Show filters
8 Total Results
Displaying 1-8 of 8
Sort by:
Attacker Value
Unknown
CVE-2023-49606
Disclosure Date: May 01, 2024 (last updated January 05, 2025)
A use-after-free vulnerability exists in the HTTP Connection Headers parsing in Tinyproxy 1.11.1 and Tinyproxy 1.10.0. A specially crafted HTTP header can trigger reuse of previously freed memory, which leads to memory corruption and could lead to remote code execution. An attacker needs to make an unauthenticated HTTP request to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2022-40468
Disclosure Date: September 19, 2022 (last updated October 08, 2023)
Potential leak of left-over heap data if custom error page templates containing special non-standard variables are used. Tinyproxy commit 84f203f and earlier use uninitialized buffers in process_request() function.
0
Attacker Value
Unknown
CVE-2017-11747
Disclosure Date: July 30, 2017 (last updated November 26, 2024)
main.c in Tinyproxy 1.8.4 and earlier creates a /run/tinyproxy/tinyproxy.pid file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for tinyproxy.pid modification before a root script executes a "kill `cat /run/tinyproxy/tinyproxy.pid`" command.
0
Attacker Value
Unknown
CVE-2012-3505
Disclosure Date: October 09, 2012 (last updated November 08, 2023)
Tinyproxy 1.8.3 and earlier allows remote attackers to cause a denial of service (CPU and memory consumption) via (1) a large number of headers or (2) a large number of forged headers that trigger hash collisions predictably. bucket.
0
Attacker Value
Unknown
CVE-2011-1843
Disclosure Date: May 03, 2011 (last updated October 04, 2023)
Integer overflow in conf.c in Tinyproxy before 1.8.3 might allow remote attackers to bypass intended access restrictions in opportunistic circumstances via a TCP connection, related to improper handling of invalid port numbers.
0
Attacker Value
Unknown
CVE-2011-1499
Disclosure Date: April 29, 2011 (last updated October 04, 2023)
acl.c in Tinyproxy before 1.8.3, when an Allow configuration setting specifies a CIDR block, permits TCP connections from all IP addresses, which makes it easier for remote attackers to hide the origin of web traffic by leveraging the open HTTP proxy server.
0
Attacker Value
Unknown
CVE-2002-0847
Disclosure Date: August 12, 2002 (last updated February 22, 2025)
tinyproxy HTTP proxy 1.5.0, 1.4.3, and earlier allows remote attackers to execute arbitrary code via memory that is freed twice (double-free).
0
Attacker Value
Unknown
CVE-2001-0129
Disclosure Date: March 12, 2001 (last updated February 22, 2025)
Buffer overflow in Tinyproxy HTTP proxy 1.3.3 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long connect request.
0