Squid Squid : OVAL Definitions - Class: Vulnerability

Filter: Compliance Inventory Patch Vulnerability All Family: All Windows Unix IOS Pixos
Title Definition Id Class Family
Buffer overflow in the gopherToHTML function in the Gopher reply parser for Squid 2.5.STABLE7 and earlier allows remote ... oval:org.mitre.oval:def:11146 Vulnerability unix
CVE-2004-0832 oval:org.opensuse.security:def:20040832 Vulnerability unix
CVE-2004-0918 oval:org.opensuse.security:def:20040918 Vulnerability unix
CVE-2005-0094 oval:org.opensuse.security:def:20050094 Vulnerability unix
CVE-2005-0095 oval:org.opensuse.security:def:20050095 Vulnerability unix
CVE-2005-0096 oval:org.opensuse.security:def:20050096 Vulnerability unix
CVE-2005-0097 oval:org.opensuse.security:def:20050097 Vulnerability unix
CVE-2005-0211 oval:org.opensuse.security:def:20050211 Vulnerability unix
CVE-2005-0241 oval:org.opensuse.security:def:20050241 Vulnerability unix
CVE-2005-0446 oval:org.opensuse.security:def:20050446 Vulnerability unix
CVE-2005-0626 oval:org.opensuse.security:def:20050626 Vulnerability unix
CVE-2005-0718 oval:org.opensuse.security:def:20050718 Vulnerability unix
CVE-2005-1345 oval:org.opensuse.security:def:20051345 Vulnerability unix
CVE-2005-1519 oval:org.opensuse.security:def:20051519 Vulnerability unix
CVE-2005-2794 oval:org.opensuse.security:def:20052794 Vulnerability unix
CVE-2005-2796 oval:org.opensuse.security:def:20052796 Vulnerability unix
CVE-2005-2917 oval:org.opensuse.security:def:20052917 Vulnerability unix
CVE-2005-3258 oval:org.opensuse.security:def:20053258 Vulnerability unix
CVE-2007-0247 oval:org.opensuse.security:def:20070247 Vulnerability unix
CVE-2007-0248 oval:org.opensuse.security:def:20070248 Vulnerability unix
CVE-2008-1612 oval:org.opensuse.security:def:20081612 Vulnerability unix
CVE-2009-0478 oval:org.opensuse.security:def:20090478 Vulnerability unix
Memory leak in the NTLM fakeauth_auth helper for Squid 2.5.STABLE7 and earlier allows remote attackers to cause a denial... oval:org.mitre.oval:def:10233 Vulnerability unix
Race condition in Squid 2.5.STABLE7 to 2.5.STABLE9, when using the Netscape Set-Cookie recommendations for handling cook... oval:org.mitre.oval:def:11169 Vulnerability unix
Red Hat Enterprise 3 Squid ACL Bypass Vulnerability oval:org.mitre.oval:def:941 Vulnerability unix
Red Hat Squid ACL Bypass Vulnerability oval:org.mitre.oval:def:877 Vulnerability unix
Squid 2.5 STABLE9 and earlier, when the DNS client port is unfiltered and the environment does not prevent IP spoofing, ... oval:org.mitre.oval:def:9976 Vulnerability unix
Squid 2.5 up to 2.5.STABLE7 allows remote attackers to poison the cache via an HTTP response splitting attack. oval:org.mitre.oval:def:10998 Vulnerability unix
Squid 2.5 up to 2.5.STABLE7 allows remote attackers to poison the cache via an HTTP response splitting attack. oval:org.mitre.oval:def:9573 Vulnerability unix
Squid 2.5 up to 2.5.STABLE7 allows remote attackers to poison the cache via an HTTP response splitting attack. oval:org.mitre.oval:def:11605 Vulnerability unix
Total number of results : 45
Page : 1 (This Page) 2

OVAL Definitions By Referenced Objects

How does it work?   User agreement and privacy statement   About & Contact
CVE is a registred trademark of the MITRE Corporation and the authoritive source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritive source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritive source of OVAL content is MITRE's OVAL web site.
Warning: This site and all data are provided as is. It is not guaranteed that all information is accurate and complete. Use any information provided on this site at your own risk. By using this site you accept that you know that these data are provided as is and not guaranteed to be accurate, correct or complete. All trademarks appearing on this site are the property of their respective owners in the US or other countries. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss. PLEASE SEE nvd.nist.gov and oval.mitre.org for more details about OVAL language and definitions.
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor/web site owner/maintainer be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
Use of OVAL and all related data is subject to terms of use defined by Mitre at http://oval.mitre.org/oval/about/termsofuse.html