Логотип exploitDog
bind:"CVE-2023-25725" OR bind:"CVE-2023-0056"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2023-25725" OR bind:"CVE-2023-0056"

Количество 22

Количество 22

suse-cvrf логотип

SUSE-SU-2023:0413-1

больше 2 лет назад

Security update for haproxy

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:0412-1

больше 2 лет назад

Security update for haproxy

EPSS: Низкий
suse-cvrf логотип

SUSE-FU-2023:2119-1

около 2 лет назад

Feature update for haproxy

EPSS: Низкий
suse-cvrf логотип

SUSE-FU-2023:2117-1

около 2 лет назад

Feature update for haproxy

EPSS: Низкий
oracle-oval логотип

ELSA-2023-1696

около 2 лет назад

ELSA-2023-1696: haproxy security update (MODERATE)

EPSS: Низкий
ubuntu логотип

CVE-2023-0056

около 2 лет назад

An uncontrolled resource consumption vulnerability was discovered in HAProxy which could crash the service. This issue could allow an authenticated remote attacker to run a specially crafted malicious server in an OpenShift cluster. The biggest impact is to availability.

CVSS3: 6.5
EPSS: Низкий
redhat логотип

CVE-2023-0056

больше 2 лет назад

An uncontrolled resource consumption vulnerability was discovered in HAProxy which could crash the service. This issue could allow an authenticated remote attacker to run a specially crafted malicious server in an OpenShift cluster. The biggest impact is to availability.

CVSS3: 4.3
EPSS: Низкий
nvd логотип

CVE-2023-0056

около 2 лет назад

An uncontrolled resource consumption vulnerability was discovered in HAProxy which could crash the service. This issue could allow an authenticated remote attacker to run a specially crafted malicious server in an OpenShift cluster. The biggest impact is to availability.

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2023-0056

около 2 лет назад

An uncontrolled resource consumption vulnerability was discovered in H ...

CVSS3: 6.5
EPSS: Низкий
ubuntu логотип

CVE-2023-25725

больше 2 лет назад

HAProxy before 2.7.3 may allow a bypass of access control because HTTP/1 headers are inadvertently lost in some situations, aka "request smuggling." The HTTP header parsers in HAProxy may accept empty header field names, which could be used to truncate the list of HTTP headers and thus make some headers disappear after being parsed and processed for HTTP/1.0 and HTTP/1.1. For HTTP/2 and HTTP/3, the impact is limited because the headers disappear before being parsed and processed, as if they had not been sent by the client. The fixed versions are 2.7.3, 2.6.9, 2.5.12, 2.4.22, 2.2.29, and 2.0.31.

CVSS3: 9.1
EPSS: Средний
redhat логотип

CVE-2023-25725

больше 2 лет назад

HAProxy before 2.7.3 may allow a bypass of access control because HTTP/1 headers are inadvertently lost in some situations, aka "request smuggling." The HTTP header parsers in HAProxy may accept empty header field names, which could be used to truncate the list of HTTP headers and thus make some headers disappear after being parsed and processed for HTTP/1.0 and HTTP/1.1. For HTTP/2 and HTTP/3, the impact is limited because the headers disappear before being parsed and processed, as if they had not been sent by the client. The fixed versions are 2.7.3, 2.6.9, 2.5.12, 2.4.22, 2.2.29, and 2.0.31.

CVSS3: 8.2
EPSS: Средний
nvd логотип

CVE-2023-25725

больше 2 лет назад

HAProxy before 2.7.3 may allow a bypass of access control because HTTP/1 headers are inadvertently lost in some situations, aka "request smuggling." The HTTP header parsers in HAProxy may accept empty header field names, which could be used to truncate the list of HTTP headers and thus make some headers disappear after being parsed and processed for HTTP/1.0 and HTTP/1.1. For HTTP/2 and HTTP/3, the impact is limited because the headers disappear before being parsed and processed, as if they had not been sent by the client. The fixed versions are 2.7.3, 2.6.9, 2.5.12, 2.4.22, 2.2.29, and 2.0.31.

CVSS3: 9.1
EPSS: Средний
msrc логотип

CVE-2023-25725

больше 2 лет назад

CVSS3: 9.1
EPSS: Средний
debian логотип

CVE-2023-25725

больше 2 лет назад

HAProxy before 2.7.3 may allow a bypass of access control because HTTP ...

CVSS3: 9.1
EPSS: Средний
suse-cvrf логотип

SUSE-SU-2023:0153-1

больше 2 лет назад

Security update for haproxy

EPSS: Низкий
github логотип

GHSA-43q4-pf55-3xhc

около 2 лет назад

An uncontrolled resource consumption vulnerability was discovered in HAProxy which could crash the service. This issue could allow an authenticated remote attacker to run a specially crafted malicious server in an OpenShift cluster. The biggest impact is to availability.

CVSS3: 6.5
EPSS: Низкий
fstec логотип

BDU:2023-04835

больше 2 лет назад

Уязвимость серверного программного обеспечения HAProxy, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 6.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:0411-1

больше 2 лет назад

Security update for haproxy

EPSS: Средний
github логотип

GHSA-h2p2-w857-329f

больше 2 лет назад

HAProxy before 2.7.3 may allow a bypass of access control because HTTP/1 headers are inadvertently lost in some situations, aka "request smuggling." The HTTP header parsers in HAProxy may accept empty header field names, which could be used to truncate the list of HTTP headers and thus make some headers disappear after being parsed and processed for HTTP/1.0 and HTTP/1.1. For HTTP/2 and HTTP/3, the impact is limited because the headers disappear before being parsed and processed, as if they had not been sent by the client. The fixed versions are 2.7.3, 2.6.9, 2.5.12, 2.4.22, 2.2.29, and 2.0.31.

CVSS3: 9.1
EPSS: Средний
fstec логотип

BDU:2023-00758

больше 2 лет назад

Уязвимость серверного программного обеспечения HAProxy, связанная с недостатками обработки HTTP-запросов, позволяющая нарушителю выполнять атаку «контрабанда HTTP-запросов»

CVSS3: 7.5
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
suse-cvrf логотип
SUSE-SU-2023:0413-1

Security update for haproxy

больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:0412-1

Security update for haproxy

больше 2 лет назад
suse-cvrf логотип
SUSE-FU-2023:2119-1

Feature update for haproxy

около 2 лет назад
suse-cvrf логотип
SUSE-FU-2023:2117-1

Feature update for haproxy

около 2 лет назад
oracle-oval логотип
ELSA-2023-1696

ELSA-2023-1696: haproxy security update (MODERATE)

около 2 лет назад
ubuntu логотип
CVE-2023-0056

An uncontrolled resource consumption vulnerability was discovered in HAProxy which could crash the service. This issue could allow an authenticated remote attacker to run a specially crafted malicious server in an OpenShift cluster. The biggest impact is to availability.

CVSS3: 6.5
0%
Низкий
около 2 лет назад
redhat логотип
CVE-2023-0056

An uncontrolled resource consumption vulnerability was discovered in HAProxy which could crash the service. This issue could allow an authenticated remote attacker to run a specially crafted malicious server in an OpenShift cluster. The biggest impact is to availability.

CVSS3: 4.3
0%
Низкий
больше 2 лет назад
nvd логотип
CVE-2023-0056

An uncontrolled resource consumption vulnerability was discovered in HAProxy which could crash the service. This issue could allow an authenticated remote attacker to run a specially crafted malicious server in an OpenShift cluster. The biggest impact is to availability.

CVSS3: 6.5
0%
Низкий
около 2 лет назад
debian логотип
CVE-2023-0056

An uncontrolled resource consumption vulnerability was discovered in H ...

CVSS3: 6.5
0%
Низкий
около 2 лет назад
ubuntu логотип
CVE-2023-25725

HAProxy before 2.7.3 may allow a bypass of access control because HTTP/1 headers are inadvertently lost in some situations, aka "request smuggling." The HTTP header parsers in HAProxy may accept empty header field names, which could be used to truncate the list of HTTP headers and thus make some headers disappear after being parsed and processed for HTTP/1.0 and HTTP/1.1. For HTTP/2 and HTTP/3, the impact is limited because the headers disappear before being parsed and processed, as if they had not been sent by the client. The fixed versions are 2.7.3, 2.6.9, 2.5.12, 2.4.22, 2.2.29, and 2.0.31.

CVSS3: 9.1
17%
Средний
больше 2 лет назад
redhat логотип
CVE-2023-25725

HAProxy before 2.7.3 may allow a bypass of access control because HTTP/1 headers are inadvertently lost in some situations, aka "request smuggling." The HTTP header parsers in HAProxy may accept empty header field names, which could be used to truncate the list of HTTP headers and thus make some headers disappear after being parsed and processed for HTTP/1.0 and HTTP/1.1. For HTTP/2 and HTTP/3, the impact is limited because the headers disappear before being parsed and processed, as if they had not been sent by the client. The fixed versions are 2.7.3, 2.6.9, 2.5.12, 2.4.22, 2.2.29, and 2.0.31.

CVSS3: 8.2
17%
Средний
больше 2 лет назад
nvd логотип
CVE-2023-25725

HAProxy before 2.7.3 may allow a bypass of access control because HTTP/1 headers are inadvertently lost in some situations, aka "request smuggling." The HTTP header parsers in HAProxy may accept empty header field names, which could be used to truncate the list of HTTP headers and thus make some headers disappear after being parsed and processed for HTTP/1.0 and HTTP/1.1. For HTTP/2 and HTTP/3, the impact is limited because the headers disappear before being parsed and processed, as if they had not been sent by the client. The fixed versions are 2.7.3, 2.6.9, 2.5.12, 2.4.22, 2.2.29, and 2.0.31.

CVSS3: 9.1
17%
Средний
больше 2 лет назад
msrc логотип
CVSS3: 9.1
17%
Средний
больше 2 лет назад
debian логотип
CVE-2023-25725

HAProxy before 2.7.3 may allow a bypass of access control because HTTP ...

CVSS3: 9.1
17%
Средний
больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:0153-1

Security update for haproxy

0%
Низкий
больше 2 лет назад
github логотип
GHSA-43q4-pf55-3xhc

An uncontrolled resource consumption vulnerability was discovered in HAProxy which could crash the service. This issue could allow an authenticated remote attacker to run a specially crafted malicious server in an OpenShift cluster. The biggest impact is to availability.

CVSS3: 6.5
0%
Низкий
около 2 лет назад
fstec логотип
BDU:2023-04835

Уязвимость серверного программного обеспечения HAProxy, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 6.5
0%
Низкий
больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:0411-1

Security update for haproxy

17%
Средний
больше 2 лет назад
github логотип
GHSA-h2p2-w857-329f

HAProxy before 2.7.3 may allow a bypass of access control because HTTP/1 headers are inadvertently lost in some situations, aka "request smuggling." The HTTP header parsers in HAProxy may accept empty header field names, which could be used to truncate the list of HTTP headers and thus make some headers disappear after being parsed and processed for HTTP/1.0 and HTTP/1.1. For HTTP/2 and HTTP/3, the impact is limited because the headers disappear before being parsed and processed, as if they had not been sent by the client. The fixed versions are 2.7.3, 2.6.9, 2.5.12, 2.4.22, 2.2.29, and 2.0.31.

CVSS3: 9.1
17%
Средний
больше 2 лет назад
fstec логотип
BDU:2023-00758

Уязвимость серверного программного обеспечения HAProxy, связанная с недостатками обработки HTTP-запросов, позволяющая нарушителю выполнять атаку «контрабанда HTTP-запросов»

CVSS3: 7.5
17%
Средний
больше 2 лет назад

Уязвимостей на страницу