Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
traffic server vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2018-11783
sslheaders plugin extracts information from the client certificate and sets headers in the request based on the configuration of the plugin. The plugin doesn't strip the headers from the request in some scenarios. This problem exists in versions 6.0.0 to 6.0.3, 7.0.0 to 7.1....
Apache Traffic Server
9.8
CVSSv3
CVE-2021-43082
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in the stats-over-http plugin of Apache Traffic Server allows an malicious user to overwrite memory. This issue affects Apache Traffic Server 9.1.0.
Apache Traffic Server
7.5
CVSSv3
CVE-2020-17508
The ATS ESI plugin has a memory disclosure vulnerability. If you are running the plugin please upgrade. Apache Traffic Server versions 7.0.0 to 7.1.11 and 8.0.0 to 8.1.0 are affected.
Apache Traffic Server
7.5
CVSSv3
CVE-2020-17509
ATS negative cache option is vulnerable to a cache poisoning attack. If you have this option enabled, please upgrade or disable this feature. Apache Traffic Server versions 7.0.0 to 7.1.11 and 8.0.0 to 8.1.0 are affected.
Apache Traffic Server
9.8
CVSSv3
CVE-2014-3624
Apache Traffic Server 5.1.x prior to 5.1.1 allows remote malicious users to bypass access restrictions by leveraging failure to properly tunnel remap requests using CONNECT.
Apache Traffic Server 5.1.0
9.8
CVSSv3
CVE-2015-3249
The HTTP/2 experimental feature in Apache Traffic Server 5.3.x prior to 5.3.1 allows remote malicious users to cause a denial of service (out-of-bounds access and daemon crash) or possibly execute arbitrary code via vectors related to the (1) frame_handlers array or (2) set_dynam...
Apache Traffic Server 5.3.0
7.5
CVSSv3
CVE-2021-27737
Apache Traffic Server 9.0.0 is vulnerable to a remote DOS attack on the experimental Slicer plugin.
Apache Traffic Server 9.0.0
NA
CVE-2003-0292
Cross-site scripting (XSS) vulnerability in Inktomi Traffic-Server 5.5.1 allows remote malicious users to insert arbitrary web script or HTML into an error page that appears to come from the domain that the client is visiting, aka "Man-in-the-Middle" XSS.
Inktomi Inktomi Traffic-server 5.5.1
7.5
CVSSv3
CVE-2022-31778
Improper Input Validation vulnerability in handling the Transfer-Encoding header of Apache Traffic Server allows an malicious user to poison the cache. This issue affects Apache Traffic Server 8.0.0 to 9.0.2.
Apache Traffic Server
Debian Debian Linux 11.0
7.5
CVSSv3
CVE-2021-32565
Invalid values in the Content-Length header sent to Apache Traffic Server allows an malicious user to smuggle requests. This issue affects Apache Traffic Server 7.0.0 to 7.1.12, 8.0.0 to 8.1.1, 9.0.0 to 9.0.1.
Apache Traffic Server
Debian Debian Linux 10.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5248
CVE-2024-3110
CVE-2024-5552
CVE-2024-29415
HTML injection
CVE-2024-3095
TCP
type confusion
CVE-2024-1800
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »