Search for vulnerabilities
Vulnerability details: VCID-jb3e-tb2r-aaac
Vulnerability ID VCID-jb3e-tb2r-aaac
Aliases CVE-2002-1156
Summary Apache 2.0.42 allows remote attackers to view the source code of a CGI script via a POST request to a directory with both WebDAV and CGI enabled.
Status Published
Exploitability 0.5
Weighted Severity 4.8
Risk 2.4
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
System Score Found at
epss 0.00087 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.00087 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.00087 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.00087 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.00087 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.00087 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.00087 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.00087 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.00087 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.00087 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.00087 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.00087 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.00087 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.01319 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.01319 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.01319 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.01319 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.30553 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.30553 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.30553 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.30553 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.30553 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.30553 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.30553 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.30553 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.30553 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.30553 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.30553 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.30553 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.30553 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.30553 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.30553 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.30553 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.30553 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.30553 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.30553 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.30553 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.30553 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.30553 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.30553 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.30553 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.30553 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.30553 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.30553 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.30553 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.30553 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.30553 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.30553 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.30553 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.30553 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.30553 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.30553 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.30553 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.30553 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.30553 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.30553 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.30553 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.30553 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.30553 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.30553 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.30553 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.30553 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.30553 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.30553 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.30553 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.30553 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.30553 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.30553 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.30553 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.30553 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.30553 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.30553 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.30553 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.30553 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
epss 0.30553 https://api.first.org/data/v1/epss?cve=CVE-2002-1156
apache_httpd moderate https://httpd.apache.org/security/json/CVE-2002-1156.json
cvssv2 5.0 https://nvd.nist.gov/vuln/detail/CVE-2002-1156
Reference id Reference type URL
http://online.securityfocus.com/advisories/4617
https://api.first.org/data/v1/epss?cve=CVE-2002-1156
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1156
https://exchange.xforce.ibmcloud.com/vulnerabilities/10499
https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r5001ecf3d6b2bdd0b732e527654248abb264f08390045d30709a92f6@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r5001ecf3d6b2bdd0b732e527654248abb264f08390045d30709a92f6%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd00b45b93fda4a5bd013b28587207d0e00f99f6e3308dbb6025f3b01@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd00b45b93fda4a5bd013b28587207d0e00f99f6e3308dbb6025f3b01%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
http://www.apache.org/dist/httpd/CHANGES_2.0
http://www.apacheweek.com/issues/02-10-04
http://www.kb.cert.org/vuls/id/910713
http://www.securityfocus.com/bid/6065
cpe:2.3:a:apache:http_server:2.0.42:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.0.42:*:*:*:*:*:*:*
CVE-2002-1156 https://httpd.apache.org/security/json/CVE-2002-1156.json
CVE-2002-1156 https://nvd.nist.gov/vuln/detail/CVE-2002-1156
No exploits are available.
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2002-1156
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.37743
EPSS Score 0.00087
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.