squid vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the squid package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
CVE-2024-45802

<6.12-1
  • L
CVE-2024-37894

<6.10-1
  • L
CVE-2024-25111

<6.8-1
  • L
Collapse of Data into Unsafe Value

<6.5-1
  • M
Operation on a Resource after Expiration or Release

<6.6-1
  • H
Uncontrolled Recursion

<6.6-1
  • L
Out-of-bounds Read

<6.5-1
  • H
Use After Free

<6.1-1
  • L
Reachable Assertion

<6.5-1
  • H
Buffer Overflow

<6.5-1
  • H
Incorrect Conversion between Numeric Types

<6.5-1
  • H
Improper Certificate Validation

<6.5-1
  • H
Improper Handling of Exceptional Conditions

<6.5-1
  • H
NULL Pointer Dereference

<6.1-1
  • M
HTTP Request Smuggling

<6.5-1
  • H
Integer Overflow or Wraparound

<5.7-1
  • M
Insufficient Comparison

<5.7-1
  • M
Reachable Assertion

<5.6-1
  • H
Improper Certificate Validation

<5.2-1
  • M
Improper Input Validation

<4.13-10
  • M
Improper Input Validation

<4.13-10
  • M
Integer Overflow or Wraparound

<4.13-10
  • M
Improper Encoding or Escaping of Output

<4.13-10
  • H
Memory Leak

<4.13-10
  • M
Memory Leak

<4.13-10
  • M
Improper Encoding or Escaping of Output

<4.13-10
  • H
Improper Input Validation

<4.13-8
  • M
Out-of-bounds Read

<5.2-1
  • H
Improper Input Validation

<4.13-1
  • M
HTTP Request Smuggling

<4.13-1
  • M
HTTP Request Smuggling

<4.13-1
  • L
Improper Privilege Management

*
  • L
NULL Pointer Dereference

<4.12-1
  • H
HTTP Request Smuggling

<4.12-1
  • M
Out-of-bounds Write

<4.11-1
  • C
Out-of-bounds Write

<4.11-1
  • C
Integer Overflow or Wraparound

<4.11-1
  • H
Improper Input Validation

<4.8-1
  • C
Missing Authentication for Critical Function

<4.8-1
  • L
Arbitrary Code Injection

<4.9-1
  • L
Improper Input Validation

<4.10-1
  • H
Information Exposure

<4.10-1
  • H
Exposure of Resource to Wrong Sphere

<4.10-1
  • H
Out-of-Bounds

<4.10-1
  • H
Out-of-bounds Write

<4.9-1
  • C
CVE-2019-12523

<4.9-1
  • C
Buffer Overflow

<4.9-1
  • H
Information Exposure

<4.9-1
  • M
HTTP Request Smuggling

<4.9-1
  • M
Cross-site Request Forgery (CSRF)

<4.9-1
  • H
Out-of-Bounds

<4.8-1
  • M
Cross-site Scripting (XSS)

<4.8-1
  • M
Information Exposure

<4.8-1
  • H
Out-of-bounds Write

<4.8-1
  • C
Out-of-Bounds

<4.8-1
  • L
Cross-site Scripting (XSS)

<4.4-1
  • L
Missing Release of Resource after Effective Lifetime

<4.4-1
  • L
NULL Pointer Dereference

<4.1-1
  • H
NULL Pointer Dereference

<4.1-1
  • H
CVE-2018-1000024

<4.1-1
  • H
Insufficient Verification of Data Authenticity

<4.1-1
  • H
Out-of-Bounds

<4.1-1
  • L
Improper Input Validation

<4.1-1
  • H
Out-of-Bounds

<4.1-1
  • H
Out-of-Bounds

<4.1-1
  • M
Access Restriction Bypass

<4.1-1
  • L
Improper Input Validation

<4.1-1
  • L
CVE-2015-0881

<4.1-1
  • M
Improper Data Handling

<4.1-1
  • M
Improper Input Validation

<4.1-1
  • L
Out-of-Bounds

<4.1-1
  • M
Improper Input Validation

<2.7.STABLE9-5
  • M
Out-of-Bounds

<2.7.STABLE9-2
  • M
Improper Input Validation

<2.7.STABLE9-2
  • M
CVE-2010-0639

<2.7.STABLE8-1
  • M
Improper Input Validation

<2.7.STABLE8-1
  • L
Improper Input Validation

<2.7.STABLE7-1
  • L
Access Restriction Bypass

<4.1-1
  • M
Improper Input Validation

<2.7.STABLE3-4.1
  • M
Improper Input Validation

<2.6.18-1
  • M
Improper Input Validation

<2.6.17-1
  • L
CVE-2007-1560

<2.6.5-6
  • L
Resource Management Errors

<2.6.5-4
  • L
CVE-2007-0248

<2.6.5-4
  • M
CVE-2005-2917

<2.5.10-7
  • M
CVE-2005-2796

<2.5.10-5
  • M
CVE-2005-2794

<2.5.10-5
  • M
CVE-2005-1519

<2.5.9-9
  • H
CVE-2005-1345

<2.5.9-7
  • C
CVE-2005-0194

<2.5.7-7
  • H
Out-of-Bounds

<2.5.7-6
  • M
CVE-2005-0446

<2.5.8-3
  • H
CVE-2005-0173

<2.5.7-4
  • M
CVE-2005-0241

<2.5.7-7
  • M
CVE-2005-0718

<2.5.8
  • L
CVE-2005-0626

<2.5.9-2
  • M
CVE-2005-0174

<2.5.7-6
  • M
CVE-2005-0175

<2.5.7-6
  • M
Resource Management Errors

<2.5.7
  • M
CVE-2005-0096

<2.5.7-4
  • M
CVE-2005-0094

<2.5.7-4
  • M
CVE-2005-0095

<2.5.7-4
  • M
CVE-2005-0097

<2.5.7-4
  • M
CVE-2004-2479

<2.5.8
  • M
CVE-2004-2654

<2.5.6
  • M
CVE-2004-2480

<2.5
  • M
CVE-2004-0832

<2.5.6-8
  • C
CVE-2004-0541

<2.5.5-5
  • H
CVE-2004-0189

<2.5.5-1
  • H
CVE-2002-0916

<2.4.7
  • H
CVE-2002-0713

<2.4.6-2
  • M
CVE-2002-0715

<2.4.6-2
  • H
CVE-2002-0714

<2.4.6
  • H
CVE-1999-0710

<2.5.7-1