Description
modules/arch/win32/mod_isapi.c in mod_isapi in the Apache HTTP Server 2.0.37 through 2.0.63, 2.2.0 through 2.2.14, and 2.3.x before 2.3.7, when running on Windows, does not ensure that request processing is complete before calling isapi_unload for an ISAPI .dll module, which allows remote attackers to execute arbitrary code via unspecified vectors related to a crafted request, a reset packet, and "orphaned callback pointers."
Remediation
References
Related Vulnerabilities
WordPress Plugin Social Share Icons & Social Share Buttons Security Bypass (3.0.2)
WordPress Plugin IP Ban Cross-Site Request Forgery (1.2.3)
WordPress Plugin Ecwid Ecommerce Shopping Cart PHP Object Injection (4.4.3)
WordPress Plugin Portfolio Gallery-Photo Gallery Unspecified Vulnerability (2.3.0)