Search for vulnerabilities
Vulnerability details: VCID-me26-h1nn-aaaa
Vulnerability ID VCID-me26-h1nn-aaaa
Aliases CVE-2001-0731
Summary Apache 1.3.20 with Multiviews enabled allows remote attackers to view directory contents and bypass the index page via a URL containing the "M=D" query string.
Status Published
Exploitability 2.0
Weighted Severity 8.0
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
System Score Found at
epss 0.71872 https://api.first.org/data/v1/epss?cve=CVE-2001-0731
epss 0.71872 https://api.first.org/data/v1/epss?cve=CVE-2001-0731
epss 0.71872 https://api.first.org/data/v1/epss?cve=CVE-2001-0731
epss 0.71872 https://api.first.org/data/v1/epss?cve=CVE-2001-0731
epss 0.71872 https://api.first.org/data/v1/epss?cve=CVE-2001-0731
epss 0.71872 https://api.first.org/data/v1/epss?cve=CVE-2001-0731
epss 0.71872 https://api.first.org/data/v1/epss?cve=CVE-2001-0731
epss 0.71872 https://api.first.org/data/v1/epss?cve=CVE-2001-0731
epss 0.71872 https://api.first.org/data/v1/epss?cve=CVE-2001-0731
epss 0.71872 https://api.first.org/data/v1/epss?cve=CVE-2001-0731
epss 0.71872 https://api.first.org/data/v1/epss?cve=CVE-2001-0731
epss 0.71872 https://api.first.org/data/v1/epss?cve=CVE-2001-0731
epss 0.71872 https://api.first.org/data/v1/epss?cve=CVE-2001-0731
epss 0.74386 https://api.first.org/data/v1/epss?cve=CVE-2001-0731
epss 0.74386 https://api.first.org/data/v1/epss?cve=CVE-2001-0731
epss 0.74386 https://api.first.org/data/v1/epss?cve=CVE-2001-0731
epss 0.74386 https://api.first.org/data/v1/epss?cve=CVE-2001-0731
epss 0.74386 https://api.first.org/data/v1/epss?cve=CVE-2001-0731
epss 0.74386 https://api.first.org/data/v1/epss?cve=CVE-2001-0731
epss 0.74386 https://api.first.org/data/v1/epss?cve=CVE-2001-0731
epss 0.74386 https://api.first.org/data/v1/epss?cve=CVE-2001-0731
epss 0.74386 https://api.first.org/data/v1/epss?cve=CVE-2001-0731
epss 0.74386 https://api.first.org/data/v1/epss?cve=CVE-2001-0731
epss 0.74386 https://api.first.org/data/v1/epss?cve=CVE-2001-0731
epss 0.74386 https://api.first.org/data/v1/epss?cve=CVE-2001-0731
epss 0.74386 https://api.first.org/data/v1/epss?cve=CVE-2001-0731
epss 0.74386 https://api.first.org/data/v1/epss?cve=CVE-2001-0731
epss 0.74386 https://api.first.org/data/v1/epss?cve=CVE-2001-0731
epss 0.74386 https://api.first.org/data/v1/epss?cve=CVE-2001-0731
epss 0.74386 https://api.first.org/data/v1/epss?cve=CVE-2001-0731
epss 0.74386 https://api.first.org/data/v1/epss?cve=CVE-2001-0731
epss 0.74386 https://api.first.org/data/v1/epss?cve=CVE-2001-0731
epss 0.74386 https://api.first.org/data/v1/epss?cve=CVE-2001-0731
epss 0.74386 https://api.first.org/data/v1/epss?cve=CVE-2001-0731
epss 0.74386 https://api.first.org/data/v1/epss?cve=CVE-2001-0731
epss 0.77085 https://api.first.org/data/v1/epss?cve=CVE-2001-0731
epss 0.85803 https://api.first.org/data/v1/epss?cve=CVE-2001-0731
epss 0.85803 https://api.first.org/data/v1/epss?cve=CVE-2001-0731
epss 0.85803 https://api.first.org/data/v1/epss?cve=CVE-2001-0731
epss 0.96516 https://api.first.org/data/v1/epss?cve=CVE-2001-0731
epss 0.96516 https://api.first.org/data/v1/epss?cve=CVE-2001-0731
epss 0.96516 https://api.first.org/data/v1/epss?cve=CVE-2001-0731
epss 0.96516 https://api.first.org/data/v1/epss?cve=CVE-2001-0731
epss 0.96516 https://api.first.org/data/v1/epss?cve=CVE-2001-0731
epss 0.96646 https://api.first.org/data/v1/epss?cve=CVE-2001-0731
epss 0.96646 https://api.first.org/data/v1/epss?cve=CVE-2001-0731
epss 0.96646 https://api.first.org/data/v1/epss?cve=CVE-2001-0731
rhbs high https://bugzilla.redhat.com/show_bug.cgi?id=1616612
apache_httpd important https://httpd.apache.org/security/json/CVE-2001-0731.json
cvssv2 5.0 https://nvd.nist.gov/vuln/detail/CVE-2001-0731
Reference id Reference type URL
ftp://patches.sgi.com/support/free/security/advisories/20020301-01-P
http://frontal2.mandriva.com/security/advisories?name=MDKSA-2001:077
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2001-0731.json
https://api.first.org/data/v1/epss?cve=CVE-2001-0731
https://exchange.xforce.ibmcloud.com/vulnerabilities/8275
https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
http://www.apacheweek.com/issues/01-10-05#security
http://www.redhat.com/support/errata/RHSA-2001-126.html
http://www.redhat.com/support/errata/RHSA-2001-164.html
http://www.securityfocus.com/archive/1/20010709214744.A28765%40brasscannon.net
http://www.securityfocus.com/archive/1/20010709214744.A28765@brasscannon.net
http://www.securityfocus.com/bid/3009
1616612 https://bugzilla.redhat.com/show_bug.cgi?id=1616612
cpe:2.3:a:apache:http_server:1.3.20:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.20:*:*:*:*:*:*:*
CVE-2001-0731 https://httpd.apache.org/security/json/CVE-2001-0731.json
CVE-2001-0731 https://nvd.nist.gov/vuln/detail/CVE-2001-0731
CVE-2001-0731;OSVDB-582 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/21002.txt
CVE-2001-0731;OSVDB-582 Exploit https://www.securityfocus.com/bid/3009/info
RHSA-2001:126 https://access.redhat.com/errata/RHSA-2001:126
RHSA-2001:164 https://access.redhat.com/errata/RHSA-2001:164
Data source Exploit-DB
Date added July 10, 2001
Description Apache 1.3 - Directory Index Disclosure
Ransomware campaign use Known
Source publication date July 10, 2001
Exploit type remote
Platform multiple
Source update date Sept. 2, 2012
Source URL https://www.securityfocus.com/bid/3009/info
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2001-0731
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.98636
EPSS Score 0.71872
Published At May 7, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.