Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
libproxy project libproxy vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2020-26154
url.cpp in libproxy up to and including 0.4.15 is prone to a buffer overflow when PAC is enabled, as demonstrated by a large PAC file that is delivered without a Content-length header.
Libproxy Project Libproxy
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Opensuse Leap 15.1
Opensuse Leap 15.2
8.1
CVSSv3
CVE-2015-10088
A vulnerability, which was classified as critical, was found in ayttm up to 0.5.0.89. This affects the function http_connect in the library libproxy/proxy.c. The manipulation leads to format string. It is possible to initiate the attack remotely. The complexity of an attack is ra...
Ayttm Project Ayttm
7.5
CVSSv3
CVE-2020-25219
url::recvline in url.cpp in libproxy 0.4.x up to and including 0.4.15 allows a remote HTTP server to trigger uncontrolled recursion via a response composed of an infinite stream that lacks a newline character. This leads to stack exhaustion.
Libproxy Project Libproxy
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Opensuse Leap 15.1
Opensuse Leap 15.2
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 20.04
Canonical Ubuntu Linux 16.04
NA
CVE-2012-5580
Format string vulnerability in the print_proxies function in bin/proxy.c in libproxy 0.3.1 might allow context-dependent malicious users to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers in a proxy name, as demonstrated using th...
Libproxy Project Libproxy 0.3.1
NA
CVE-2012-4505
Heap-based buffer overflow in the px_pac_reload function in lib/pac.c in libproxy 0.2.x and 0.3.x allows remote servers to have an unspecified impact via a crafted Content-Length size in an HTTP response header for a proxy.pac file request, a different vulnerability than CVE-2012...
Libproxy Project Libproxy 0.2.3
Libproxy Project Libproxy 0.3.1
Libproxy Project Libproxy 0.3.0
NA
CVE-2012-4504
Stack-based buffer overflow in the url::get_pac function in url.cpp in libproxy 0.4.x prior to 0.4.9 allows remote servers to have an unspecified impact via a large proxy.pac file.
Libproxy Project Libproxy 0.4.8
Libproxy Project Libproxy 0.4.2
Libproxy Project Libproxy 0.4.0
Libproxy Project Libproxy 0.4.5
Libproxy Project Libproxy 0.4.7
Libproxy Project Libproxy 0.4.3
Libproxy Project Libproxy 0.4.1
Libproxy Project Libproxy 0.4.6
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started