Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
varnish-software varnish cache vulnerabilities and exploits
(subscribe to this query)
9.1
CVSSv3
CVE-2022-23959
In Varnish Cache prior to 6.6.2 and 7.x prior to 7.0.2, Varnish Cache 6.0 LTS prior to 6.0.10, and and Varnish Enterprise (Cache Plus) 4.1.x prior to 4.1.11r6 and 6.0.x prior to 6.0.9r4, request smuggling can occur for HTTP/1 connections.
Varnish-software Varnich Cache 4.1
Varnish-software Varnich Cache
Varnish Cache Project Varnish Cache
Varnish-software Varnish Cache
Varnish-software Varnish Cache Plus
Fedoraproject Fedora 35
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Debian Debian Linux 11.0
7.5
CVSSv3
CVE-2022-45060
An HTTP Request Forgery issue exists in Varnish Cache 5.x and 6.x prior to 6.0.11, 7.x prior to 7.1.2, and 7.2.x prior to 7.2.1. An attacker may introduce characters through HTTP/2 pseudo-headers that are invalid in the context of an HTTP/1 request line, causing the Varnish serve...
Varnish-software Varnish Cache Plus 6.0.8
Varnish Cache Project Varnish Cache 7.2.0
Varnish Cache Project Varnish Cache
Varnish-software Varnish Cache Plus 6.0.10
Varnish-software Varnish Cache Plus 6.0.0
Varnish-software Varnish Cache Plus 6.0.1
Varnish-software Varnish Cache Plus 6.0.2
Varnish-software Varnish Cache Plus 6.0.3
Varnish-software Varnish Cache Plus 6.0.4
Varnish-software Varnish Cache Plus 6.0.5
Varnish-software Varnish Cache Plus 6.0.6
Varnish-software Varnish Cache Plus 6.0.7
Varnish-software Varnish Cache Plus 6.0.9
Varnish-software Varnish Cache
Fedoraproject Fedora 35
Fedoraproject Fedora 36
Fedoraproject Fedora 37
Debian Debian Linux 10.0
Debian Debian Linux 11.0
7.5
CVSSv3
CVE-2020-11653
An issue exists in Varnish Cache prior to 6.0.6 LTS, 6.1.x and 6.2.x prior to 6.2.3, and 6.3.x prior to 6.3.2. It occurs when communication with a TLS termination proxy uses PROXY version 2. There can be an assertion failure and daemon restart, which causes a performance loss.
Varnish-cache Varnish Cache
Varnish-software Varnish Cache
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
Debian Debian Linux 10.0
7.5
CVSSv3
CVE-2019-20637
An issue exists in Varnish Cache prior to 6.0.5 LTS, 6.1.x and 6.2.x prior to 6.2.2, and 6.3.x prior to 6.3.1. It does not clear a pointer between the handling of one client request and the next request within the same connection. This sometimes causes information to be disclosed...
Varnish-cache Varnish Cache
Varnish-software Varnish Cache
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
7.5
CVSSv3
CVE-2019-15892
An issue exists in Varnish Cache prior to 6.0.4 LTS, and 6.1.x and 6.2.x prior to 6.2.1. An HTTP/1 parsing failure allows a remote malicious user to trigger an assert by sending crafted HTTP/1 requests. The assert will cause an automatic restart with a clean cache, which makes it...
Varnish Cache Project Varnish Cache
Varnish-software Varnish Cache
Debian Debian Linux 10.0
7.5
CVSSv3
CVE-2017-12425
An issue exists in Varnish HTTP Cache 4.0.1 up to and including 4.0.4, 4.1.0 up to and including 4.1.7, 5.0.0, and 5.1.0 up to and including 5.1.2. A wrong if statement in the varnishd source code means that particular invalid requests from the client can trigger an assert, relat...
Varnish-cache Varnish 4.0.3
Varnish-cache Varnish 4.0.2
Varnish Cache Project Varnish Cache 4.0.1
Varnish Cache Project Varnish Cache 4.0.4
Varnish Cache Project Varnish Cache 4.0.3
Varnish Cache Project Varnish Cache 4.0.2
Varnish-cache Varnish 4.1.0
Varnish-software Varnish Cache 4.1.0
Varnish-software Varnish Cache 4.1.2
Varnish-software Varnish Cache 4.1.1
Varnish-software Varnish Cache 4.1.4
Varnish-software Varnish Cache 4.1.3
Varnish-software Varnish Cache 4.1.5
Varnish-software Varnish Cache 4.1.6
Varnish-software Varnish Cache 4.1.7
Varnish Cache Project Varnish Cache 5.1.0
Varnish Cache Project Varnish Cache 5.0.0
Varnish Cache Project Varnish Cache 5.1.1
Varnish Cache Project Varnish Cache 5.1.2
6.5
CVSSv3
CVE-2021-36740
Varnish Cache, with HTTP/2 enabled, allows request smuggling and VCL authorization bypass via a large Content-Length header for a POST request. This affects Varnish Enterprise 6.0.x prior to 6.0.8r3, and Varnish Cache 5.x and 6.x prior to 6.5.2, 6.6.x prior to 6.6.1, and 6.0 LTS ...
Varnish-cache Varnish Cache
Varnish-cache Varnish Cache 6.0.8
Varnish Cache Project Varnish Cache
Varnish-software Varnish Cache
Fedoraproject Fedora 33
Fedoraproject Fedora 34
Debian Debian Linux 10.0
Debian Debian Linux 11.0
8 Github repositories
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3201
CVE-2024-4779
CVE-2024-35090
CVE-2024-5084
hard-coded
CVE-2024-4985
HTML injection
CVE-2024-33655
local file inclusion
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started