Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
squid-cache squid 4.0.7 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2016-3947
Heap-based buffer overflow in the Icmp6::Recv function in icmp/Icmp6.cc in the pinger utility in Squid prior to 3.5.16 and 4.x prior to 4.0.8 allows remote servers to cause a denial of service (performance degradation or transition failures) or write sensitive information to log ...
Squid-cache Squid 4.0.5
Squid-cache Squid 4.0.4
Squid-cache Squid 4.0.3
Squid-cache Squid 4.0.2
Squid-cache Squid 4.0.1
Squid-cache Squid 4.0.6
Squid-cache Squid 4.0.7
Squid-cache Squid
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 15.10
5
CVSSv2
CVE-2016-2570
The Edge Side Includes (ESI) parser in Squid 3.x prior to 3.5.15 and 4.x prior to 4.0.7 does not check buffer limits during XML parsing, which allows remote HTTP servers to cause a denial of service (assertion failure and daemon exit) via a crafted XML document, related to esi/Cu...
Squid-cache Squid 4.0.3
Squid-cache Squid 4.0.2
Squid-cache Squid 3.4.8
Squid-cache Squid 3.4.4
Squid-cache Squid 3.4.1
Squid-cache Squid 3.4.0.3
Squid-cache Squid 3.3.5
Squid-cache Squid 3.3.4
Squid-cache Squid 3.3.0.3
Squid-cache Squid 3.3.0.2
Squid-cache Squid 3.2.4
Squid-cache Squid 3.2.3
Squid-cache Squid 3.2.0.9
Squid-cache Squid 3.2.0.8
Squid-cache Squid 3.2.0.18
Squid-cache Squid 3.2.0.17
Squid-cache Squid 3.2.0.10
Squid-cache Squid 3.2.0.1
Squid-cache Squid 3.1.4
Squid-cache Squid 3.1.3
Squid-cache Squid 3.1.1
Squid-cache Squid 3.1.0.9
5
CVSSv2
CVE-2016-10002
Incorrect processing of responses to If-None-Modified HTTP conditional requests in Squid HTTP Proxy 3.1.10 up to and including 3.1.23, 3.2.0.3 up to and including 3.5.22, and 4.0.1 up to and including 4.0.16 leads to client-specific Cookie data being leaked to other clients. Atta...
Debian Debian Linux 8.0
Squid-cache Squid 3.1.12
Squid-cache Squid 3.1.14
Squid-cache Squid 3.1.21
Squid-cache Squid 3.1.22
Squid-cache Squid 3.1.15
Squid-cache Squid 3.1.16
Squid-cache Squid 3.1.10
Squid-cache Squid 3.1.11
Squid-cache Squid 3.1.19
Squid-cache Squid 3.1.20
Squid-cache Squid 3.1.23
Squid-cache Squid 3.1.17
Squid-cache Squid 3.1.18
Squid-cache Squid 3.2.0.14
Squid-cache Squid 3.2.0.15
Squid-cache Squid 3.2.0.6
Squid-cache Squid 3.2.0.7
Squid-cache Squid 3.2.13
Squid-cache Squid 3.2.2
Squid-cache Squid 3.2.9
Squid-cache Squid 3.2.14
5
CVSSv2
CVE-2016-2572
http.cc in Squid 4.x prior to 4.0.7 relies on the HTTP status code after a response-parsing failure, which allows remote HTTP servers to cause a denial of service (assertion failure and daemon exit) via a malformed response.
Squid-cache Squid 4.0.1
Squid-cache Squid 4.0.3
Squid-cache Squid 4.0.2
Squid-cache Squid 4.0.6
Squid-cache Squid 4.0.5
Squid-cache Squid 4.0.4
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
brute force
CVE-2024-24908
open redirect
CVE-2024-31497
CVE-2023-45866
CVE-2024-4135
CVE-2024-25523
cache poisoning
CVE-2024-4649
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started