Show filters
22 Total Results
Displaying 1-10 of 22
Sort by:
Attacker Value
Unknown

CVE-2023-44487

Disclosure Date: October 10, 2023 (last updated June 28, 2024)
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
Attacker Value
Unknown

CVE-2022-25881

Disclosure Date: January 31, 2023 (last updated February 24, 2025)
This affects versions of the package http-cache-semantics before 4.1.1. The issue can be exploited via malicious request header values sent to a server, when that server reads the cache policy from the request using this library.
Attacker Value
Unknown

CVE-2022-45059

Disclosure Date: November 09, 2022 (last updated February 24, 2025)
An issue was discovered in Varnish Cache 7.x before 7.1.2 and 7.2.x before 7.2.1. A request smuggling attack can be performed on Varnish Cache servers by requesting that certain headers are made hop-by-hop, preventing the Varnish Cache servers from forwarding critical headers to the backend.
Attacker Value
Unknown

CVE-2022-45060

Disclosure Date: November 09, 2022 (last updated November 08, 2023)
An HTTP Request Forgery issue was discovered in Varnish Cache 5.x and 6.x before 6.0.11, 7.x before 7.1.2, and 7.2.x before 7.2.1. An attacker may introduce characters through HTTP/2 pseudo-headers that are invalid in the context of an HTTP/1 request line, causing the Varnish server to produce invalid HTTP/1 requests to the backend. This could, in turn, be used to exploit vulnerabilities in a server behind the Varnish server. Note: the 6.0.x LTS series (before 6.0.11) is affected.
Attacker Value
Unknown

CVE-2022-38150

Disclosure Date: August 11, 2022 (last updated October 08, 2023)
In Varnish Cache 7.0.0, 7.0.1, 7.0.2, and 7.1.0, it is possible to cause the Varnish Server to assert and automatically restart through forged HTTP/1 backend responses. An attack uses a crafted reason phrase of the backend response status line. This is fixed in 7.0.3 and 7.1.1.
Attacker Value
Unknown

CVE-2022-2091

Disclosure Date: July 11, 2022 (last updated February 24, 2025)
The Cache Images WordPress plugin before 3.2.1 does not implement nonce checks, which could allow attackers to make any logged user upload images via a CSRF attack.
Attacker Value
Unknown

CVE-2022-23959

Disclosure Date: January 26, 2022 (last updated February 23, 2025)
In Varnish Cache before 6.6.2 and 7.x before 7.0.2, Varnish Cache 6.0 LTS before 6.0.10, and and Varnish Enterprise (Cache Plus) 4.1.x before 4.1.11r6 and 6.0.x before 6.0.9r4, request smuggling can occur for HTTP/1 connections.
Attacker Value
Unknown

CVE-2020-36448

Disclosure Date: August 08, 2021 (last updated February 23, 2025)
An issue was discovered in the cache crate through 2020-11-24 for Rust. There are unconditional implementations of Send and Sync for Cache<K>.
Attacker Value
Unknown

CVE-2021-36740

Disclosure Date: July 14, 2021 (last updated February 23, 2025)
Varnish Cache, with HTTP/2 enabled, allows request smuggling and VCL authorization bypass via a large Content-Length header for a POST request. This affects Varnish Enterprise 6.0.x before 6.0.8r3, and Varnish Cache 5.x and 6.x before 6.5.2, 6.6.x before 6.6.1, and 6.0 LTS before 6.0.8.
Attacker Value
Unknown

CVE-2021-25903

Disclosure Date: January 26, 2021 (last updated February 22, 2025)
An issue was discovered in the cache crate through 2021-01-01 for Rust. A raw pointer is dereferenced.