squid-sysvinit vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the squid-sysvinit package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Information Exposure

<7:3.5.20-17.0.9.el7_9.13
  • H
Out-of-bounds Write

<7:3.5.20-17.0.7.el7_9.13
  • H
HTTP Request Smuggling

<7:3.5.20-17.0.5.el7_9.13
  • H
CVE-2024-45802

<7:3.5.20-17.0.3.el7_9.10
  • H
Improper Certificate Validation

<7:3.5.20-17.0.1.el7_9.10
  • H
Reachable Assertion

<7:3.5.20-17.0.1.el7_9.10
  • H
CVE-2024-25617

<7:3.5.20-17.0.1.el7_9.10
  • H
Uncontrolled Recursion

<7:3.5.20-17.0.1.el7_9.10
  • H
Out-of-bounds Read

<7:3.5.20-17.0.1.el7_9.10
  • H
NULL Pointer Dereference

<7:3.5.20-17.0.1.el7_9.10
  • C
Buffer Overflow

<7:3.5.20-17.0.1.el7_9.9
  • H
Integer Overflow or Wraparound

<7:3.5.20-17.0.1.el7_9.8
  • H
Reachable Assertion

<7:3.5.20-17.0.1.el7_9.7
  • H
Memory Leak

<7:3.5.20-17.0.7.el7_9.13
  • H
Improper Input Validation

<7:3.5.20-17.0.1.el7_9.6
  • H
Memory Leak

<7:3.5.20-17.0.1.el7_9.6
  • H
Integer Overflow or Wraparound

<7:3.5.20-17.0.1.el7_9.6
  • H
Integer Overflow or Wraparound

<7:3.5.20-17.0.1.el7_9.6
  • H
Improper Encoding or Escaping of Output

<7:3.5.20-17.0.1.el7_9.6
  • H
Improper Input Validation

<7:3.5.20-17.el7_9.6
  • H
Incorrect Calculation of Buffer Size

<7:3.5.20-17.el7_9.4
  • H
CVE-2019-12528

<7:3.5.20-17.el7_9.4
  • H
Exposure of Resource to Wrong Sphere

<7:3.5.20-17.el7_9.4
  • H
Improper Locking

<7:3.5.20-17.el7_9.4
  • H
HTTP Request Smuggling

<7:3.5.20-17.el7_9.4
  • H
Insufficient Comparison

<7:3.5.20-17.el7_9.4
  • H
HTTP Request Smuggling

<7:3.5.20-17.el7_9.4
  • H
Out-of-bounds Write

<7:3.5.20-15.el7_8.1
  • H
Integer Overflow or Wraparound

<7:3.5.20-15.el7_8.1
  • H
Out-of-bounds Write

<7:3.5.20-15.el7_8.1
  • M
CVE-2018-1000024

<7:3.5.20-15.el7
  • M
NULL Pointer Dereference

<7:3.5.20-15.el7
  • M
Cross-site Scripting (XSS)

<7:3.5.20-15.el7
  • M
Information Exposure

<7:3.5.20-2.el7_3.2
  • M
Improper Input Validation

<7:3.5.20-2.el7
  • M
Improper Input Validation

<7:3.5.20-2.el7
  • M
Out-of-Bounds

<7:3.5.20-2.el7
  • M
Improper Input Validation

<7:3.5.20-2.el7
  • M
Improper Input Validation

<7:3.5.20-2.el7
  • M
Out-of-Bounds

<7:3.3.8-26.el7_2.3
  • M
Out-of-Bounds

<7:3.3.8-26.el7_2.3
  • M
Improper Input Validation

<7:3.3.8-26.el7_2.3
  • M
Insufficient Verification of Data Authenticity

<7:3.3.8-26.el7_2.3
  • M
Out-of-Bounds

<7:3.3.8-26.el7_2.3
  • M
Insufficient Verification of Data Authenticity

<7:3.3.8-26.el7_2.3
  • M
CVE-2016-4556

<7:3.3.8-26.el7_2.3
  • M
Out-of-Bounds

<7:3.3.8-26.el7_2.3
  • M
Improper Input Validation

<7:3.3.8-26.el7
  • H
Improper Input Validation

<7:3.3.8-12.el7_0