7.5
CVSSv2

CVE-2014-9707

Published: 31/03/2015 Updated: 09/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

EmbedThis GoAhead 3.0.0 up to and including 3.4.1 does not properly handle path segments starting with a . (dot), which allows remote malicious users to conduct directory traversal attacks, cause a denial of service (heap-based buffer overflow and crash), or possibly execute arbitrary code via a crafted URI.

Vulnerable Product Search on Vulmon Subscribe to Product

embedthis goahead 3.0.0

embedthis goahead 3.3.2

embedthis goahead 3.3.1

embedthis goahead 3.4.0

embedthis goahead 3.3.6

embedthis goahead 3.3.5

embedthis goahead 3.3.4

embedthis goahead 3.3.3

Exploits

GoAhead web server versions 300 through 341 suffers from heap overflow and directory traversal vulnerabilities ...

Github Repositories

Some modules that I created for fun. :)

Modules for metasploit Some modules that I created for fun :) openvpn_credentialsrb Grab OpenVPN Credentials via Post Module Output: msfdevel 19216804 shell[s]:0 job[s]:0 msf> exploit(handler) exploit [*] Starting the payload handler [*] Started bind handler [*] Command shell session 3 opened (19216804:34386 -> 19216804:4444) at 2015-10-19 23:22:4