The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Squid Internet Content Adaptation Protocol

Squid 3: denial of service via ICAP
An authenticated attacker can create a denial of service when Squid-cache uses ICAP...
BID-34277, VIGILANCE-VUL-8573
Squid 2: denial of service via ICAP
An authenticated attacker can force ICAP to consume all memory of proxy...
VIGILANCE-VUL-7402
Our database contains other pages. You can request a free trial to read them.

Display information about Squid Internet Content Adaptation Protocol: