Логотип exploitDog
bind:CVE-2004-1484
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2004-1484

Количество 3

Количество 3

nvd логотип

CVE-2004-1484

больше 20 лет назад

Format string vulnerability in the _msg function in error.c in socat 1.4.0.3 and earlier, when used as an HTTP proxy client and run with the -ly option, allows remote attackers or local users to execute arbitrary code via format string specifiers in a syslog message.

CVSS2: 5
EPSS: Низкий
debian логотип

CVE-2004-1484

больше 20 лет назад

Format string vulnerability in the _msg function in error.c in socat 1 ...

CVSS2: 5
EPSS: Низкий
github логотип

GHSA-v3f9-7x42-4vg2

больше 3 лет назад

Format string vulnerability in the _msg function in error.c in socat 1.4.0.3 and earlier, when used as an HTTP proxy client and run with the -ly option, allows remote attackers or local users to execute arbitrary code via format string specifiers in a syslog message.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2004-1484

Format string vulnerability in the _msg function in error.c in socat 1.4.0.3 and earlier, when used as an HTTP proxy client and run with the -ly option, allows remote attackers or local users to execute arbitrary code via format string specifiers in a syslog message.

CVSS2: 5
2%
Низкий
больше 20 лет назад
debian логотип
CVE-2004-1484

Format string vulnerability in the _msg function in error.c in socat 1 ...

CVSS2: 5
2%
Низкий
больше 20 лет назад
github логотип
GHSA-v3f9-7x42-4vg2

Format string vulnerability in the _msg function in error.c in socat 1.4.0.3 and earlier, when used as an HTTP proxy client and run with the -ly option, allows remote attackers or local users to execute arbitrary code via format string specifiers in a syslog message.

2%
Низкий
больше 3 лет назад

Уязвимостей на страницу