
apache http server 2.2.3
apache http server 2.2.0
apache http server 2.2.2
apache http server 2.2.6
apache http server 1.3.39
apache http server 1.3.3
apache http server 1.3.36
apache http server 1.3.35
apache http server 1.3.34
apache http server 1.3.32
apache http server 1.3.31
apache http server 2.0.28
apache http server 2.0.32
apache http server 2.0.35
apache http server 2.0.36
apache http server 2.0.37
apache http server 2.0.41
apache http server 1.3.30
apache http server 1.3.38
apache http server 2.0.32 beta
apache http server 2.0.34 beta
apache http server 2.0.43
apache http server 2.0.44
apache http server 2.0.45
apache http server 2.0.50
apache http server 2.0.53
apache http server 2.0.54
apache http server 2.0.56
apache http server 2.0.57
apache http server 2.0.58
apache http server 2.0.60
apache http server 2.0.61
apache http server 2.2
apache http server 2.2.1
gentoo linux *
redhat enterprise linux 3
redhat enterprise linux 5
redhat enterprise linux 5
redhat enterprise linux 5
redhat rhel application server 2
redhat enterprise linux 6
redhat enterprise linux 6
redhat enterprise linux desktop 6
redhat enterprise linux hpc node 6