Show filters
95 Total Results
Displaying 11-20 of 95
Sort by:
Attacker Value
Unknown
CVE-2023-38522
Disclosure Date: July 26, 2024 (last updated August 13, 2024)
Apache Traffic Server accepts characters that are not allowed for HTTP field names and forwards malformed requests to origin servers. This can be utilized for request smuggling and may also lead cache poisoning if the origin servers are vulnerable.
This issue affects Apache Traffic Server: from 8.0.0 through 8.1.10, from 9.0.0 through 9.2.4.
Users are recommended to upgrade to version 8.1.11 or 9.2.5, which fixes the issue.
0
Attacker Value
Unknown
CVE-2024-31309
Disclosure Date: April 10, 2024 (last updated February 14, 2025)
HTTP/2 CONTINUATION DoS attack can cause Apache Traffic Server to consume more resources on the server. Version from 8.0.0 through 8.1.9, from 9.0.0 through 9.2.3 are affected.
Users can set a new setting (proxy.config.http2.max_continuation_frames_per_minute) to limit the number of CONTINUATION frames per minute. ATS does have a fixed amount of memory a request can use and ATS adheres to these limits in previous releases.
Users are recommended to upgrade to versions 8.1.10 or 9.2.4 which fixes the issue.
0
Attacker Value
Unknown
CVE-2023-41752
Disclosure Date: October 17, 2023 (last updated February 14, 2025)
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Traffic Server.This issue affects Apache Traffic Server: from 8.0.0 through 8.1.8, from 9.0.0 through 9.2.2.
Users are recommended to upgrade to version 8.1.9 or 9.2.3, which fixes the issue.
0
Attacker Value
Unknown
CVE-2023-39456
Disclosure Date: October 17, 2023 (last updated February 14, 2025)
Improper Input Validation vulnerability in Apache Traffic Server with malformed HTTP/2 frames.This issue affects Apache Traffic Server: from 9.0.0 through 9.2.2.
Users are recommended to upgrade to version 9.2.3, which fixes the issue.
0
Attacker Value
Unknown
CVE-2023-33934
Disclosure Date: August 09, 2023 (last updated February 14, 2025)
Improper Input Validation vulnerability in Apache Software Foundation Apache Traffic Server.This issue affects Apache Traffic Server: through 9.2.1.
0
Attacker Value
Unknown
CVE-2022-47185
Disclosure Date: August 09, 2023 (last updated February 14, 2025)
Improper input validation vulnerability on the range header in Apache Software Foundation Apache Traffic Server.This issue affects Apache Traffic Server: through 9.2.1.
0
Attacker Value
Unknown
CVE-2023-33933
Disclosure Date: June 14, 2023 (last updated February 14, 2025)
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Software Foundation Apache Traffic Server.This issue affects Apache Traffic Server: from 8.0.0 through 9.2.0.
8.x users should upgrade to 8.1.7 or later versions
9.x users should upgrade to 9.2.1 or later versions
0
Attacker Value
Unknown
CVE-2023-30631
Disclosure Date: June 14, 2023 (last updated February 14, 2025)
Improper Input Validation vulnerability in Apache Software Foundation Apache Traffic Server. The configuration option proxy.config.http.push_method_enabled didn't function. However, by default the PUSH method is blocked in the ip_allow configuration file.This issue affects Apache Traffic Server: from 8.0.0 through 9.2.0.
8.x users should upgrade to 8.1.7 or later versions
9.x users should upgrade to 9.2.1 or later versions
0
Attacker Value
Unknown
CVE-2022-47184
Disclosure Date: June 14, 2023 (last updated February 14, 2025)
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Software Foundation Apache Traffic Server.This issue affects Apache Traffic Server: 8.0.0 to 9.2.0.
0
Attacker Value
Unknown
CVE-2022-40743
Disclosure Date: December 19, 2022 (last updated October 08, 2023)
Improper Input Validation vulnerability for the xdebug plugin in Apache Software Foundation Apache Traffic Server can lead to cross site scripting and cache poisoning attacks.This issue affects Apache Traffic Server: 9.0.0 to 9.1.3. Users should upgrade to 9.1.4 or later versions.
0