Lucene search

K
ApacheTraffic Server

80 matches found

CVE
CVE
added 2022/08/10 6:15 a.m.58 views

CVE-2021-37150

Improper Input Validation vulnerability in header parsing of Apache Traffic Server allows an attacker to request secure resources. This issue affects Apache Traffic Server 8.0.0 to 9.1.2.

7.5CVSS7.3AI score0.00235EPSS
CVE
CVE
added 2021/11/03 4:15 p.m.57 views

CVE-2021-37148

Improper input validation vulnerability in header parsing of Apache Traffic Server allows an attacker to smuggle requests. This issue affects Apache Traffic Server 8.0.0 to 8.1.2 and 9.0.0 to 9.0.1.

7.5CVSS7.4AI score0.00797EPSS
CVE
CVE
added 2022/12/19 11:15 a.m.57 views

CVE-2022-37392

Improper Check for Unusual or Exceptional Conditions vulnerability in handling the requests to Apache Traffic Server. This issue affects Apache Traffic Server 8.0.0 to 9.1.2.

5.3CVSS5.4AI score0.00231EPSS
CVE
CVE
added 2024/11/14 10:15 a.m.57 views

CVE-2024-38479

Improper Input Validation vulnerability in Apache Traffic Server. This issue affects Apache Traffic Server: from 8.0.0 through 8.1.11, from 9.0.0 through 9.2.5. Users are recommended to upgrade to version 9.2.6, which fixes the issue, or 10.0.2, which does not have the issue.

7.5CVSS7.4AI score0.00585EPSS
CVE
CVE
added 2024/11/14 10:15 a.m.57 views

CVE-2024-50306

Unchecked return value can allow Apache Traffic Server to retain privileges on startup. This issue affects Apache Traffic Server: from 9.2.0 through 9.2.5, from 10.0.0 through 10.0.1. Users are recommended to upgrade to version 9.2.6 or 10.0.2, which fixes the issue.

9.1CVSS9.2AI score0.01137EPSS
CVE
CVE
added 2025/03/06 11:15 a.m.57 views

CVE-2024-56202

Expected Behavior Violation vulnerability in Apache Traffic Server. This issue affects Apache Traffic Server: from 9.0.0 through 9.2.8, from 10.0.0 through 10.0.3. Users are recommended to upgrade to versions 9.2.9 or 10.0.4 or newer, which fixes the issue.

4.3CVSS7.1AI score0.00196EPSS
CVE
CVE
added 2018/08/29 1:29 p.m.56 views

CVE-2018-8005

When there are multiple ranges in a range request, Apache Traffic Server (ATS) will read the entire object from cache. This can cause performance problems with large objects in cache. This affects versions 6.0.0 to 6.2.2 and 7.0.0 to 7.1.3. To resolve this issue users running 6.x users should upgra...

5.3CVSS6AI score0.10133EPSS
CVE
CVE
added 2014/08/22 2:55 p.m.55 views

CVE-2014-3525

Unspecified vulnerability in Apache Traffic Server 3.x through 3.2.5, 4.x before 4.2.1.1, and 5.x before 5.0.1 has unknown impact and attack vectors, possibly related to health checks.

10CVSS6.4AI score0.0127EPSS
CVE
CVE
added 2021/01/11 10:15 a.m.55 views

CVE-2020-17509

ATS negative cache option is vulnerable to a cache poisoning attack. If you have this option enabled, please upgrade or disable this feature. Apache Traffic Server versions 7.0.0 to 7.1.11 and 8.0.0 to 8.1.0 are affected.

7.5CVSS7.3AI score0.03046EPSS
CVE
CVE
added 2025/03/06 12:15 p.m.55 views

CVE-2024-56195

Improper Access Control vulnerability in Apache Traffic Server. This issue affects Apache Traffic Server: from 9.2.0 through 9.2.8, from 10.0.0 through 10.0.3. Users are recommended to upgrade to version 9.2.9 or 10.0.4, which fixes the issue.

6.3CVSS7.1AI score0.00163EPSS
CVE
CVE
added 2022/12/19 11:15 a.m.54 views

CVE-2022-32749

Improper Check for Unusual or Exceptional Conditions vulnerability handling requests in Apache Traffic Server allows an attacker to crash the server under certain conditions. This issue affects Apache Traffic Server: from 8.0.0 through 9.1.3.

7.5CVSS7.3AI score0.00393EPSS
CVE
CVE
added 2023/06/14 8:15 a.m.54 views

CVE-2022-47184

Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Software Foundation Apache Traffic Server.This issue affects Apache Traffic Server: 8.0.0 to 9.2.0.

7.5CVSS7.3AI score0.00157EPSS
CVE
CVE
added 2021/11/03 4:15 p.m.53 views

CVE-2021-38161

Improper Authentication vulnerability in TLS origin verification of Apache Traffic Server allows for man in the middle attacks. This issue affects Apache Traffic Server 8.0.0 to 8.0.8.

8.1CVSS7.9AI score0.00347EPSS
CVE
CVE
added 2022/08/10 6:15 a.m.53 views

CVE-2022-28129

Improper Input Validation vulnerability in HTTP/1.1 header parsing of Apache Traffic Server allows an attacker to send invalid headers. This issue affects Apache Traffic Server 8.0.0 to 9.1.2.

7.5CVSS7.3AI score0.00141EPSS
CVE
CVE
added 2017/10/30 2:29 p.m.50 views

CVE-2015-3249

The HTTP/2 experimental feature in Apache Traffic Server 5.3.x before 5.3.1 allows remote attackers to cause a denial of service (out-of-bounds access and daemon crash) or possibly execute arbitrary code via vectors related to the (1) frame_handlers array or (2) set_dynamic_table_size function.

9.8CVSS9.8AI score0.03606EPSS
CVE
CVE
added 2017/04/17 6:59 p.m.50 views

CVE-2017-5659

Apache Traffic Server before 6.2.1 generates a coredump when there is a mismatch between content length and chunked encoding.

7.5CVSS7.5AI score0.01533EPSS
CVE
CVE
added 2018/02/27 8:29 p.m.50 views

CVE-2017-7671

There is a DOS attack vulnerability in Apache Traffic Server (ATS) 5.2.0 to 5.3.2, 6.0.0 to 6.2.0, and 7.0.0 with the TLS handshake. This issue can cause the server to coredump.

7.5CVSS7.3AI score0.0427EPSS
CVE
CVE
added 2021/11/03 4:15 p.m.50 views

CVE-2021-37149

Improper Input Validation vulnerability in header parsing of Apache Traffic Server allows an attacker to smuggle requests. This issue affects Apache Traffic Server 8.0.0 to 8.1.2 and 9.0.0 to 9.1.0.

7.5CVSS7.4AI score0.00797EPSS
CVE
CVE
added 2018/02/27 8:29 p.m.49 views

CVE-2017-5660

There is a vulnerability in Apache Traffic Server (ATS) 6.2.0 and prior and 7.0.0 and prior with the Host header and line folding. This can have issues when interacting with upstream proxies and the wrong host being used.

8.6CVSS8.3AI score0.02584EPSS
CVE
CVE
added 2012/03/26 2:55 p.m.48 views

CVE-2012-0256

Apache Traffic Server 2.0.x and 3.0.x before 3.0.4 and 3.1.x before 3.1.3 does not properly allocate heap memory, which allows remote attackers to cause a denial of service (daemon crash) via a long HTTP Host header.

5CVSS6.5AI score0.01643EPSS
CVE
CVE
added 2021/11/03 4:15 p.m.48 views

CVE-2021-41585

Improper Input Validation vulnerability in accepting socket connections in Apache Traffic Server allows an attacker to make the server stop accepting new connections. This issue affects Apache Traffic Server 5.0.0 to 9.1.0.

7.5CVSS7.5AI score0.00736EPSS
CVE
CVE
added 2025/03/06 12:15 p.m.45 views

CVE-2024-56196

Improper Access Control vulnerability in Apache Traffic Server. This issue affects Apache Traffic Server: from 10.0.0 through 10.0.3. Users are recommended to upgrade to version 10.0.4, which fixes the issue.

6.3CVSS7.1AI score0.00131EPSS
CVE
CVE
added 2017/09/13 4:29 p.m.43 views

CVE-2015-5206

Unspecified vulnerability in the HTTP/2 experimental feature in Apache Traffic Server before 5.3.x before 5.3.2 has unknown impact and attack vectors, a different vulnerability than CVE-2015-5168.

10CVSS9.3AI score0.01903EPSS
CVE
CVE
added 2015/01/13 11:59 a.m.42 views

CVE-2014-10022

Apache Traffic Server before 5.1.2 allows remote attackers to cause a denial of service via unspecified vectors, related to internal buffer sizing.

5CVSS6.8AI score0.02191EPSS
CVE
CVE
added 2017/04/17 6:59 p.m.41 views

CVE-2016-5396

Apache Traffic Server 6.0.0 to 6.2.0 are affected by an HPACK Bomb Attack.

7.8CVSS7.4AI score0.01806EPSS
CVE
CVE
added 2010/09/13 9:0 p.m.40 views

CVE-2010-2952

Apache Traffic Server before 2.0.1, and 2.1.x before 2.1.2-unstable, does not properly choose DNS source ports and transaction IDs, and does not properly use DNS query fields to validate responses, which makes it easier for man-in-the-middle attackers to poison the internal DNS cache via a crafted ...

4.3CVSS6.5AI score0.01206EPSS
CVE
CVE
added 2024/11/20 6:15 p.m.40 views

CVE-2018-9481

In bta_hd_set_report_act of bta_hd_act.cc, there is a possible out-of-bounds read due to an integer overflow. This could lead to remote information disclosure in the Bluetooth service with no additional execution privileges needed. User interaction is not needed for exploitation.

6.5CVSS6.5AI score0.00019EPSS
CVE
CVE
added 2018/08/29 1:29 p.m.39 views

CVE-2018-8022

A carefully crafted invalid TLS handshake can cause Apache Traffic Server (ATS) to segfault. This affects version 6.2.2. To resolve this issue users running 6.2.2 should upgrade to 6.2.3 or later versions.

7.5CVSS7.4AI score0.07893EPSS
CVE
CVE
added 2025/06/19 10:15 a.m.37 views

CVE-2025-49763

ESI plugin does not have the limit for maximum inclusion depth, and that allows excessive memory consumption if malicious instructions are inserted. Users can use a new setting for the plugin (--max-inclusion-depth) to limit it.This issue affects Apache Traffic Server: from 10.0.0 through 10.0.5, f...

7.5CVSS6.5AI score0.00296EPSS
CVE
CVE
added 2025/06/19 10:15 a.m.18 views

CVE-2025-31698

ACL configured in ip_allow.config or remap.config does not use IP addresses that are provided by PROXY protocol. Users can use a new setting (proxy.config.acl.subjects) to choose which IP addresses to use for the ACL if Apache Traffic Server is configured to accept PROXY protocol. This issue affect...

7.5CVSS6.5AI score0.00098EPSS
Total number of security vulnerabilities80