
CVE-2023-44487 – HTTP/2 Rapid Reset Attack Vulnerability
https://notcve.org/view.php?id=CVE-2023-44487
10 Oct 2023 — The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023. El protocolo HTTP/2 permite una denegación de servicio (consumo de recursos del servidor) porque la cancelación de solicitudes puede restablecer muchas transmisiones rápidamente, como se explotó en la naturaleza entre agosto y octubre de 2023. A flaw was found in handling multiplexed streams in the HTTP/2 protocol. ... • https://github.com/imabee101/CVE-2023-44487 • CWE-400: Uncontrolled Resource Consumption •

CVE-2022-25881 – http-cache-semantics < 4.1.1 - Regular Expression Denial of Service (ReDoS)
https://notcve.org/view.php?id=CVE-2022-25881
31 Jan 2023 — This affects versions of the package http-cache-semantics before 4.1.1. The issue can be exploited via malicious request header values sent to a server, when that server reads the cache policy from the request using this library. Esto afecta a las versiones del paquete http-cache-semantics anteriores a la 4.1.1. El problema se puede explotar mediante valores de encabezado de solicitud maliciosos enviados a un servidor, cuando ese servidor lee la política de caché de la solicitud utilizando esta librería. A ... • https://github.com/kornelski/http-cache-semantics/blob/master/index.js%23L83 • CWE-1333: Inefficient Regular Expression Complexity •

CVE-2022-45059
https://notcve.org/view.php?id=CVE-2022-45059
09 Nov 2022 — An issue was discovered in Varnish Cache 7.x before 7.1.2 and 7.2.x before 7.2.1. A request smuggling attack can be performed on Varnish Cache servers by requesting that certain headers are made hop-by-hop, preventing the Varnish Cache servers from forwarding critical headers to the backend. Se descubrió un problema en Varnish Cache 7.x anterior a la versión 7.1.2 y 7.2.x anterior a la versión 7.2.1. Se puede realizar un ataque de tráfico ilegal de solicitudes en los servidores Varnish Cache solicitando que... • https://github.com/martinvks/CVE-2022-45059-demo • CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') •

CVE-2022-45060 – varnish: Request Forgery Vulnerability
https://notcve.org/view.php?id=CVE-2022-45060
09 Nov 2022 — An HTTP Request Forgery issue was discovered in Varnish Cache 5.x and 6.x before 6.0.11, 7.x before 7.1.2, and 7.2.x before 7.2.1. An attacker may introduce characters through HTTP/2 pseudo-headers that are invalid in the context of an HTTP/1 request line, causing the Varnish server to produce invalid HTTP/1 requests to the backend. This could, in turn, be used to exploit vulnerabilities in a server behind the Varnish server. Note: the 6.0.x LTS series (before 6.0.11) is affected. Se descubrió un problema d... • https://docs.varnish-software.com/security/VSV00011 • CWE-20: Improper Input Validation CWE-918: Server-Side Request Forgery (SSRF) •

CVE-2022-38150
https://notcve.org/view.php?id=CVE-2022-38150
11 Aug 2022 — In Varnish Cache 7.0.0, 7.0.1, 7.0.2, and 7.1.0, it is possible to cause the Varnish Server to assert and automatically restart through forged HTTP/1 backend responses. An attack uses a crafted reason phrase of the backend response status line. This is fixed in 7.0.3 and 7.1.1. En Varnish Cache versiones 7.0.0, 7.0.1, 7.0.2 y 7.1.0, es posible causar que el servidor Varnish sea afirmado y reiniciado automáticamente mediante respuestas backend HTTP/1 falsificadas. Un ataque usa una frase de razón diseñada de... • https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M4KVVCIQVINQQ2D7ORNARSYALMJUMP3I •

CVE-2022-2091 – Cache Images < 3.2.1 - Image Upload / Import via CSRF
https://notcve.org/view.php?id=CVE-2022-2091
20 Jun 2022 — The Cache Images WordPress plugin before 3.2.1 does not implement nonce checks, which could allow attackers to make any logged user upload images via a CSRF attack. El plugin Cache Images de WordPress versiones anteriores a 3.2.1, no implementa comprobaciones de nonce, lo que podría permitir a atacantes hacer que cualquier usuario registrado cargue imágenes por medio de un ataque de tipo CSRF The Cache Images plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, ... • https://wpscan.com/vulnerability/03e7c2dc-1c6d-4cff-af59-6b41ead74978 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVE-2022-23959 – varnish: HTTP/1 request smuggling vulnerability
https://notcve.org/view.php?id=CVE-2022-23959
26 Jan 2022 — In Varnish Cache before 6.6.2 and 7.x before 7.0.2, Varnish Cache 6.0 LTS before 6.0.10, and and Varnish Enterprise (Cache Plus) 4.1.x before 4.1.11r6 and 6.0.x before 6.0.9r4, request smuggling can occur for HTTP/1 connections. En Varnish Cache versiones anteriores a 6.6.2 y 7.x versiones anteriores a 7.0.2, Varnish Cache 6.0 LTS versiones anteriores a 6.0.10, y Varnish Enterprise (Cache Plus) 4.1.x versiones anteriores a 4.1.11r6 y 6.0.x versiones anteriores a 6.0.9r4, puede producirse contrabando de peti... • https://docs.varnish-software.com/security/VSV00008 • CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') •

CVE-2020-36448
https://notcve.org/view.php?id=CVE-2020-36448
08 Aug 2021 — An issue was discovered in the cache crate through 2020-11-24 for Rust. There are unconditional implementations of Send and Sync for Cache<K>. Se ha detectado un problema en la crate cache hasta el 24-11-2020 para Rust. Se presentan implementaciones incondicionales de Send y Sync para la función Cache(K) • https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/cache/RUSTSEC-2020-0128.md • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVE-2021-36740 – varnish: HTTP/2 request smuggling attack via a large Content-Length header for a POST request
https://notcve.org/view.php?id=CVE-2021-36740
14 Jul 2021 — Varnish Cache, with HTTP/2 enabled, allows request smuggling and VCL authorization bypass via a large Content-Length header for a POST request. This affects Varnish Enterprise 6.0.x before 6.0.8r3, and Varnish Cache 5.x and 6.x before 6.5.2, 6.6.x before 6.6.1, and 6.0 LTS before 6.0.8. Varnish Cache, con HTTP/2 habilitado, permite el contrabando de peticiones y la omisión de autorización de VCL por medio de un encabezado Content-Length grande para una petición POST. Esto afecta a Varnish Enterprise version... • https://docs.varnish-software.com/security/VSV00007 • CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') •

CVE-2021-25903
https://notcve.org/view.php?id=CVE-2021-25903
22 Jan 2021 — An issue was discovered in the cache crate through 2021-01-01 for Rust. A raw pointer is dereferenced. Se detectó un problema en la crate cache versiones hasta el 01-01-2021 para Rust. Un puntero sin procesar es desreferenciado • https://rustsec.org/advisories/RUSTSEC-2021-0006.html • CWE-476: NULL Pointer Dereference •