Show filters
22 Total Results
Displaying 11-20 of 22
Sort by:
Attacker Value
Unknown

CVE-2013-4090

Disclosure Date: February 12, 2020 (last updated February 21, 2025)
Varnish HTTP cache before 3.0.4: ACL bug
Attacker Value
Unknown

CVE-2019-10778

Disclosure Date: January 08, 2020 (last updated February 21, 2025)
devcert-sanscache before 0.4.7 allows remote attackers to execute arbitrary code or cause a Command Injection via the exec function. The variable `commonName` controlled by user input is used as part of the `exec` function without any sanitization.
Attacker Value
Unknown

CVE-2019-15892

Disclosure Date: September 03, 2019 (last updated November 08, 2023)
An issue was discovered in Varnish Cache before 6.0.4 LTS, and 6.1.x and 6.2.x before 6.2.1. An HTTP/1 parsing failure allows a remote attacker to trigger an assert by sending crafted HTTP/1 requests. The assert will cause an automatic restart with a clean cache, which makes it a Denial of Service attack.
0
Attacker Value
Unknown

CVE-2019-7539

Disclosure Date: March 21, 2019 (last updated November 27, 2024)
A code injection issue was discovered in ipycache through 2016-05-31.
0
Attacker Value
Unknown

CVE-2017-8807

Disclosure Date: November 16, 2017 (last updated November 26, 2024)
vbf_stp_error in bin/varnishd/cache/cache_fetch.c in Varnish HTTP Cache 4.1.x before 4.1.9 and 5.x before 5.2.1 allows remote attackers to obtain sensitive information from process memory because a VFP_GetStorage buffer is larger than intended in certain circumstances involving -sfile Stevedore transient objects.
Attacker Value
Unknown

CVE-2017-12425

Disclosure Date: August 04, 2017 (last updated November 26, 2024)
An issue was discovered in Varnish HTTP Cache 4.0.1 through 4.0.4, 4.1.0 through 4.1.7, 5.0.0, and 5.1.0 through 5.1.2. A wrong if statement in the varnishd source code means that particular invalid requests from the client can trigger an assert, related to an Integer Overflow. This causes the varnishd worker process to abort and restart, losing the cached contents in the process. An attacker can therefore crash the varnishd worker process on demand and effectively keep it from serving content - a Denial-of-Service attack. The specific source-code filename containing the incorrect statement varies across releases.
0
Attacker Value
Unknown

CVE-2017-8933

Disclosure Date: May 15, 2017 (last updated November 08, 2023)
Libmenu-cache 1.0.2 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (menu unavailability).
0
Attacker Value
Unknown

CVE-2015-8852

Disclosure Date: April 25, 2016 (last updated November 25, 2024)
Varnish 3.x before 3.0.7, when used in certain stacked installations, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a header line terminated by a \r (carriage return) character in conjunction with multiple Content-Length headers in an HTTP request.
0
Attacker Value
Unknown

CVE-2013-0345

Disclosure Date: May 08, 2014 (last updated November 08, 2023)
varnish 3.0.3 uses world-readable permissions for the /var/log/varnish/ directory and the log files in the directory, which allows local users to obtain sensitive information by reading the files. NOTE: some of these details are obtained from third party information.
0
Attacker Value
Unknown

CVE-2013-4484

Disclosure Date: November 01, 2013 (last updated October 05, 2023)
Varnish before 3.0.5 allows remote attackers to cause a denial of service (child-process crash and temporary caching outage) via a GET request with trailing whitespace characters and no URI.
0