CVE-2008-6742

Foxy - Improper Input Validation

Title source: rule

Description

Foxy P2P software allows remote attackers to cause a denial of service (memory consumption) via a foxy URI with a download action and a large fs value.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Styxosaurus · htmldoswindows
https://www.exploit-db.com/exploits/5843

Scores

EPSS 0.0579
EPSS Percentile 90.5%

Details

CWE
CWE-20
Status published
Products (1)
gofoxy/foxy
Published Apr 21, 2009
Tracked Since Feb 18, 2026