Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Oops_proxy_server
(Igor_khasilev)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 3 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2005-05-02 | CVE-2005-1121 | Format string vulnerability in the my_xlog function in lib.c for Oops! Proxy Server 1.5.23 and earlier, as called by the auth functions in the passwd_mysql and passwd_pgsql modules, may allow attackers to execute arbitrary code via a URL. | Linux, Oops_proxy_server | N/A | ||
2001-02-12 | CVE-2001-0029 | Buffer overflow in oops WWW proxy server 1.4.6 (and possibly other versions) allows remote attackers to execute arbitrary commands via a long host or domain name that is obtained from a reverse DNS lookup. | Oops_proxy_server | N/A | ||
2001-02-12 | CVE-2001-0028 | Buffer overflow in the HTML parsing code in oops WWW proxy server 1.5.2 and earlier allows remote attackers to execute arbitrary commands via a large number of " (quotation) characters. | Oops_proxy_server | N/A |