CVE-2002-1062
Published Oct 4, 2002
Last updated 16 years ago
Overview
- Description
- Signedness error in Thomas Hauck Jana Server 2.x through 2.2.1, and 1.4.6 and earlier, allows remote attackers to execute arbitrary code via long (1) Username, (2) Password, or (3) Hostname entries.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:t._hauck:jana_web_server:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "09026053-0568-4D8F-AEB0-F7850C655635" }, { "criteria": "cpe:2.3:a:t._hauck:jana_web_server:1.45:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5C0BC837-4993-4780-B4B0-88D4C1A42BD5" }, { "criteria": "cpe:2.3:a:t._hauck:jana_web_server:1.46:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D4505B16-611E-422F-995D-748281466621" }, { "criteria": "cpe:2.3:a:t._hauck:jana_web_server:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "525A467E-9EFF-47AE-AEBC-BE769073A64C" }, { "criteria": "cpe:2.3:a:t._hauck:jana_web_server:2.0_beta1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1812EAA2-85E0-47CE-A704-646AF4AA5CF7" }, { "criteria": "cpe:2.3:a:t._hauck:jana_web_server:2.0_beta2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CD6D91CA-E975-49CF-BF32-1E0302D5D8AD" }, { "criteria": "cpe:2.3:a:t._hauck:jana_web_server:2.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AD2CDD0D-387C-413A-B2E8-DB18A7E3FD3B" } ], "operator": "OR" } ] } ]