High Security Advisories for github.com/traefik/traefik/v2 in go Clear Filters
High
3 months ago
Traefik Client Plugin's Path Traversal Vulnerability Allows Arbitrary File Overwrite and Remote Code Execution
go
github.com/traefik/traefik/v3, github.com/traefik/traefik/v2
High
7 months ago
Traefik has a possible vulnerability with the path matchers
go
github.com/traefik/traefik/v3, github.com/traefik/traefik/v2, github.com/traefik/traefik
High
7 months ago
Traefik affected by Go oauth2/jws Improper Validation of Syntactic Correctness of Input vulnerability
go
github.com/traefik/traefik/v3, github.com/traefik/traefik/v2
High
over 1 year ago
Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes
go
github.com/traefik/traefik/v3, github.com/traefik/traefik/v2
High
over 1 year ago
Traefik vulnerable to denial of service with Content-length header
go
github.com/traefik/traefik, github.com/traefik/traefik/v2, github.com/traefik/traefik/v3
High
almost 2 years ago
Traefik docker container using 100% CPU
go
github.com/traefik/traefik/v3, github.com/traefik/traefik/v2
High
over 2 years ago
Traefik HTTP header parsing could cause a denial of service
go
github.com/traefik/traefik/v2
High
about 3 years ago
Traefik HTTP/2 connections management could cause a denial of service
go
github.com/traefik/traefik/v2
High
over 3 years ago
Skip the router TLS configuration when the host header is an FQDN
go
github.com/traefik/traefik/v2