Количество 15
Количество 15
CVE-2020-15810
An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Smuggling attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the proxy cache and any downstream caches with content from an arbitrary source. When configured for relaxed header parsing (the default), Squid relays headers containing whitespace characters to upstream servers. When this occurs as a prefix to a Content-Length header, the frame length specified will be ignored by Squid (allowing for a conflicting length to be used from another Content-Length header) but relayed upstream.
CVE-2020-15810
An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Smuggling attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the proxy cache and any downstream caches with content from an arbitrary source. When configured for relaxed header parsing (the default), Squid relays headers containing whitespace characters to upstream servers. When this occurs as a prefix to a Content-Length header, the frame length specified will be ignored by Squid (allowing for a conflicting length to be used from another Content-Length header) but relayed upstream.
CVE-2020-15810
An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Smuggling attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the proxy cache and any downstream caches with content from an arbitrary source. When configured for relaxed header parsing (the default), Squid relays headers containing whitespace characters to upstream servers. When this occurs as a prefix to a Content-Length header, the frame length specified will be ignored by Squid (allowing for a conflicting length to be used from another Content-Length header) but relayed upstream.
CVE-2020-15810
An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due ...
BDU:2020-04147
Уязвимость прокси-сервера Squid, связанная с непоследовательной интерпретацией http-запросов, позволяющая нарушителю осуществлять межсайтовые сценарные атаки (XSS)
RLSA-2020:3623
Important: squid:4 security update
ELSA-2020-3623
ELSA-2020-3623: squid:4 security update (IMPORTANT)
SUSE-SU-2022:14908-1
Security update for squid
SUSE-SU-2020:2471-1
Security update for squid
SUSE-SU-2020:14590-1
Security update for squid3
openSUSE-SU-2020:1369-1
Security update for squid
openSUSE-SU-2020:1346-1
Security update for squid
SUSE-SU-2020:2443-1
Security update for squid
SUSE-SU-2020:2442-1
Security update for squid
ELSA-2020-4082
ELSA-2020-4082: squid security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2020-15810 An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Smuggling attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the proxy cache and any downstream caches with content from an arbitrary source. When configured for relaxed header parsing (the default), Squid relays headers containing whitespace characters to upstream servers. When this occurs as a prefix to a Content-Length header, the frame length specified will be ignored by Squid (allowing for a conflicting length to be used from another Content-Length header) but relayed upstream. | CVSS3: 6.5 | 0% Низкий | больше 5 лет назад | |
CVE-2020-15810 An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Smuggling attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the proxy cache and any downstream caches with content from an arbitrary source. When configured for relaxed header parsing (the default), Squid relays headers containing whitespace characters to upstream servers. When this occurs as a prefix to a Content-Length header, the frame length specified will be ignored by Squid (allowing for a conflicting length to be used from another Content-Length header) but relayed upstream. | CVSS3: 9.6 | 0% Низкий | больше 5 лет назад | |
CVE-2020-15810 An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Smuggling attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the proxy cache and any downstream caches with content from an arbitrary source. When configured for relaxed header parsing (the default), Squid relays headers containing whitespace characters to upstream servers. When this occurs as a prefix to a Content-Length header, the frame length specified will be ignored by Squid (allowing for a conflicting length to be used from another Content-Length header) but relayed upstream. | CVSS3: 6.5 | 0% Низкий | больше 5 лет назад | |
CVE-2020-15810 An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due ... | CVSS3: 6.5 | 0% Низкий | больше 5 лет назад | |
BDU:2020-04147 Уязвимость прокси-сервера Squid, связанная с непоследовательной интерпретацией http-запросов, позволяющая нарушителю осуществлять межсайтовые сценарные атаки (XSS) | CVSS3: 6.5 | 0% Низкий | больше 5 лет назад | |
RLSA-2020:3623 Important: squid:4 security update | больше 5 лет назад | |||
ELSA-2020-3623 ELSA-2020-3623: squid:4 security update (IMPORTANT) | больше 5 лет назад | |||
SUSE-SU-2022:14908-1 Security update for squid | больше 3 лет назад | |||
SUSE-SU-2020:2471-1 Security update for squid | больше 5 лет назад | |||
SUSE-SU-2020:14590-1 Security update for squid3 | почти 5 лет назад | |||
openSUSE-SU-2020:1369-1 Security update for squid | больше 5 лет назад | |||
openSUSE-SU-2020:1346-1 Security update for squid | больше 5 лет назад | |||
SUSE-SU-2020:2443-1 Security update for squid | больше 5 лет назад | |||
SUSE-SU-2020:2442-1 Security update for squid | больше 5 лет назад | |||
ELSA-2020-4082 ELSA-2020-4082: squid security update (IMPORTANT) | около 5 лет назад |
Уязвимостей на страницу