{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-16T17:54:04.837","vulnerabilities":[{"cve":{"id":"CVE-2002-0412","sourceIdentifier":"cve@mitre.org","published":"2002-08-12T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Format string vulnerability in TraceEvent function for ntop before 2.1 allows remote attackers to execute arbitrary code by causing format strings to be injected into calls to the syslog function, via (1) an HTTP GET request, (2) a user name in HTTP authentication, or (3) a password in HTTP authentication."},{"lang":"es","value":"Vulnerabilidad de cadena de formato en la función TraceEvent para ntop anteriores a la 2.1 permite a atacantes remotos la ejecución de código arbitrario haciendo que la cadena del formato forme parte de las llamadas a la función syslog, mediante:\r\n\r\n una petición HTTP GET\r\n un nombre de usuario en la autenticación HTTP\r\n una contraseña en la autenticación HTTP."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:luca_deri:ntop:2.0:*:*:*:*:*:*:*","matchCriteriaId":"ECBA05AB-4CB0-4B94-AFB6-D220F55D5E1D"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/vulnwatch/2002-q1/0056.html","source":"cve@mitre.org"},{"url":"http://listmanager.unipi.it/pipermail/ntop-dev/2002-February/000489.html","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=101854261030453&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=101856541322245&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=101908224609740&w=2","source":"cve@mitre.org"},{"url":"http://online.securityfocus.com/archive/1/259642","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://snapshot.ntop.org/","source":"cve@mitre.org"},{"url":"http://www.iss.net/security_center/static/8347.php","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.osvdb.org/5307","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/4225","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://archives.neohapsis.com/archives/vulnwatch/2002-q1/0056.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://listmanager.unipi.it/pipermail/ntop-dev/2002-February/000489.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=101854261030453&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=101856541322245&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=101908224609740&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://online.securityfocus.com/archive/1/259642","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://snapshot.ntop.org/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.iss.net/security_center/static/8347.php","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.osvdb.org/5307","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/4225","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}