{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-02T04:38:03.576","vulnerabilities":[{"cve":{"id":"CVE-2001-1242","sourceIdentifier":"cve@mitre.org","published":"2001-07-17T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Directory traversal vulnerability in Un-CGI 1.9 and earlier allows remote attackers to execute arbitrary code via a .. (dot dot) in an HTML form."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:steve_grimm:un-cgi:1.0:*:*:*:*:*:*:*","matchCriteriaId":"C8EFF837-1B59-450D-B0E9-594093901168"},{"vulnerable":true,"criteria":"cpe:2.3:a:steve_grimm:un-cgi:1.1:*:*:*:*:*:*:*","matchCriteriaId":"05272766-A2E1-426B-AE77-3AF64AC7DAC1"},{"vulnerable":true,"criteria":"cpe:2.3:a:steve_grimm:un-cgi:1.2:*:*:*:*:*:*:*","matchCriteriaId":"84EBDD40-DA8F-460B-A996-8019C0F719EC"},{"vulnerable":true,"criteria":"cpe:2.3:a:steve_grimm:un-cgi:1.3:*:*:*:*:*:*:*","matchCriteriaId":"0B61DC67-7988-44C9-A9D4-9A3AEB1CCAFF"},{"vulnerable":true,"criteria":"cpe:2.3:a:steve_grimm:un-cgi:1.4:*:*:*:*:*:*:*","matchCriteriaId":"CAC08CF8-2899-40EF-B404-7B2A138E0755"},{"vulnerable":true,"criteria":"cpe:2.3:a:steve_grimm:un-cgi:1.5:*:*:*:*:*:*:*","matchCriteriaId":"0F69BABC-DC25-45E6-B50E-27264C95FD23"},{"vulnerable":true,"criteria":"cpe:2.3:a:steve_grimm:un-cgi:1.6:*:*:*:*:*:*:*","matchCriteriaId":"993399AD-0A50-4DE3-8572-8805D9AEE386"},{"vulnerable":true,"criteria":"cpe:2.3:a:steve_grimm:un-cgi:1.6.1:*:*:*:*:*:*:*","matchCriteriaId":"AF7B2908-19AA-49A8-A281-C470DCF159DD"},{"vulnerable":true,"criteria":"cpe:2.3:a:steve_grimm:un-cgi:1.6.2:*:*:*:*:*:*:*","matchCriteriaId":"ACC8093D-5A84-4003-8A74-2A12A0A761D9"},{"vulnerable":true,"criteria":"cpe:2.3:a:steve_grimm:un-cgi:1.7:*:*:*:*:*:*:*","matchCriteriaId":"03E2D80A-6448-40EC-B33E-1606BB27C319"},{"vulnerable":true,"criteria":"cpe:2.3:a:steve_grimm:un-cgi:1.8:*:*:*:*:*:*:*","matchCriteriaId":"17EDF72D-3553-45DC-8E3F-C3B7D2949DFA"},{"vulnerable":true,"criteria":"cpe:2.3:a:steve_grimm:un-cgi:1.9:*:*:*:*:*:*:*","matchCriteriaId":"DFFDFDCC-04B6-4DC9-B2FB-1E33FBED2444"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2001-07/0287.html","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2001-07/0349.html","source":"cve@mitre.org"},{"url":"http://www.iss.net/security_center/static/6846.php","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.midwinter.com/~koreth/uncgi-changes.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/3056","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2001-07/0287.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2001-07/0349.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.iss.net/security_center/static/6846.php","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.midwinter.com/~koreth/uncgi-changes.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/3056","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}