7.5
CVE-2004-1388
- EPSS 74.09%
- Veröffentlicht 31.12.2004 05:00:00
- Zuletzt bearbeitet 16.04.2026 00:27:16
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
Format string vulnerability in the gpsd_report function for BerliOS GPD daemon (gpsd, formerly pygps) 1.9.0 through 2.7 allows remote attackers to execute arbitrary code via certain GPS requests containing format string specifiers that are not properly handled in syslog calls.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Berlios ≫ Gps Daemon Version1.9.0
Berlios ≫ Gps Daemon Version1.25
Berlios ≫ Gps Daemon Version1.26
Berlios ≫ Gps Daemon Version1.91
Berlios ≫ Gps Daemon Version1.92
Berlios ≫ Gps Daemon Version1.93
Berlios ≫ Gps Daemon Version1.94
Berlios ≫ Gps Daemon Version1.95
Berlios ≫ Gps Daemon Version1.96
Berlios ≫ Gps Daemon Version1.97
Berlios ≫ Gps Daemon Version1.98
Berlios ≫ Gps Daemon Version2.0
Berlios ≫ Gps Daemon Version2.1
Berlios ≫ Gps Daemon Version2.2
Berlios ≫ Gps Daemon Version2.3
Berlios ≫ Gps Daemon Version2.4
Berlios ≫ Gps Daemon Version2.7
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 74.09% | 0.988 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.5 | 10 | 6.4 |
AV:N/AC:L/Au:N/C:P/I:P/A:P
|