Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2008-4575

Buffer overflow in the DoCommand function in jhead before 2.84 might allow context-dependent attackers to cause a denial of service (crash) via (1) a long -cmd argument and (2) unspecified vectors related to "a bunch of potential string overflows."
Exploit prediction scoring system (EPSS) score
EPSS Score 0.008
EPSS Ranking 72.4%
CVSS Severity
CVSS v2 Score 5.0
References
Products affected by CVE-2008-4575
  • Sentex » Jhead » Version: Any
    cpe:2.3:a:sentex:jhead:*
  • Sentex » Jhead » Version: 1.2
    cpe:2.3:a:sentex:jhead:1.2
  • Sentex » Jhead » Version: 1.3
    cpe:2.3:a:sentex:jhead:1.3
  • Sentex » Jhead » Version: 1.4
    cpe:2.3:a:sentex:jhead:1.4
  • Sentex » Jhead » Version: 1.5
    cpe:2.3:a:sentex:jhead:1.5
  • Sentex » Jhead » Version: 1.6
    cpe:2.3:a:sentex:jhead:1.6
  • Sentex » Jhead » Version: 1.7
    cpe:2.3:a:sentex:jhead:1.7
  • Sentex » Jhead » Version: 1.8
    cpe:2.3:a:sentex:jhead:1.8
  • Sentex » Jhead » Version: 1.9
    cpe:2.3:a:sentex:jhead:1.9
  • Sentex » Jhead » Version: 2.0
    cpe:2.3:a:sentex:jhead:2.0
  • Sentex » Jhead » Version: 2.1
    cpe:2.3:a:sentex:jhead:2.1
  • Sentex » Jhead » Version: 2.2
    cpe:2.3:a:sentex:jhead:2.2
  • Sentex » Jhead » Version: 2.3
    cpe:2.3:a:sentex:jhead:2.3
  • Sentex » Jhead » Version: 2.4
    cpe:2.3:a:sentex:jhead:2.4
  • Sentex » Jhead » Version: 2.4-1
    cpe:2.3:a:sentex:jhead:2.4-1
  • Sentex » Jhead » Version: 2.4-2
    cpe:2.3:a:sentex:jhead:2.4-2
  • Sentex » Jhead » Version: 2.5
    cpe:2.3:a:sentex:jhead:2.5
  • Sentex » Jhead » Version: 2.6
    cpe:2.3:a:sentex:jhead:2.6
  • Sentex » Jhead » Version: 2.7
    cpe:2.3:a:sentex:jhead:2.7
  • Sentex » Jhead » Version: 2.8
    cpe:2.3:a:sentex:jhead:2.8


Contact Us

Shodan ® - All rights reserved