Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
haproxy haproxy 2.5 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2021-40346
An integer overflow exists in HAProxy 2.0 up to and including 2.5 in htx_add_header that can be exploited to perform an HTTP request smuggling attack, allowing an malicious user to bypass all configured http-request HAProxy ACLs and possibly other ACLs.
Haproxy Haproxy
Haproxy Haproxy 2.5
Debian Debian Linux 11.0
Fedoraproject Fedora 33
Fedoraproject Fedora 34
7 Github repositories
7.5
CVSSv3
CVE-2023-0836
An information leak vulnerability exists in HAProxy 2.1, 2.2 prior to 2.2.27, 2.3, 2.4 prior to 2.4.21, 2.5 prior to 2.5.11, 2.6 prior to 2.6.8, 2.7 prior to 2.7.1. There are 5 bytes left uninitialized in the connection buffer when encoding the FCGI_BEGIN_REQUEST record. Sensitiv...
Haproxy Haproxy 2.7.0
Haproxy Haproxy
Haproxy Haproxy 2.3.0
Haproxy Haproxy 2.1.0
7.2
CVSSv3
CVE-2023-40225
HAProxy up to and including 2.0.32, 2.1.x and 2.2.x up to and including 2.2.30, 2.3.x and 2.4.x up to and including 2.4.23, 2.5.x and 2.6.x prior to 2.6.15, 2.7.x prior to 2.7.10, and 2.8.x prior to 2.8.2 forwards empty Content-Length headers, violating RFC 9110 section 8.6. In u...
Haproxy Haproxy
1 Github repository
7.5
CVSSv3
CVE-2018-20102
An out-of-bounds read in dns_validate_dns_response in dns.c exists in HAProxy up to and including 1.8.14. Due to a missing check when validating DNS responses, remote attackers might be able read the 16 bytes corresponding to an AAAA record from the non-initialized part of the bu...
Haproxy Haproxy
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 18.10
Redhat Openshift Container Platform 3.11
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-26925
CVE-2023-41826
LFI
CVE-2022-22364
CVE-2024-2887
command injection
remote code execution
CVE-2024-34446
CVE-2022-48699
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started