Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
varnish-cache varnish cache vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2024-30156
Varnish Cache prior to 7.3.2 and 7.4.x prior to 7.4.3 (and prior to 6.0.13 LTS), and Varnish Enterprise 6 prior to 6.0.12r6, allows credits exhaustion for an HTTP/2 connection control flow window, aka a Broke Window Attack.
7.5
CVSSv3
CVE-2023-44487
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
Ietf Http 2.0
Nghttp2 Nghttp2
Netty Netty
Envoyproxy Envoy 1.27.0
Envoyproxy Envoy 1.26.4
Envoyproxy Envoy 1.25.9
Envoyproxy Envoy 1.24.10
Eclipse Jetty
Caddyserver Caddy
Golang Http2
Golang Go
Golang Networking
F5 Big-ip Analytics
F5 Big-ip Policy Enforcement Manager
F5 Big-ip Local Traffic Manager
F5 Big-ip Link Controller
F5 Big-ip Global Traffic Manager
F5 Big-ip Fraud Protection Service
F5 Big-ip Domain Name System
F5 Big-ip Application Security Manager
F5 Big-ip Application Acceleration Manager
F5 Big-ip Advanced Firewall Manager
34 Github repositories
2 Articles
4.3
CVSSv3
CVE-2023-1929
The WP Fastest Cache plugin for WordPress is vulnerable to unauthorized data modification due to a missing capability check on the wpfc_purgecache_varnish_callback function in versions up to, and including, 1.1.2. This makes it possible for authenticated attackers with subscriber...
Wpfastestcache Wp Fastest Cache
4.3
CVSSv3
CVE-2023-1920
The WP Fastest Cache plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.1.2. This is due to missing or incorrect nonce validation on the wpfc_purgecache_varnish_callback function. This makes it possible for unauthenticated malicio...
Wpfastestcache Wp Fastest Cache
7.5
CVSSv3
CVE-2022-45059
An issue exists in Varnish Cache 7.x prior to 7.1.2 and 7.2.x prior to 7.2.1. A request smuggling attack can be performed on Varnish Cache servers by requesting that certain headers are made hop-by-hop, preventing the Varnish Cache servers from forwarding critical headers to the ...
Varnish Cache Project Varnish Cache 7.2.0
Varnish Cache Project Varnish Cache
Fedoraproject Fedora 35
Fedoraproject Fedora 36
Fedoraproject Fedora 37
3 Github repositories
7.5
CVSSv3
CVE-2022-45060
An HTTP Request Forgery issue exists in Varnish Cache 5.x and 6.x prior to 6.0.11, 7.x prior to 7.1.2, and 7.2.x prior to 7.2.1. An attacker may introduce characters through HTTP/2 pseudo-headers that are invalid in the context of an HTTP/1 request line, causing the Varnish serve...
Varnish-software Varnish Cache Plus 6.0.8
Varnish Cache Project Varnish Cache 7.2.0
Varnish Cache Project Varnish Cache
Varnish-software Varnish Cache Plus 6.0.10
Varnish-software Varnish Cache Plus 6.0.0
Varnish-software Varnish Cache Plus 6.0.1
Varnish-software Varnish Cache Plus 6.0.2
Varnish-software Varnish Cache Plus 6.0.3
Varnish-software Varnish Cache Plus 6.0.4
Varnish-software Varnish Cache Plus 6.0.5
Varnish-software Varnish Cache Plus 6.0.6
Varnish-software Varnish Cache Plus 6.0.7
Varnish-software Varnish Cache Plus 6.0.9
Varnish-software Varnish Cache
Fedoraproject Fedora 35
Fedoraproject Fedora 36
Fedoraproject Fedora 37
Debian Debian Linux 10.0
Debian Debian Linux 11.0
7.5
CVSSv3
CVE-2022-38150
In Varnish Cache 7.0.0, 7.0.1, 7.0.2, and 7.1.0, it is possible to cause the Varnish Server to assert and automatically restart through forged HTTP/1 backend responses. An attack uses a crafted reason phrase of the backend response status line. This is fixed in 7.0.3 and 7.1.1.
Varnish Cache Project Varnish Cache 7.1.0
Varnish Cache Project Varnish Cache 7.0.2
Varnish Cache Project Varnish Cache 7.0.1
Varnish Cache Project Varnish Cache 7.0.0
Fedoraproject Fedora 35
Fedoraproject Fedora 36
9.1
CVSSv3
CVE-2022-23959
In Varnish Cache prior to 6.6.2 and 7.x prior to 7.0.2, Varnish Cache 6.0 LTS prior to 6.0.10, and and Varnish Enterprise (Cache Plus) 4.1.x prior to 4.1.11r6 and 6.0.x prior to 6.0.9r4, request smuggling can occur for HTTP/1 connections.
Varnish-software Varnich Cache 4.1
Varnish-software Varnich Cache
Varnish Cache Project Varnish Cache
Varnish-software Varnish Cache
Varnish-software Varnish Cache Plus
Fedoraproject Fedora 35
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Debian Debian Linux 11.0
6.5
CVSSv3
CVE-2021-36740
Varnish Cache, with HTTP/2 enabled, allows request smuggling and VCL authorization bypass via a large Content-Length header for a POST request. This affects Varnish Enterprise 6.0.x prior to 6.0.8r3, and Varnish Cache 5.x and 6.x prior to 6.5.2, 6.6.x prior to 6.6.1, and 6.0 LTS ...
Varnish-cache Varnish Cache
Varnish-cache Varnish Cache 6.0.8
Varnish Cache Project Varnish Cache
Varnish-software Varnish Cache
Fedoraproject Fedora 33
Fedoraproject Fedora 34
Debian Debian Linux 10.0
Debian Debian Linux 11.0
8 Github repositories
7.5
CVSSv3
CVE-2021-28543
Varnish varnish-modules prior to 0.17.1 allows remote malicious users to cause a denial of service (daemon restart) in some configurations. This does not affect organizations that only install the Varnish Cache product; however, it is common to install both Varnish Cache and varn...
Varnish-cache Varnish-modules
Varnish-cache Varnish-modules Klarlack
Fedoraproject Fedora 34
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
blind SQL injection
CVE-2006-4304
CVE-2023-26603
CVE-2024-28327
CVE-2023-50363
CVE-2024-21905
template injection
CVE-2024-3400
cross-site request forgery
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »