Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
varnish-cache varnish cache vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2019-20637
An issue exists in Varnish Cache prior to 6.0.5 LTS, 6.1.x and 6.2.x prior to 6.2.2, and 6.3.x prior to 6.3.1. It does not clear a pointer between the handling of one client request and the next request within the same connection. This sometimes causes information to be disclosed...
Varnish-cache Varnish Cache
Varnish-software Varnish Cache
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
7.5
CVSSv3
CVE-2020-11653
An issue exists in Varnish Cache prior to 6.0.6 LTS, 6.1.x and 6.2.x prior to 6.2.3, and 6.3.x prior to 6.3.2. It occurs when communication with a TLS termination proxy uses PROXY version 2. There can be an assertion failure and daemon restart, which causes a performance loss.
Varnish-cache Varnish Cache
Varnish-software Varnish Cache
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
Debian Debian Linux 10.0
7.5
CVSSv3
CVE-2013-4090
Varnish HTTP cache prior to 3.0.4: ACL bug
Varnish Cache Project Varnish Cache
7.5
CVSSv3
CVE-2019-15892
An issue exists in Varnish Cache prior to 6.0.4 LTS, and 6.1.x and 6.2.x prior to 6.2.1. An HTTP/1 parsing failure allows a remote malicious user to trigger an assert by sending crafted HTTP/1 requests. The assert will cause an automatic restart with a clean cache, which makes it...
Varnish Cache Project Varnish Cache
Varnish-software Varnish Cache
Debian Debian Linux 10.0
9.1
CVSSv3
CVE-2017-8807
vbf_stp_error in bin/varnishd/cache/cache_fetch.c in Varnish HTTP Cache 4.1.x prior to 4.1.9 and 5.x prior to 5.2.1 allows remote malicious users to obtain sensitive information from process memory because a VFP_GetStorage buffer is larger than intended in certain circumstances i...
Varnish-cache Varnish
Varnish Cache Project Varnish Cache
Debian Debian Linux 9.0
7.5
CVSSv3
CVE-2017-12425
An issue exists in Varnish HTTP Cache 4.0.1 up to and including 4.0.4, 4.1.0 up to and including 4.1.7, 5.0.0, and 5.1.0 up to and including 5.1.2. A wrong if statement in the varnishd source code means that particular invalid requests from the client can trigger an assert, relat...
Varnish-cache Varnish 4.0.3
Varnish-cache Varnish 4.0.2
Varnish Cache Project Varnish Cache 4.0.1
Varnish Cache Project Varnish Cache 4.0.4
Varnish Cache Project Varnish Cache 4.0.3
Varnish Cache Project Varnish Cache 4.0.2
Varnish-cache Varnish 4.1.0
Varnish-software Varnish Cache 4.1.0
Varnish-software Varnish Cache 4.1.2
Varnish-software Varnish Cache 4.1.1
Varnish-software Varnish Cache 4.1.4
Varnish-software Varnish Cache 4.1.3
Varnish-software Varnish Cache 4.1.5
Varnish-software Varnish Cache 4.1.6
Varnish-software Varnish Cache 4.1.7
Varnish Cache Project Varnish Cache 5.1.0
Varnish Cache Project Varnish Cache 5.0.0
Varnish Cache Project Varnish Cache 5.1.1
Varnish Cache Project Varnish Cache 5.1.2
7.5
CVSSv3
CVE-2015-8852
Varnish 3.x prior to 3.0.7, when used in certain stacked installations, allows remote malicious users to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a header line terminated by a \r (carriage return) character in conjunction with multiple Content...
Varnish Cache Project Varnish Cache 3.0.0
Varnish Cache Project Varnish Cache 3.0.6
Varnish Cache Project Varnish Cache 3.0.5
Varnish Cache Project Varnish Cache 3.0.2
Varnish Cache Project Varnish Cache 3.0.4
Varnish Cache Project Varnish Cache 3.0.3
Varnish Cache Project Varnish Cache 3.0.1
Debian Debian Linux 7.0
NA
CVE-2013-0345
varnish 3.0.3 uses world-readable permissions for the /var/log/varnish/ directory and the log files in the directory, which allows local users to obtain sensitive information by reading the files. NOTE: some of these details are obtained from third party information.
Varnish Cache Project Varnish Cache 3.0.3
NA
CVE-2013-4484
Varnish prior to 3.0.5 allows remote malicious users to cause a denial of service (child-process crash and temporary caching outage) via a GET request with trailing whitespace characters and no URI.
Varnish-cache Varnish 2.0.0
Varnish Cache Project Varnish Cache 2.0.6
Varnish Cache Project Varnish Cache 2.0.1
Varnish Cache Project Varnish Cache 2.1.1
Varnish Cache Project Varnish Cache 2.0.4
Varnish Cache Project Varnish Cache 3.0.0
Varnish Cache Project Varnish Cache 2.1.2
Varnish Cache Project Varnish Cache 2.1.0
Varnish Cache Project Varnish Cache 2.0.3
Varnish Cache Project Varnish Cache 2.1.5
Varnish Cache Project Varnish Cache 2.0.5
Varnish Cache Project Varnish Cache 3.0.2
Varnish Cache Project Varnish Cache 3.0.1
Varnish Cache Project Varnish Cache
Varnish Cache Project Varnish Cache 3.0.3
Varnish Cache Project Varnish Cache 2.1.4
Varnish Cache Project Varnish Cache 2.1.3
Varnish Cache Project Varnish Cache 2.0.2
NA
CVE-2009-2936
The Command Line Interface (aka Server CLI or administration interface) in the master process in the reverse proxy server in Varnish prior to 2.1.0 does not require authentication for commands received through a TCP port, which allows remote malicious users to (1) execute arbitra...
Varnish.projects.linpro Varnish 1.0.1
Varnish.projects.linpro Varnish 1.1.2
Varnish.projects.linpro Varnish 2.0.5
Varnish.projects.linpro Varnish 2.0.2
Varnish.projects.linpro Varnish 1.0.3
Varnish.projects.linpro Varnish 1.0.4
Varnish.projects.linpro Varnish 2.0.1
Varnish.projects.linpro Varnish 2.0
Varnish.projects.linpro Varnish 0.9.1
Varnish.projects.linpro Varnish 1.0
Varnish.projects.linpro Varnish 2.0.6
Varnish.projects.linpro Varnish 0.9
Varnish.projects.linpro Varnish 2.0.3
Varnish.projects.linpro Varnish 1.0.2
Varnish.projects.linpro Varnish 1.1.1
Varnish.projects.linpro Varnish 1.1
Varnish.projects.linpro Varnish 2.0.4
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4654
CVE-2023-49606
encryption
NULL pointer dereference
CVE-2024-4439
CVE-2024-4649
race condition
CVE-2024-27202
CVE-2024-34566
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2