Format string vulnerability in the mod_tcl module 1.0 for Apache 2.x allows context-dependent malicious users to execute arbitrary code via format string specifiers that are not properly handled in a set_var function call in (1) tcl_cmds.c and (2) tcl_core.c.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
apache http server 2.0 |
||
apache http server 2.0.9 |
||
apache http server 2.0.28 |
||
apache http server 2.0.32 |
||
apache http server 2.0.34 |
||
apache http server 2.0.35 |
||
apache http server 2.0.36 |
||
apache http server 2.0.37 |
||
apache http server 2.0.38 |
||
apache http server 2.0.39 |
||
apache http server 2.0.40 |
||
apache http server 2.0.41 |
||
apache http server 2.0.42 |
||
apache http server 2.0.43 |
||
apache http server 2.0.44 |
||
apache http server 2.0.45 |
||
apache http server 2.0.46 |
||
apache http server 2.0.47 |
||
apache http server 2.0.48 |
||
apache http server 2.0.49 |
||
apache http server 2.0.50 |
||
apache http server 2.0.51 |
||
apache http server 2.0.52 |
||
apache http server 2.0.53 |
||
apache http server 2.0.54 |
||
apache http server 2.0.55 |
||
apache http server 2.0.56 |
||
apache http server 2.0.57 |
||
apache http server 2.0.58 |
||
apache http server 2.1 |
||
apache http server 2.1.1 |
||
apache http server 2.1.2 |
||
apache http server 2.1.3 |
||
apache http server 2.1.4 |
||
apache http server 2.1.5 |
||
apache http server 2.1.6 |
||
apache http server 2.2 |
||
apache http server 2.2.1 |
||
apache http server 2.2.2 |
||
apache http server 2.2.3 |