squid-sysvinit vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the squid-sysvinit package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
CVE-2024-45802

<7:3.5.20-17.0.3.el7_9.10
  • H
Improper Certificate Validation

<7:3.5.20-17.0.1.el7_9.10
  • H
Reachable Assertion

<7:3.5.20-17.0.1.el7_9.10
  • H
CVE-2024-25617

<7:3.5.20-17.0.1.el7_9.10
  • H
Uncontrolled Recursion

<7:3.5.20-17.0.1.el7_9.10
  • H
Out-of-bounds Read

<7:3.5.20-17.0.1.el7_9.10
  • H
NULL Pointer Dereference

<7:3.5.20-17.0.1.el7_9.10
  • C
Buffer Overflow

<7:3.5.20-17.0.1.el7_9.9
  • H
Integer Overflow or Wraparound

<7:3.5.20-17.0.1.el7_9.8
  • H
Reachable Assertion

<7:3.5.20-17.0.1.el7_9.7
  • H
Memory Leak

<7:3.5.20-17.0.1.el7_9.6
  • H
Improper Input Validation

<7:3.5.20-17.0.1.el7_9.6
  • H
Memory Leak

<7:3.5.20-17.0.1.el7_9.6
  • H
Integer Overflow or Wraparound

<7:3.5.20-17.0.1.el7_9.6
  • H
Integer Overflow or Wraparound

<7:3.5.20-17.0.1.el7_9.6
  • H
Improper Encoding or Escaping of Output

<7:3.5.20-17.0.1.el7_9.6
  • H
Improper Input Validation

<7:3.5.20-17.el7_9.6
  • H
Incorrect Calculation of Buffer Size

<7:3.5.20-17.el7_9.4
  • H
CVE-2019-12528

<7:3.5.20-17.el7_9.4
  • H
Exposure of Resource to Wrong Sphere

<7:3.5.20-17.el7_9.4
  • H
Improper Locking

<7:3.5.20-17.el7_9.4
  • H
HTTP Request Smuggling

<7:3.5.20-17.el7_9.4
  • H
Insufficient Comparison

<7:3.5.20-17.el7_9.4
  • H
HTTP Request Smuggling

<7:3.5.20-17.el7_9.4
  • H
Out-of-bounds Write

<7:3.5.20-15.el7_8.1
  • H
Integer Overflow or Wraparound

<7:3.5.20-15.el7_8.1
  • H
Out-of-bounds Write

<7:3.5.20-15.el7_8.1
  • M
CVE-2018-1000024

<7:3.5.20-15.el7
  • M
NULL Pointer Dereference

<7:3.5.20-15.el7
  • M
Cross-site Scripting (XSS)

<7:3.5.20-15.el7
  • M
Information Exposure

<7:3.5.20-2.el7_3.2
  • M
Improper Input Validation

<7:3.5.20-2.el7
  • M
Improper Input Validation

<7:3.5.20-2.el7
  • M
Out-of-Bounds

<7:3.5.20-2.el7
  • M
Improper Input Validation

<7:3.5.20-2.el7
  • M
Improper Input Validation

<7:3.5.20-2.el7
  • M
Out-of-Bounds

<7:3.3.8-26.el7_2.3
  • M
Out-of-Bounds

<7:3.3.8-26.el7_2.3
  • M
Improper Input Validation

<7:3.3.8-26.el7_2.3
  • M
Insufficient Verification of Data Authenticity

<7:3.3.8-26.el7_2.3
  • M
Out-of-Bounds

<7:3.3.8-26.el7_2.3
  • M
Insufficient Verification of Data Authenticity

<7:3.3.8-26.el7_2.3
  • M
CVE-2016-4556

<7:3.3.8-26.el7_2.3
  • M
Out-of-Bounds

<7:3.3.8-26.el7_2.3
  • M
Improper Input Validation

<7:3.3.8-26.el7
  • H
Improper Input Validation

<7:3.3.8-12.el7_0