CVE-2001-0766 – Apache 1.3.14 - Mac File Protection Bypass
https://notcve.org/view.php?id=CVE-2001-0766
Apache on MacOS X Client 10.0.3 with the HFS+ file system allows remote attackers to bypass access restrictions via a URL that contains some characters whose case is not matched by Apache's filters. • https://www.exploit-db.com/exploits/20911 http://archives.neohapsis.com/archives/bugtraq/2001-06/0090.html http://www.securityfocus.com/bid/2852 • CWE-178: Improper Handling of Case Sensitivity •
CVE-2001-1072
https://notcve.org/view.php?id=CVE-2001-1072
Apache with mod_rewrite enabled on most UNIX systems allows remote attackers to bypass RewriteRules by inserting extra / (slash) characters into the requested path, which causes the regular expression in the RewriteRule to fail. • http://www.apacheweek.com/issues/02-02-01#security http://www.securityfocus.com/archive/1/203955 http://www.securityfocus.com/bid/3176 https://exchange.xforce.ibmcloud.com/vulnerabilities/8633 •
CVE-2001-1342
https://notcve.org/view.php?id=CVE-2001-1342
Apache before 1.3.20 on Windows and OS/2 systems allows remote attackers to cause a denial of service (GPF) via an HTTP request for a URI that contains a large number of / (slash) or other characters, which causes certain functions to dereference a null pointer. • http://bugs.apache.org/index.cgi/full/7522 http://marc.info/?l=bugtraq&m=99054258728748&w=2 http://online.securityfocus.com/archive/1/176144 http://www.apacheweek.com/issues/01-05-25 http://www.iss.net/security_center/static/6527.php http://www.securityfocus.com/bid/2740 https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.o •
CVE-2001-0925 – Apache 1.3 - Artificially Long Slash Path Directory Listing
https://notcve.org/view.php?id=CVE-2001-0925
The default installation of Apache before 1.3.19 allows remote attackers to list directories instead of the multiview index.html file via an HTTP request for a path that contains many / (slash) characters, which causes the path to be mishandled by (1) mod_negotiation, (2) mod_dir, or (3) mod_autoindex. • https://www.exploit-db.com/exploits/20692 https://www.exploit-db.com/exploits/20693 https://www.exploit-db.com/exploits/20694 https://www.exploit-db.com/exploits/20695 http://www.apacheweek.com/features/security-13 http://www.debian.org/security/2001/dsa-067 http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-077.php3 http://www.linuxsecurity.com/advisories/other_advisory-1452.html http://www.securityfocus.com/archive/1/168497 http://www.securityfocus.com/archive • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2001-0131
https://notcve.org/view.php?id=CVE-2001-0131
htpasswd and htdigest in Apache 2.0a9, 1.3.14, and others allows local users to overwrite arbitrary files via a symlink attack. • http://marc.info/?l=bugtraq&m=97916374410647&w=2 http://www.debian.org/security/2001/dsa-021 http://www.securityfocus.com/bid/2182 https://exchange.xforce.ibmcloud.com/vulnerabilities/5926 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •