FreshPorts - VuXML
This page displays vulnerability information about FreeBSD Ports.
The VUXML data was last processed by FreshPorts on 2024-12-02 20:06:50 UTC
List all Vulnerabilities, by package
List all Vulnerabilities, by date
k68
These are the vulnerabilities relating to the commit you have selected:
VuXML ID | Description |
5b8d8dee-6088-11ed-8c5e-641c67a117d8 | varnish -- HTTP/2 Request Forgery Vulnerability
Varnish Cache Project reports:
A request forgery attack can be performed on Varnish Cache servers that
have the HTTP/2 protocol turned on. An attacker may introduce
characters through the HTTP/2 pseudo-headers that are invalid in the
context of an HTTP/1 request line, causing the Varnish server to
produce invalid HTTP/1 requests to the backend. This may in turn be
used to successfully exploit vulnerabilities in a server behind the
Varnish server.
Discovery 2022-11-08 Entry 2022-11-09 varnish7
< 7.2.1
varnish6
<= 6.6.2
https://varnish-cache.org/security/VSV00011.html
|
f25a34b1-910d-11ee-a1a2-641c67a117d8 | varnish -- HTTP/2 Rapid Reset Attack
Varnish Cache Project reports:
A denial of service attack can be performed on Varnish Cache servers
that have the HTTP/2 protocol turned on. An attacker can create a large
volume of streams and immediately reset them without ever reaching the
maximum number of concurrent streams allowed for the session, causing
the Varnish server to consume unnecessary resources processing requests
for which the response will not be delivered.
Discovery 2023-11-13 Entry 2023-12-02 varnish7
< 7.4.2
varnish6
< 6.6.3
CVE-2023-44487
https://varnish-cache.org/security/VSV00013.html
|