CVE-2020-26154
- EPSS 0.89%
- Published 30.09.2020 18:15:27
- Last modified 21.11.2024 05:19:23
url.cpp in libproxy through 0.4.15 is prone to a buffer overflow when PAC is enabled, as demonstrated by a large PAC file that is delivered without a Content-length header.
CVE-2020-25219
- EPSS 1.23%
- Published 09.09.2020 21:15:11
- Last modified 21.11.2024 05:17:41
url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a remote HTTP server to trigger uncontrolled recursion via a response composed of an infinite stream that lacks a newline character. This leads to stack exhaustion.
CVE-2012-5580
- EPSS 0.8%
- Published 27.10.2014 22:55:09
- Last modified 12.04.2025 10:46:40
Format string vulnerability in the print_proxies function in bin/proxy.c in libproxy 0.3.1 might allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers in a proxy name, ...
- EPSS 4.37%
- Published 11.11.2012 13:00:49
- Last modified 11.04.2025 00:51:21
Heap-based buffer overflow in the px_pac_reload function in lib/pac.c in libproxy 0.2.x and 0.3.x allows remote servers to have an unspecified impact via a crafted Content-Length size in an HTTP response header for a proxy.pac file request, a differe...
- EPSS 5.63%
- Published 11.11.2012 13:00:48
- Last modified 11.04.2025 00:51:21
Stack-based buffer overflow in the url::get_pac function in url.cpp in libproxy 0.4.x before 0.4.9 allows remote servers to have an unspecified impact via a large proxy.pac file.