Page 16 of 83 results (0.011 seconds)

CVSS: 4.3EPSS: 1%CPEs: 2EXPL: 0

Opera 6.0.3, when using Squid 2.4 for HTTPS proxying, does not properly handle when accepting a non-global certificate authority (CA) certificate from a site and establishing a subsequent HTTPS connection, which allows remote attackers to cause a denial of service (crash). • http://marc.info/?l=full-disclosure&m=103783186608438&w=2 http://www.iss.net/security_center/static/10673.php http://www.securityfocus.com/bid/6218 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

FTP proxy in Squid before 2.4.STABLE6 does not compare the IP addresses of control and data connections with the FTP server, which allows remote attackers to bypass firewall rules or spoof FTP server responses. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-046.0.txt http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000506 http://marc.info/?l=bugtraq&m=102674543407606&w=2 http://rhn.redhat.com/errata/RHSA-2002-051.html http://rhn.redhat.com/errata/RHSA-2002-130.html http://www.iss.net/security_center/static/9479.php http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-044.php http://www.osvdb.org/5924 http://www.securityfocus.com/bid/5158 •

CVSS: 7.5EPSS: 16%CPEs: 1EXPL: 0

Buffer overflows in Squid before 2.4.STABLE6 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code (1) via the MSNT auth helper (msnt_auth) when using denyusers or allowusers files, (2) via the gopher client, or (3) via the FTP server directory listing parser when HTML output is generated. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-046.0.txt http://marc.info/?l=bugtraq&m=102674543407606&w=2 http://rhn.redhat.com/errata/RHSA-2002-051.html http://rhn.redhat.com/errata/RHSA-2002-130.html http://www.iss.net/security_center/static/9480.php http://www.iss.net/security_center/static/9481.php http://www.iss.net/security_center/static/9482.php http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-044.php http://www.securityfocus.com&# •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Vulnerability in Squid before 2.4.STABLE6 related to proxy authentication credentials may allow remote web sites to obtain the user's proxy login and password. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-046.0.txt http://marc.info/?l=bugtraq&m=102674543407606&w=2 http://rhn.redhat.com/errata/RHSA-2002-051.html http://rhn.redhat.com/errata/RHSA-2002-130.html http://www.iss.net/security_center/static/9478.php http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-044.php http://www.securityfocus.com/bid/5154 http://www.squid-cache.org/Advisories/SQUID-2002_3.txt http://www.squid-cache.org/Versions/ •

CVSS: 7.5EPSS: 30%CPEs: 1EXPL: 1

Heap-based buffer overflow in Squid before 2.4 STABLE4, and Squid 2.5 and 2.6 until March 12, 2002 distributions, allows remote attackers to cause a denial of service, and possibly execute arbitrary code, via compressed DNS responses. Desbordamiento de buffer en Squid anterior a 2.4.9 permite a un atacante remoto producir una denegación de servicio, y probablemente ejecutar código arbitrario, mediante respuestas DNS comprimidas. • https://www.exploit-db.com/exploits/347 ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-017.1.txt ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:19.squid.asc http://marc.info/?l=bugtraq&m=101716495023226&w=2 http://rhn.redhat.com/errata/RHSA-2002-051.html http://www.iss.net/security_center/static/8628.php http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-027.php http://www.securityfocus.com/bid/4363 http://www.squid-cache&# •