NA

CVE-2023-33933

Published: 14/06/2023 Updated: 30/06/2023
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Software Foundation Apache Traffic Server.This issue affects Apache Traffic Server: from 8.0.0 up to and including 9.2.0. 8.x users should upgrade to 8.1.7 or later versions 9.x users should upgrade to 9.2.1 or later versions

Vulnerable Product Search on Vulmon Subscribe to Product

apache traffic server

Vendor Advisories

Debian Bug report logs - #1038248 trafficserver: CVE-2022-47184 CVE-2023-30631 CVE-2023-33933 Package: src:trafficserver; Maintainer for src:trafficserver is Jean Baptiste Favre <debian@jbfavreorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 16 Jun 2023 18:45:01 UTC Severity: important Tags: se ...
Several vulnerabilities were discovered in Apache Traffic Server, a reverse and forward proxy server, which could result in information disclosure or denial of service For the stable distribution (bookworm), these problems have been fixed in version 920+ds-2+deb12u1 This is a no change rebuild of the update from DSA-5435-1 with a corrected vers ...
Several vulnerabilities were discovered in Apache Traffic Server, a reverse and forward proxy server, which could result in information disclosure or denial of service For the oldstable distribution (bullseye), these problems have been fixed in version 817+ds-1~deb11u1 For the stable distribution (bookworm), these problems have been fixed in ve ...