Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
varnish-cache varnish vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2019-20637
An issue exists in Varnish Cache prior to 6.0.5 LTS, 6.1.x and 6.2.x prior to 6.2.2, and 6.3.x prior to 6.3.1. It does not clear a pointer between the handling of one client request and the next request within the same connection. This sometimes causes information to be disclosed...
Varnish-cache Varnish Cache
Varnish-software Varnish Cache
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
2.1
CVSSv2
CVE-2013-0345
varnish 3.0.3 uses world-readable permissions for the /var/log/varnish/ directory and the log files in the directory, which allows local users to obtain sensitive information by reading the files. NOTE: some of these details are obtained from third party information.
Varnish Cache Project Varnish Cache 3.0.3
5
CVSSv2
CVE-2020-11653
An issue exists in Varnish Cache prior to 6.0.6 LTS, 6.1.x and 6.2.x prior to 6.2.3, and 6.3.x prior to 6.3.2. It occurs when communication with a TLS termination proxy uses PROXY version 2. There can be an assertion failure and daemon restart, which causes a performance loss.
Varnish-cache Varnish Cache
Varnish-software Varnish Cache
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
Debian Debian Linux 10.0
5
CVSSv2
CVE-2021-28543
Varnish varnish-modules prior to 0.17.1 allows remote malicious users to cause a denial of service (daemon restart) in some configurations. This does not affect organizations that only install the Varnish Cache product; however, it is common to install both Varnish Cache and varn...
Varnish-cache Varnish-modules
Varnish-cache Varnish-modules Klarlack
Fedoraproject Fedora 34
6.4
CVSSv2
CVE-2022-23959
In Varnish Cache prior to 6.6.2 and 7.x prior to 7.0.2, Varnish Cache 6.0 LTS prior to 6.0.10, and and Varnish Enterprise (Cache Plus) 4.1.x prior to 4.1.11r6 and 6.0.x prior to 6.0.9r4, request smuggling can occur for HTTP/1 connections.
Varnish-software Varnich Cache 4.1
Varnish-software Varnich Cache
Varnish Cache Project Varnish Cache
Varnish-software Varnish Cache
Varnish-software Varnish Cache Plus
Fedoraproject Fedora 35
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Debian Debian Linux 11.0
7.5
CVSSv2
CVE-2009-2936
The Command Line Interface (aka Server CLI or administration interface) in the master process in the reverse proxy server in Varnish prior to 2.1.0 does not require authentication for commands received through a TCP port, which allows remote malicious users to (1) execute arbitra...
Varnish.projects.linpro Varnish 1.0.1
Varnish.projects.linpro Varnish 1.1.2
Varnish.projects.linpro Varnish 2.0.5
Varnish.projects.linpro Varnish 2.0.2
Varnish.projects.linpro Varnish 1.0.3
Varnish.projects.linpro Varnish 1.0.4
Varnish.projects.linpro Varnish 2.0.1
Varnish.projects.linpro Varnish 2.0
Varnish.projects.linpro Varnish 0.9.1
Varnish.projects.linpro Varnish 1.0
Varnish.projects.linpro Varnish 2.0.6
Varnish.projects.linpro Varnish 0.9
Varnish.projects.linpro Varnish 2.0.3
Varnish.projects.linpro Varnish 1.0.2
Varnish.projects.linpro Varnish 1.1.1
Varnish.projects.linpro Varnish 1.1
Varnish.projects.linpro Varnish 2.0.4
1 EDB exploit
NA
CVE-2024-30156
Varnish Cache prior to 7.3.2 and 7.4.x prior to 7.4.3 (and prior to 6.0.13 LTS), and Varnish Enterprise 6 prior to 6.0.12r6, allows credits exhaustion for an HTTP/2 connection control flow window, aka a Broke Window Attack.
NA
CVE-2023-1929
The WP Fastest Cache plugin for WordPress is vulnerable to unauthorized data modification due to a missing capability check on the wpfc_purgecache_varnish_callback function in versions up to, and including, 1.1.2. This makes it possible for authenticated attackers with subscriber...
Wpfastestcache Wp Fastest Cache
NA
CVE-2023-1920
The WP Fastest Cache plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.1.2. This is due to missing or incorrect nonce validation on the wpfc_purgecache_varnish_callback function. This makes it possible for unauthenticated malicio...
Wpfastestcache Wp Fastest Cache
NA
CVE-2023-44487
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
Ietf Http 2.0
Nghttp2 Nghttp2
Netty Netty
Envoyproxy Envoy 1.27.0
Envoyproxy Envoy 1.26.4
Envoyproxy Envoy 1.25.9
Envoyproxy Envoy 1.24.10
Eclipse Jetty
Caddyserver Caddy
Golang Http2
Golang Go
Golang Networking
F5 Big-ip Analytics
F5 Big-ip Policy Enforcement Manager
F5 Big-ip Local Traffic Manager
F5 Big-ip Link Controller
F5 Big-ip Global Traffic Manager
F5 Big-ip Fraud Protection Service
F5 Big-ip Domain Name System
F5 Big-ip Application Security Manager
F5 Big-ip Application Acceleration Manager
F5 Big-ip Advanced Firewall Manager
35 Github repositories
2 Articles
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-20065
open redirect
CVE-2024-1086
path traversal
CVE-2024-29825
XXE
CVE-2024-29822
CVE-2024-20696
CVE-2024-3564
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2