Zero-friction vulnerability management platform
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux

Format string on URI
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
The remote web server seems to be vulnerable to a format string attack on the URI. An attacker might use this flaw to make it crash or even execute arbitrary code on this host.
Insight
Insight
Flaw is due to the application fails to properly sanitize user-supplied input before including it in the format-specifier argument of a formatted-printing function.
Detection Method
Detection Method
Send a crafted request via HTTP GET and check whether the server is vulnerable to format string attack.
Solution
Solution
Upgrade your software or contact your vendor and inform him of this vulnerability.