Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apache traffic server vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2014-10022
Apache Traffic Server prior to 5.1.2 allows remote malicious users to cause a denial of service via unspecified vectors, related to internal buffer sizing.
Apache Traffic Server
7.5
CVSSv3
CVE-2021-41585
Improper Input Validation vulnerability in accepting socket connections in Apache Traffic Server allows an malicious user to make the server stop accepting new connections. This issue affects Apache Traffic Server 5.0.0 to 9.1.0.
Apache Traffic Server
7.5
CVSSv3
CVE-2019-10079
Apache Traffic Server is vulnerable to HTTP/2 setting flood attacks. Earlier versions of Apache Traffic Server didn't limit the number of setting frames sent from the client using the HTTP/2 protocol. Users should upgrade to Apache Traffic Server 7.1.7, 8.0.4, or later versi...
Apache Traffic Server
9.8
CVSSv3
CVE-2015-3249
The HTTP/2 experimental feature in Apache Traffic Server 5.3.x prior to 5.3.1 allows remote malicious users to cause a denial of service (out-of-bounds access and daemon crash) or possibly execute arbitrary code via vectors related to the (1) frame_handlers array or (2) set_dynam...
Apache Traffic Server 5.3.0
9.8
CVSSv3
CVE-2014-3624
Apache Traffic Server 5.1.x prior to 5.1.1 allows remote malicious users to bypass access restrictions by leveraging failure to properly tunnel remap requests using CONNECT.
Apache Traffic Server 5.1.0
7.5
CVSSv3
CVE-2021-27737
Apache Traffic Server 9.0.0 is vulnerable to a remote DOS attack on the experimental Slicer plugin.
Apache Traffic Server 9.0.0
9.8
CVSSv3
CVE-2019-17565
There is a vulnerability in Apache Traffic Server 6.0.0 to 6.2.3, 7.0.0 to 7.1.8, and 8.0.0 to 8.0.5 with a smuggling attack and chunked encoding. Upgrade to versions 7.1.9 and 8.0.6 or later versions.
Apache Traffic Server
Debian Debian Linux 10.0
7.5
CVSSv3
CVE-2021-32567
Improper Input Validation vulnerability in HTTP/2 of Apache Traffic Server allows an malicious user to DOS the server. This issue affects Apache Traffic Server 7.0.0 to 7.1.12, 8.0.0 to 8.1.1, 9.0.0 to 9.0.1.
Apache Traffic Server
Debian Debian Linux 10.0
7.5
CVSSv3
CVE-2022-31778
Improper Input Validation vulnerability in handling the Transfer-Encoding header of Apache Traffic Server allows an malicious user to poison the cache. This issue affects Apache Traffic Server 8.0.0 to 9.0.2.
Apache Traffic Server
Debian Debian Linux 11.0
7.5
CVSSv3
CVE-2020-9494
Apache Traffic Server 6.0.0 to 6.2.3, 7.0.0 to 7.1.10, and 8.0.0 to 8.0.7 is vulnerable to certain types of HTTP/2 HEADERS frames that can cause the server to allocate a large amount of memory and spin the thread.
Apache Traffic Server
Debian Debian Linux 10.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4671
unauthorized
CVE-2024-4776
CVE-2024-3407
CVE-2024-26026
CVE-2024-32888
wireless
CVE-2024-4656
template injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »