Page 5 of 33 results (0.016 seconds)

CVSS: 10.0EPSS: 23%CPEs: 1EXPL: 1

Buffer overflow in k9filter.exe in BlueCoat K9 Web Protection 3.2.36, and probably other versions before 3.2.44, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long HTTP GET request to port 2372. Desbordamiento de búfer en k9filter.exe de BlueCoat K9 Web Protection 3.2.36, y probablemente otras versiones anteriores a 3.2.44, permite a atacantes remotos provocar una denegación de servicio (caída) y posiblemente ejecutar código de su elección mediante una petición larga HTTP GET al puerto 2372. • https://www.exploit-db.com/exploits/30163 http://archives.neohapsis.com/archives/fulldisclosure/2007-06/0190.html http://lists.grok.org.uk/pipermail/full-disclosure/2007-June/063848.html http://osvdb.org/37186 http://secunia.com/advisories/25593 http://www.csis.dk/dk/forside/Bluecoat-k9.pdf http://www.kb.cert.org/vuls/id/271601 http://www.securityfocus.com/archive/1/470836/100/0/threaded http://www.securityfocus.com/bid/24373 http://www.securitytracker.com/id?1018 •

CVSS: 7.5EPSS: 16%CPEs: 2EXPL: 0

Blue Coat Systems WinProxy 6.1a and 6.0 r1c, and possibly earlier, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a long HTTP CONNECT request, which triggers heap corruption. Blue Coat Systems WinProxy 6.1a y 6.0 r1c, y posiblemente anteriores, permite a atacantes remotos provocar una denegación de servicio (caída del demonio) o posiblemente ejecutar código de su elección mediante una petición HTTP CONNECT larga, lo cual provoca la corrupción de la pila. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=471 http://osvdb.org/33097 http://secunia.com/advisories/24049 http://securitytracker.com/id?1017586 http://www.securityfocus.com/bid/22393 http://www.vupen.com/english/advisories/2007/0482 https://exchange.xforce.ibmcloud.com/vulnerabilities/32204 •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

Blue Coat Proxy Security Gateway OS (SGOS) 4.1.2.1 does not enforce CONNECT rules when using Deep Content Inspection, which allows remote attackers to bypass connection filters. Blue Coat Proxy Security Gateway OS (SGOS) 4.1.2.1 no impone reglas CONNECT cuando se usa Deep Content Inspection, lo que permite a atacantes remotos evitar filtros de conexión. • http://secunia.com/advisories/18622 http://securitytracker.com/id?1015644 http://www.bluecoat.com/support/knowledge/advisory_connect_denial_ignore.html http://www.osvdb.org/22853 http://www.secumind.net/content/french/modules/news/article.php?storyid=8 http://www.vupen.com/english/advisories/2006/0401 https://exchange.xforce.ibmcloud.com/vulnerabilities/24446 •

CVSS: 7.5EPSS: 57%CPEs: 20EXPL: 3

Buffer overflow in BlueCoat (a) WinProxy before 6.1a and (b) the web console access functionality in ProxyAV before 2.4.2.3 allows remote attackers to execute arbitrary code via a long Host: header. • https://www.exploit-db.com/exploits/1408 https://www.exploit-db.com/exploits/16691 http://secunia.com/advisories/18288 http://secunia.com/advisories/18909 http://securitytracker.com/id?1015441 http://www.bluecoat.com/support/knowledge/advisory_host_header_stack_overflow.html http://www.idefense.com/intelligence/vulnerabilities/display.php?id=364 http://www.securityfocus.com/bid/16147 http://www.vupen.com/english/advisories/2006/0065 http://www.vupen.com/english/advisories/2006/0622 •

CVSS: 7.5EPSS: 34%CPEs: 19EXPL: 0

Blue Coat Systems Inc. WinProxy before 6.1a allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large number of packets with 0xFF characters to the Telnet port (TCP 23), which corrupts the heap. • http://secunia.com/advisories/18288 http://securityreason.com/securityalert/322 http://securitytracker.com/id?1015442 http://www.idefense.com/intelligence/vulnerabilities/display.php?id=365 http://www.securityfocus.com/bid/16149 http://www.vupen.com/english/advisories/2006/0065 http://www.winproxy.com/products/relnotes.asp •