Vulnerability Details CVE-2004-0414
CVS 1.12.x through 1.12.8, and 1.11.x through 1.11.16, does not properly handle malformed "Entry" lines, which prevents a NULL terminator from being used and may lead to a denial of service (crash), modification of critical program data, or arbitrary code execution.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.078
EPSS Ranking 91.5%
CVSS Severity
CVSS v2 Score 10.0
Products affected by CVE-2004-0414
-
-
-
-
-
cpe:2.3:a:cvs:cvs:1.11.10
-
cpe:2.3:a:cvs:cvs:1.11.11
-
cpe:2.3:a:cvs:cvs:1.11.14
-
cpe:2.3:a:cvs:cvs:1.11.15
-
cpe:2.3:a:cvs:cvs:1.11.16
-
Cvs
»
Cvs
»
Version: 1.11.1_p1
cpe:2.3:a:cvs:cvs:1.11.1_p1
-
-
-
-
-
-
-
-
-
-
-
cpe:2.3:a:openpkg:openpkg:-
-
cpe:2.3:a:openpkg:openpkg:1.0
-
cpe:2.3:a:openpkg:openpkg:1.1
-
cpe:2.3:a:openpkg:openpkg:1.1.0
-
cpe:2.3:a:openpkg:openpkg:1.2
-
cpe:2.3:a:openpkg:openpkg:1.2.0
-
cpe:2.3:a:openpkg:openpkg:1.3
-
cpe:2.3:a:openpkg:openpkg:1.3.3
-
cpe:2.3:a:openpkg:openpkg:1.3.5
-
cpe:2.3:a:openpkg:openpkg:2.0
-
cpe:2.3:a:openpkg:openpkg:2.1
-
cpe:2.3:a:openpkg:openpkg:2.2
-
cpe:2.3:a:openpkg:openpkg:2.5
-
cpe:2.3:a:sgi:propack:2.4
-
cpe:2.3:a:sgi:propack:3.0
-
cpe:2.3:o:gentoo:linux:1.4
-
cpe:2.3:o:openbsd:openbsd:-
-
cpe:2.3:o:openbsd:openbsd:2.0
-
cpe:2.3:o:openbsd:openbsd:2.1
-
cpe:2.3:o:openbsd:openbsd:2.2
-
cpe:2.3:o:openbsd:openbsd:2.3
-
cpe:2.3:o:openbsd:openbsd:2.4
-
cpe:2.3:o:openbsd:openbsd:2.5
-
cpe:2.3:o:openbsd:openbsd:2.6
-
cpe:2.3:o:openbsd:openbsd:2.7
-
cpe:2.3:o:openbsd:openbsd:2.8
-
cpe:2.3:o:openbsd:openbsd:2.9
-
cpe:2.3:o:openbsd:openbsd:3.0
-
cpe:2.3:o:openbsd:openbsd:3.1
-
cpe:2.3:o:openbsd:openbsd:3.2
-
cpe:2.3:o:openbsd:openbsd:3.3
-
cpe:2.3:o:openbsd:openbsd:3.4
-
cpe:2.3:o:openbsd:openbsd:3.5
-
cpe:2.3:o:openbsd:openbsd:3.6
-
cpe:2.3:o:openbsd:openbsd:3.7
-
cpe:2.3:o:openbsd:openbsd:3.8
-
cpe:2.3:o:openbsd:openbsd:3.9
-
cpe:2.3:o:openbsd:openbsd:4.0
-
cpe:2.3:o:openbsd:openbsd:4.1
-
cpe:2.3:o:openbsd:openbsd:4.2
-
cpe:2.3:o:openbsd:openbsd:4.3
-
cpe:2.3:o:openbsd:openbsd:4.4
-
cpe:2.3:o:openbsd:openbsd:4.5
-
cpe:2.3:o:openbsd:openbsd:4.6
-
cpe:2.3:o:openbsd:openbsd:4.7
-
cpe:2.3:o:openbsd:openbsd:4.8
-
cpe:2.3:o:openbsd:openbsd:4.9
-
cpe:2.3:o:openbsd:openbsd:5.0
-
cpe:2.3:o:openbsd:openbsd:5.1
-
cpe:2.3:o:openbsd:openbsd:5.2
-
cpe:2.3:o:openbsd:openbsd:5.3
-
cpe:2.3:o:openbsd:openbsd:5.4
-
cpe:2.3:o:openbsd:openbsd:5.5
-
cpe:2.3:o:openbsd:openbsd:5.6
-
cpe:2.3:o:openbsd:openbsd:5.7
-
cpe:2.3:o:openbsd:openbsd:5.8
-
cpe:2.3:o:openbsd:openbsd:5.9
-
cpe:2.3:o:openbsd:openbsd:6.0
-
cpe:2.3:o:openbsd:openbsd:6.1
-
cpe:2.3:o:openbsd:openbsd:6.2
-
cpe:2.3:o:openbsd:openbsd:6.3
-
cpe:2.3:o:openbsd:openbsd:6.4
-
cpe:2.3:o:openbsd:openbsd:6.5
-
cpe:2.3:o:openbsd:openbsd:6.6
-
cpe:2.3:o:openbsd:openbsd:6.7
-
cpe:2.3:o:openbsd:openbsd:6.9
-
cpe:2.3:o:openbsd:openbsd:7.0
-
cpe:2.3:o:openbsd:openbsd:7.1
-
cpe:2.3:o:openbsd:openbsd:7.2
-
cpe:2.3:o:openbsd:openbsd:7.3
-
cpe:2.3:o:openbsd:openbsd:8.0