7.5
CVE-2004-1388
- EPSS 74.55%
- Veröffentlicht 31.12.2004 05:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
Format string vulnerability in the gpsd_report function for BerliOS GPD daemon (gpsd, formerly pygps) 1.9.0 through 2.7 allows remote attackers to execute arbitrary code via certain GPS requests containing format string specifiers that are not properly handled in syslog calls.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Berlios ≫ Gps Daemon Version1.9.0
Berlios ≫ Gps Daemon Version1.25
Berlios ≫ Gps Daemon Version1.26
Berlios ≫ Gps Daemon Version1.91
Berlios ≫ Gps Daemon Version1.92
Berlios ≫ Gps Daemon Version1.93
Berlios ≫ Gps Daemon Version1.94
Berlios ≫ Gps Daemon Version1.95
Berlios ≫ Gps Daemon Version1.96
Berlios ≫ Gps Daemon Version1.97
Berlios ≫ Gps Daemon Version1.98
Berlios ≫ Gps Daemon Version2.0
Berlios ≫ Gps Daemon Version2.1
Berlios ≫ Gps Daemon Version2.2
Berlios ≫ Gps Daemon Version2.3
Berlios ≫ Gps Daemon Version2.4
Berlios ≫ Gps Daemon Version2.7
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 74.55% | 0.988 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.5 | 10 | 6.4 |
AV:N/AC:L/Au:N/C:P/I:P/A:P
|