CVE-2011-1499
29.04.2011, 22:55
acl.c in Tinyproxy before 1.8.3, when an Allow configuration setting specifies a CIDR block, permits TCP connections from all IP addresses, which makes it easier for remote attackers to hide the origin of web traffic by leveraging the open HTTP proxy server.Enginsight
Vendor | Product | Version |
---|---|---|
banu | tinyproxy | 𝑥 ≤ 1.8.2 |
banu | tinyproxy | 1.5.0 |
banu | tinyproxy | 1.5.0:pre1 |
banu | tinyproxy | 1.5.0:pre2 |
banu | tinyproxy | 1.5.0:pre3 |
banu | tinyproxy | 1.5.0:pre4 |
banu | tinyproxy | 1.5.0:pre5 |
banu | tinyproxy | 1.5.0:pre6 |
banu | tinyproxy | 1.5.0:rc1 |
banu | tinyproxy | 1.5.0:rc10 |
banu | tinyproxy | 1.5.0:rc2 |
banu | tinyproxy | 1.5.0:rc4 |
banu | tinyproxy | 1.5.0:rc5 |
banu | tinyproxy | 1.5.0:rc6 |
banu | tinyproxy | 1.5.0:rc7 |
banu | tinyproxy | 1.5.0:rc8 |
banu | tinyproxy | 1.5.0:rc9 |
banu | tinyproxy | 1.5.1 |
banu | tinyproxy | 1.5.1:pre1 |
banu | tinyproxy | 1.5.1:pre2 |
banu | tinyproxy | 1.5.1:pre3 |
banu | tinyproxy | 1.5.1:pre4 |
banu | tinyproxy | 1.5.1:pre5 |
banu | tinyproxy | 1.5.1:pre6 |
banu | tinyproxy | 1.5.1:rc1 |
banu | tinyproxy | 1.5.1:rc2 |
banu | tinyproxy | 1.5.1:rc3 |
banu | tinyproxy | 1.5.1:rc4 |
banu | tinyproxy | 1.5.2 |
banu | tinyproxy | 1.5.2:rc1 |
banu | tinyproxy | 1.5.2:rc2 |
banu | tinyproxy | 1.5.3 |
banu | tinyproxy | 1.5.3:rc1 |
banu | tinyproxy | 1.6.0 |
banu | tinyproxy | 1.6.0:a |
banu | tinyproxy | 1.6.0:pre1 |
banu | tinyproxy | 1.6.0:pre2 |
banu | tinyproxy | 1.6.0:pre3 |
banu | tinyproxy | 1.6.0:pre4 |
banu | tinyproxy | 1.6.0:rc1 |
banu | tinyproxy | 1.6.0:rc2 |
banu | tinyproxy | 1.6.0:rc3 |
banu | tinyproxy | 1.6.1 |
banu | tinyproxy | 1.6.2 |
banu | tinyproxy | 1.6.3 |
banu | tinyproxy | 1.6.4 |
banu | tinyproxy | 1.6.5 |
banu | tinyproxy | 1.7.0 |
banu | tinyproxy | 1.7.1 |
banu | tinyproxy | 1.8.0 |
banu | tinyproxy | 1.8.1 |
debian | debian_linux | 6.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References