Vulnerabilities
Vulnerable Software
Apache:  >> Http Server  >> 2.2.3  Security Vulnerabilities
Multiple race conditions in suexec in Apache HTTP Server (httpd) 2.2.3 between directory and file validation, and their usage, allow local users to gain privileges and execute arbitrary code by renaming directories or performing symlink attacks. NOTE: the researcher, who is reliable, claims that the vendor disputes the issue because "the attacks described rely on an insecure server configuration" in which the user "has write access to the document root."
CVSS Score
6.2
EPSS Score
0.001
Published
2007-04-13
Format string vulnerability in the mod_tcl module 1.0 for Apache 2.x allows context-dependent attackers to execute arbitrary code via format string specifiers that are not properly handled in a set_var function call in (1) tcl_cmds.c and (2) tcl_core.c.
CVSS Score
6.8
EPSS Score
0.328
Published
2006-10-16
Apache 2.2.2, when running on Windows, allows remote attackers to read source code of CGI programs via a request that contains uppercase (or alternate case) characters that bypass the case-sensitive ScriptAlias directive, but allow access to the file on case-insensitive file systems.
CVSS Score
4.3
EPSS Score
0.173
Published
2006-08-14


Contact Us

Shodan ® - All rights reserved