Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
proxy vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2017-16037
`gomeplus-h5-proxy` is vulnerable to a directory traversal issue, allowing malicious users to access any file in the system by placing '../' in the URL.
Gomeplus-h5-proxy Project Gomeplus-h5-proxy
6.4
CVSSv2
CVE-2018-3739
https-proxy-agent prior to 2.1.1 passes auth option to the Buffer constructor without proper sanitization, resulting in DoS and uninitialized memory leak in setups where an attacker could submit typed input to the 'auth' parameter (e.g. JSON).
Https-proxy-agent Project Https-proxy-agent
NA
CVE-2023-3893
A security issue exists in Kubernetes where a user that can create pods on Windows nodes running kubernetes-csi-proxy may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they include Windows nodes running kubernetes-csi-proxy.
Kubernetes Csi Proxy 2.0.0
Kubernetes Csi Proxy
10
CVSSv2
CVE-2008-4541
Heap-based buffer overflow in the FTP subsystem in Sun Java System Web Proxy Server 4.0 up to and including 4.0.7 allows remote malicious users to execute arbitrary code via a crafted HTTP GET request.
Sun Java System Web Proxy Server 4.0
Sun Java System Web Proxy Server 4.0.1
Sun Java System Web Proxy Server 4.0.3
Sun Java System Web Proxy Server 4.0.4
Sun Java System Web Proxy Server 4.0.6
Sun Java System Web Proxy Server 4.0.5
Sun Java System Web Proxy Server 4.0.7
Sun Java System Web Proxy Server 4.0.2
5
CVSSv2
CVE-2008-3683
Unspecified vulnerability in the FTP subsystem in Sun Java System Web Proxy Server 4.0 up to and including 4.0.5 before SP6 allows remote malicious users to cause a denial of service (failure to accept connections) via unknown vectors, probably related to exhaustion of file descr...
Sun Java System Web Proxy Server 4.0.1
Sun Java System Web Proxy Server 4.0.2
Sun Java System Web Proxy Server 4.0.4
Sun Java System Web Proxy Server 4
Sun Java System Web Proxy Server 4.0.3
Sun Java System Web Proxy Server 4.0.5
5
CVSSv2
CVE-1999-1481
Squid 2.2.STABLE5 and below, when using external authentication, allows malicious users to bypass access controls via a newline in the user/password pair.
National Science Foundation Squid Web Proxy 1.0novm
National Science Foundation Squid Web Proxy 1.1
National Science Foundation Squid Web Proxy 1.0
National Science Foundation Squid Web Proxy 2.1
National Science Foundation Squid Web Proxy 2.2
1 EDB exploit
9.3
CVSSv2
CVE-2017-16659
The Gentoo mail-filter/assp package 1.9.8.13030 and previous versions allows local users to gain privileges by leveraging access to the assp user account to install a Trojan horse /usr/share/assp/assp.pl script.
Anti-spam Smtp Proxy Project Anti-spam Smtp Proxy
5
CVSSv2
CVE-2004-2479
Squid Web Proxy Cache 2.5 might allow remote malicious users to obtain sensitive information via URLs containing invalid hostnames that cause DNS operations to fail, which results in references to previously used error messages.
National Science Foundation Squid Web Proxy Cache 2.5 Stable4
National Science Foundation Squid Web Proxy Cache 2.5 Stable5
National Science Foundation Squid Web Proxy Cache 2.5 Stable1
National Science Foundation Squid Web Proxy Cache 2.5 Stable6
National Science Foundation Squid Web Proxy Cache 2.5 Stable7
National Science Foundation Squid Web Proxy Cache 2.5 Stable2
National Science Foundation Squid Web Proxy Cache 2.5 Stable3
5
CVSSv2
CVE-2016-6023
Directory traversal vulnerability in the Configuration Manager in IBM Sterling Secure Proxy (SSP) 3.4.2 prior to 3.4.2.0 iFix 8 and 3.4.3 prior to 3.4.3.0 iFix 1 allows remote malicious users to read arbitrary files via a crafted URL.
Ibm Sterling Secure Proxy 3.4.2.0
Ibm Sterling Secure Proxy 3.4.3.0
4.6
CVSSv2
CVE-2016-6025
The Configuration Manager in IBM Sterling Secure Proxy (SSP) 3.4.2 prior to 3.4.2.0 iFix 8 and 3.4.3 prior to 3.4.3.0 iFix 1 allows remote malicious users to obtain access by leveraging an unattended workstation to conduct a post-logoff session-reuse attack involving a modified U...
Ibm Sterling Secure Proxy 3.4.2.0
Ibm Sterling Secure Proxy 3.4.3.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
blind SQL injection
SSRF
buffer overflow
CVE-2023-28952
CVE-2023-41822
CVE-2024-27956
CVE-2023-7028
CVE-2024-34447
CVE-2024-34460
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »