Page 2 of 7 results (0.015 seconds)

CVSS: 7.5EPSS: 1%CPEs: 3EXPL: 0

tinyproxy HTTP proxy 1.5.0, 1.4.3, and earlier allows remote attackers to execute arbitrary code via memory that is freed twice (double-free). • http://sourceforge.net/project/shownotes.php?release_id=88790 http://www.iss.net/security_center/static/9079.php http://www.securityfocus.com/bid/4731 https://www.debian.org/security/2002/dsa-145 •

CVSS: 10.0EPSS: 7%CPEs: 2EXPL: 2

Buffer overflow in Tinyproxy HTTP proxy 1.3.3 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long connect request. • https://www.exploit-db.com/exploits/20559 http://marc.info/?l=bugtraq&m=97975486527750&w=2 http://www.debian.org/security/2001/dsa-018 http://www.securityfocus.com/bid/2217 https://exchange.xforce.ibmcloud.com/vulnerabilities/5954 •