Lucene search

K
Libproxy ProjectLibproxy

5 matches found

CVE
CVE
added 2020/09/30 6:15 p.m.264 views

CVE-2020-26154

url.cpp in libproxy through 0.4.15 is prone to a buffer overflow when PAC is enabled, as demonstrated by a large PAC file that is delivered without a Content-length header.

9.8CVSS9.4AI score0.00894EPSS
CVE
CVE
added 2020/09/09 9:15 p.m.260 views

CVE-2020-25219

url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a remote HTTP server to trigger uncontrolled recursion via a response composed of an infinite stream that lacks a newline character. This leads to stack exhaustion.

7.5CVSS7.2AI score0.01056EPSS
CVE
CVE
added 2012/11/11 1:0 p.m.53 views

CVE-2012-4505

Heap-based buffer overflow in the px_pac_reload function in lib/pac.c in libproxy 0.2.x and 0.3.x allows remote servers to have an unspecified impact via a crafted Content-Length size in an HTTP response header for a proxy.pac file request, a different vulnerability than CVE-2012-4504.

10CVSS6.8AI score0.05628EPSS
CVE
CVE
added 2012/11/11 1:0 p.m.38 views

CVE-2012-4504

Stack-based buffer overflow in the url::get_pac function in url.cpp in libproxy 0.4.x before 0.4.9 allows remote servers to have an unspecified impact via a large proxy.pac file.

10CVSS6.9AI score0.05628EPSS
CVE
CVE
added 2014/10/27 10:55 p.m.30 views

CVE-2012-5580

Format string vulnerability in the print_proxies function in bin/proxy.c in libproxy 0.3.1 might allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers in a proxy name, as demonstrated using the http_proxy environment ...

7.5CVSS7.6AI score0.00802EPSS