squid vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the https://squid-cache.org|squid package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Improper Input Validation

[3.0,7.0)
  • H
Out-of-bounds Write

[,6.10)
  • M
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

[0,)
  • H
Uncontrolled Recursion

[3.5.27,)
  • M
Denial of Service (DoS)

[,6.5)
  • M
Expired Pointer Dereference

[,6.6)
  • H
Uncontrolled Recursion

[2.6,6.6)
  • H
Reachable Assertion

[,6.5)
  • H
Use After Free

[3.5,6.0.1)
  • H
Buffer Over-read

[2.2,6.5)
  • H
Denial of Service (DoS)

[,6.0.1)
  • H
Out-of-bounds Read

[3.3.0.1,6.4)
  • C
Improper Handling of Structural Elements

[,6.4)
  • H
Uncontrolled Resource Consumption ('Resource Exhaustion')

[5.0.3,6.4)
  • C
Heap-based Buffer Overflow

[3.2.0.1,6.4)
  • C
Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')

[2.6,6.4)
  • M
Information Exposure

[4.9,5.7)
  • H
Buffer Overflow

[2.5,5.7)
  • H
Denial of Service (DoS)

[2.0,5.6)
  • M
Improper Input Validation

[,3.3.13)[3.4.0,3.4.7)
  • H
Improper Input Validation

[,3.2.9)[3.3.0,3.3.3)
  • M
Out-of-Bounds

[3.1,3.2.4]
  • M
Improper Input Validation

[,3.2.13)[3.3.0,3.3.8)
  • C
Buffer Overflow

[3.0,3.5.28][4.0,4.9)
  • C
Out-of-bounds Write

[3.0,4.11)[5.0.0,5.0.1)
  • M
Improper Input Validation

[,3.1.22)[3.2.0,3.2.4)[3.3.0.0,3.3.0.2)
  • M
Denial of Service (DoS)

[2.6.stable1,2.6.stable11]
  • M
Memory Leak

[,4.4)
  • M
Denial of Service (DoS)

[,3.1.6]
  • H
Improper Input Validation

[2.0,4.14)[5.0.1,5.0.5)
  • M
Arbitrary Code Injection

[,4.9)
  • M
Denial of Service (DoS)

[,3.1.15)[3.2.0.0,3.2.0.11)
  • C
Integer Overflow or Wraparound

[3.0,3.5.28][4.0,4.11)[5.0,5.0.2)
  • M
Improper Data Handling

[,3.4.8)
  • M
Access Restriction Bypass

[0,3.2.0.11)
  • H
Denial of Service (DoS)

[4.0,4.8)
  • M
Denial of Service (DoS)

[2.0_patch2,2.5.6]
  • H
CVE-2005-1345

[2.5.stable1,2.5.stable9]
  • M
Integer Overflow or Wraparound

[3.0,4.15)[5.0,5.0.6)
  • M
Cross-site Request Forgery (CSRF)

[2.0,2.7][3.0,3.5.28][4.0,4.9)
  • H
Out-of-bounds Write

[4.0.23,4.8)
  • H
HTTP Request Smuggling

[2.0,2.7)[3.1,3.5.28][4.0,4.12)[5.0,5.0.3)
  • H
Access Restriction Bypass

[2.0.patch1,2.2.pre2]
  • M
Denial of Service (DoS)

[2.0_patch2,2.5.6]
  • M
Cross-site Scripting (XSS)

[,4.4)
  • H
Improper Input Validation

[,3.5.15)[4.0.0,4.0.7)
  • M
Improper Input Validation

[2.0_patch2,3.0]
  • M
HTTP Request Smuggling

[,4.13)[5.0,5.0.4)
  • H
Out-of-Bounds

[,3.2.12)[3.3.0,3.3.7)
  • M
Out-of-Bounds

[3.0,3.1.0.4]
  • H
Information Exposure

[,4.10)
  • L
Out-of-Bounds

[,3.5.17)[4.0.0,4.0.9)
  • M
Improper Input Validation

[,3.4.8)
  • H
Improper Input Validation

[,3.5.15)[4.0.0,4.0.7)
  • H
Out-of-Bounds

[,3.5.16)
  • M
Improper Synchronization

[5.0,5.0.3)
  • M
Improper Input Validation

[3.0.stable1,3.1.0.15]
  • M
CVE-2005-0174

[2.5_.stable1,2.5.6]
  • M
Improper Input Validation

[,4.15)[5.0,5.0.6)
  • H
Improper Input Validation

[,4.10)
  • M
Denial of Service (DoS)

[2.0,2.7.STABLE8)[3.0,3.0.STABLE24)
  • H
NULL Pointer Dereference

[,4.0.23)
  • M
Privilege Escalation

[,4.8)
  • H
Insufficient Verification of Data Authenticity

[,3.5.18)
  • M
Improper Input Validation

[,3.5.14)
  • H
Information Exposure

[,3.5.23)[4.0.0,4.0.17)
  • M
Information Exposure

[2.0,2.7][3.0,3.5.28][4.0,4.8)
  • M
Out-of-Bounds

[2.4.stable1,3.4.7]
  • M
Denial of Service (DoS)

[2.0_patch2,2.5.6]
  • H
Memory Leak

[2.0,4.15)[5.0,5.0.6)
  • M
Resource Management Errors

[,3.1.16)
  • M
Cross-site Scripting (XSS)

[,4.8)
  • M
CVE-2005-0175

[2.5_.stable1,2.5.6]
  • H
Improper Input Validation

[,3.5.15)[4.0.0,4.0.7)
  • C
Out-of-Bounds

[3.3.9,3.5.28][4.0,4.8)
  • M
Denial of Service (DoS)

[2.0_patch2,2.5.6]
  • H
Out-of-Bounds

[,3.5.17)[4.0.0,4.0.9)
  • H
Information Exposure

[,4.10)
  • H
Information Exposure

[2.0,2.7][3.0,3.5.28][4.0,4.9)
  • M
Memory Leak

[1.0,4.15)[5.0,5.0.6)
  • M
Cross-site Scripting (XSS)

[4.0.1,4.15)[5.0,5.0.6)
  • H
Information Exposure

[,3.5.23)[4.0.0,4.0.17)
  • M
Denial of Service (DoS)

[2.0_patch2,2.5.6]
  • C
Access Restriction Bypass

[3.0,3.5.28][4.0,4.9)
  • M
Improper Input Validation

[2.7.stable1,3.1.0.4]
  • M
Denial of Service (DoS)

[,3.1.8)[3.2.0.0,3.2.0.2)
  • H
Insufficient Verification of Data Authenticity

[,3.5.18)
  • L
CVE-2005-0626

[2.5.stable5,2.5.stable7]
  • M
Denial of Service (DoS)

[2.0_patch2,2.5.6]
  • L
Improper Input Validation

[,3.2.14)[3.3.0,3.3.14)[3.4.0,3.4.13)[3.5.0,3.5.4)
  • H
Improper Input Validation

[,3.5.15)[4.0.0,4.0.7)
  • M
CRLF Injection

[,3.1.1)
  • M
Access Restriction Bypass

[2.5.stable1,2.5.stable7]
  • H
Improper Input Validation

[,4.8)
  • H
Out-of-Bounds

[,3.5.17)[4.0.0,4.0.9)
  • H
Out-of-Bounds

[,4.10)
  • H
Out-of-Bounds

[0,3.5.16)
  • M
Denial of Service (DoS)

[,2.6.stable1]
  • M
Denial of Service (DoS)

[2.0_patch2,2.5.6]
  • H
Out-of-Bounds

[,3.5.17)[4.0.0,4.0.9)
  • H
Improper Input Validation

[0,3.5.18)
  • M
Denial of Service (DoS)

[,2.6.stable6]
  • M
Resource Management Errors

[2.6.stable1,2.6.stable6]
  • H
CVE-2005-1711

[,2.6.stable1]
  • M
HTTP Request Smuggling

[,4.13)[5.0,5.0.4)
  • M
Access Restriction Bypass

[,3.5.3)
  • H
Denial of Service (DoS)

[,3.5.18)[4.0.0,4.0.10)
  • C
Missing Authentication

[,4.8)
  • M
Denial of Service (DoS)

[2.0.patch1,2.5.6]
  • M
HTTP Request Smuggling

[3.0,3.5.28][4.0,4.9)
  • M
Denial of Service (DoS)

[2.0.patch1,2.2.pre2]
  • H
Out-of-bounds Write

[3.0,3.5.28][4.0,4.9)
  • H
Improper Data Handling

[3.0,3.5.27][4.0,4.3)
  • H
Out-of-Bounds

[2.5.stable1,2.5.stable6]
  • M
Improper Input Validation

[,2.7]
  • H
NULL Pointer Dereference

[3.1,3.5.28][4.0,4.12)[5.0,5.0.3)
  • M
Access Restriction Bypass

[,3.4)
  • H
Improper Input Validation

[3.0,4.13)[5.0.1,5.0.4)
  • M
Improper Input Validation

[,2.6.stable17]
  • M
Improper Input Validation

[3.0,3.1.0.4]
  • M
Out-of-bounds Write

[3.0,4.11)[5.0.1,5.0.2)
  • M
Out-of-bounds Read

[,4.14][5.0,)
  • M
Cross-site Scripting (XSS)

[,4.15)[5.0,5.0.6)
  • C
Access Restriction Bypass

[2.0.patch1,2.2.pre2]
  • M
Improper Input Validation

[,4.15)[5.0,5.0.6)
  • M
Improper Input Validation

[,3.3.12)[3.4.0,3.4.4)