10
CVE-2004-0980
- EPSS 1.58%
- Published 09.02.2005 05:00:00
- Last modified 03.04.2025 01:03:51
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
Format string vulnerability in ez-ipupdate.c for ez-ipupdate 3.0.10 through 3.0.11b8, when running in daemon mode with certain service types in use, allows remote servers to execute arbitrary code.
Data is provided by the National Vulnerability Database (NVD)
Angus Mackay ≫ Ez-ipupdate Version3.0.11b5
Angus Mackay ≫ Ez-ipupdate Version3.0.11b8
Debian ≫ Debian Linux Version3.0
Debian ≫ Debian Linux Version3.0 Editionalpha
Debian ≫ Debian Linux Version3.0 Editionarm
Debian ≫ Debian Linux Version3.0 Editionhppa
Debian ≫ Debian Linux Version3.0 Editionia-32
Debian ≫ Debian Linux Version3.0 Editionia-64
Debian ≫ Debian Linux Version3.0 Editionm68k
Debian ≫ Debian Linux Version3.0 Editionmips
Debian ≫ Debian Linux Version3.0 Editionmipsel
Debian ≫ Debian Linux Version3.0 Editionppc
Debian ≫ Debian Linux Version3.0 Editions-390
Debian ≫ Debian Linux Version3.0 Editionsparc
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 1.58% | 0.798 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 10 | 10 | 10 |
AV:N/AC:L/Au:N/C:C/I:C/A:C
|