Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-28543

CVSS 4.0 · Medium EPSS 0.92% · P76
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-28543

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Varnish varnish-modules before 0.17.1 allows remote attackers to cause a denial of service (daemon restart) in some configurations. This does not affect organizations that only install the Varnish Cache product; however, it is common to install both Varnish Cache and varnish-modules. Specifically, an assertion failure or NULL pointer dereference can be triggered in Varnish Cache through the varnish-modules header.append() and header.copy() functions. For some Varnish Configuration Language (VCL) files, this gives remote clients an opportunity to cause a Varnish Cache restart. A restart reduces overall availability and performance due to an increased number of cache misses, and may cause higher load on backend servers.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Martin Blix Grydeland varnish-modules 代码问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Martin Blix Grydeland varnish-modules是 (Martin Blix Grydeland)开源的一个应用软件。用于描述具有其他功能的HTTP请求/响应策略。 varnish-modules 存在安全漏洞,该漏洞允许远程攻击者在某些配置中导致拒绝服务(守护进程重启)。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2021-28543

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-28543

登录查看更多情报信息。

Same Patch Batch · n/a · 2021-03-16 · 15 CVEs total

CVE-2020-24263Portainer 权限许可和访问控制问题漏洞
CVE-2020-24264Portainer 访问控制错误漏洞
CVE-2021-22887Pulse Secure PSA5000 and PSA7000 安全漏洞
CVE-2021-25916Paul Humphreys patchmerge 安全漏洞
CVE-2021-27938Silverstripe CMS 跨站脚本漏洞
CVE-2020-28899ZyXEL LTE4506-M606 访问控制错误漏洞
CVE-2021-28380TYPO3 跨站脚本漏洞
CVE-2021-28381TYPO3 SQL注入漏洞
CVE-2021-28294Egavilan Media Bakeshop Online Ordering System 代码问题漏洞
CVE-2021-28295Egavilan Media Bakeshop Online Ordering System SQL注入漏洞
CVE-2021-3127NATS Server 访问控制错误漏洞
CVE-2021-20218Rohan Kumar kubernetes-client 路径遍历漏洞
CVE-2019-3897红帽 Red Hat 安全漏洞
CVE-2021-3344Red Hat OpenShift Container Platform 安全漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2021-28543

No comments yet


Leave a comment