Логотип exploitDog
bind:"CVE-2020-15810" OR bind:"CVE-2020-15811"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2020-15810" OR bind:"CVE-2020-15811"

Количество 20

Количество 20

rocky логотип

RLSA-2020:3623

почти 5 лет назад

Important: squid:4 security update

EPSS: Низкий
oracle-oval логотип

ELSA-2020-3623

почти 5 лет назад

ELSA-2020-3623: squid:4 security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:2471-1

почти 5 лет назад

Security update for squid

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:14590-1

больше 4 лет назад

Security update for squid3

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:1369-1

почти 5 лет назад

Security update for squid

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:1346-1

почти 5 лет назад

Security update for squid

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:2443-1

почти 5 лет назад

Security update for squid

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:2442-1

почти 5 лет назад

Security update for squid

EPSS: Низкий
oracle-oval логотип

ELSA-2020-4082

больше 4 лет назад

ELSA-2020-4082: squid security update (IMPORTANT)

EPSS: Низкий
ubuntu логотип

CVE-2020-15811

почти 5 лет назад

An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Splitting attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the browser cache and any downstream caches with content from an arbitrary source. Squid uses a string search instead of parsing the Transfer-Encoding header to find chunked encoding. This allows an attacker to hide a second request inside Transfer-Encoding: it is interpreted by Squid as chunked and split out into a second request delivered upstream. Squid will then deliver two distinct responses to the client, corrupting any downstream caches.

CVSS3: 6.5
EPSS: Низкий
redhat логотип

CVE-2020-15811

почти 5 лет назад

An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Splitting attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the browser cache and any downstream caches with content from an arbitrary source. Squid uses a string search instead of parsing the Transfer-Encoding header to find chunked encoding. This allows an attacker to hide a second request inside Transfer-Encoding: it is interpreted by Squid as chunked and split out into a second request delivered upstream. Squid will then deliver two distinct responses to the client, corrupting any downstream caches.

CVSS3: 9.6
EPSS: Низкий
nvd логотип

CVE-2020-15811

почти 5 лет назад

An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Splitting attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the browser cache and any downstream caches with content from an arbitrary source. Squid uses a string search instead of parsing the Transfer-Encoding header to find chunked encoding. This allows an attacker to hide a second request inside Transfer-Encoding: it is interpreted by Squid as chunked and split out into a second request delivered upstream. Squid will then deliver two distinct responses to the client, corrupting any downstream caches.

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2020-15811

почти 5 лет назад

An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due ...

CVSS3: 6.5
EPSS: Низкий
ubuntu логотип

CVE-2020-15810

почти 5 лет назад

An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Smuggling attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the proxy cache and any downstream caches with content from an arbitrary source. When configured for relaxed header parsing (the default), Squid relays headers containing whitespace characters to upstream servers. When this occurs as a prefix to a Content-Length header, the frame length specified will be ignored by Squid (allowing for a conflicting length to be used from another Content-Length header) but relayed upstream.

CVSS3: 6.5
EPSS: Низкий
redhat логотип

CVE-2020-15810

почти 5 лет назад

An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Smuggling attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the proxy cache and any downstream caches with content from an arbitrary source. When configured for relaxed header parsing (the default), Squid relays headers containing whitespace characters to upstream servers. When this occurs as a prefix to a Content-Length header, the frame length specified will be ignored by Squid (allowing for a conflicting length to be used from another Content-Length header) but relayed upstream.

CVSS3: 9.6
EPSS: Низкий
nvd логотип

CVE-2020-15810

почти 5 лет назад

An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Smuggling attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the proxy cache and any downstream caches with content from an arbitrary source. When configured for relaxed header parsing (the default), Squid relays headers containing whitespace characters to upstream servers. When this occurs as a prefix to a Content-Length header, the frame length specified will be ignored by Squid (allowing for a conflicting length to be used from another Content-Length header) but relayed upstream.

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2020-15810

почти 5 лет назад

An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due ...

CVSS3: 6.5
EPSS: Низкий
fstec логотип

BDU:2020-04148

почти 5 лет назад

Уязвимость прокси-сервера Squid, связанная с непринятием мер по обработке последовательностей CRLF в HTTP-заголовках, позволяющая нарушителю внедрить произвольные HTTP-заголовки

CVSS3: 6.5
EPSS: Низкий
fstec логотип

BDU:2020-04147

почти 5 лет назад

Уязвимость прокси-сервера Squid, связанная с непоследовательной интерпретацией http-запросов, позволяющая нарушителю осуществлять межсайтовые сценарные атаки (XSS)

CVSS3: 6.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:14908-1

больше 3 лет назад

Security update for squid

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
rocky логотип
RLSA-2020:3623

Important: squid:4 security update

почти 5 лет назад
oracle-oval логотип
ELSA-2020-3623

ELSA-2020-3623: squid:4 security update (IMPORTANT)

почти 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:2471-1

Security update for squid

почти 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:14590-1

Security update for squid3

больше 4 лет назад
suse-cvrf логотип
openSUSE-SU-2020:1369-1

Security update for squid

почти 5 лет назад
suse-cvrf логотип
openSUSE-SU-2020:1346-1

Security update for squid

почти 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:2443-1

Security update for squid

почти 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:2442-1

Security update for squid

почти 5 лет назад
oracle-oval логотип
ELSA-2020-4082

ELSA-2020-4082: squid security update (IMPORTANT)

больше 4 лет назад
ubuntu логотип
CVE-2020-15811

An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Splitting attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the browser cache and any downstream caches with content from an arbitrary source. Squid uses a string search instead of parsing the Transfer-Encoding header to find chunked encoding. This allows an attacker to hide a second request inside Transfer-Encoding: it is interpreted by Squid as chunked and split out into a second request delivered upstream. Squid will then deliver two distinct responses to the client, corrupting any downstream caches.

CVSS3: 6.5
0%
Низкий
почти 5 лет назад
redhat логотип
CVE-2020-15811

An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Splitting attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the browser cache and any downstream caches with content from an arbitrary source. Squid uses a string search instead of parsing the Transfer-Encoding header to find chunked encoding. This allows an attacker to hide a second request inside Transfer-Encoding: it is interpreted by Squid as chunked and split out into a second request delivered upstream. Squid will then deliver two distinct responses to the client, corrupting any downstream caches.

CVSS3: 9.6
0%
Низкий
почти 5 лет назад
nvd логотип
CVE-2020-15811

An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Splitting attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the browser cache and any downstream caches with content from an arbitrary source. Squid uses a string search instead of parsing the Transfer-Encoding header to find chunked encoding. This allows an attacker to hide a second request inside Transfer-Encoding: it is interpreted by Squid as chunked and split out into a second request delivered upstream. Squid will then deliver two distinct responses to the client, corrupting any downstream caches.

CVSS3: 6.5
0%
Низкий
почти 5 лет назад
debian логотип
CVE-2020-15811

An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due ...

CVSS3: 6.5
0%
Низкий
почти 5 лет назад
ubuntu логотип
CVE-2020-15810

An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Smuggling attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the proxy cache and any downstream caches with content from an arbitrary source. When configured for relaxed header parsing (the default), Squid relays headers containing whitespace characters to upstream servers. When this occurs as a prefix to a Content-Length header, the frame length specified will be ignored by Squid (allowing for a conflicting length to be used from another Content-Length header) but relayed upstream.

CVSS3: 6.5
0%
Низкий
почти 5 лет назад
redhat логотип
CVE-2020-15810

An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Smuggling attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the proxy cache and any downstream caches with content from an arbitrary source. When configured for relaxed header parsing (the default), Squid relays headers containing whitespace characters to upstream servers. When this occurs as a prefix to a Content-Length header, the frame length specified will be ignored by Squid (allowing for a conflicting length to be used from another Content-Length header) but relayed upstream.

CVSS3: 9.6
0%
Низкий
почти 5 лет назад
nvd логотип
CVE-2020-15810

An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Smuggling attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the proxy cache and any downstream caches with content from an arbitrary source. When configured for relaxed header parsing (the default), Squid relays headers containing whitespace characters to upstream servers. When this occurs as a prefix to a Content-Length header, the frame length specified will be ignored by Squid (allowing for a conflicting length to be used from another Content-Length header) but relayed upstream.

CVSS3: 6.5
0%
Низкий
почти 5 лет назад
debian логотип
CVE-2020-15810

An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due ...

CVSS3: 6.5
0%
Низкий
почти 5 лет назад
fstec логотип
BDU:2020-04148

Уязвимость прокси-сервера Squid, связанная с непринятием мер по обработке последовательностей CRLF в HTTP-заголовках, позволяющая нарушителю внедрить произвольные HTTP-заголовки

CVSS3: 6.5
0%
Низкий
почти 5 лет назад
fstec логотип
BDU:2020-04147

Уязвимость прокси-сервера Squid, связанная с непоследовательной интерпретацией http-запросов, позволяющая нарушителю осуществлять межсайтовые сценарные атаки (XSS)

CVSS3: 6.5
0%
Низкий
почти 5 лет назад
suse-cvrf логотип
SUSE-SU-2022:14908-1

Security update for squid

больше 3 лет назад

Уязвимостей на страницу