| ID | Name | Product | Family | Published | Updated | Severity |
|---|---|---|---|---|---|---|
| 98909 | Apache 2.4.18 / 2.4.20 X.509 Certificate Authentication Bypass | Web App Scanning | Component Vulnerability | 1/9/2019 | 3/14/2023 | high |
| 9394 | Apache HTTP Server 2.4.x < 2.4.23 Multiple Vulnerabilities | Nessus Network Monitor | Web Servers | 7/15/2016 | 3/6/2019 | medium |
| 92289 | Fedora 24 : httpd (2016-c7288a5b36) | Nessus | Fedora Local Security Checks | 7/15/2016 | 2/2/2026 | high |
| 289757 | MiracleLinux 7 : httpd24-httpd-2.4.18-11.el7 (AXSA:2016-572:01) | Nessus | Miracle Linux Local Security Checks | 1/16/2026 | 1/16/2026 | high |
| 92334 | Fedora 23 : httpd (2016-e256a03791) | Nessus | Fedora Local Security Checks | 7/18/2016 | 2/2/2026 | high |
| 93903 | GLSA-201610-02 : Apache: Multiple vulnerabilities | Nessus | Gentoo Local Security Checks | 10/7/2016 | 1/22/2026 | high |
| 289476 | MiracleLinux 4 : httpd24-httpd-2.4.18-11.AXS4 (AXSA:2016-567:01) | Nessus | Miracle Linux Local Security Checks | 1/16/2026 | 1/16/2026 | high |
| 91949 | FreeBSD : apache24 -- X509 Client certificate based authentication can be bypassed when HTTP/2 is used (e9d1e040-42c9-11e6-9608-20cf30e32f6d) | Nessus | FreeBSD Local Security Checks | 7/6/2016 | 1/4/2021 | high |
| 92320 | Apache 2.4.18 / 2.4.20 X.509 Certificate Authentication Bypass | Nessus | Web Servers | 7/15/2016 | 4/11/2022 | high |