Show plain JSON{"id": "CVE-2002-1754", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 2.1, "accessVector": "LOCAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "LOW", "obtainAllPrivilege": false, "exploitabilityScore": 3.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2002-12-31T05:00:00.000", "references": [{"url": "http://support.novell.com/servlet/tidfinder/2962694", "source": "cve@mitre.org"}, {"url": "http://www.cqure.net/advisories.jsp?id=15", "tags": ["Patch", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/9035", "source": "cve@mitre.org"}, {"url": "http://support.novell.com/servlet/tidfinder/2962694", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.cqure.net/advisories.jsp?id=15", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/9035", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "Buffer overflow in Novell NetWare Client 4.80 through 4.83 allows local users to cause a denial of service (crash) by using ping, traceroute, or a similar utility to force the client to resolve a large hostname."}], "lastModified": "2025-04-03T01:03:51.193", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:novell:netware_client:4.80:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2E777D34-C2B0-4897-BF52-C26DEC135FAB"}, {"criteria": "cpe:2.3:a:novell:netware_client:4.81:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E1F109DD-BA31-41A9-8B27-92752183F5EC"}, {"criteria": "cpe:2.3:a:novell:netware_client:4.82:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "044DEABB-891D-4C53-BF4E-2A35C2149EA9"}, {"criteria": "cpe:2.3:a:novell:netware_client:4.83:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "333665A6-3363-41B2-B077-F624737AE188"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}