CVE-2001-1534
https://notcve.org/view.php?id=CVE-2001-1534
mod_usertrack in Apache 1.3.11 through 1.3.20 generates session ID's using predictable information including host IP address, system time and server process ID, which allows local users to obtain session ID's and bypass authentication when these session ID's are used for authentication. • http://cert.uni-stuttgart.de/archive/bugtraq/2001/11/msg00084.html http://www.iss.net/security_center/static/7494.php http://www.securityfocus.com/bid/3521 • CWE-384: Session Fixation •
CVE-2001-0730
https://notcve.org/view.php?id=CVE-2001-0730
split-logfile in Apache 1.3.20 allows remote attackers to overwrite arbitrary files that end in the .log extension via an HTTP request with a / (slash) in the Host: header. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000430 http://frontal2.mandriva.com/security/advisories?name=MDKSA-2001:077 http://www.apacheweek.com/issues/01-09-28#security http://www.linuxsecurity.com/advisories/other_advisory-1649.html http://www.redhat.com/support/errata/RHSA-2001-126.html http://www.redhat.com/support/errata/RHSA-2001-164.html https://exchange.xforce.ibmcloud.com/vulnerabilities/7419 https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5 •
CVE-2001-0729
https://notcve.org/view.php?id=CVE-2001-0729
Apache 1.3.20 on Windows servers allows remote attackers to bypass the default index page and list directory contents via a URL with a large number of / (slash) characters. • http://secunia.com/advisories/23794 http://securitytracker.com/id?1017522 http://www.apacheweek.com/issues/01-09-28#security http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html http://www.securityfocus.com/bid/22083 https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf2f0f3611f93 •
CVE-2001-0731 – Apache 1.3 - Directory Index Disclosure
https://notcve.org/view.php?id=CVE-2001-0731
Apache 1.3.20 with Multiviews enabled allows remote attackers to view directory contents and bypass the index page via a URL containing the "M=D" query string. • https://www.exploit-db.com/exploits/21002 ftp://patches.sgi.com/support/free/security/advisories/20020301-01-P http://frontal2.mandriva.com/security/advisories?name=MDKSA-2001:077 http://www.apacheweek.com/issues/01-10-05#security http://www.redhat.com/support/errata/RHSA-2001-126.html http://www.redhat.com/support/errata/RHSA-2001-164.html http://www.securityfocus.com/archive/1/20010709214744.A28765%40brasscannon.net http://www.securityfocus.com/bid/3009 https://exchange.xforce. •
CVE-2001-0131
https://notcve.org/view.php?id=CVE-2001-0131
htpasswd and htdigest in Apache 2.0a9, 1.3.14, and others allows local users to overwrite arbitrary files via a symlink attack. • http://marc.info/?l=bugtraq&m=97916374410647&w=2 http://www.debian.org/security/2001/dsa-021 http://www.securityfocus.com/bid/2182 https://exchange.xforce.ibmcloud.com/vulnerabilities/5926 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •