Page 11 of 58 results (0.004 seconds)

CVSS: 5.0EPSS: 97%CPEs: 6EXPL: 1

squid/src/ftp.c in Squid before 2.6.STABLE7 allows remote FTP servers to cause a denial of service (core dump) via crafted FTP directory listing responses, possibly related to the (1) ftpListingFinish and (2) ftpHtmlifyListEntry functions. El archivo squid/src/ftp.c en Squid versiones anteriores a 2.6.STABLE7, permite a los servidores FTP remotos causar una denegación de servicio (volcado del núcleo) por medio de respuestas de enumeración de directorio FTP, posiblemente relacionadas con las funciones (1) ftpListingFinish y (2) ftpHtmlifyListEntry. • https://www.exploit-db.com/exploits/29473 http://fedoranews.org/cms/node/2442 http://osvdb.org/39839 http://secunia.com/advisories/23767 http://secunia.com/advisories/23805 http://secunia.com/advisories/23810 http://secunia.com/advisories/23837 http://secunia.com/advisories/23889 http://secunia.com/advisories/23921 http://secunia.com/advisories/23946 http://www.gentoo.org/security/en/glsa/glsa-200701-22.xml http://www.mandriva.com/security/advisories?name=MDKSA-2007 • CWE-399: Resource Management Errors •

CVSS: 5.0EPSS: 1%CPEs: 2EXPL: 0

Unspecified vulnerability in Squid on SUSE Linux 9.0 allows remote attackers to cause a denial of service (crash) via HTTPs (SSL). • http://www.novell.com/linux/security/advisories/2005_24_sr.html http://www.novell.com/linux/security/advisories/2005_28_sr.html http://www.securityfocus.com/bid/15165 •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

Gibraltar Firewall 2.2 and earlier, when using the ClamAV update to 0.81 for Squid, uses a defunct ClamAV method to scan memory for viruses, which does not return an error code and prevents viruses from being detected. • http://securitytracker.com/id?1014030 •

CVSS: 5.0EPSS: 6%CPEs: 27EXPL: 0

Memory leak in the NTLM fakeauth_auth helper for Squid 2.5.STABLE7 and earlier allows remote attackers to cause a denial of service (memory consumption). • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000923 http://fedoranews.org/updates/FEDORA--.shtml http://security.gentoo.org/glsa/glsa-200501-25.xml http://securitytracker.com/id?1012818 http://www.novell.com/linux/security/advisories/2005_06_squid.html http://www.redhat.com/support/errata/RHSA-2005-060.html http://www.redhat.com/support/errata/RHSA-2005-061.html http://www.securityfocus.com/bid/12324 http://www.squid-cache.org/Versions/v2/2.5/bugs/& •

CVSS: 5.0EPSS: 96%CPEs: 27EXPL: 1

The WCCP message parsing code in Squid 2.5.STABLE7 and earlier allows remote attackers to cause a denial of service (crash) via malformed WCCP messages with source addresses that are spoofed to reference Squid's home router and invalid WCCP_I_SEE_YOU cache numbers. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000923 http://fedoranews.org/updates/FEDORA--.shtml http://secunia.com/advisories/13825 http://security.gentoo.org/glsa/glsa-200501-25.xml http://securitytracker.com/id?1012882 http://www.debian.org/security/2005/dsa-651 http://www.mandriva.com/security/advisories?name=MDKSA-2005:014 http://www.novell.com/linux/security/advisories/2005_06_squid.html http://www.osvdb.org/12886 http://www.redhat.com/support/erra •