6.8
CVSSv2

CVE-2007-2668

Published: 14/05/2007 Updated: 11/10/2017
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 690
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Buffer overflow in webdesproxy 0.0.1 allows remote malicious users to execute arbitrary code via a long URL, possibly involving the process_connection_request function in webdesproxy.c.

Vulnerable Product Search on Vulmon Subscribe to Product

webdesproxy webdesproxy 0.0.1

Exploits

/* ** ** Fedora Core 6 (exec-shield) based ** Webdesproxy (webdesproxy-001tgz) remote root exploit ** (reverse connect-back method) by Xpl017Elz ** ** Advanced exploitation in exec-shield (Fedora Core case study) ** URL: x82inetcoporg/h0me/papers/FC_exploit/FC_exploittxt ** ** vendor: webdesproxysourceforgenet/ ** ** vade79/v9 ...
/*[ webdesproxy[v001]: (cygwin) remote buffer overflow exploit ]* * * * by: vade79/v9 v9@fakehalous (fakehalo/realhalo) * * * * compile: * * ...