Squid-cache

Squid

109 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 11.16%
  • Veröffentlicht 27.02.2016 05:59:06
  • Zuletzt bearbeitet 06.05.2026 22:30:45

http.cc in Squid 4.x before 4.0.7 relies on the HTTP status code after a response-parsing failure, which allows remote HTTP servers to cause a denial of service (assertion failure and daemon exit) via a malformed response.

  • EPSS 14.33%
  • Veröffentlicht 27.02.2016 05:59:05
  • Zuletzt bearbeitet 06.05.2026 22:30:45

http.cc in Squid 3.x before 3.5.15 and 4.x before 4.0.7 proceeds with the storage of certain data after a response-parsing failure, which allows remote HTTP servers to cause a denial of service (assertion failure and daemon exit) via a malformed resp...

  • EPSS 5.49%
  • Veröffentlicht 27.02.2016 05:59:04
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The Edge Side Includes (ESI) parser in Squid 3.x before 3.5.15 and 4.x before 4.0.7 does not check buffer limits during XML parsing, which allows remote HTTP servers to cause a denial of service (assertion failure and daemon exit) via a crafted XML d...

  • EPSS 70.32%
  • Veröffentlicht 27.02.2016 05:59:03
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Squid 3.x before 3.5.15 and 4.x before 4.0.7 does not properly append data to String objects, which allows remote servers to cause a denial of service (assertion failure and daemon exit) via a long string, as demonstrated by a crafted HTTP Vary heade...

  • EPSS 1.94%
  • Veröffentlicht 06.11.2015 21:59:00
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Squid 3.4.4 through 3.4.11 and 3.5.0.1 through 3.5.1, when Digest authentication is used, allow remote authenticated users to retain access by leveraging a stale nonce, aka "Nonce replay vulnerability."

Exploit
  • EPSS 24.7%
  • Veröffentlicht 28.09.2015 20:59:03
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Squid before 3.5.6 does not properly handle CONNECT method peer responses when configured with cache_peer, which allows remote attackers to bypass intended restrictions and gain access to a backend proxy via a CONNECT request.

  • EPSS 6.47%
  • Veröffentlicht 18.05.2015 15:59:11
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Squid 3.2.x before 3.2.14, 3.3.x before 3.3.14, 3.4.x before 3.4.13, and 3.5.x before 3.5.4, when configured with client-first SSL-bump, do not properly validate the domain or hostname fields of X.509 certificates, which allows man-in-the-middle atta...

  • EPSS 4.38%
  • Veröffentlicht 20.02.2015 11:59:04
  • Zuletzt bearbeitet 06.05.2026 22:30:45

CRLF injection vulnerability in Squid before 3.1.1 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a crafted header in a response.

  • EPSS 64.23%
  • Veröffentlicht 26.11.2014 15:59:04
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The pinger in Squid 3.x before 3.4.8 allows remote attackers to obtain sensitive information or cause a denial of service (crash) via a crafted (1) ICMP or (2) ICMP6 packet size.

  • EPSS 77.33%
  • Veröffentlicht 26.11.2014 15:59:03
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The pinger in Squid 3.x before 3.4.8 allows remote attackers to obtain sensitive information or cause a denial of service (out-of-bounds read and crash) via a crafted type in an (1) ICMP or (2) ICMP6 packet.