Apache HTTP Server 2.4.48 freeware
The Apache HTTP Server Project is a collaborative software development effort aimed at creating a robust, commercial-grade, featureful, and freely-available source code implementation of an HTTP (Web) server. ...
|Author||Apache Software Foundation|
|OS||Windows 2000, Windows 2003, Windows XP, Windows Vista, Windows Vista x64, Windows 7, Windows 7 x64, Windows 8, Windows 8 x64, Windows 10, Windows 10 x64|
|Installation||Instal And Uninstall|
|Keywords||apache server, http server, threaded apache, webserver, HTTP, Apache|
Apache HTTP Server Free Download - we do not host any Apache HTTP Server torrent files or links of Apache HTTP Server on rapidshare.com, depositfiles.com, megaupload.com etc. All Apache HTTP Server download links are direct Apache HTTP Server download from publisher site or their selected mirrors.
|2.4.48||Jun 2, 2021||New Release||SECURITY: CVE-2021-31618 (cve.mitre.org)
mod_http2: Fix a potential NULL pointer dereference
mod_proxy_wstunnel: Add ProxyWebsocketFallbackToProxyHttp to opt-out the fallback to mod_proxy_http for WebSocket upgrade and tunneling.
mod_proxy: Fix flushing of THRESHOLD_MIN_WRITE data while tunneling.
core: Fix a regression that stripped the ETag header from 304 responses.
core: Adding SSL related inquiry functions to the server API.
These function are always available, even when no module providing SSL is loaded. They provide their own "shadowing" implementation for the optional functions of similar name that mod_ssl and impersonators of mod_ssl provide. This enables loading of several SSL providing modules when all but one of them registers itself into the new hooks. Two old-style SSL modules will not work, as they replace the others optional functions with their own.
Modules using the old-style optional functions will continue to work as core supplies its own versions of those.
|2.4.47||May 1, 2021||New Release|
|2.4.46||Aug 7, 2020||New Release||SECURITY: CVE-2020-11984 (cve.mitre.org) mod_proxy_uwsgi: Malicious request may result in information disclosure or RCE of existing file on the server running under a malicious process environment. [Yann Ylavic]|