Количество 10
Количество 10
CVE-2016-2572
http.cc in Squid 4.x before 4.0.7 relies on the HTTP status code after a response-parsing failure, which allows remote HTTP servers to cause a denial of service (assertion failure and daemon exit) via a malformed response.
CVE-2016-2572
http.cc in Squid 4.x before 4.0.7 relies on the HTTP status code after a response-parsing failure, which allows remote HTTP servers to cause a denial of service (assertion failure and daemon exit) via a malformed response.
CVE-2016-2572
http.cc in Squid 4.x before 4.0.7 relies on the HTTP status code after a response-parsing failure, which allows remote HTTP servers to cause a denial of service (assertion failure and daemon exit) via a malformed response.
CVE-2016-2572
http.cc in Squid 4.x before 4.0.7 relies on the HTTP status code after ...
GHSA-6789-43mm-jrhx
http.cc in Squid 4.x before 4.0.7 relies on the HTTP status code after a response-parsing failure, which allows remote HTTP servers to cause a denial of service (assertion failure and daemon exit) via a malformed response.
BDU:2016-00618
Уязвимость прокси-сервера Squid, позволяющая нарушителю вызвать отказ в обслуживании
ELSA-2016-2600
ELSA-2016-2600: squid security, bug fix, and enhancement update (MODERATE)
openSUSE-SU-2016:2081-1
Security update for squid
SUSE-SU-2016:2008-1
Security update for squid
SUSE-SU-2016:2089-1
Security update for squid3
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2016-2572 http.cc in Squid 4.x before 4.0.7 relies on the HTTP status code after a response-parsing failure, which allows remote HTTP servers to cause a denial of service (assertion failure and daemon exit) via a malformed response. | CVSS3: 7.5 | 15% Средний | больше 9 лет назад | |
CVE-2016-2572 http.cc in Squid 4.x before 4.0.7 relies on the HTTP status code after a response-parsing failure, which allows remote HTTP servers to cause a denial of service (assertion failure and daemon exit) via a malformed response. | CVSS2: 5 | 15% Средний | больше 9 лет назад | |
CVE-2016-2572 http.cc in Squid 4.x before 4.0.7 relies on the HTTP status code after a response-parsing failure, which allows remote HTTP servers to cause a denial of service (assertion failure and daemon exit) via a malformed response. | CVSS3: 7.5 | 15% Средний | больше 9 лет назад | |
CVE-2016-2572 http.cc in Squid 4.x before 4.0.7 relies on the HTTP status code after ... | CVSS3: 7.5 | 15% Средний | больше 9 лет назад | |
GHSA-6789-43mm-jrhx http.cc in Squid 4.x before 4.0.7 relies on the HTTP status code after a response-parsing failure, which allows remote HTTP servers to cause a denial of service (assertion failure and daemon exit) via a malformed response. | CVSS3: 7.5 | 15% Средний | больше 3 лет назад | |
BDU:2016-00618 Уязвимость прокси-сервера Squid, позволяющая нарушителю вызвать отказ в обслуживании | CVSS2: 5 | 15% Средний | больше 9 лет назад | |
ELSA-2016-2600 ELSA-2016-2600: squid security, bug fix, and enhancement update (MODERATE) | около 9 лет назад | |||
openSUSE-SU-2016:2081-1 Security update for squid | около 9 лет назад | |||
SUSE-SU-2016:2008-1 Security update for squid | больше 9 лет назад | |||
SUSE-SU-2016:2089-1 Security update for squid3 | около 9 лет назад |
Уязвимостей на страницу