Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ziproxy ziproxy 2.6.0 vulnerabilities and exploits
(subscribe to this query)
5.4
CVSSv2
CVE-2009-0804
Ziproxy 2.6.0, when transparent interception mode is enabled, uses the HTTP Host header to determine the remote endpoint, which allows remote malicious users to bypass access controls for Flash, Java, Silverlight, and probably other technologies, and possibly communicate with res...
Ziproxy Ziproxy 2.6.0
6.8
CVSSv2
CVE-2010-1513
Multiple integer overflows in src/image.c in Ziproxy prior to 3.0.1 allow remote malicious users to execute arbitrary code via (1) a large JPG image, related to the jpg2bitmap function or (2) a large PNG image, related to the png2bitmap function, leading to heap-based buffer over...
Daniel Mealha Cabrita Ziproxy 2.7.1
Daniel Mealha Cabrita Ziproxy 2.7.0
Daniel Mealha Cabrita Ziproxy 2.3.0
Daniel Mealha Cabrita Ziproxy 2.2.2
Daniel Mealha Cabrita Ziproxy 1.5.1
Daniel Mealha Cabrita Ziproxy 1.5.0
Daniel Mealha Cabrita Ziproxy 1.2
Daniel Mealha Cabrita Ziproxy 2.6.9
Daniel Mealha Cabrita Ziproxy 2.5.9
Daniel Mealha Cabrita Ziproxy 2.5.1
Daniel Mealha Cabrita Ziproxy 2.5.0
Daniel Mealha Cabrita Ziproxy 2.2.1
Daniel Mealha Cabrita Ziproxy 2.2.0
Daniel Mealha Cabrita Ziproxy 2.1.1
Daniel Mealha Cabrita Ziproxy 1.4.0
Daniel Mealha Cabrita Ziproxy 1.3
Daniel Mealha Cabrita Ziproxy 1.1
Daniel Mealha Cabrita Ziproxy
Daniel Mealha Cabrita Ziproxy 2.4.8
Daniel Mealha Cabrita Ziproxy 2.5.2
Daniel Mealha Cabrita Ziproxy 2.7.2
Daniel Mealha Cabrita Ziproxy 2.4.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-34377
CVE-2024-20859
CVE-2023-49606
inject
arbitrary
CVE-2024-33788
CVE-2024-30973
IDOR
CVE-2024-33907
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started