| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2023-47106 | Incorrect processing of fragment in the URL leads to Authorization Bypass in Traefik | traefik | traefik | Medium | 4.8 | 2023-12-04 20:26:37 | Deep Dive |
| CVE-2023-47124 | Denial of service whith ACME HTTPChallenge in Traefik | traefik | traefik | Medium | 5.9 | 2023-12-04 20:20:31 | Deep Dive |
| CVE-2023-29013 | HTTP header parsing could cause a deny of service | traefik | traefik | High | 7.5 | 2023-04-14 18:15:13 | Deep Dive |
| CVE-2022-46153 | Routes exposed with an empty TLSOption in traefik | traefik | traefik | High | 8.1 | 2022-12-08 21:46:22 | Deep Dive |
| CVE-2022-23469 | Authorization header displayed in the debug logs | traefik | traefik | Low | 3.5 | 2022-12-08 21:33:19 | Deep Dive |
| CVE-2022-39271 | Traefik HTTP/2 connections management could cause a denial of service | traefik | traefik | High | 7.5 | 2022-10-11 00:00:00 | Deep Dive |
| CVE-2022-23632 | Traefik skips the router TLS configuration when the host header is an FQDN | traefik | traefik | High | 7.4 | 2022-02-17 14:55:10 | Deep Dive |
| CVE-2021-32813 | Drop Headers via Malicious Connection Header | traefik | traefik | Medium | 4.8 | 2021-08-03 22:50:11 | Deep Dive |
| CVE-2020-15129 | Open redirect in Traefik | containous | traefik | Medium | 6.1 | 2020-07-30 15:20:15 | Deep Dive |