Page 7 of 67 results (0.003 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

26 Jul 2002 — FTP proxy in Squid before 2.4.STABLE6 does not compare the IP addresses of control and data connections with the FTP server, which allows remote attackers to bypass firewall rules or spoof FTP server responses. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-046.0.txt •

CVSS: 9.8EPSS: 1%CPEs: 1EXPL: 0

23 Jul 2002 — Buffer overflows in Squid before 2.4.STABLE6 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code (1) via the MSNT auth helper (msnt_auth) when using denyusers or allowusers files, (2) via the gopher client, or (3) via the FTP server directory listing parser when HTML output is generated. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-046.0.txt •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

23 Jul 2002 — Vulnerability in Squid before 2.4.STABLE6 related to proxy authentication credentials may allow remote web sites to obtain the user's proxy login and password. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-046.0.txt •

CVSS: 9.8EPSS: 3%CPEs: 1EXPL: 1

26 Mar 2002 — Heap-based buffer overflow in Squid before 2.4 STABLE4, and Squid 2.5 and 2.6 until March 12, 2002 distributions, allows remote attackers to cause a denial of service, and possibly execute arbitrary code, via compressed DNS responses. Desbordamiento de buffer en Squid anterior a 2.4.9 permite a un atacante remoto producir una denegación de servicio, y probablemente ejecutar código arbitrario, mediante respuestas DNS comprimidas. • https://www.exploit-db.com/exploits/347 •

CVSS: 9.1EPSS: 0%CPEs: 11EXPL: 0

08 Mar 2002 — Squid 2.4 STABLE3 and earlier does not properly disable HTCP, even when "htcp_port 0" is specified in squid.conf, which could allow remote attackers to bypass intended access restrictions. Squid 2.4 STABLE2 y versiones anteriores no deshabilita adecuadamente HTCP, incluso cuando ""htcp_port 0"" es especificado en el fichero squid.conf, el cual podría permitir a atacantes remotos saltarse las restricciones de acceso. • ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:12.squid.asc •

CVSS: 9.8EPSS: 5%CPEs: 11EXPL: 2

08 Mar 2002 — Squid 2.4 STABLE3 and earlier allows remote attackers to cause a denial of service (core dump) and possibly execute arbitrary code with an ftp:// URL with a larger number of special characters, which exceed the buffer when Squid URL-escapes the characters. Squid 2.4 STABLE3 y versiones anteriores permite a atacantes remotos causar la denegación de servicios por volcado del núcleo (core dump) y ejecutar código arbitrario mediante una dirección URL ftp:// mal construida. • https://www.exploit-db.com/exploits/21297 •

CVSS: 7.5EPSS: 1%CPEs: 11EXPL: 0

08 Mar 2002 — Memory leak in SNMP in Squid 2.4 STABLE3 and earlier allows remote attackers to cause a denial of service. Error de memoria en SNMP de Squid STABLE2 y versiones anteriores permite a un atacante remoto provocar una denegación del servicio. • ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:12.squid.asc •