middlewares

package

Versions in this module

v1
Dec 10, 2021 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Oct 7, 2021 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Oct 6, 2021 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Oct 4, 2021 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Apr 8, 2021 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Mar 29, 2021 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Jan 13, 2021 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Jan 13, 2021 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Jul 28, 2020 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Jul 15, 2020 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Mar 25, 2020 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Mar 23, 2020 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Mar 18, 2020 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Feb 20, 2020 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Dec 10, 2019 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Oct 28, 2019 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Sep 26, 2019 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Sep 23, 2019 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Sep 13, 2019 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Sep 12, 2019 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Aug 14, 2019 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Aug 8, 2019 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
May 29, 2019 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Apr 26, 2019 GO-2022-0325 +15 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-1919: Containous Traefik Exposes Password Hashes in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Mar 28, 2019 GO-2022-0325 +15 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-1919: Containous Traefik Exposes Password Hashes in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Feb 11, 2019 GO-2022-0325 +15 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-1919: Containous Traefik Exposes Password Hashes in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Jan 29, 2019 GO-2022-0325 +15 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-1919: Containous Traefik Exposes Password Hashes in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Jan 8, 2019 GO-2022-0325 +15 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-1919: Containous Traefik Exposes Password Hashes in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Dec 14, 2018 GO-2022-0325 +15 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-1919: Containous Traefik Exposes Password Hashes in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Dec 3, 2018 GO-2022-0325 +15 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-1919: Containous Traefik Exposes Password Hashes in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Oct 30, 2018 GO-2022-0325 +15 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-1919: Containous Traefik Exposes Password Hashes in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Oct 15, 2018 GO-2022-0325 +15 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-1919: Containous Traefik Exposes Password Hashes in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Oct 4, 2018 GO-2022-0325 +15 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-1919: Containous Traefik Exposes Password Hashes in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Sep 28, 2018 GO-2022-0325 +15 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-1919: Containous Traefik Exposes Password Hashes in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Sep 24, 2018 GO-2022-0325 +15 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-1919: Containous Traefik Exposes Password Hashes in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Sep 18, 2018 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Sep 7, 2018 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Aug 1, 2018 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Jul 17, 2018 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Jul 9, 2018 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Aug 20, 2018 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Jul 10, 2018 GO-2022-0325 +15 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-1950: Traefik Missing Authentication in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Jun 15, 2018 GO-2022-0325 +15 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-1950: Traefik Missing Authentication in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Jun 5, 2018 GO-2022-0325 +15 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-1950: Traefik Missing Authentication in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
May 22, 2018 GO-2022-0325 +15 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-1950: Traefik Missing Authentication in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
May 14, 2018 GO-2022-0325 +15 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-1950: Traefik Missing Authentication in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Apr 30, 2018 GO-2022-0325 +15 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-1950: Traefik Missing Authentication in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Apr 17, 2018 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Apr 12, 2018 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Apr 4, 2018 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Mar 28, 2018 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Mar 27, 2018 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Mar 26, 2018 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Mar 15, 2018 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Feb 27, 2018 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Feb 12, 2018 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Jan 29, 2018 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Jan 23, 2018 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Jan 15, 2018 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Jan 4, 2018 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Dec 20, 2017 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Dec 6, 2017 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Nov 28, 2017 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Jan 2, 2018 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Dec 6, 2017 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Nov 23, 2017 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Nov 14, 2017 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Nov 2, 2017 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Oct 24, 2017 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Oct 16, 2017 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Changes in this version
Oct 10, 2017 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Oct 2, 2017 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Sep 18, 2017 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Sep 8, 2017 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Aug 29, 2017 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Sep 7, 2017 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Aug 25, 2017 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Aug 22, 2017 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Aug 1, 2017 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Jul 27, 2017 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Jul 6, 2017 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Jun 29, 2017 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Jun 16, 2017 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
May 31, 2017 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
May 24, 2017 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
May 16, 2017 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
May 5, 2017 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Apr 13, 2017 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Apr 11, 2017 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Mar 27, 2017 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Mar 21, 2017 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Mar 1, 2017 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Feb 6, 2017 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Dec 15, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Nov 29, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Nov 17, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Nov 10, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Oct 26, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Oct 19, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Sep 30, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Sep 22, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Aug 2, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Jul 19, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Jul 5, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Changes in this version
Jun 23, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Jun 7, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
May 30, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
May 30, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
May 30, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
May 27, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
May 26, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
May 25, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
May 25, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
May 23, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
May 23, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
May 23, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
May 19, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
May 19, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
May 19, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
May 18, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
May 13, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
May 13, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
May 12, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
May 12, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
May 10, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
May 9, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
May 7, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
May 5, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
May 5, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
May 3, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
May 3, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
May 2, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Apr 28, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Apr 27, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Apr 27, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Apr 27, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Apr 25, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Apr 22, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Apr 22, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Apr 20, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Apr 19, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Apr 19, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Apr 19, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Apr 16, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Apr 16, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Apr 15, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Apr 15, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Apr 13, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Apr 13, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Apr 13, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Apr 13, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Apr 13, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Apr 13, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Apr 12, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Apr 8, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Apr 7, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Apr 7, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Apr 6, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Apr 6, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Apr 5, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Apr 5, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Apr 4, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Apr 2, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Apr 1, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Apr 1, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Mar 31, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Mar 30, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Mar 29, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Mar 28, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Mar 25, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Mar 23, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Mar 23, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Mar 21, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Mar 16, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Mar 14, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Mar 14, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Mar 9, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik
Mar 9, 2016 GO-2022-0325 +14 more
Alert  GO-2022-0325: Skip the router TLS configuration when the host header is an FQDN in github.com/traefik/traefik
Alert  GO-2022-0808: Improper Certificate Handling in github.com/containous/traefik
Alert  GO-2022-0923: Header dropping in traefik in github.com/traefik/traefik
Alert  GO-2022-1152: Traefik routes exposed with an empty TLSOption in github.com/traefik/traefik
Alert  GO-2022-1154: Traefik may display authorization header in the debug logs in github.com/traefik/traefik
Alert  GO-2023-2376: Traefik incorrectly processes fragment in the URL, leads to Authorization Bypass in github.com/traefik/traefik
Alert  GO-2023-2377: Traefik docker container using 100% CPU in github.com/traefik/traefik
Alert  GO-2023-2381: Traefik vulnerable to potential DDoS via ACME HTTPChallenge in github.com/traefik/traefik
Alert  GO-2024-2722: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
Alert  GO-2024-2726: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
Alert  GO-2024-2880: Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik
Alert  GO-2024-2917: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
Alert  GO-2024-2941: ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik
Alert  GO-2024-2973: Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik
Alert  GO-2024-3135: HTTP client can manipulate custom HTTP headers that are added by Traefik in github.com/traefik/traefik

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL