### [CVE-2024-56202](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56202) ![](https://img.shields.io/static/v1?label=Product&message=Apache%20Traffic%20Server&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=10.0.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=9.0.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-440%20Expected%20Behavior%20Violation&color=brightgreen) ### Description Expected Behavior Violation vulnerability in Apache Traffic Server.This issue affects Apache Traffic Server: from 9.0.0 through 9.2.8, from 10.0.0 through 10.0.3.Users are recommended to upgrade to versions 9.2.9 or 10.0.4 or newer, which fixes the issue. ### POC #### Reference No PoCs from references. #### Github - https://github.com/fkie-cad/nvd-json-data-feeds - https://github.com/w4zu/Debian_security