Executive Summary

Informations
Name CVE-2002-1742 First vendor Publication 2002-12-31
Vendor Cve Last vendor Modification 2017-07-11

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:P/A:N)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

SOAP::Lite 0.50 through 0.52 allows remote attackers to load arbitrary Perl functions by suppling a non-existent function in a script using a SOAP::Lite module, which causes the AUTOLOAD subroutine to trigger.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1742

CWE : Common Weakness Enumeration

% Id Name

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 3

Open Source Vulnerability Database (OSVDB)

Id Description
59562 Perl SOAP::Lite Module Crafted Request Arbitrary Function Loading

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/4493
BUGTRAQ http://online.securityfocus.com/archive/1/267051
FREEBSD ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SN-02%3A02.asc
MISC http://use.perl.org/articles/02/04/09/000212.shtml?tid=5
http://www.phrack.com/show.php?p=58&a=9
http://www.phrack.org/show.php?p=58&a=9
http://www.soaplite.com/
XF https://exchange.xforce.ibmcloud.com/vulnerabilities/8838

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
Date Informations
2021-05-04 12:01:51
  • Multiple Updates
2021-04-22 01:01:59
  • Multiple Updates
2020-05-23 00:15:12
  • Multiple Updates
2017-07-11 12:01:12
  • Multiple Updates
2013-05-11 12:14:16
  • Multiple Updates