Page 13 of 66 results (0.014 seconds)

CVSS: 7.5EPSS: 16%CPEs: 1EXPL: 0

Buffer overflows in Squid before 2.4.STABLE6 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code (1) via the MSNT auth helper (msnt_auth) when using denyusers or allowusers files, (2) via the gopher client, or (3) via the FTP server directory listing parser when HTML output is generated. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-046.0.txt http://marc.info/?l=bugtraq&m=102674543407606&w=2 http://rhn.redhat.com/errata/RHSA-2002-051.html http://rhn.redhat.com/errata/RHSA-2002-130.html http://www.iss.net/security_center/static/9480.php http://www.iss.net/security_center/static/9481.php http://www.iss.net/security_center/static/9482.php http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-044.php http://www.securityfocus.com&# •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Vulnerability in Squid before 2.4.STABLE6 related to proxy authentication credentials may allow remote web sites to obtain the user's proxy login and password. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-046.0.txt http://marc.info/?l=bugtraq&m=102674543407606&w=2 http://rhn.redhat.com/errata/RHSA-2002-051.html http://rhn.redhat.com/errata/RHSA-2002-130.html http://www.iss.net/security_center/static/9478.php http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-044.php http://www.securityfocus.com/bid/5154 http://www.squid-cache.org/Advisories/SQUID-2002_3.txt http://www.squid-cache.org/Versions/ •

CVSS: 7.5EPSS: 30%CPEs: 1EXPL: 1

Heap-based buffer overflow in Squid before 2.4 STABLE4, and Squid 2.5 and 2.6 until March 12, 2002 distributions, allows remote attackers to cause a denial of service, and possibly execute arbitrary code, via compressed DNS responses. Desbordamiento de buffer en Squid anterior a 2.4.9 permite a un atacante remoto producir una denegación de servicio, y probablemente ejecutar código arbitrario, mediante respuestas DNS comprimidas. • https://www.exploit-db.com/exploits/347 ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-017.1.txt ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:19.squid.asc http://marc.info/?l=bugtraq&m=101716495023226&w=2 http://rhn.redhat.com/errata/RHSA-2002-051.html http://www.iss.net/security_center/static/8628.php http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-027.php http://www.securityfocus.com/bid/4363 http://www.squid-cache&# •

CVSS: 7.5EPSS: 0%CPEs: 11EXPL: 0

Squid 2.4 STABLE3 and earlier does not properly disable HTCP, even when "htcp_port 0" is specified in squid.conf, which could allow remote attackers to bypass intended access restrictions. Squid 2.4 STABLE2 y versiones anteriores no deshabilita adecuadamente HTCP, incluso cuando ""htcp_port 0"" es especificado en el fichero squid.conf, el cual podría permitir a atacantes remotos saltarse las restricciones de acceso. • ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:12.squid.asc http://archives.neohapsis.com/archives/linux/caldera/2002-q1/0014.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000464 http://marc.info/?l=bugtraq&m=101431040422095&w=2 http://marc.info/?l=bugtraq&m=101443252627021&w=2 http://www.iss.net/security_center/static/8261.php http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-016.php http://www.osvdb.org/5379 http:/ •

CVSS: 2.6EPSS: 3%CPEs: 11EXPL: 0

Memory leak in SNMP in Squid 2.4 STABLE3 and earlier allows remote attackers to cause a denial of service. Error de memoria en SNMP de Squid STABLE2 y versiones anteriores permite a un atacante remoto provocar una denegación del servicio. • ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:12.squid.asc http://archives.neohapsis.com/archives/linux/caldera/2002-q1/0014.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000464 http://marc.info/?l=bugtraq&m=101431040422095&w=2 http://marc.info/?l=bugtraq&m=101443252627021&w=2 http://www.iss.net/security_center/static/8260.php http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-016.php http://www.redhat.com/support/errata&#x •