2017-10-16 12:31:07 -04:00
{
2019-03-18 03:14:22 +00:00
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org" ,
"ID" : "CVE-2002-0061" ,
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a" ,
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
} ,
"vendor_name" : "n/a"
}
]
}
} ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
"description" : {
"description_data" : [
2017-10-16 12:31:07 -04:00
{
2019-03-18 03:14:22 +00:00
"lang" : "eng" ,
"value" : "Apache for Win32 before 1.3.24, and 2.0.x before 2.0.34-beta, allows remote attackers to execute arbitrary commands via shell metacharacters (a | pipe character) provided as arguments to batch (.bat) or .cmd scripts, which are sent unfiltered to the shell interpreter, typically cmd.exe."
2017-10-16 12:31:07 -04:00
}
2019-03-18 03:14:22 +00:00
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "n/a"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
"name" : "http://www.apacheweek.com/issues/02-03-29#apache1324" ,
"refsource" : "CONFIRM" ,
"url" : "http://www.apacheweek.com/issues/02-03-29#apache1324"
} ,
{
"name" : "4335" ,
"refsource" : "BID" ,
"url" : "http://www.securityfocus.com/bid/4335"
} ,
{
"name" : "apache-dos-batch-command-execution(8589)" ,
"refsource" : "XF" ,
"url" : "http://www.iss.net/security_center/static/8589.php"
} ,
{
"name" : "20020321 Vulnerability in Apache for Win32 batch file processing - Remote command execution" ,
"refsource" : "BUGTRAQ" ,
"url" : "http://marc.info/?l=bugtraq&m=101674082427358&w=2"
} ,
{
"name" : "20020325 Apache 1.3.24 Released! (fwd)" ,
"refsource" : "BUGTRAQ" ,
"url" : "http://online.securityfocus.com/archive/1/263927"
2021-03-30 12:01:52 +00:00
} ,
{
"refsource" : "MLIST" ,
"name" : "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/" ,
"url" : "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
2021-03-30 13:04:00 +00:00
} ,
{
"refsource" : "MLIST" ,
"name" : "[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html" ,
"url" : "https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E"
} ,
{
"refsource" : "MLIST" ,
"name" : "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/" ,
"url" : "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
2021-06-06 11:00:51 +00:00
} ,
{
"refsource" : "MLIST" ,
"name" : "[httpd-cvs] 20210606 svn commit: r1075470 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html" ,
"url" : "https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e@%3Ccvs.httpd.apache.org%3E"
2019-03-18 03:14:22 +00:00
}
]
}
}