{ "schema_version": "1.4.0", "id": "GHSA-p5xx-34m7-j6c4", "modified": "2022-04-30T18:21:56Z", "published": "2022-04-30T18:21:56Z", "aliases": [ "CVE-2002-1825" ], "details": "Format string vulnerability in PerlRTE_example1.pl in WASD 7.1, 7.2.0 through 7.2.3, and 8.0.0 allows remote attackers to execute arbitrary commands or crash the server via format strings in the $name variable.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1825" }, { "type": "WEB", "url": "http://wasd.vsm.com.au/ht_root/doc/misc/wasd_advisory_020925.txt" }, { "type": "WEB", "url": "http://www.iss.net/security_center/static/10213.php" }, { "type": "WEB", "url": "http://www.osvdb.org/21288" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/293229" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/5811" }, { "type": "WEB", "url": "http://www.teaser.fr/~jlgailly/security/wasd-vuln-2002-09.txt" } ], "database_specific": { "cwe_ids": [], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2002-12-31T05:00:00Z" } }