CVE-2008-6742
Foxy - Improper Input Validation
Title source: ruleDescription
Foxy P2P software allows remote attackers to cause a denial of service (memory consumption) via a foxy URI with a download action and a large fs value.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Styxosaurus · htmldoswindows
https://www.exploit-db.com/exploits/5843
Scores
EPSS
0.0579
EPSS Percentile
90.5%
Details
CWE
CWE-20
Status
published
Products (1)
gofoxy/foxy
Published
Apr 21, 2009
Tracked Since
Feb 18, 2026