Apache Traffic Server versions prior to 3.0.4 as well as all development releases prior to 3.1.3 suffers from a remote denial of service vulnerability.
50e45d1fc3c80f0ffd90567d914e2c37381b34984bd4609430830c12a4807cc9
Auto/Taxi Stand Management System version 1.0 suffers from an ignored default credential vulnerability.
4a3aab31cc09cb7f664b0210bd2bb46251fe80f53bbfee0b1b49f0f3659e515b
Auto/Taxi Stand Management System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
5bfb04fe73b1ba3334cfb80bd85d482d463f62029298535a09ed53c1a5e5c485
Debian Linux Security Advisory 5758-1 - Several vulnerabilities were discovered in Apache Traffic Server, a reverse and forward proxy server, which could result in denial of service or request smuggling.
e046ad5ea2e9dcf4e4982db8e475c4ffe401595f3c48305d26fdab29eedf868a
Debian Linux Security Advisory 5659-1 - Bartek Nowotarski discovered that Apache Traffic Server, a reverse and forward proxy server, was susceptible to denial of service via HTTP2 continuation frames.
29c5828b3902a593e3dfd49023a6bfae4f32fe5f978debd03b974b9c0db403e8
Debian Linux Security Advisory 5549-1 - Several vulnerabilities were discovered in Apache Traffic Server, a reverse and forward proxy server, which could result in denial of service or information disclosure.
06b531869de4400f36aa992d6b50615be2536465773861a5ff199f2168e9638c
Debian Linux Security Advisory 5435-2 - Several vulnerabilities were discovered in Apache Traffic Server, a reverse and forward proxy server, which could result in information disclosure or denial of service.
c1fcf596ee1cf44b8cea35182003229a26d8a8252f42c3fdec4a778bcd034ed3
Debian Linux Security Advisory 5435-1 - Several vulnerabilities were discovered in Apache Traffic Server, a reverse and forward proxy server, which could result in information disclosure or denial of service.
dfca8e4b23324ea3fd1686d46452b9a26062e6cab430b4598ba6351a0f959fc6
Debian Linux Security Advisory 5311-1 - Several vulnerabilities were discovered in Apache Traffic Server, a reverse and forward proxy server, which could result in HTTP request smuggling, cache poisoning or denial of service.
990cbc4c27bc00413fc821fd5e596736910270440e68916352b4cf984d9ea06a
Debian Linux Security Advisory 5206-1 - Several vulnerabilities were discovered in Apache Traffic Server, a reverse and forward proxy server, which could result in HTTP request smuggling, cache poisoning or information disclosure.
360f2d39b410c071cd8f7de51bc39704e2140bcc7d3c4795e6882565c3d01c09
Debian Linux Security Advisory 5153-1 - Several vulnerabilities were discovered in Apache Traffic Server, a reverse and forward proxy server, which could result in HTTP request smuggling or MITM attacks.
389b35955d8c0fde96ec34613a1833bbb3753f489c93840f576b033f9eafa474
Debian Linux Security Advisory 4957-1 - Several vulnerabilities were discovered in Apache Traffic Server, a reverse and forward proxy server, which could result in denial of service, HTTP request smuggling or cache poisoning.
ba6d55ba4643d5019068c3a8db53edc311218b25702c1dab84615cded98e95ed
Debian Linux Security Advisory 4805-1 - Two vulnerabilities were discovered in Apache Traffic Server, a reverse and forward proxy server.
33cb8cac8efefd8630541aa85e3167e1088094ad4d96382eca60976d082286c7
Debian Linux Security Advisory 4710-1 - A vulnerability was discovered in Apache Traffic Server, a reverse and forward proxy server, which could result in denial of service via malformed HTTP/2 headers.
fa2687f7a95d99d910fc74880c9275b86f7e9535d6bdc1b4a02379f6a71cdd41
Debian Linux Security Advisory 4672-1 - Several vulnerabilities were discovered in Apache Traffic Server, a reverse and forward proxy server, which could result in denial of service or request smuggling attacks.
660939fa86daf06b26ab50e4af0902ea74ef786a1e05e439262de385213123e4
Debian Linux Security Advisory 4520-1 - Several vulnerabilities were discovered in the HTTP/2 code of Apache Traffic Server, a reverse and forward proxy server, which could result in denial of service.
bc149c965e81ae3c785cdfd6e0295bb371b8cc779b73d192cb3271084b0e5f65
Debian Linux Security Advisory 4282-1 - Several vulnerabilities were discovered in Apache Traffic Server, a reverse and forward proxy server, which could result in denial of service, cache poisoning or information disclosure.
07fbc1c9e51734ca79a5933dbd1c202134f02f85f65b004c45299f8e39ff82f6
Debian Linux Security Advisory 4128-1 - Several vulnerabilities were discovered in Apache Traffic Server, a reverse and forward proxy server. They could lead to the use of an incorrect upstream proxy, or allow a remote attacker to cause a denial-of-service by application crash.
98f5dbcdd3f255927e85e8a1b0b9780b11e40c6e12aaff121d759b542ca0947e
There is a vulnerability in ATS with the HPACK Bomb Attack that can lead to a denial of service vulnerability. Versions 6.0.0 to 6.2.0 are affected. Please upgrade to ATS 6.2.1 or 7.0.0.
cce30cb7de97faec9ff6ac82fe129fe2f0047da211951cf689af0e98e9a18d82
Secunia Security Advisory - A vulnerability has been reported in Apache Traffic Server, which can be exploited by malicious people to compromise a vulnerable system.
c81a664342190cf0f53f9668579ff6aa36424dd448c51c681283a13c5fbd63ed
The Apache Traffic Server versions 2.1.1 and 2.0.0 suffer from a DNS cache poisoning vulnerability.
1dc0e9378f377c2bbcc492f5d1dc879dd8fb8b702f63ec2c802e48c3bdc43d67
Secunia Security Advisory - Tim Brown has reported a vulnerability in Apache Traffic Server, which can be exploited by malicious people to poison the DNS cache.
6cbb148411e3be1dae222b5318fe28c47374ec7e3ad0b08916c2f36b24dcb947
Arcade Trade Script version 1.0b suffers from an authentication bypass vulnerability due to an insecure cookie issue.
e1127a1055dd8221256b2a446059fc24b7e7e6d68ae157be7ddf197ecea7ccdd
Akamai Technologies Security Advisory 2007-0001 - Two security vulnerabilities have been discovered in the ActiveX version of Akamai Download Manager. For successful exploitation, both vulnerabilities require the user to visit a malicious URL, triggering a stack-based buffer overflow that allows the attacker to execute arbitrary code within the context of the victim.
dbbaf096163cf2efc8265445fa804f02abd06396737956dba892bb7bf7981d35
This is an archive of various @Stake tools that help perform vulnerability scanning and analysis, information gathering, password auditing, and forensics.
940a982de22b2a16a77c8a9239a4c129a32c00662e680f91e813279358ce0ef0
Multiple platforms ethernet Network Interface Card (NIC) device drivers incorrectly handle frame padding, allowing an attacker to view slices of previously transmitted packets or portions of kernel memory due to poor programming practices. Several implementation methods are discussed in this white paper.
daec269b3fe04ddf8ce145fdfc529beb7cb202da14e9fcd184457b800d6f711d