CVE-2025-8671
- EPSS 0.08%
- Veröffentlicht 13.08.2025 12:03:37
- Zuletzt bearbeitet 17.08.2025 15:15:25
A mismatch caused by client-triggered server-sent stream resets between HTTP/2 specifications and the internal architectures of some HTTP/2 implementations may result in excessive server resource consumption leading to denial-of-service (DoS). By op...
CVE-2025-47905
- EPSS 0.06%
- Veröffentlicht 13.05.2025 00:00:00
- Zuletzt bearbeitet 29.05.2025 09:15:26
Varnish Cache before 7.6.3 and 7.7 before 7.7.1, and Varnish Enterprise before 6.0.13r14, allow client-side desync via HTTP/1 requests, because the product incorrectly permits CRLF to be skipped to delimit chunk boundaries.
CVE-2025-30346
- EPSS 0.06%
- Veröffentlicht 21.03.2025 00:00:00
- Zuletzt bearbeitet 02.04.2025 22:15:20
Varnish Cache before 7.6.2 and Varnish Enterprise before 6.0.13r10 allow client-side desync via HTTP/1 requests.
CVE-2022-45060
- EPSS 0.76%
- Veröffentlicht 09.11.2022 06:15:09
- Zuletzt bearbeitet 01.05.2025 15:15:58
An HTTP Request Forgery issue was discovered in Varnish Cache 5.x and 6.x before 6.0.11, 7.x before 7.1.2, and 7.2.x before 7.2.1. An attacker may introduce characters through HTTP/2 pseudo-headers that are invalid in the context of an HTTP/1 request...
CVE-2022-23959
- EPSS 0.51%
- Veröffentlicht 26.01.2022 01:15:07
- Zuletzt bearbeitet 21.11.2024 06:49:32
In Varnish Cache before 6.6.2 and 7.x before 7.0.2, Varnish Cache 6.0 LTS before 6.0.10, and and Varnish Enterprise (Cache Plus) 4.1.x before 4.1.11r6 and 6.0.x before 6.0.9r4, request smuggling can occur for HTTP/1 connections.
CVE-2021-36740
- EPSS 0.12%
- Veröffentlicht 14.07.2021 17:15:08
- Zuletzt bearbeitet 21.11.2024 06:13:59
Varnish Cache, with HTTP/2 enabled, allows request smuggling and VCL authorization bypass via a large Content-Length header for a POST request. This affects Varnish Enterprise 6.0.x before 6.0.8r3, and Varnish Cache 5.x and 6.x before 6.5.2, 6.6.x be...
CVE-2019-20637
- EPSS 0.48%
- Veröffentlicht 08.04.2020 23:15:12
- Zuletzt bearbeitet 21.11.2024 04:38:56
An issue was discovered in Varnish Cache before 6.0.5 LTS, 6.1.x and 6.2.x before 6.2.2, and 6.3.x before 6.3.1. It does not clear a pointer between the handling of one client request and the next request within the same connection. This sometimes ca...
CVE-2020-11653
- EPSS 0.53%
- Veröffentlicht 08.04.2020 23:15:12
- Zuletzt bearbeitet 21.11.2024 04:58:20
An issue was discovered in Varnish Cache before 6.0.6 LTS, 6.1.x and 6.2.x before 6.2.3, and 6.3.x before 6.3.2. It occurs when communication with a TLS termination proxy uses PROXY version 2. There can be an assertion failure and daemon restart, whi...
CVE-2019-15892
- EPSS 5.55%
- Veröffentlicht 03.09.2019 21:15:10
- Zuletzt bearbeitet 21.11.2024 04:29:40
An issue was discovered in Varnish Cache before 6.0.4 LTS, and 6.1.x and 6.2.x before 6.2.1. An HTTP/1 parsing failure allows a remote attacker to trigger an assert by sending crafted HTTP/1 requests. The assert will cause an automatic restart with a...
CVE-2017-12425
- EPSS 0.82%
- Veröffentlicht 04.08.2017 09:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
An issue was discovered in Varnish HTTP Cache 4.0.1 through 4.0.4, 4.1.0 through 4.1.7, 5.0.0, and 5.1.0 through 5.1.2. A wrong if statement in the varnishd source code means that particular invalid requests from the client can trigger an assert, rel...