Security: traefik/traefik
Security Advisories
View known security vulnerabilities and report new vulnerabilities privately to maintainers.
-
Fix CVE-2023-45288 - HTTP/2 CONTINUATION flood in net/httpGHSA-7f4j-64p6-5h5v published
Apr 15, 2024 by nmenginModerate -
Possible DoS vulnerability with Content-length headerGHSA-4vwx-54mw-vqfw published
Apr 12, 2024 by mmaturHigh -
Potential DDoS whith ACME HTTPChallengeGHSA-8g85-whqh-cr2f published
Dec 4, 2023 by nmenginModerate -
Uses 100% CPU after request to with host `traefik-service`GHSA-6fwg-jrfw-ff7p published
Dec 4, 2023 by nmenginModerate -
Incorrect processing of fragment in the URL leads to Authorization BypassGHSA-fvhj-4qfh-q2hm published
Dec 4, 2023 by nmenginLow -
HTTP/2 request could cause a deny of serviceGHSA-7v4p-328v-8v5g published
Oct 12, 2023 by nmenginModerate -
HTTP header parsing could cause a deny of serviceGHSA-7hj9-rv74-5g92 published
Apr 11, 2023 by nmenginHigh -
Authorization header displayed in the debug logsGHSA-h2ph-vhm7-g4hp published
Dec 8, 2022 by ldezModerate -
Routes exposed with an empty TLSOptionGHSA-468w-8x39-gj5v published
Dec 8, 2022 by ldezHigh -
HTTP/2 connections management could cause a deny of serviceGHSA-c6hx-pjc3-7fqr published
Oct 10, 2022 by nmenginHigh