<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Apache 2.4.x &amp;lt; 2.4.56 Multiple Vulnerabilities in VMware vCenter™ Discussions</title>
    <link>https://communities.vmware.com/t5/VMware-vCenter-Discussions/Apache-2-4-x-lt-2-4-56-Multiple-Vulnerabilities/m-p/2992436#M49634</link>
    <description>&lt;P&gt;Still nothing as of Oct 24, 2023.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 24 Oct 2023 12:26:25 GMT</pubDate>
    <dc:creator>juankathens</dc:creator>
    <dc:date>2023-10-24T12:26:25Z</dc:date>
    <item>
      <title>Apache 2.4.x &lt; 2.4.56 Multiple Vulnerabilities</title>
      <link>https://communities.vmware.com/t5/VMware-vCenter-Discussions/Apache-2-4-x-lt-2-4-56-Multiple-Vulnerabilities/m-p/2977986#M48729</link>
      <description>&lt;P&gt;I have a scan vulnerability that my apache is less the 2.4.56, I just installed the latest update from VMware &lt;SPAN&gt;7.0.3.01600 for my vcenter.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;when i checked the apache version, its still showing 2.4. 54.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jul 2023 16:14:18 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-vCenter-Discussions/Apache-2-4-x-lt-2-4-56-Multiple-Vulnerabilities/m-p/2977986#M48729</guid>
      <dc:creator>bdeen</dc:creator>
      <dc:date>2023-07-18T16:14:18Z</dc:date>
    </item>
    <item>
      <title>Re: Apache 2.4.x &lt; 2.4.56 Multiple Vulnerabilities</title>
      <link>https://communities.vmware.com/t5/VMware-vCenter-Discussions/Apache-2-4-x-lt-2-4-56-Multiple-Vulnerabilities/m-p/2978056#M48731</link>
      <description>&lt;P&gt;As per the release note, this version is not a fix update:&lt;/P&gt;&lt;DIV&gt;&lt;DIV class=""&gt;&lt;UL&gt;&lt;LI&gt;&lt;P class=""&gt;VMware vCenter Server 7.0 Update 3n&amp;nbsp;Release Notes serves as a vehicle for&amp;nbsp;the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://docs.vmware.com/en/VMware-vSphere/7.0/rn/vsphere-esxi-vcenter-server-7-vsphere-with-tanzu-release-notes.html" target="_blank" rel="noopener"&gt;VMware vSphere with Tanzu Release Notes&lt;/A&gt;&amp;nbsp;and does not deliver vCenter Server fixes.&amp;nbsp;&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;A href="https://docs.vmware.com/en/VMware-vSphere/7.0/rn/vsphere-vcenter-server-70u3n-release-notes/index.html#Known%20Issues%20from%20Prior%20Releases-Security%20Features%20Issues" target="_blank" rel="noopener"&gt;https://docs.vmware.com/en/VMware-vSphere/7.0/rn/vsphere-vcenter-server-70u3n-release-notes/index.html#Known%20Issues%20from%20Prior%20Releases-Security%20Features%20Issues&lt;/A&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Regards,&lt;/DIV&gt;&lt;DIV&gt;Sachchidanand&lt;/DIV&gt;</description>
      <pubDate>Wed, 19 Jul 2023 06:46:10 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-vCenter-Discussions/Apache-2-4-x-lt-2-4-56-Multiple-Vulnerabilities/m-p/2978056#M48731</guid>
      <dc:creator>Sachchidanand</dc:creator>
      <dc:date>2023-07-19T06:46:10Z</dc:date>
    </item>
    <item>
      <title>Re: Apache 2.4.x &lt; 2.4.56 Multiple Vulnerabilities</title>
      <link>https://communities.vmware.com/t5/VMware-vCenter-Discussions/Apache-2-4-x-lt-2-4-56-Multiple-Vulnerabilities/m-p/2978141#M48737</link>
      <description>&lt;P&gt;This vulnerability has been out for a while and VMware has produced many patches since this was first reported.&amp;nbsp; Why have they not upgrade Apache yet?&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jul 2023 15:58:18 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-vCenter-Discussions/Apache-2-4-x-lt-2-4-56-Multiple-Vulnerabilities/m-p/2978141#M48737</guid>
      <dc:creator>VMGUY5</dc:creator>
      <dc:date>2023-07-19T15:58:18Z</dc:date>
    </item>
    <item>
      <title>Re: Apache 2.4.x &lt; 2.4.56 Multiple Vulnerabilities</title>
      <link>https://communities.vmware.com/t5/VMware-vCenter-Discussions/Apache-2-4-x-lt-2-4-56-Multiple-Vulnerabilities/m-p/2978361#M48744</link>
      <description>&lt;P&gt;I'm interested in a solution here as well.&lt;/P&gt;&lt;P&gt;Apache Tomcat CVE's:&lt;/P&gt;&lt;P&gt;CVE-2019-17569&amp;nbsp;HTTP Request Smuggling with reverse proxy code regression (Fixed Apache Tomcat 9.0.31)&lt;/P&gt;&lt;P&gt;CVE-2020-1935&amp;nbsp;HTTP Request Smuggling (fixed Apache Tomcat 9.0.30)&lt;/P&gt;&lt;P&gt;CVE-2020-1938&amp;nbsp;file read/inclusion vulnerability in the AJP connector (Fixed Apache Tomcat 9.0.31)&lt;/P&gt;&lt;P&gt;CVE-2021-44228&amp;nbsp;&lt;SPAN&gt;Apache Log4j logging library (fixed in Log4j 2.17.1)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Are these addressed by VMware and why not using the newest Apache?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jul 2023 16:53:52 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-vCenter-Discussions/Apache-2-4-x-lt-2-4-56-Multiple-Vulnerabilities/m-p/2978361#M48744</guid>
      <dc:creator>GeoPerkins</dc:creator>
      <dc:date>2023-07-20T16:53:52Z</dc:date>
    </item>
    <item>
      <title>Re: Apache 2.4.x &lt; 2.4.56 Multiple Vulnerabilities</title>
      <link>https://communities.vmware.com/t5/VMware-vCenter-Discussions/Apache-2-4-x-lt-2-4-56-Multiple-Vulnerabilities/m-p/2992436#M49634</link>
      <description>&lt;P&gt;Still nothing as of Oct 24, 2023.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Oct 2023 12:26:25 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-vCenter-Discussions/Apache-2-4-x-lt-2-4-56-Multiple-Vulnerabilities/m-p/2992436#M49634</guid>
      <dc:creator>juankathens</dc:creator>
      <dc:date>2023-10-24T12:26:25Z</dc:date>
    </item>
  </channel>
</rss>

