label

package

Versions in this module

v1
Dec 10, 2021 GO-2022-0325 +16 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Alert  GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
Alert  GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Oct 7, 2021 GO-2022-0325 +16 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Alert  GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
Alert  GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Oct 6, 2021 GO-2022-0325 +16 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Alert  GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
Alert  GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Oct 4, 2021 GO-2022-0325 +16 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Alert  GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
Alert  GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Apr 8, 2021 GO-2022-0325 +16 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Alert  GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
Alert  GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Mar 29, 2021 GO-2022-0325 +16 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Alert  GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
Alert  GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Jan 13, 2021 GO-2022-0325 +16 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Alert  GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
Alert  GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Jan 13, 2021 GO-2022-0325 +16 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Alert  GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
Alert  GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Jul 28, 2020 GO-2022-0325 +16 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Alert  GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
Alert  GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Jul 15, 2020 GO-2022-0325 +16 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Alert  GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
Alert  GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Mar 25, 2020 GO-2022-0325 +16 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Alert  GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
Alert  GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Mar 23, 2020 GO-2022-0325 +16 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Alert  GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
Alert  GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Mar 18, 2020 GO-2022-0325 +16 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Alert  GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
Alert  GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Feb 20, 2020 GO-2022-0325 +16 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Alert  GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
Alert  GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Dec 10, 2019 GO-2022-0325 +16 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Alert  GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
Alert  GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Oct 28, 2019 GO-2022-0325 +16 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Alert  GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
Alert  GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Sep 26, 2019 GO-2022-0325 +16 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Alert  GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
Alert  GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Sep 23, 2019 GO-2022-0325 +16 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Alert  GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
Alert  GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Sep 13, 2019 GO-2022-0325 +16 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Alert  GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
Alert  GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Sep 12, 2019 GO-2022-0325 +16 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Alert  GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
Alert  GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Aug 14, 2019 GO-2022-0325 +16 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Alert  GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
Alert  GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Aug 8, 2019 GO-2022-0325 +16 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Alert  GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
Alert  GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
May 29, 2019 GO-2022-0325 +16 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Alert  GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
Alert  GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Apr 26, 2019 GO-2022-0325 +17 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-1919: Containous Traefik Exposes Password Hashes in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Alert  GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
Alert  GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Mar 28, 2019 GO-2022-0325 +17 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-1919: Containous Traefik Exposes Password Hashes in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Alert  GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
Alert  GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Feb 11, 2019 GO-2022-0325 +17 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-1919: Containous Traefik Exposes Password Hashes in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Alert  GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
Alert  GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Jan 29, 2019 GO-2022-0325 +17 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-1919: Containous Traefik Exposes Password Hashes in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Alert  GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
Alert  GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Jan 8, 2019 GO-2022-0325 +17 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-1919: Containous Traefik Exposes Password Hashes in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Alert  GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
Alert  GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Dec 14, 2018 GO-2022-0325 +17 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-1919: Containous Traefik Exposes Password Hashes in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Alert  GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
Alert  GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Dec 3, 2018 GO-2022-0325 +17 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-1919: Containous Traefik Exposes Password Hashes in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Alert  GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
Alert  GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Oct 30, 2018 GO-2022-0325 +17 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-1919: Containous Traefik Exposes Password Hashes in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Alert  GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
Alert  GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Oct 15, 2018 GO-2022-0325 +17 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-1919: Containous Traefik Exposes Password Hashes in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Alert  GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
Alert  GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Oct 4, 2018 GO-2022-0325 +17 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-1919: Containous Traefik Exposes Password Hashes in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Alert  GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
Alert  GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Sep 28, 2018 GO-2022-0325 +17 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-1919: Containous Traefik Exposes Password Hashes in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Alert  GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
Alert  GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Sep 24, 2018 GO-2022-0325 +17 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-1919: Containous Traefik Exposes Password Hashes in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Alert  GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
Alert  GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Changes in this version
Sep 18, 2018 GO-2022-0325 +16 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Alert  GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
Alert  GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Sep 7, 2018 GO-2022-0325 +16 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Alert  GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
Alert  GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Aug 1, 2018 GO-2022-0325 +16 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Alert  GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
Alert  GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Jul 17, 2018 GO-2022-0325 +16 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Alert  GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
Alert  GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Jul 9, 2018 GO-2022-0325 +16 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Alert  GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
Alert  GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Aug 20, 2018 GO-2022-0325 +16 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Alert  GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
Alert  GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Jul 10, 2018 GO-2022-0325 +17 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-1950: Traefik Missing Authentication in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Alert  GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
Alert  GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Jun 15, 2018 GO-2022-0325 +17 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-1950: Traefik Missing Authentication in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Alert  GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
Alert  GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Jun 5, 2018 GO-2022-0325 +17 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-1950: Traefik Missing Authentication in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Alert  GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
Alert  GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
May 22, 2018 GO-2022-0325 +17 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-1950: Traefik Missing Authentication in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Alert  GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
Alert  GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
May 14, 2018 GO-2022-0325 +17 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-1950: Traefik Missing Authentication in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Alert  GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
Alert  GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Apr 30, 2018 GO-2022-0325 +17 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-1950: Traefik Missing Authentication in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Alert  GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
Alert  GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Changes in this version
Apr 17, 2018 GO-2022-0325 +16 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Alert  GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
Alert  GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Apr 12, 2018 GO-2022-0325 +16 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Alert  GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
Alert  GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Apr 4, 2018 GO-2022-0325 +16 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Alert  GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
Alert  GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Mar 28, 2018 GO-2022-0325 +16 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Alert  GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
Alert  GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Mar 27, 2018 GO-2022-0325 +16 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Alert  GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
Alert  GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik
Mar 26, 2018 GO-2022-0325 +16 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Alert  GO-2024-3299: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
Alert  GO-2024-3342: Traefik affected by CVE-2024-53259 in github.com/traefik/traefik

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL