{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-26T08:37:45.057","vulnerabilities":[{"cve":{"id":"CVE-2002-1825","sourceIdentifier":"cve@mitre.org","published":"2002-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Format string vulnerability in PerlRTE_example1.pl in WASD 7.1, 7.2.0 through 7.2.3, and 8.0.0 allows remote attackers to execute arbitrary commands or crash the server via format strings in the $name variable."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:P","baseScore":6.4,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:wasd:wasd_http_server:7.1:*:*:*:*:*:*:*","matchCriteriaId":"757E1966-F24B-4621-A6E7-BBB5DE753D36"},{"vulnerable":true,"criteria":"cpe:2.3:a:wasd:wasd_http_server:7.2:*:*:*:*:*:*:*","matchCriteriaId":"107A410D-1441-453E-A843-CABABFB31FFD"},{"vulnerable":true,"criteria":"cpe:2.3:a:wasd:wasd_http_server:7.2.1:*:*:*:*:*:*:*","matchCriteriaId":"191E74E9-A7AC-435C-908D-AD3BE5BAC8FE"},{"vulnerable":true,"criteria":"cpe:2.3:a:wasd:wasd_http_server:7.2.2:*:*:*:*:*:*:*","matchCriteriaId":"023610C4-44A0-44E5-94C6-B460398130A7"},{"vulnerable":true,"criteria":"cpe:2.3:a:wasd:wasd_http_server:7.2.3:*:*:*:*:*:*:*","matchCriteriaId":"FD84EA57-2F59-4B07-889C-5F775117026B"},{"vulnerable":true,"criteria":"cpe:2.3:a:wasd:wasd_http_server:8.0:*:*:*:*:*:*:*","matchCriteriaId":"7524322C-C0D0-49A7-8469-8F2D535508E0"}]}]}],"references":[{"url":"http://wasd.vsm.com.au/ht_root/doc/misc/wasd_advisory_020925.txt","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/10213.php","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://www.osvdb.org/21288","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/293229","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/5811","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://www.teaser.fr/~jlgailly/security/wasd-vuln-2002-09.txt","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://wasd.vsm.com.au/ht_root/doc/misc/wasd_advisory_020925.txt","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/10213.php","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http://www.osvdb.org/21288","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/archive/1/293229","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/5811","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http://www.teaser.fr/~jlgailly/security/wasd-vuln-2002-09.txt","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}