Apache

Traffic Server

82 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.82%
  • Veröffentlicht 14.11.2024 10:15:08
  • Zuletzt bearbeitet 03.11.2025 21:17:19

Unchecked return value can allow Apache Traffic Server to retain privileges on startup. This issue affects Apache Traffic Server: from 9.2.0 through 9.2.5, from 10.0.0 through 10.0.1. Users are recommended to upgrade to version 9.2.6 or 10.0.2, whi...

  • EPSS 0.32%
  • Veröffentlicht 14.11.2024 10:15:08
  • Zuletzt bearbeitet 04.06.2025 16:15:49

Valid Host header field can cause Apache Traffic Server to crash on some platforms. This issue affects Apache Traffic Server: from 9.2.0 through 9.2.5. Users are recommended to upgrade to version 9.2.6, which fixes the issue, or 10.0.2, which does ...

  • EPSS 0.57%
  • Veröffentlicht 14.11.2024 10:15:05
  • Zuletzt bearbeitet 03.11.2025 21:16:14

Improper Input Validation vulnerability in Apache Traffic Server. This issue affects Apache Traffic Server: from 8.0.0 through 8.1.11, from 9.0.0 through 9.2.5. Users are recommended to upgrade to version 9.2.6, which fixes the issue, or 10.0.2, wh...

  • EPSS 0.12%
  • Veröffentlicht 26.07.2024 10:15:02
  • Zuletzt bearbeitet 03.11.2025 22:16:56

Invalid Accept-Encoding header can cause Apache Traffic Server to fail cache lookup and force forwarding requests. This issue affects Apache Traffic Server: from 8.0.0 through 8.1.10, from 9.0.0 through 9.2.4. Users are recommended to upgrade to ve...

  • EPSS 0.45%
  • Veröffentlicht 26.07.2024 10:15:02
  • Zuletzt bearbeitet 03.11.2025 22:16:55

Apache Traffic Server forwards malformed HTTP chunked trailer section to origin servers. This can be utilized for request smuggling and may also lead cache poisoning if the origin servers are vulnerable. This issue affects Apache Traffic Server: fro...

  • EPSS 0.49%
  • Veröffentlicht 26.07.2024 10:15:01
  • Zuletzt bearbeitet 03.11.2025 22:16:24

Apache Traffic Server accepts characters that are not allowed for HTTP field names and forwards malformed requests to origin servers. This can be utilized for request smuggling and may also lead cache poisoning if the origin servers are vulnerable. ...

  • EPSS 10.85%
  • Veröffentlicht 10.04.2024 12:15:09
  • Zuletzt bearbeitet 04.11.2025 19:17:08

HTTP/2 CONTINUATION DoS attack can cause Apache Traffic Server to consume more resources on the server.  Version from 8.0.0 through 8.1.9, from 9.0.0 through 9.2.3 are affected. Users can set a new setting (proxy.config.http2.max_continuation_frames...

  • EPSS 0.35%
  • Veröffentlicht 17.10.2023 07:15:09
  • Zuletzt bearbeitet 12.06.2025 15:15:32

Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Traffic Server.This issue affects Apache Traffic Server: from 8.0.0 through 8.1.8, from 9.0.0 through 9.2.2. Users are recommended to upgrade to version 8.1.9 or 9.2....

  • EPSS 7.82%
  • Veröffentlicht 17.10.2023 07:15:09
  • Zuletzt bearbeitet 12.06.2025 15:15:31

Improper Input Validation vulnerability in Apache Traffic Server with malformed HTTP/2 frames.This issue affects Apache Traffic Server: from 9.0.0 through 9.2.2. Users are recommended to upgrade to version 9.2.3, which fixes the issue.

Warnung Medienbericht Exploit
  • EPSS 94.4%
  • Veröffentlicht 10.10.2023 14:15:10
  • Zuletzt bearbeitet 12.05.2026 15:10:32

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.