Thanks xStainDx for this. The Apache HTTP Server Project is proud to announce the ninth public release of Apache 2.0. This version of Apache is principally a security and bug fix release. Of particular note is that 2.0.46 addresses two security vulnerabilities:
Apache 2.0 versions 2.0.37 through 2.0.45 can be caused to crash in certain circumstances. This can be triggered remotely through mod_dav and possibly other mechanisms. All Apache 2.0 users are encouraged to upgrade now. (source)
Apache 2.0 versions 2.0.40 through 2.0.45 on Unix platforms were vulnerable to a denial-of-service attack on the basic authentication module, which was reported by John Hughes . A bug in the configuration scripts caused the apr_password_validate() function to be thread-unsafe on platforms with crypt_r(), including AIX and Linux. All versions of Apache 2.0 have this thread-safety problem on platforms with no crypt_r() and no thread-safe crypt(), such as Mac OS X and possibly others. When using a threaded MPM (which is not the default on these platforms), this allows remote attackers to create a denial of service which causes valid usernames and passwords for Basic Authentication to fail until Apache is restarted. We do not believe this bug could allow unauthorized users to gain access to protected resources. (source)
We rely on ads to keep creating quality content for you to enjoy for free.
Please support our site by disabling your ad blocker.
Continue without supporting us
Choose your Ad Blocker
Adblock Plus
Adblock
Adguard
Ad Remover
Brave
Ghostery
uBlock Origin
uBlock
UltraBlock
Other
In the extension bar, click the AdBlock Plus icon
Click the large blue toggle for this website
Click refresh
In the extension bar, click the AdBlock icon
Under "Pause on this site" click "Always"
In the extension bar, click on the Adguard icon
Click on the large green toggle for this website
In the extension bar, click on the Ad Remover icon
Click "Disable on This Website"
In the extension bar, click on the orange lion icon
Click the toggle on the top right, shifting from "Up" to "Down"
In the extension bar, click on the Ghostery icon
Click the "Anti-Tracking" shield so it says "Off"
Click the "Ad-Blocking" stop sign so it says "Off"
Refresh the page
In the extension bar, click on the uBlock Origin icon
Click on the big, blue power button
Refresh the page
In the extension bar, click on the uBlock icon
Click on the big, blue power button
Refresh the page
In the extension bar, click on the UltraBlock icon
Check the "Disable UltraBlock" checkbox
Please disable your Ad Blocker
Disable any DNS blocking tools such as AdGuardDNS or NextDNS
Disable any privacy or tracking protection extensions such as Firefox Enhanced Tracking Protection or DuckDuckGo Privacy.
If the prompt is still appearing, please disable any tools or services you are using that block internet ads (e.g. DNS Servers, tracking protection or privacy extensions).