Vulnerabilities
Vulnerable Software
Apache:  >> Traffic Server  >> 2.1.4  Security Vulnerabilities
Apache Traffic Server is vulnerable to HTTP/2 setting flood attacks. Earlier versions of Apache Traffic Server didn't limit the number of setting frames sent from the client using the HTTP/2 protocol. Users should upgrade to Apache Traffic Server 7.1.7, 8.0.4, or later versions.
CVSS Score
7.5
EPSS Score
0.051
Published
2019-10-22
There is a vulnerability in Apache Traffic Server (ATS) 6.2.0 and prior and 7.0.0 and prior with the Host header and line folding. This can have issues when interacting with upstream proxies and the wrong host being used.
CVSS Score
8.6
EPSS Score
0.026
Published
2018-02-27
Apache Traffic Server before 6.2.1 generates a coredump when there is a mismatch between content length and chunked encoding.
CVSS Score
7.5
EPSS Score
0.015
Published
2017-04-17
Apache Traffic Server before 5.1.2 allows remote attackers to cause a denial of service via unspecified vectors, related to internal buffer sizing.
CVSS Score
5.0
EPSS Score
0.022
Published
2015-01-13
Unspecified vulnerability in Apache Traffic Server 3.x through 3.2.5, 4.x before 4.2.1.1, and 5.x before 5.0.1 has unknown impact and attack vectors, possibly related to health checks.
CVSS Score
10.0
EPSS Score
0.013
Published
2014-08-22
Apache Traffic Server 2.0.x and 3.0.x before 3.0.4 and 3.1.x before 3.1.3 does not properly allocate heap memory, which allows remote attackers to cause a denial of service (daemon crash) via a long HTTP Host header.
CVSS Score
5.0
EPSS Score
0.016
Published
2012-03-26


Contact Us

Shodan ® - All rights reserved