Versions in this module
v1
Dec 10, 2021 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Oct 7, 2021 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Oct 6, 2021 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Oct 4, 2021 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Apr 8, 2021 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Mar 29, 2021 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Jan 13, 2021 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Jan 13, 2021 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Jul 28, 2020 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Jul 15, 2020 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Mar 25, 2020 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Mar 23, 2020 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Mar 18, 2020 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Feb 20, 2020 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Dec 10, 2019 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Oct 28, 2019 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Sep 26, 2019 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Sep 23, 2019 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Sep 13, 2019 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Sep 12, 2019 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Aug 14, 2019 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Aug 8, 2019 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
May 29, 2019 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Apr 26, 2019 GO-2022-0325 +17 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-1919: Containous Traefik Exposes Password Hashes in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Mar 28, 2019 GO-2022-0325 +17 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-1919: Containous Traefik Exposes Password Hashes in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Feb 11, 2019 GO-2022-0325 +17 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-1919: Containous Traefik Exposes Password Hashes in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Jan 29, 2019 GO-2022-0325 +17 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-1919: Containous Traefik Exposes Password Hashes in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Jan 8, 2019 GO-2022-0325 +17 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-1919: Containous Traefik Exposes Password Hashes in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Dec 14, 2018 GO-2022-0325 +17 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-1919: Containous Traefik Exposes Password Hashes in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Dec 3, 2018 GO-2022-0325 +17 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-1919: Containous Traefik Exposes Password Hashes in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Oct 30, 2018 GO-2022-0325 +17 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-1919: Containous Traefik Exposes Password Hashes in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Oct 15, 2018 GO-2022-0325 +17 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-1919: Containous Traefik Exposes Password Hashes in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Oct 4, 2018 GO-2022-0325 +17 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-1919: Containous Traefik Exposes Password Hashes in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Sep 28, 2018 GO-2022-0325 +17 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-1919: Containous Traefik Exposes Password Hashes in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Sep 24, 2018 GO-2022-0325 +17 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-1919: Containous Traefik Exposes Password Hashes in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Sep 18, 2018 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Sep 7, 2018 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Aug 1, 2018 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Jul 17, 2018 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Jul 9, 2018 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Aug 20, 2018 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Jul 10, 2018 GO-2022-0325 +17 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-1950: Traefik Missing Authentication in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Jun 15, 2018 GO-2022-0325 +17 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-1950: Traefik Missing Authentication in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Jun 5, 2018 GO-2022-0325 +17 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-1950: Traefik Missing Authentication in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
May 22, 2018 GO-2022-0325 +17 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-1950: Traefik Missing Authentication in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
May 14, 2018 GO-2022-0325 +17 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-1950: Traefik Missing Authentication in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Apr 30, 2018 GO-2022-0325 +17 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-1950: Traefik Missing Authentication in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Apr 17, 2018 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Apr 12, 2018 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Apr 4, 2018 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Mar 28, 2018 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Mar 27, 2018 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Mar 26, 2018 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Mar 15, 2018 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Feb 27, 2018 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Feb 12, 2018 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Jan 29, 2018 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Jan 23, 2018 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Jan 15, 2018 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Jan 4, 2018 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Dec 20, 2017 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Dec 6, 2017 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Nov 28, 2017 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Jan 2, 2018 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Dec 6, 2017 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Nov 23, 2017 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Nov 14, 2017 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Nov 2, 2017 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Oct 24, 2017 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Oct 16, 2017 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Oct 10, 2017 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Oct 2, 2017 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Sep 18, 2017 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Sep 8, 2017 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Aug 29, 2017 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Sep 7, 2017 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Aug 25, 2017 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Aug 22, 2017 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Aug 1, 2017 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Jul 27, 2017 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Jul 6, 2017 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Jun 29, 2017 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Jun 16, 2017 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
May 31, 2017 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
May 24, 2017 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
May 16, 2017 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
May 5, 2017 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Apr 13, 2017 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Apr 11, 2017 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Mar 27, 2017 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Mar 21, 2017 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Mar 1, 2017 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Feb 6, 2017 GO-2022-0325 +16 more
GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Incompatible versions in this module
Jul 19, 2019
GO-2022-0325
+16 more
Jul 1, 2019
GO-2022-0325
+16 more
Jun 21, 2019
GO-2022-0325
+16 more
Jun 18, 2019
GO-2022-0325
+16 more
Jun 17, 2019
GO-2022-0325
+16 more
Apr 17, 2019
GO-2022-0325
+16 more
Mar 29, 2019
GO-2022-0325
+16 more
Mar 19, 2019
GO-2022-0325
+16 more
Mar 18, 2019
GO-2022-0325
+16 more