CVE-2016-2572
- EPSS 11.16%
- Veröffentlicht 27.02.2016 05:59:06
- Zuletzt bearbeitet 06.05.2026 22:30:45
http.cc in Squid 4.x before 4.0.7 relies on the HTTP status code after a response-parsing failure, which allows remote HTTP servers to cause a denial of service (assertion failure and daemon exit) via a malformed response.
CVE-2016-2571
- EPSS 14.33%
- Veröffentlicht 27.02.2016 05:59:05
- Zuletzt bearbeitet 06.05.2026 22:30:45
http.cc in Squid 3.x before 3.5.15 and 4.x before 4.0.7 proceeds with the storage of certain data after a response-parsing failure, which allows remote HTTP servers to cause a denial of service (assertion failure and daemon exit) via a malformed resp...
CVE-2016-2570
- EPSS 5.49%
- Veröffentlicht 27.02.2016 05:59:04
- Zuletzt bearbeitet 06.05.2026 22:30:45
The Edge Side Includes (ESI) parser in Squid 3.x before 3.5.15 and 4.x before 4.0.7 does not check buffer limits during XML parsing, which allows remote HTTP servers to cause a denial of service (assertion failure and daemon exit) via a crafted XML d...
CVE-2016-2569
- EPSS 70.32%
- Veröffentlicht 27.02.2016 05:59:03
- Zuletzt bearbeitet 06.05.2026 22:30:45
Squid 3.x before 3.5.15 and 4.x before 4.0.7 does not properly append data to String objects, which allows remote servers to cause a denial of service (assertion failure and daemon exit) via a long string, as demonstrated by a crafted HTTP Vary heade...
- EPSS 1.94%
- Veröffentlicht 06.11.2015 21:59:00
- Zuletzt bearbeitet 06.05.2026 22:30:45
Squid 3.4.4 through 3.4.11 and 3.5.0.1 through 3.5.1, when Digest authentication is used, allow remote authenticated users to retain access by leveraging a stale nonce, aka "Nonce replay vulnerability."
CVE-2015-5400
- EPSS 24.7%
- Veröffentlicht 28.09.2015 20:59:03
- Zuletzt bearbeitet 06.05.2026 22:30:45
Squid before 3.5.6 does not properly handle CONNECT method peer responses when configured with cache_peer, which allows remote attackers to bypass intended restrictions and gain access to a backend proxy via a CONNECT request.
CVE-2015-3455
- EPSS 6.47%
- Veröffentlicht 18.05.2015 15:59:11
- Zuletzt bearbeitet 06.05.2026 22:30:45
Squid 3.2.x before 3.2.14, 3.3.x before 3.3.14, 3.4.x before 3.4.13, and 3.5.x before 3.5.4, when configured with client-first SSL-bump, do not properly validate the domain or hostname fields of X.509 certificates, which allows man-in-the-middle atta...
CVE-2015-0881
- EPSS 4.38%
- Veröffentlicht 20.02.2015 11:59:04
- Zuletzt bearbeitet 06.05.2026 22:30:45
CRLF injection vulnerability in Squid before 3.1.1 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a crafted header in a response.
CVE-2014-7142
- EPSS 64.23%
- Veröffentlicht 26.11.2014 15:59:04
- Zuletzt bearbeitet 06.05.2026 22:30:45
The pinger in Squid 3.x before 3.4.8 allows remote attackers to obtain sensitive information or cause a denial of service (crash) via a crafted (1) ICMP or (2) ICMP6 packet size.
CVE-2014-7141
- EPSS 77.33%
- Veröffentlicht 26.11.2014 15:59:03
- Zuletzt bearbeitet 06.05.2026 22:30:45
The pinger in Squid 3.x before 3.4.8 allows remote attackers to obtain sensitive information or cause a denial of service (out-of-bounds read and crash) via a crafted type in an (1) ICMP or (2) ICMP6 packet.