Filtered by vendor Squid
Subscriptions
Total
41 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2005-2917 | 2 Redhat, Squid | 2 Enterprise Linux, Squid | 2025-04-03 | N/A |
Squid 2.5.STABLE10 and earlier, while performing NTLM authentication, does not properly handle certain request sequences, which allows attackers to cause a denial of service (daemon restart). | ||||
CVE-2005-0626 | 2 Redhat, Squid | 2 Enterprise Linux, Squid | 2025-04-03 | N/A |
Race condition in Squid 2.5.STABLE7 to 2.5.STABLE9, when using the Netscape Set-Cookie recommendations for handling cookies in caches, may cause Set-Cookie headers to be sent to other users, which allows attackers to steal the related cookies. | ||||
CVE-2005-0718 | 2 Redhat, Squid | 2 Enterprise Linux, Squid | 2025-04-03 | N/A |
Squid 2.5.STABLE7 and earlier allows remote attackers to cause a denial of service (segmentation fault) by aborting the connection during a (1) PUT or (2) POST request, which causes Squid to access previously freed memory. | ||||
CVE-2004-2654 | 1 Squid | 1 Squid | 2025-04-03 | N/A |
The clientAbortBody function in client_side.c in Squid Web Proxy Cache before 2.6 STABLE6 allows remote attackers to cause a denial of service (segmentation fault) via unspecified vectors that trigger a null dereference. NOTE: in a followup advisory, a researcher claimed that the issue was a buffer overflow that was not fixed in STABLE6. However, the vendor's bug report clearly shows that the researcher later retracted this claim, because the tested product was actually STABLE5. | ||||
CVE-2005-0094 | 2 Redhat, Squid | 2 Enterprise Linux, Squid | 2025-04-03 | N/A |
Buffer overflow in the gopherToHTML function in the Gopher reply parser for Squid 2.5.STABLE7 and earlier allows remote malicious Gopher servers to cause a denial of service (crash) via crafted responses. | ||||
CVE-2005-1519 | 2 Redhat, Squid | 2 Enterprise Linux, Squid | 2025-04-03 | N/A |
Squid 2.5 STABLE9 and earlier, when the DNS client port is unfiltered and the environment does not prevent IP spoofing, allows remote attackers to spoof DNS lookups. | ||||
CVE-2005-0173 | 2 Redhat, Squid | 2 Enterprise Linux, Squid | 2025-04-03 | N/A |
squid_ldap_auth in Squid 2.5 and earlier allows remote authenticated users to bypass username-based Access Control Lists (ACLs) via a username with a space at the beginning or end, which is ignored by the LDAP server. | ||||
CVE-2005-0241 | 2 Redhat, Squid | 2 Enterprise Linux, Squid | 2025-04-03 | N/A |
The httpProcessReplyHeader function in http.c for Squid 2.5-STABLE7 and earlier does not properly set the debug context when it is handling "oversized" HTTP reply headers, which might allow remote attackers to poison the cache or bypass access controls based on header size. | ||||
CVE-2004-0832 | 2 Redhat, Squid | 2 Enterprise Linux, Squid | 2025-04-03 | N/A |
The (1) ntlm_fetch_string and (2) ntlm_get_string functions in Squid 2.5.6 and earlier, with NTLM authentication enabled, allow remote attackers to cause a denial of service (application crash) via an NTLMSSP packet that causes a negative value to be passed to memcpy. | ||||
CVE-2004-0918 | 6 Gentoo, Openpkg, Redhat and 3 more | 7 Linux, Openpkg, Enterprise Linux and 4 more | 2025-04-03 | N/A |
The asn_parse_header function (asn1.c) in the SNMP module for Squid Web Proxy Cache before 2.4.STABLE7 allows remote attackers to cause a denial of service (server restart) via certain SNMP packets with negative length fields that trigger a memory allocation error. | ||||
CVE-2002-0067 | 2 Redhat, Squid | 2 Linux, Squid | 2025-04-03 | N/A |
Squid 2.4 STABLE3 and earlier does not properly disable HTCP, even when "htcp_port 0" is specified in squid.conf, which could allow remote attackers to bypass intended access restrictions. | ||||
CVE-2002-0069 | 2 Redhat, Squid | 2 Linux, Squid | 2025-04-03 | N/A |
Memory leak in SNMP in Squid 2.4 STABLE3 and earlier allows remote attackers to cause a denial of service. | ||||
CVE-2002-0163 | 2 Redhat, Squid | 2 Linux, Squid | 2025-04-03 | N/A |
Heap-based buffer overflow in Squid before 2.4 STABLE4, and Squid 2.5 and 2.6 until March 12, 2002 distributions, allows remote attackers to cause a denial of service, and possibly execute arbitrary code, via compressed DNS responses. | ||||
CVE-2001-1030 | 6 Caldera, Immunix, Mandrakesoft and 3 more | 8 Openlinux Server, Immunix, Mandrake Linux and 5 more | 2025-04-03 | N/A |
Squid before 2.3STABLE5 in HTTP accelerator mode does not enable access control lists (ACLs) when the httpd_accel_host and http_accel_with_proxy off settings are used, which allows attackers to bypass the ACLs and conduct unauthorized activities such as port scanning. | ||||
CVE-2002-0068 | 2 Redhat, Squid | 2 Linux, Squid | 2025-04-03 | N/A |
Squid 2.4 STABLE3 and earlier allows remote attackers to cause a denial of service (core dump) and possibly execute arbitrary code with an ftp:// URL with a larger number of special characters, which exceed the buffer when Squid URL-escapes the characters. | ||||
CVE-2001-0843 | 2 Redhat, Squid | 2 Linux, Squid Web Proxy | 2025-04-03 | N/A |
Squid proxy server 2.4 and earlier allows remote attackers to cause a denial of service (crash) via a mkdir-only FTP PUT request. | ||||
CVE-2002-0714 | 2 Redhat, Squid | 3 Enterprise Linux, Linux, Squid | 2025-04-03 | N/A |
FTP proxy in Squid before 2.4.STABLE6 does not compare the IP addresses of control and data connections with the FTP server, which allows remote attackers to bypass firewall rules or spoof FTP server responses. | ||||
CVE-2002-0715 | 2 Redhat, Squid | 3 Enterprise Linux, Linux, Squid | 2025-04-03 | N/A |
Vulnerability in Squid before 2.4.STABLE6 related to proxy authentication credentials may allow remote web sites to obtain the user's proxy login and password. | ||||
CVE-2002-2414 | 2 Opera Software, Squid | 2 Opera, Squid | 2025-04-03 | N/A |
Opera 6.0.3, when using Squid 2.4 for HTTPS proxying, does not properly handle when accepting a non-global certificate authority (CA) certificate from a site and establishing a subsequent HTTPS connection, which allows remote attackers to cause a denial of service (crash). | ||||
CVE-2005-0095 | 2 Redhat, Squid | 2 Enterprise Linux, Squid | 2025-04-03 | N/A |
The WCCP message parsing code in Squid 2.5.STABLE7 and earlier allows remote attackers to cause a denial of service (crash) via malformed WCCP messages with source addresses that are spoofed to reference Squid's home router and invalid WCCP_I_SEE_YOU cache numbers. |