Количество 6
Количество 6
CVE-2023-49606
A use-after-free vulnerability exists in the HTTP Connection Headers parsing in Tinyproxy 1.11.1 and Tinyproxy 1.10.0. A specially crafted HTTP header can trigger reuse of previously freed memory, which leads to memory corruption and could lead to remote code execution. An attacker needs to make an unauthenticated HTTP request to trigger this vulnerability.
CVE-2023-49606
A use-after-free vulnerability exists in the HTTP Connection Headers parsing in Tinyproxy 1.11.1 and Tinyproxy 1.10.0. A specially crafted HTTP header can trigger reuse of previously freed memory, which leads to memory corruption and could lead to remote code execution. An attacker needs to make an unauthenticated HTTP request to trigger this vulnerability.
CVE-2023-49606
A use-after-free vulnerability exists in the HTTP Connection Headers p ...
GHSA-w78j-vw2g-233v
A use-after-free vulnerability exists in the HTTP Connection Headers parsing in Tinyproxy 1.11.1 and Tinyproxy 1.10.0. A specially crafted HTTP header can trigger reuse of previously freed memory, which leads to memory corruption and could lead to remote code execution. An attacker needs to make an unauthenticated HTTP request to trigger this vulnerability.
BDU:2024-03549
Уязвимость комопнента обработки заголовков HTTP-запросов демона прокси-сервера, позволяющая нарушителю выполнить произвольный код
openSUSE-SU-2024:0119-1
Security update for tinyproxy
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2023-49606 A use-after-free vulnerability exists in the HTTP Connection Headers parsing in Tinyproxy 1.11.1 and Tinyproxy 1.10.0. A specially crafted HTTP header can trigger reuse of previously freed memory, which leads to memory corruption and could lead to remote code execution. An attacker needs to make an unauthenticated HTTP request to trigger this vulnerability. | CVSS3: 9.8 | 78% Высокий | почти 2 года назад | |
CVE-2023-49606 A use-after-free vulnerability exists in the HTTP Connection Headers parsing in Tinyproxy 1.11.1 and Tinyproxy 1.10.0. A specially crafted HTTP header can trigger reuse of previously freed memory, which leads to memory corruption and could lead to remote code execution. An attacker needs to make an unauthenticated HTTP request to trigger this vulnerability. | CVSS3: 9.8 | 78% Высокий | почти 2 года назад | |
CVE-2023-49606 A use-after-free vulnerability exists in the HTTP Connection Headers p ... | CVSS3: 9.8 | 78% Высокий | почти 2 года назад | |
GHSA-w78j-vw2g-233v A use-after-free vulnerability exists in the HTTP Connection Headers parsing in Tinyproxy 1.11.1 and Tinyproxy 1.10.0. A specially crafted HTTP header can trigger reuse of previously freed memory, which leads to memory corruption and could lead to remote code execution. An attacker needs to make an unauthenticated HTTP request to trigger this vulnerability. | CVSS3: 9.8 | 78% Высокий | почти 2 года назад | |
BDU:2024-03549 Уязвимость комопнента обработки заголовков HTTP-запросов демона прокси-сервера, позволяющая нарушителю выполнить произвольный код | CVSS3: 9.8 | 78% Высокий | почти 2 года назад | |
openSUSE-SU-2024:0119-1 Security update for tinyproxy | больше 1 года назад |
Уязвимостей на страницу