Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-881e-dkhk-y7fc
SummaryApache for Win32 before 1.3.24 and 2.0.34-beta allows remote attackers to execute arbitrary commands via parameters passed to batch file CGI scripts.
Aliases
0
alias CVE-2002-0061
Fixed_packages
0
url pkg:apache/httpd@1.3.24
purl pkg:apache/httpd@1.3.24
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-123w-f3zc-37d9
1
vulnerability VCID-3m9y-maes-5ycp
2
vulnerability VCID-a86d-f4nd-eqhh
3
vulnerability VCID-bu8e-hpcy-jqda
4
vulnerability VCID-d5w4-vnbd-afdj
5
vulnerability VCID-dqkp-f1my-dbg9
6
vulnerability VCID-e2sp-bna5-mqb6
7
vulnerability VCID-j3mb-97k1-uuh9
8
vulnerability VCID-kcwg-hswv-2uf7
9
vulnerability VCID-kgpj-aexq-7kah
10
vulnerability VCID-me4r-1qb6-dqdf
11
vulnerability VCID-nkgw-gs9g-ckft
12
vulnerability VCID-prd8-51a5-pygj
13
vulnerability VCID-sn3y-mpbk-hqe8
14
vulnerability VCID-srxw-jjvr-p3d5
15
vulnerability VCID-ug4a-zxkg-cbew
16
vulnerability VCID-yjqs-kszf-yka1
17
vulnerability VCID-zn9e-rcpj-yuax
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@1.3.24
Affected_packages
0
url pkg:apache/httpd@1.3.22
purl pkg:apache/httpd@1.3.22
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-123w-f3zc-37d9
1
vulnerability VCID-3m9y-maes-5ycp
2
vulnerability VCID-881e-dkhk-y7fc
3
vulnerability VCID-a86d-f4nd-eqhh
4
vulnerability VCID-bu8e-hpcy-jqda
5
vulnerability VCID-d5w4-vnbd-afdj
6
vulnerability VCID-dqkp-f1my-dbg9
7
vulnerability VCID-e2sp-bna5-mqb6
8
vulnerability VCID-j3mb-97k1-uuh9
9
vulnerability VCID-kcwg-hswv-2uf7
10
vulnerability VCID-kgpj-aexq-7kah
11
vulnerability VCID-me4r-1qb6-dqdf
12
vulnerability VCID-nkgw-gs9g-ckft
13
vulnerability VCID-prd8-51a5-pygj
14
vulnerability VCID-sn3y-mpbk-hqe8
15
vulnerability VCID-srxw-jjvr-p3d5
16
vulnerability VCID-ug4a-zxkg-cbew
17
vulnerability VCID-yjqs-kszf-yka1
18
vulnerability VCID-zn9e-rcpj-yuax
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@1.3.22
References
0
reference_url http://marc.info/?l=bugtraq&m=101674082427358&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=101674082427358&w=2
1
reference_url http://online.securityfocus.com/archive/1/263927
reference_id
reference_type
scores
url http://online.securityfocus.com/archive/1/263927
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-0061.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-0061.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2002-0061
reference_id
reference_type
scores
0
value 0.88277
scoring_system epss
scoring_elements 0.99505
published_at 2026-05-14T12:55:00Z
1
value 0.88277
scoring_system epss
scoring_elements 0.99503
published_at 2026-05-11T12:55:00Z
2
value 0.88277
scoring_system epss
scoring_elements 0.99504
published_at 2026-05-12T12:55:00Z
3
value 0.88277
scoring_system epss
scoring_elements 0.99487
published_at 2026-04-02T12:55:00Z
4
value 0.88277
scoring_system epss
scoring_elements 0.99489
published_at 2026-04-04T12:55:00Z
5
value 0.88277
scoring_system epss
scoring_elements 0.9949
published_at 2026-04-07T12:55:00Z
6
value 0.88277
scoring_system epss
scoring_elements 0.99492
published_at 2026-04-09T12:55:00Z
7
value 0.88277
scoring_system epss
scoring_elements 0.99493
published_at 2026-04-13T12:55:00Z
8
value 0.88277
scoring_system epss
scoring_elements 0.99495
published_at 2026-04-16T12:55:00Z
9
value 0.88277
scoring_system epss
scoring_elements 0.99496
published_at 2026-04-18T12:55:00Z
10
value 0.88277
scoring_system epss
scoring_elements 0.99497
published_at 2026-04-21T12:55:00Z
11
value 0.88277
scoring_system epss
scoring_elements 0.99498
published_at 2026-04-24T12:55:00Z
12
value 0.88277
scoring_system epss
scoring_elements 0.995
published_at 2026-05-05T12:55:00Z
13
value 0.88277
scoring_system epss
scoring_elements 0.99501
published_at 2026-05-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2002-0061
4
reference_url https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E
5
reference_url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
6
reference_url https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E
7
reference_url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
8
reference_url http://www.apacheweek.com/issues/02-03-29#apache1324
reference_id
reference_type
scores
url http://www.apacheweek.com/issues/02-03-29#apache1324
9
reference_url http://www.iss.net/security_center/static/8589.php
reference_id
reference_type
scores
url http://www.iss.net/security_center/static/8589.php
10
reference_url http://www.securityfocus.com/bid/4335
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/4335
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
12
reference_url https://httpd.apache.org/security/json/CVE-2002-0061.json
reference_id CVE-2002-0061
reference_type
scores
0
value critical
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2002-0061.json
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2002-0061
reference_id CVE-2002-0061
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2002-0061
14
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/21350.pl
reference_id CVE-2002-0061;OSVDB-769
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/21350.pl
15
reference_url https://www.securityfocus.com/bid/4335/info
reference_id CVE-2002-0061;OSVDB-769
reference_type exploit
scores
url https://www.securityfocus.com/bid/4335/info
Weaknesses
0
cwe_id 78
name Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
description The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Exploits
0
date_added 2002-03-21
description Apache Win32 1.3.x/2.0.x - Batch File Remote Command Execution
required_action null
due_date null
notes null
known_ransomware_campaign_use true
source_date_published 2002-03-21
exploit_type remote
platform windows
source_date_updated 2012-09-17
data_source Exploit-DB
source_url https://www.securityfocus.com/bid/4335/info
Severity_range_score7.5 - 10.0
Exploitability2.0
Weighted_severity7.0
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-881e-dkhk-y7fc