Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
varnish cache project varnish cache vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv2
CVE-2019-15892
An issue exists in Varnish Cache prior to 6.0.4 LTS, and 6.1.x and 6.2.x prior to 6.2.1. An HTTP/1 parsing failure allows a remote malicious user to trigger an assert by sending crafted HTTP/1 requests. The assert will cause an automatic restart with a clean cache, which makes it...
Varnish Cache Project Varnish Cache
Varnish-software Varnish Cache
Debian Debian Linux 10.0
6.4
CVSSv2
CVE-2022-23959
In Varnish Cache prior to 6.6.2 and 7.x prior to 7.0.2, Varnish Cache 6.0 LTS prior to 6.0.10, and and Varnish Enterprise (Cache Plus) 4.1.x prior to 4.1.11r6 and 6.0.x prior to 6.0.9r4, request smuggling can occur for HTTP/1 connections.
Varnish-software Varnich Cache 4.1
Varnish-software Varnich Cache
Varnish Cache Project Varnish Cache
Varnish-software Varnish Cache
Varnish-software Varnish Cache Plus
Fedoraproject Fedora 35
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Debian Debian Linux 11.0
6.4
CVSSv2
CVE-2021-36740
Varnish Cache, with HTTP/2 enabled, allows request smuggling and VCL authorization bypass via a large Content-Length header for a POST request. This affects Varnish Enterprise 6.0.x prior to 6.0.8r3, and Varnish Cache 5.x and 6.x prior to 6.5.2, 6.6.x prior to 6.6.1, and 6.0 LTS ...
Varnish-cache Varnish Cache
Varnish-cache Varnish Cache 6.0.8
Varnish Cache Project Varnish Cache
Varnish-software Varnish Cache
Fedoraproject Fedora 33
Fedoraproject Fedora 34
Debian Debian Linux 10.0
Debian Debian Linux 11.0
8 Github repositories
6.4
CVSSv2
CVE-2017-8807
vbf_stp_error in bin/varnishd/cache/cache_fetch.c in Varnish HTTP Cache 4.1.x prior to 4.1.9 and 5.x prior to 5.2.1 allows remote malicious users to obtain sensitive information from process memory because a VFP_GetStorage buffer is larger than intended in certain circumstances i...
Varnish-cache Varnish
Varnish Cache Project Varnish Cache
Debian Debian Linux 9.0
5
CVSSv2
CVE-2013-4090
Varnish HTTP cache prior to 3.0.4: ACL bug
Varnish Cache Project Varnish Cache
5
CVSSv2
CVE-2017-12425
An issue exists in Varnish HTTP Cache 4.0.1 up to and including 4.0.4, 4.1.0 up to and including 4.1.7, 5.0.0, and 5.1.0 up to and including 5.1.2. A wrong if statement in the varnishd source code means that particular invalid requests from the client can trigger an assert, relat...
Varnish-cache Varnish 4.0.3
Varnish-cache Varnish 4.0.2
Varnish Cache Project Varnish Cache 4.0.1
Varnish Cache Project Varnish Cache 4.0.4
Varnish Cache Project Varnish Cache 4.0.3
Varnish Cache Project Varnish Cache 4.0.2
Varnish-cache Varnish 4.1.0
Varnish-software Varnish Cache 4.1.0
Varnish-software Varnish Cache 4.1.2
Varnish-software Varnish Cache 4.1.1
Varnish-software Varnish Cache 4.1.4
Varnish-software Varnish Cache 4.1.3
Varnish-software Varnish Cache 4.1.5
Varnish-software Varnish Cache 4.1.6
Varnish-software Varnish Cache 4.1.7
Varnish Cache Project Varnish Cache 5.1.0
Varnish Cache Project Varnish Cache 5.0.0
Varnish Cache Project Varnish Cache 5.1.1
Varnish Cache Project Varnish Cache 5.1.2
5
CVSSv2
CVE-2015-8852
Varnish 3.x prior to 3.0.7, when used in certain stacked installations, allows remote malicious users to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a header line terminated by a \r (carriage return) character in conjunction with multiple Content...
Varnish Cache Project Varnish Cache 3.0.0
Varnish Cache Project Varnish Cache 3.0.6
Varnish Cache Project Varnish Cache 3.0.5
Varnish Cache Project Varnish Cache 3.0.2
Varnish Cache Project Varnish Cache 3.0.4
Varnish Cache Project Varnish Cache 3.0.3
Varnish Cache Project Varnish Cache 3.0.1
Debian Debian Linux 7.0
5
CVSSv2
CVE-2013-4484
Varnish prior to 3.0.5 allows remote malicious users to cause a denial of service (child-process crash and temporary caching outage) via a GET request with trailing whitespace characters and no URI.
Varnish-cache Varnish 2.0.0
Varnish Cache Project Varnish Cache 2.0.6
Varnish Cache Project Varnish Cache 2.0.1
Varnish Cache Project Varnish Cache 2.1.1
Varnish Cache Project Varnish Cache 2.0.4
Varnish Cache Project Varnish Cache 3.0.0
Varnish Cache Project Varnish Cache 2.1.2
Varnish Cache Project Varnish Cache 2.1.0
Varnish Cache Project Varnish Cache 2.0.3
Varnish Cache Project Varnish Cache 2.1.5
Varnish Cache Project Varnish Cache 2.0.5
Varnish Cache Project Varnish Cache 3.0.2
Varnish Cache Project Varnish Cache 3.0.1
Varnish Cache Project Varnish Cache
Varnish Cache Project Varnish Cache 3.0.3
Varnish Cache Project Varnish Cache 2.1.4
Varnish Cache Project Varnish Cache 2.1.3
Varnish Cache Project Varnish Cache 2.0.2
2.1
CVSSv2
CVE-2013-0345
varnish 3.0.3 uses world-readable permissions for the /var/log/varnish/ directory and the log files in the directory, which allows local users to obtain sensitive information by reading the files. NOTE: some of these details are obtained from third party information.
Varnish Cache Project Varnish Cache 3.0.3
NA
CVE-2023-44487
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
Ietf Http 2.0
Nghttp2 Nghttp2
Netty Netty
Envoyproxy Envoy 1.27.0
Envoyproxy Envoy 1.26.4
Envoyproxy Envoy 1.25.9
Envoyproxy Envoy 1.24.10
Eclipse Jetty
Caddyserver Caddy
Golang Http2
Golang Go
Golang Networking
F5 Big-ip Analytics
F5 Big-ip Policy Enforcement Manager
F5 Big-ip Local Traffic Manager
F5 Big-ip Link Controller
F5 Big-ip Global Traffic Manager
F5 Big-ip Fraud Protection Service
F5 Big-ip Domain Name System
F5 Big-ip Application Security Manager
F5 Big-ip Application Acceleration Manager
F5 Big-ip Advanced Firewall Manager
35 Github repositories
2 Articles
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
privilege escalation
CVE-2024-20696
CVE-2024-29829
CVE-2024-33999
CVE-2024-35646
physical
CVE-2024-24919
CVE-2024-31030
local users
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »