Affected by GO-2022-0325
and 15 other vulnerabilities
GO-2022-0325 : Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
GO-2022-0808 : Improper Certificate Handling in github.com/containous/traefik
GO-2022-0923 : Header dropping in traefik in github.com/traefik/traefik
GO-2022-1152 : Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
GO-2022-1154 : Traefik may display authorization header in the debug logs in github.com/traefik/traefik
GO-2023-1950 : Traefik Missing Authentication in github.com/traefik/traefik
GO-2023-2376 : Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
GO-2023-2377 : Traefik docker container using 100% CPU in github.com/traefik/traefik
GO-2023-2381 : Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
GO-2024-2722 : Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
GO-2024-2726 : Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
GO-2024-2880 : Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
GO-2024-2917 : Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
GO-2024-2941 : ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
GO-2024-2973 : Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
GO-2024-3135 : HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
The highest tagged major version is
v3 .
Discover Packages
github.com/traefik/traefik
autogen
gentemplates
package
Version:
v1.6.3
Opens a new window with list of versions in this module.
Published: Jun 5, 2018
License: MIT
Opens a new window with license information.
Imports: 6
Opens a new window with list of imports.
Imported by: 6
Opens a new window with list of known importers.
Documentation
Documentation
¶
Asset loads and returns the asset for the given name.
It returns an error if the asset could not be found or
could not be loaded.
AssetDir returns the file names below a certain
directory embedded in the file by go-bindata.
For example if you run go-bindata on data/... and data contains the
following hierarchy:
data/
foo.txt
img/
a.png
b.png
then AssetDir("data") would return []string{"foo.txt", "img"}
AssetDir("data/img") would return []string{"a.png", "b.png"}
AssetDir("foo.txt") and AssetDir("notexist") would return an error
AssetDir("") will return []string{"data"}.
AssetInfo loads and returns the asset info for the given name.
It returns an error if the asset could not be found or
could not be loaded.
AssetNames returns the names of the assets.
MustAsset is like Asset but panics when Asset would return an error.
It simplifies safe initialization of global variables.
RestoreAsset restores an asset under the given directory
RestoreAssets restores an asset under the given directory recursively
Source Files
¶
Click to show internal directories.
Click to hide internal directories.