Show filters
224 Total Results
Displaying 71-80 of 224
Sort by:
Attacker Value
Unknown

CVE-2022-48367

Disclosure Date: March 12, 2023 (last updated October 08, 2023)
An issue was discovered in eZ Publish Ibexa Kernel before 7.5.28. Access control based on object state is mishandled.
Attacker Value
Unknown

CVE-2023-27478

Disclosure Date: March 07, 2023 (last updated October 08, 2023)
libmemcached-awesome is an open source C/C++ client library and tools for the memcached server. `libmemcached` could return data for a previously requested key, if that previous request timed out due to a low `POLL_TIMEOUT`. This issue has been addressed in version 1.1.4. Users are advised to upgrade. There are several ways to workaround or lower the probability of this bug affecting a given deployment. 1: use a reasonably high `POLL_TIMEOUT` setting, like the default. 2: use separate libmemcached connections for unrelated data. 3: do not re-use libmemcached connections in an unknown state.
Attacker Value
Unknown

CVE-2021-37519

Disclosure Date: February 03, 2023 (last updated October 08, 2023)
Buffer Overflow vulnerability in authfile.c memcached 1.6.9 allows attackers to cause a denial of service via crafted authenticattion file.
Attacker Value
Unknown

CVE-2022-25881

Disclosure Date: January 31, 2023 (last updated February 14, 2025)
This affects versions of the package http-cache-semantics before 4.1.1. The issue can be exploited via malicious request header values sent to a server, when that server reads the cache policy from the request using this library.
Attacker Value
Unknown

CVE-2022-45059

Disclosure Date: November 09, 2022 (last updated November 08, 2023)
An issue was discovered in Varnish Cache 7.x before 7.1.2 and 7.2.x before 7.2.1. A request smuggling attack can be performed on Varnish Cache servers by requesting that certain headers are made hop-by-hop, preventing the Varnish Cache servers from forwarding critical headers to the backend.
Attacker Value
Unknown

CVE-2022-45060

Disclosure Date: November 09, 2022 (last updated November 08, 2023)
An HTTP Request Forgery issue was discovered in Varnish Cache 5.x and 6.x before 6.0.11, 7.x before 7.1.2, and 7.2.x before 7.2.1. An attacker may introduce characters through HTTP/2 pseudo-headers that are invalid in the context of an HTTP/1 request line, causing the Varnish server to produce invalid HTTP/1 requests to the backend. This could, in turn, be used to exploit vulnerabilities in a server behind the Varnish server. Note: the 6.0.x LTS series (before 6.0.11) is affected.
Attacker Value
Unknown

CVE-2022-38150

Disclosure Date: August 11, 2022 (last updated October 08, 2023)
In Varnish Cache 7.0.0, 7.0.1, 7.0.2, and 7.1.0, it is possible to cause the Varnish Server to assert and automatically restart through forged HTTP/1 backend responses. An attack uses a crafted reason phrase of the backend response status line. This is fixed in 7.0.3 and 7.1.1.
Attacker Value
Unknown

CVE-2022-2091

Disclosure Date: July 11, 2022 (last updated February 24, 2025)
The Cache Images WordPress plugin before 3.2.1 does not implement nonce checks, which could allow attackers to make any logged user upload images via a CSRF attack.
Attacker Value
Unknown

CVE-2022-1765

Disclosure Date: June 13, 2022 (last updated February 23, 2025)
The Hot Linked Image Cacher WordPress plugin through 1.16 is vulnerable to CSRF. This can be used to store / cache images from external domains on the server, which could lead to legal risks (due to copyright violations or licensing rules).
Attacker Value
Unknown

CVE-2022-28198

Disclosure Date: April 29, 2022 (last updated February 23, 2025)
NVIDIA Omniverse Nucleus and Cache contain a vulnerability in its configuration of OpenSSL, where an attacker with physical access to the system can cause arbitrary code execution which can impact confidentiality, integrity, and availability.