CVE-2002-1654 : Detail

CVE-2002-1654

7.24%V3
Network
2005-03-28
03h00 +00:00
2017-07-10
12h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

iPlanet Web Server Enterprise Edition and Netscape Enterprise Server 4.0 and 4.1 allows remote attackers to conduct HTTP Basic Authentication via the wp-force-auth Web Publisher command, which provides a distinct attack vector and may make it easier to conduct brute force password guessing without detection.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 7.5 AV:N/AC:L/Au:N/C:P/I:P/A:P [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Products Mentioned

Configuraton 0

Iplanet>>Iplanet_web_server >> Version 6.0

    Iplanet>>Iplanet_web_server >> Version enterprise_4.0

      Iplanet>>Iplanet_web_server >> Version enterprise_4.1

        Netscape>>Enterprise_server >> Version 2.0

        Netscape>>Enterprise_server >> Version 3.0

        Netscape>>Enterprise_server >> Version 3.1

        Netscape>>Enterprise_server >> Version 3.2

        Netscape>>Enterprise_server >> Version 3.3

        Netscape>>Enterprise_server >> Version 3.4

        Netscape>>Enterprise_server >> Version 3.5

        Netscape>>Enterprise_server >> Version 3.6

        References

        http://www.securityfocus.com/bid/3831
        Tags : vdb-entry, x_refsource_BID
        http://www.kb.cert.org/vuls/id/985347
        Tags : third-party-advisory, x_refsource_CERT-VN
        http://lists.virus.org/vulnwatch-0201/msg00008.html
        Tags : mailing-list, x_refsource_VULNWATCH
        http://securitytracker.com/id?1003157
        Tags : vdb-entry, x_refsource_SECTRACK