Ecosyste.ms: Packages
An open API service providing package, version and dependency metadata of many open source software ecosystems and registries.
Top 0.7% dependent packages on proxy.golang.org
Top 0.8% dependent repos on proxy.golang.org
Top 0.1% forks on proxy.golang.org
Top 0.1% docker downloads on proxy.golang.org
proxy.golang.org : github.com/traefik/traefik/v2
The Cloud Native Application Proxy
Registry
-
Source
- Documentation
- JSON
purl: pkg:golang/github.com/traefik/traefik/v2
Keywords: consul, docker, etcd, go, golang, kubernetes, letsencrypt, load-balancer, marathon, mesos, microservice, reverse-proxy, zookeeper
License: MIT
Latest release: 23 days ago
First release: over 1 year ago
Namespace: github.com/traefik/traefik
Dependent packages: 44
Dependent repositories: 52
Stars: 42,108 on GitHub
Forks: 4,525 on GitHub
Docker dependents: 76
Docker downloads: 3,306,964,099
See more repository details: repos.ecosyste.ms
Last synced: 2 days ago
GSA_kwCzR0hTQS03ZjRqLTY0cDYtNWg1ds4AA7BQ
Traefik affected by HTTP/2 CONTINUATION flood in net/httpEcosystems: go
Packages: github.com/traefik/traefik/v3, github.com/traefik/traefik/v2
Source: github
Published: 19 days ago
MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLW02OTctNHY4Zi01NXFn
Header dropping in traefikEcosystems: go
Packages: github.com/traefik/traefik, github.com/traefik/traefik/v2
Source: github
Published: over 2 years ago
GSA_kwCzR0hTQS00dnd4LTU0bXctdnFmd84AA69W
Traefik vulnerable to denial of service with Content-length headerEcosystems: go
Packages: github.com/traefik/traefik, github.com/traefik/traefik/v2, github.com/traefik/traefik/v3
Source: github
Published: 22 days ago
GSA_kwCzR0hTQS03aGo5LXJ2NzQtNWc5Ms4AAyrs
Traefik HTTP header parsing could cause a denial of serviceEcosystems: go
Packages: github.com/traefik/traefik/v2
Source: github
Published: about 1 year ago
GSA_kwCzR0hTQS1jNmh4LXBqYzMtN2Zxcs4AAvOE
Traefik HTTP/2 connections management could cause a denial of serviceEcosystems: go
Packages: github.com/traefik/traefik/v2
Source: github
Published: over 1 year ago
GSA_kwCzR0hTQS1mdmhqLTRxZmgtcTJobc4AA3ku
Traefik incorrectly processes fragment in the URL, leads to Authorization BypassEcosystems: go
Packages: github.com/traefik/traefik/v3, github.com/traefik/traefik/v2
Source: github
Published: 5 months ago
GSA_kwCzR0hTQS04Zzg1LXdocWgtY3IyZs4AA3kv
Traefik vulnerable to potential DDoS via ACME HTTPChallengeEcosystems: go
Packages: github.com/traefik/traefik/v3, github.com/traefik/traefik/v2
Source: github
Published: 5 months ago
GSA_kwCzR0hTQS02ZndnLWpyZnctZmY3cM4AA3kw
Traefik docker container using 100% CPUEcosystems: go
Packages: github.com/traefik/traefik/v3, github.com/traefik/traefik/v2
Source: github
Published: 5 months ago
GSA_kwCzR0hTQS1oMnBoLXZobTctZzRocM4AAwNV
Traefik may display authorization header in the debug logsEcosystems: go
Packages: github.com/traefik/traefik/v2
Source: github
Published: over 1 year ago
GSA_kwCzR0hTQS00Njh3LTh4MzktZ2o1ds4AAwNU
Traefik routes exposed with an empty TLSOptionEcosystems: go
Packages: github.com/traefik/traefik/v2
Source: github
Published: over 1 year ago
GSA_kwCzR0hTQS1ocmh4LTZoMzQtajVoY80sbQ
Skip the router TLS configuration when the host header is an FQDNEcosystems: go
Packages: github.com/traefik/traefik/v2
Source: github
Published: about 2 years ago
MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTZxcTgtNXdxMy04NnJw
Traefik vulnerable to Open Redirect via handling of X-Forwarded-Prefix headerEcosystems: go
Packages: github.com/containous/traefik/v2/pkg/api, github.com/containous/traefik/api, github.com/traefik/traefik/v2/pkg/api, github.com/traefik/traefik/api, github.com/containous/traefik/v2, github.com/traefik/traefik/v2, github.com/containous/traefik, github.com/traefik/traefik
Source: github
Published: about 2 years ago
MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXE5bXAtNzljcC05Zzhq
Improper AuthenticationEcosystems: go
Packages: github.com/traefik/traefik/v2
Source: github
Published: over 2 years ago