Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
squid squid web proxy cache 2.5 .stable9 vulnerabilities and exploits
(subscribe to this query)
570
VMScore
CVE-2005-1519
Squid 2.5 STABLE9 and previous versions, when the DNS client port is unfiltered and the environment does not prevent IP spoofing, allows remote malicious users to spoof DNS lookups.
Squid Squid
445
VMScore
CVE-2012-5643
Multiple memory leaks in tools/cachemgr.cc in cachemgr.cgi in Squid 2.x and 3.x prior to 3.1.22, 3.2.x prior to 3.2.4, and 3.3.x prior to 3.3.0.2 allow remote malicious users to cause a denial of service (memory consumption) via (1) invalid Content-Length headers, (2) long POST r...
Squid-cache Squid 2.6
Squid-cache Squid 2.0
Squid-cache Squid 2.7
Squid-cache Squid 2.2
Squid-cache Squid 2.3
Squid-cache Squid 2.5
Squid-cache Squid 2.1
Squid-cache Squid 2.4
Squid-cache Squid 3.1.0.18
Squid-cache Squid 3.0.stable13
Squid-cache Squid 3.1.21
Squid-cache Squid 3.0
Squid-cache Squid 3.0.stable9
Squid-cache Squid 3.1.13
Squid-cache Squid 3.0.stable20
Squid-cache Squid 3.0.stable14
Squid-cache Squid 3.0.stable3
Squid-cache Squid 3.1.17
Squid-cache Squid 3.1.0.7
Squid-cache Squid 3.1.0.14
Squid-cache Squid 3.0.stable4
Squid-cache Squid 3.1.0.12
445
VMScore
CVE-2007-6239
The "cache update reply processing" functionality in Squid 2.x prior to 2.6.STABLE17 and Squid 3.0 allows remote malicious users to cause a denial of service (crash) via unknown vectors related to HTTP headers and an Array memory leak during requests for cached objects.
Squid Squid Web Proxy Cache 2.4 Stable2
Squid Squid Web Proxy Cache 2.5.stable11
Squid Squid Web Proxy Cache 2.5 Stable10
Squid Squid Web Proxy Cache 2.5 Stable3
Squid Squid Web Proxy Cache 2.5 .stable9
Squid Squid Web Proxy Cache 2.6.stable12
Squid Squid Web Proxy Cache 2.3.stable4
Squid Squid Web Proxy Cache 2.1 Patch2
Squid Squid Web Proxy Cache 2.6.stable2
Squid Squid Web Proxy Cache 2.6.stable13
Squid Squid Web Proxy Cache 2.5.stable14
Squid Squid Web Proxy Cache 2.6.stable3
Squid Squid Web Proxy Cache 2.6.stable14
Squid Squid Web Proxy Cache 2.0 Patch2
Squid Squid Web Proxy Cache 2.6.stable16
Squid Squid Web Proxy Cache 2.6.stable1
Squid Squid Web Proxy Cache 2.5 Stable4
Squid Squid Web Proxy Cache 2.5 Stable1
Squid Squid Web Proxy Cache 2.5 Stable6
Squid Squid Web Proxy Cache 2.6
Squid Squid Web Proxy Cache 3.0 Pre2
Squid Squid Web Proxy Cache 2.5 Stable7
445
VMScore
CVE-2005-0175
Squid 2.5 up to 2.5.STABLE7 allows remote malicious users to poison the cache via an HTTP response splitting attack.
Squid Squid 2.5 Stable9
Squid Squid 2.5 .stable3
Squid Squid 2.5.stable5
Squid Squid 2.5 Stable3
Squid Squid 2.5.stable3
Squid Squid 2.5.6
Squid Squid 2.5.stable1
Squid Squid 2.5 .stable5
Squid Squid 2.5.stable6
Squid Squid 2.5 .stable6
Squid Squid 2.5.stable4
Squid Squid 2.5.stable2
Squid Squid 2.5 .stable1
Squid Squid 2.5 .stable4
Squid Squid 2.5 Stable4
Squid Squid 2.5.stable7
356
VMScore
CVE-2010-0308
lib/rfc1035.c in Squid 2.x, 3.0 up to and including 3.0.STABLE22, and 3.1 up to and including 3.1.0.15 allows remote malicious users to cause a denial of service (assertion failure) via a crafted DNS packet that only contains a header.
Squid-cache Squid 3.0.stable13
Squid-cache Squid 2.6
Squid-cache Squid 3.0.stable9
Squid-cache Squid 2.0
Squid-cache Squid 3.0.stable20
Squid-cache Squid 3.0.stable14
Squid-cache Squid 3.0.stable3
Squid-cache Squid 3.1.0.7
Squid-cache Squid 3.1.0.14
Squid-cache Squid 3.0.stable4
Squid-cache Squid 3.1.0.12
Squid-cache Squid 2.2
Squid-cache Squid 3.1.0.3
Squid-cache Squid 3.1.0.1
Squid-cache Squid 3.0.stable16
Squid-cache Squid 2.3
Squid-cache Squid 3.0.stable18
Squid-cache Squid 3.0.stable1
Squid-cache Squid 3.1.0.9
Squid-cache Squid 3.1.0.15
Squid-cache Squid 3.0.stable6
Squid-cache Squid 3.1.0.13
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
deserialization
CVE-2024-4541
CVE-2024-3080
CVE-2024-4787
log injection
CVE-2024-5967
inject
CVE-2024-30078
CVE-2024-5899
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started