CVE-2024-33427

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
CVSS

No CVSS.

References

No reference.

Configurations

No configuration.

History

26 May 2024, 22:15

Type Values Removed Values Added
Summary (en) Buffer Overflow vulnerability in Squid version before v.6.10 allows a local attacker cause a denial of service via a improper check of string in function ConfigParser::UnQuote. (en) Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
References
  • {'url': 'http://squid.com', 'source': 'cve@mitre.org'}
  • {'url': 'https://github.com/squid-cache/squid/pull/1763', 'source': 'cve@mitre.org'}

24 May 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-24 16:15

Updated : 2024-05-26 22:15


NVD link : CVE-2024-33427

Mitre link : CVE-2024-33427

CVE.ORG link : CVE-2024-33427


JSON object : View

Products Affected

No product.

CWE

No CWE.