Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
varnish cache project varnish cache vulnerabilities and exploits
(subscribe to this query)
9.1
CVSSv3
CVE-2022-23959
In Varnish Cache prior to 6.6.2 and 7.x prior to 7.0.2, Varnish Cache 6.0 LTS prior to 6.0.10, and and Varnish Enterprise (Cache Plus) 4.1.x prior to 4.1.11r6 and 6.0.x prior to 6.0.9r4, request smuggling can occur for HTTP/1 connections.
Varnish-software Varnich Cache 4.1
Varnish-software Varnich Cache
Varnish Cache Project Varnish Cache
Varnish-software Varnish Cache
Varnish-software Varnish Cache Plus
Fedoraproject Fedora 35
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Debian Debian Linux 11.0
9.1
CVSSv3
CVE-2017-8807
vbf_stp_error in bin/varnishd/cache/cache_fetch.c in Varnish HTTP Cache 4.1.x prior to 4.1.9 and 5.x prior to 5.2.1 allows remote malicious users to obtain sensitive information from process memory because a VFP_GetStorage buffer is larger than intended in certain circumstances i...
Varnish-cache Varnish
Varnish Cache Project Varnish Cache
Debian Debian Linux 9.0
7.5
CVSSv3
CVE-2023-44487
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
Ietf Http 2.0
Nghttp2 Nghttp2
Netty Netty
Envoyproxy Envoy 1.27.0
Envoyproxy Envoy 1.26.4
Envoyproxy Envoy 1.25.9
Envoyproxy Envoy 1.24.10
Eclipse Jetty
Caddyserver Caddy
Golang Http2
Golang Go
Golang Networking
F5 Big-ip Analytics
F5 Big-ip Policy Enforcement Manager
F5 Big-ip Local Traffic Manager
F5 Big-ip Link Controller
F5 Big-ip Global Traffic Manager
F5 Big-ip Fraud Protection Service
F5 Big-ip Domain Name System
F5 Big-ip Application Security Manager
F5 Big-ip Application Acceleration Manager
F5 Big-ip Advanced Firewall Manager
35 Github repositories
2 Articles
7.5
CVSSv3
CVE-2022-45060
An HTTP Request Forgery issue exists in Varnish Cache 5.x and 6.x prior to 6.0.11, 7.x prior to 7.1.2, and 7.2.x prior to 7.2.1. An attacker may introduce characters through HTTP/2 pseudo-headers that are invalid in the context of an HTTP/1 request line, causing the Varnish serve...
Varnish-software Varnish Cache Plus 6.0.8
Varnish Cache Project Varnish Cache 7.2.0
Varnish Cache Project Varnish Cache
Varnish-software Varnish Cache Plus 6.0.10
Varnish-software Varnish Cache Plus 6.0.0
Varnish-software Varnish Cache Plus 6.0.1
Varnish-software Varnish Cache Plus 6.0.2
Varnish-software Varnish Cache Plus 6.0.3
Varnish-software Varnish Cache Plus 6.0.4
Varnish-software Varnish Cache Plus 6.0.5
Varnish-software Varnish Cache Plus 6.0.6
Varnish-software Varnish Cache Plus 6.0.7
Varnish-software Varnish Cache Plus 6.0.9
Varnish-software Varnish Cache
Fedoraproject Fedora 35
Fedoraproject Fedora 36
Fedoraproject Fedora 37
Debian Debian Linux 10.0
Debian Debian Linux 11.0
7.5
CVSSv3
CVE-2022-45059
An issue exists in Varnish Cache 7.x prior to 7.1.2 and 7.2.x prior to 7.2.1. A request smuggling attack can be performed on Varnish Cache servers by requesting that certain headers are made hop-by-hop, preventing the Varnish Cache servers from forwarding critical headers to the ...
Varnish Cache Project Varnish Cache 7.2.0
Varnish Cache Project Varnish Cache
Fedoraproject Fedora 35
Fedoraproject Fedora 36
Fedoraproject Fedora 37
3 Github repositories
7.5
CVSSv3
CVE-2022-38150
In Varnish Cache 7.0.0, 7.0.1, 7.0.2, and 7.1.0, it is possible to cause the Varnish Server to assert and automatically restart through forged HTTP/1 backend responses. An attack uses a crafted reason phrase of the backend response status line. This is fixed in 7.0.3 and 7.1.1.
Varnish Cache Project Varnish Cache 7.1.0
Varnish Cache Project Varnish Cache 7.0.2
Varnish Cache Project Varnish Cache 7.0.1
Varnish Cache Project Varnish Cache 7.0.0
Fedoraproject Fedora 35
Fedoraproject Fedora 36
7.5
CVSSv3
CVE-2013-4090
Varnish HTTP cache prior to 3.0.4: ACL bug
Varnish Cache Project Varnish Cache
7.5
CVSSv3
CVE-2019-15892
An issue exists in Varnish Cache prior to 6.0.4 LTS, and 6.1.x and 6.2.x prior to 6.2.1. An HTTP/1 parsing failure allows a remote malicious user to trigger an assert by sending crafted HTTP/1 requests. The assert will cause an automatic restart with a clean cache, which makes it...
Varnish Cache Project Varnish Cache
Varnish-software Varnish Cache
Debian Debian Linux 10.0
7.5
CVSSv3
CVE-2017-12425
An issue exists in Varnish HTTP Cache 4.0.1 up to and including 4.0.4, 4.1.0 up to and including 4.1.7, 5.0.0, and 5.1.0 up to and including 5.1.2. A wrong if statement in the varnishd source code means that particular invalid requests from the client can trigger an assert, relat...
Varnish-cache Varnish 4.0.3
Varnish-cache Varnish 4.0.2
Varnish Cache Project Varnish Cache 4.0.1
Varnish Cache Project Varnish Cache 4.0.4
Varnish Cache Project Varnish Cache 4.0.3
Varnish Cache Project Varnish Cache 4.0.2
Varnish-cache Varnish 4.1.0
Varnish-software Varnish Cache 4.1.0
Varnish-software Varnish Cache 4.1.2
Varnish-software Varnish Cache 4.1.1
Varnish-software Varnish Cache 4.1.4
Varnish-software Varnish Cache 4.1.3
Varnish-software Varnish Cache 4.1.5
Varnish-software Varnish Cache 4.1.6
Varnish-software Varnish Cache 4.1.7
Varnish Cache Project Varnish Cache 5.1.0
Varnish Cache Project Varnish Cache 5.0.0
Varnish Cache Project Varnish Cache 5.1.1
Varnish Cache Project Varnish Cache 5.1.2
7.5
CVSSv3
CVE-2015-8852
Varnish 3.x prior to 3.0.7, when used in certain stacked installations, allows remote malicious users to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a header line terminated by a \r (carriage return) character in conjunction with multiple Content...
Varnish Cache Project Varnish Cache 3.0.0
Varnish Cache Project Varnish Cache 3.0.6
Varnish Cache Project Varnish Cache 3.0.5
Varnish Cache Project Varnish Cache 3.0.2
Varnish Cache Project Varnish Cache 3.0.4
Varnish Cache Project Varnish Cache 3.0.3
Varnish Cache Project Varnish Cache 3.0.1
Debian Debian Linux 7.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »