Buffer overflow in John Franks WN Server 1.18.2 through 2.0.0 allows remote attackers to execute arbitrary code via a long GET request.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Wn_server | John_franks | 1.18.2 (including) | 1.18.2 (including) |
Wn_server | John_franks | 1.18.3 (including) | 1.18.3 (including) |
Wn_server | John_franks | 1.18.4 (including) | 1.18.4 (including) |
Wn_server | John_franks | 1.18.5 (including) | 1.18.5 (including) |
Wn_server | John_franks | 1.18.6 (including) | 1.18.6 (including) |
Wn_server | John_franks | 1.18.7 (including) | 1.18.7 (including) |
Wn_server | John_franks | 1.19.0 (including) | 1.19.0 (including) |
Wn_server | John_franks | 1.19.1 (including) | 1.19.1 (including) |
Wn_server | John_franks | 1.19.2 (including) | 1.19.2 (including) |
Wn_server | John_franks | 1.19.3 (including) | 1.19.3 (including) |
Wn_server | John_franks | 1.19.4 (including) | 1.19.4 (including) |
Wn_server | John_franks | 1.19.5 (including) | 1.19.5 (including) |
Wn_server | John_franks | 1.19.6 (including) | 1.19.6 (including) |
Wn_server | John_franks | 1.19.7 (including) | 1.19.7 (including) |
Wn_server | John_franks | 1.19.8 (including) | 1.19.8 (including) |
Wn_server | John_franks | 1.19.9 (including) | 1.19.9 (including) |
Wn_server | John_franks | 2.0.0 (including) | 2.0.0 (including) |