CVE-2002-1166
Published Oct 11, 2002
Last updated 8 years ago
Overview
- Description
- Buffer overflow in John Franks WN Server 1.18.2 through 2.0.0 allows remote attackers to execute arbitrary code via a long GET request.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:john_franks:wn_server:1.18.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A7853930-CB5C-40FF-B350-E9870104F4FE" }, { "criteria": "cpe:2.3:a:john_franks:wn_server:1.18.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C6258E82-EC9D-41A1-A542-0E5988065817" }, { "criteria": "cpe:2.3:a:john_franks:wn_server:1.18.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "998881F2-AF7F-4D81-A40B-7272D3535CB8" }, { "criteria": "cpe:2.3:a:john_franks:wn_server:1.18.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "660DC32B-3F25-43A7-9F1C-1425C257B65E" }, { "criteria": "cpe:2.3:a:john_franks:wn_server:1.18.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7A37D1CF-2CFC-47A2-B4B3-FBC57480C185" }, { "criteria": "cpe:2.3:a:john_franks:wn_server:1.18.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E24280E5-0263-471E-95CC-5B1C3E9CE7F0" }, { "criteria": "cpe:2.3:a:john_franks:wn_server:1.19.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4801C3D0-2C11-4E30-9300-B3102A6F6E6B" }, { "criteria": "cpe:2.3:a:john_franks:wn_server:1.19.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3705A455-F271-461C-8614-3F0BD7A105EC" }, { "criteria": "cpe:2.3:a:john_franks:wn_server:1.19.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3AF670A2-150B-4D2A-86B2-611A88BCDB8C" }, { "criteria": "cpe:2.3:a:john_franks:wn_server:1.19.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ADC3768D-63D7-4154-A8E7-03648AD272A0" }, { "criteria": "cpe:2.3:a:john_franks:wn_server:1.19.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7A6E7299-23E2-4EFD-901C-9108740215BD" }, { "criteria": "cpe:2.3:a:john_franks:wn_server:1.19.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "042D86DB-DB3C-489F-A4B4-92728F782E86" }, { "criteria": "cpe:2.3:a:john_franks:wn_server:1.19.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AB52612E-E971-4669-B955-378FA3603992" }, { "criteria": "cpe:2.3:a:john_franks:wn_server:1.19.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "42A21E22-1F33-44ED-B367-A386A474C723" }, { "criteria": "cpe:2.3:a:john_franks:wn_server:1.19.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C20FAFF3-9F12-4ABB-94B4-ABBDEC42E8B0" }, { "criteria": "cpe:2.3:a:john_franks:wn_server:1.19.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "30F11597-3433-4350-ABAB-1EF0D852BC2A" }, { "criteria": "cpe:2.3:a:john_franks:wn_server:2.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6ED4C3B7-6445-49A8-8D1E-5F1484332226" } ], "operator": "OR" } ] } ]