Vigilance.fr - Squid: memory corruption via ESI Reverse Proxy, analyzed on 26/06/2024
An attacker can trigger a memory corruption of Squid, via ESI Reverse Proxy, in order to trigger a denial of service, and possibly to run code. - Security Vulnerability

An attacker can trigger a memory corruption of Squid, via ESI Reverse Proxy, in order to trigger a denial of service, and possibly to run code.