{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-14T02:09:32.126","vulnerabilities":[{"cve":{"id":"CVE-2024-45802","sourceIdentifier":"security-advisories@github.com","published":"2024-10-28T15:15:04.857","lastModified":"2025-11-03T21:16:21.203","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Squid is an open source caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to Input Validation, Premature Release of Resource During Expected Lifetime, and Missing Release of Resource after Effective Lifetime bugs, Squid is vulnerable to Denial of Service attacks by a trusted server against all clients using the proxy. This bug is fixed in the default build configuration of Squid version 6.10."},{"lang":"es","value":"Squid es un proxy de almacenamiento en caché de código abierto para la Web compatible con HTTP, HTTPS, FTP y más. Debido a errores de validación de entrada, liberación prematura de recursos durante el tiempo de vida útil esperado y falta de liberación de recursos después del tiempo de vida útil efectivo, Squid es vulnerable a ataques de denegación de servicio por parte de un servidor confiable contra todos los clientes que utilicen el proxy. Este error se corrigió en la configuración de compilación predeterminada de la versión 6.10 de Squid."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-20"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0","versionEndExcluding":"6.10","matchCriteriaId":"269E064C-AAF8-4A48-BBAB-76A37C1A0684"}]}]}],"references":[{"url":"https://github.com/squid-cache/squid/security/advisories/GHSA-f975-v7qw-q7hj","source":"security-advisories@github.com","tags":["Mitigation","Third Party Advisory"]},{"url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00009.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://security.netapp.com/advisory/ntap-20250103-0004/","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}