Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
libproxy project libproxy vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2015-10088
A vulnerability, which was classified as critical, was found in ayttm up to 0.5.0.89. This affects the function http_connect in the library libproxy/proxy.c. The manipulation leads to format string. It is possible to initiate the attack remotely. The complexity of an attack is ra...
Ayttm Project Ayttm
6.8
CVSSv2
CVE-2020-26154
url.cpp in libproxy up to and including 0.4.15 is prone to a buffer overflow when PAC is enabled, as demonstrated by a large PAC file that is delivered without a Content-length header.
Libproxy Project Libproxy
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Opensuse Leap 15.1
Opensuse Leap 15.2
5
CVSSv2
CVE-2020-25219
url::recvline in url.cpp in libproxy 0.4.x up to and including 0.4.15 allows a remote HTTP server to trigger uncontrolled recursion via a response composed of an infinite stream that lacks a newline character. This leads to stack exhaustion.
Libproxy Project Libproxy
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Opensuse Leap 15.1
Opensuse Leap 15.2
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 20.04
Canonical Ubuntu Linux 16.04
7.5
CVSSv2
CVE-2012-5580
Format string vulnerability in the print_proxies function in bin/proxy.c in libproxy 0.3.1 might allow context-dependent malicious users to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers in a proxy name, as demonstrated using th...
Libproxy Project Libproxy 0.3.1
10
CVSSv2
CVE-2012-4505
Heap-based buffer overflow in the px_pac_reload function in lib/pac.c in libproxy 0.2.x and 0.3.x allows remote servers to have an unspecified impact via a crafted Content-Length size in an HTTP response header for a proxy.pac file request, a different vulnerability than CVE-2012...
Libproxy Project Libproxy 0.2.3
Libproxy Project Libproxy 0.3.1
Libproxy Project Libproxy 0.3.0
10
CVSSv2
CVE-2012-4504
Stack-based buffer overflow in the url::get_pac function in url.cpp in libproxy 0.4.x prior to 0.4.9 allows remote servers to have an unspecified impact via a large proxy.pac file.
Libproxy Project Libproxy 0.4.8
Libproxy Project Libproxy 0.4.2
Libproxy Project Libproxy 0.4.0
Libproxy Project Libproxy 0.4.5
Libproxy Project Libproxy 0.4.7
Libproxy Project Libproxy 0.4.3
Libproxy Project Libproxy 0.4.1
Libproxy Project Libproxy 0.4.6
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2021-35000
CVE-2024-4439
unauthorized
CVE-2024-0042
CVE-2024-31848
CVE-2023-40694
cache poisoning
CVE-2024-23707
firmware
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started