Varnish-software

Varnish Cache

13 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 12.04.2026 19:23:03
  • Zuletzt bearbeitet 17.04.2026 14:38:09

Varnish Cache 9 before 9.0.1 allows a "workspace overflow" denial of service (daemon panic) after timeout_linger. A malicious client could send an HTTP/1 request, wait long enough until the session releases its worker thread (timeout_linger) and resu...

  • EPSS 0.06%
  • Veröffentlicht 12.04.2026 19:17:34
  • Zuletzt bearbeitet 17.04.2026 14:35:23

Varnish Cache 9 before 9.0.1 and Varnish Enterprise before 6.0.16r11 allows a "workspace overflow" denial of service (daemon panic) for certain amounts of prefetched data. The setup of an HTTP/2 session starts with a speculative HTTP/1 transport, and...

  • EPSS 0.07%
  • Veröffentlicht 27.03.2026 19:40:28
  • Zuletzt bearbeitet 22.04.2026 19:40:02

Varnish Cache before 8.0.1 and Varnish Enterprise before 6.0.16r12, in certain unchecked req.url scenarios, mishandle URLs with a path of / for HTTP/1.1, potentially leading to cache poisoning or authentication bypass.

  • EPSS 0.86%
  • Veröffentlicht 13.08.2025 12:03:37
  • Zuletzt bearbeitet 15.04.2026 00:35:42

A mismatch caused by client-triggered server-sent stream resets between HTTP/2 specifications and the internal architectures of some HTTP/2 implementations may result in excessive server resource consumption leading to denial-of-service (DoS). By op...

  • EPSS 0.29%
  • Veröffentlicht 13.05.2025 00:00:00
  • Zuletzt bearbeitet 15.04.2026 00:35:42

Varnish Cache before 7.6.3 and 7.7 before 7.7.1, and Varnish Enterprise before 6.0.13r14, allow client-side desync via HTTP/1 requests, because the product incorrectly permits CRLF to be skipped to delimit chunk boundaries.

  • EPSS 0.4%
  • Veröffentlicht 21.03.2025 00:00:00
  • Zuletzt bearbeitet 02.04.2025 22:15:20

Varnish Cache before 7.6.2 and Varnish Enterprise before 6.0.13r10 allow client-side desync via HTTP/1 requests.

  • EPSS 0.83%
  • Veröffentlicht 09.11.2022 06:15:09
  • Zuletzt bearbeitet 01.05.2025 15:15:58

An HTTP Request Forgery issue was discovered in Varnish Cache 5.x and 6.x before 6.0.11, 7.x before 7.1.2, and 7.2.x before 7.2.1. An attacker may introduce characters through HTTP/2 pseudo-headers that are invalid in the context of an HTTP/1 request...

  • EPSS 0.35%
  • Veröffentlicht 26.01.2022 01:15:07
  • Zuletzt bearbeitet 21.11.2024 06:49:32

In Varnish Cache before 6.6.2 and 7.x before 7.0.2, Varnish Cache 6.0 LTS before 6.0.10, and and Varnish Enterprise (Cache Plus) 4.1.x before 4.1.11r6 and 6.0.x before 6.0.9r4, request smuggling can occur for HTTP/1 connections.

  • EPSS 0.71%
  • Veröffentlicht 14.07.2021 17:15:08
  • Zuletzt bearbeitet 21.11.2024 06:13:59

Varnish Cache, with HTTP/2 enabled, allows request smuggling and VCL authorization bypass via a large Content-Length header for a POST request. This affects Varnish Enterprise 6.0.x before 6.0.8r3, and Varnish Cache 5.x and 6.x before 6.5.2, 6.6.x be...

  • EPSS 0.48%
  • Veröffentlicht 08.04.2020 23:15:12
  • Zuletzt bearbeitet 21.11.2024 04:38:56

An issue was discovered in Varnish Cache before 6.0.5 LTS, 6.1.x and 6.2.x before 6.2.2, and 6.3.x before 6.3.1. It does not clear a pointer between the handling of one client request and the next request within the same connection. This sometimes ca...