7.5
CVE-2004-1388
- EPSS 74.55%
- Published 31.12.2004 05:00:00
- Last modified 03.04.2025 01:03:51
- Source cve@mitre.org
- CVE-Watchlists
- Open
Format string vulnerability in the gpsd_report function for BerliOS GPD daemon (gpsd, formerly pygps) 1.9.0 through 2.7 allows remote attackers to execute arbitrary code via certain GPS requests containing format string specifiers that are not properly handled in syslog calls.
Data is provided by the National Vulnerability Database (NVD)
Berlios ≫ Gps Daemon Version1.9.0
Berlios ≫ Gps Daemon Version1.25
Berlios ≫ Gps Daemon Version1.26
Berlios ≫ Gps Daemon Version1.91
Berlios ≫ Gps Daemon Version1.92
Berlios ≫ Gps Daemon Version1.93
Berlios ≫ Gps Daemon Version1.94
Berlios ≫ Gps Daemon Version1.95
Berlios ≫ Gps Daemon Version1.96
Berlios ≫ Gps Daemon Version1.97
Berlios ≫ Gps Daemon Version1.98
Berlios ≫ Gps Daemon Version2.0
Berlios ≫ Gps Daemon Version2.1
Berlios ≫ Gps Daemon Version2.2
Berlios ≫ Gps Daemon Version2.3
Berlios ≫ Gps Daemon Version2.4
Berlios ≫ Gps Daemon Version2.7
| Type | Source | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 74.55% | 0.988 |
| Source | Base Score | Exploit Score | Impact Score | Vector string |
|---|---|---|---|---|
| nvd@nist.gov | 7.5 | 10 | 6.4 |
AV:N/AC:L/Au:N/C:P/I:P/A:P
|