2 results (0.004 seconds)

CVSS: 7.5EPSS: 16%CPEs: 2EXPL: 0

Blue Coat Systems WinProxy 6.1a and 6.0 r1c, and possibly earlier, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a long HTTP CONNECT request, which triggers heap corruption. Blue Coat Systems WinProxy 6.1a y 6.0 r1c, y posiblemente anteriores, permite a atacantes remotos provocar una denegación de servicio (caída del demonio) o posiblemente ejecutar código de su elección mediante una petición HTTP CONNECT larga, lo cual provoca la corrupción de la pila. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=471 http://osvdb.org/33097 http://secunia.com/advisories/24049 http://securitytracker.com/id?1017586 http://www.securityfocus.com/bid/22393 http://www.vupen.com/english/advisories/2007/0482 https://exchange.xforce.ibmcloud.com/vulnerabilities/32204 •

CVSS: 5.0EPSS: 6%CPEs: 1EXPL: 1

The listening daemon in Blue Coat Systems Inc. WinProxy before 6.1a allows remote attackers to cause a denial of service (crash) via a long HTTP request that causes an out-of-bounds read. • https://www.exploit-db.com/exploits/1409 http://secunia.com/advisories/18288 http://www.idefense.com/intelligence/vulnerabilities/display.php?id=363 http://www.securityfocus.com/bid/16148 http://www.vupen.com/english/advisories/2006/0065 •