Search for vulnerabilities
Vulnerability details: VCID-xtge-bym9-aaak
Vulnerability ID VCID-xtge-bym9-aaak
Aliases CVE-2001-1342
Summary Apache before 1.3.20 on Windows and OS/2 systems allows remote attackers to cause a denial of service (GPF) via an HTTP request for a URI that contains a large number of / (slash) or other characters, which causes certain functions to dereference a null pointer.
Status Published
Exploitability None
Weighted Severity None
Risk None
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
System Score Found at
epss 0.01815 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.01815 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.01815 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.01815 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.01815 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.01815 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.01815 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.01815 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.01815 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.01913 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.01913 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.01913 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.02551 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.02551 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.02551 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.02551 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.08146 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.09106 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.09106 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.09106 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.09106 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.09106 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.09106 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.09106 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.09106 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.09106 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.09106 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.09106 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.09106 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.09106 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.09106 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.09106 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.09106 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.09106 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.09106 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.09106 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.09106 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.09106 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.09106 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.09106 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.09106 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.09106 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.09106 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.09106 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.10153 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.10153 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.10153 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.10153 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.10153 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.10153 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.10153 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.10153 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.10153 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.10153 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.10153 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.10153 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.10153 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.10153 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.10153 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.10153 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.10153 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.10153 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.10153 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.10153 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.10153 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.10153 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
epss 0.10153 https://api.first.org/data/v1/epss?cve=CVE-2001-1342
apache_httpd important https://httpd.apache.org/security/json/CVE-2001-1342.json
cvssv2 5.0 https://nvd.nist.gov/vuln/detail/CVE-2001-1342
Reference id Reference type URL
http://bugs.apache.org/index.cgi/full/7522
http://marc.info/?l=bugtraq&m=99054258728748&w=2
http://online.securityfocus.com/archive/1/176144
https://api.first.org/data/v1/epss?cve=CVE-2001-1342
https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
http://www.apacheweek.com/issues/01-05-25
http://www.iss.net/security_center/static/6527.php
http://www.securityfocus.com/bid/2740
cpe:2.3:a:apache:http_server:1.3.12:*:win32:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.12:*:win32:*:*:*:*:*
cpe:2.3:a:apache:http_server:1.3.14:*:win32:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.14:*:win32:*:*:*:*:*
cpe:2.3:a:apache:http_server:1.3.15:*:win32:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.15:*:win32:*:*:*:*:*
cpe:2.3:a:apache:http_server:1.3.16:*:win32:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.16:*:win32:*:*:*:*:*
cpe:2.3:a:apache:http_server:1.3.17:*:win32:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.17:*:win32:*:*:*:*:*
cpe:2.3:a:apache:http_server:1.3.18:*:win32:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.18:*:win32:*:*:*:*:*
cpe:2.3:a:apache:http_server:1.3.19:*:win32:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.19:*:win32:*:*:*:*:*
CVE-2001-1342 https://httpd.apache.org/security/json/CVE-2001-1342.json
CVE-2001-1342 https://nvd.nist.gov/vuln/detail/CVE-2001-1342
No exploits are available.
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2001-1342
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.88547
EPSS Score 0.01815
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.