Логотип exploitDog
bind:CVE-2019-18277
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-18277

Количество 12

Количество 12

ubuntu логотип

CVE-2019-18277

больше 6 лет назад

A flaw was found in HAProxy before 2.0.6. In legacy mode, messages featuring a transfer-encoding header missing the "chunked" value were not being correctly rejected. The impact was limited but if combined with the "http-reuse always" setting, it could be used to help construct an HTTP request smuggling attack against a vulnerable component employing a lenient parser that would ignore the content-length header as soon as it saw a transfer-encoding one (even if not entirely valid according to the specification).

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2019-18277

больше 6 лет назад

A flaw was found in HAProxy before 2.0.6. In legacy mode, messages featuring a transfer-encoding header missing the "chunked" value were not being correctly rejected. The impact was limited but if combined with the "http-reuse always" setting, it could be used to help construct an HTTP request smuggling attack against a vulnerable component employing a lenient parser that would ignore the content-length header as soon as it saw a transfer-encoding one (even if not entirely valid according to the specification).

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2019-18277

больше 6 лет назад

A flaw was found in HAProxy before 2.0.6. In legacy mode, messages featuring a transfer-encoding header missing the "chunked" value were not being correctly rejected. The impact was limited but if combined with the "http-reuse always" setting, it could be used to help construct an HTTP request smuggling attack against a vulnerable component employing a lenient parser that would ignore the content-length header as soon as it saw a transfer-encoding one (even if not entirely valid according to the specification).

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2019-18277

больше 6 лет назад

A flaw was found in HAProxy before 2.0.6. In legacy mode, messages fea ...

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:2645-1

около 6 лет назад

Security update for haproxy

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:2626-1

около 6 лет назад

Security update for haproxy

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:3288-1

около 6 лет назад

Security update for haproxy

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:3126-1

около 6 лет назад

Security update for haproxy

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:3125-1

около 6 лет назад

Security update for haproxy

EPSS: Низкий
github логотип

GHSA-7r84-r685-grmg

больше 3 лет назад

A flaw was found in HAProxy before 2.0.6. In legacy mode, messages featuring a transfer-encoding header missing the "chunked" value were not being correctly rejected. The impact was limited but if combined with the "http-reuse always" setting, it could be used to help construct an HTTP request smuggling attack against a vulnerable component employing a lenient parser that would ignore the content-length header as soon as it saw a transfer-encoding one (even if not entirely valid according to the specification).

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2023-07810

больше 6 лет назад

Уязвимость серверного программного обеспечения HAProxy, связанная с недостатками обработки HTTP-запросов, позволяющая нарушителю оказать воздействие на целостность данных

CVSS3: 7.5
EPSS: Низкий
oracle-oval логотип

ELSA-2020-1725

почти 6 лет назад

ELSA-2020-1725: haproxy security, bug fix, and enhancement update (MODERATE)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2019-18277

A flaw was found in HAProxy before 2.0.6. In legacy mode, messages featuring a transfer-encoding header missing the "chunked" value were not being correctly rejected. The impact was limited but if combined with the "http-reuse always" setting, it could be used to help construct an HTTP request smuggling attack against a vulnerable component employing a lenient parser that would ignore the content-length header as soon as it saw a transfer-encoding one (even if not entirely valid according to the specification).

CVSS3: 7.5
1%
Низкий
больше 6 лет назад
redhat логотип
CVE-2019-18277

A flaw was found in HAProxy before 2.0.6. In legacy mode, messages featuring a transfer-encoding header missing the "chunked" value were not being correctly rejected. The impact was limited but if combined with the "http-reuse always" setting, it could be used to help construct an HTTP request smuggling attack against a vulnerable component employing a lenient parser that would ignore the content-length header as soon as it saw a transfer-encoding one (even if not entirely valid according to the specification).

CVSS3: 6.5
1%
Низкий
больше 6 лет назад
nvd логотип
CVE-2019-18277

A flaw was found in HAProxy before 2.0.6. In legacy mode, messages featuring a transfer-encoding header missing the "chunked" value were not being correctly rejected. The impact was limited but if combined with the "http-reuse always" setting, it could be used to help construct an HTTP request smuggling attack against a vulnerable component employing a lenient parser that would ignore the content-length header as soon as it saw a transfer-encoding one (even if not entirely valid according to the specification).

CVSS3: 7.5
1%
Низкий
больше 6 лет назад
debian логотип
CVE-2019-18277

A flaw was found in HAProxy before 2.0.6. In legacy mode, messages fea ...

CVSS3: 7.5
1%
Низкий
больше 6 лет назад
suse-cvrf логотип
openSUSE-SU-2019:2645-1

Security update for haproxy

1%
Низкий
около 6 лет назад
suse-cvrf логотип
openSUSE-SU-2019:2626-1

Security update for haproxy

1%
Низкий
около 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:3288-1

Security update for haproxy

1%
Низкий
около 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:3126-1

Security update for haproxy

1%
Низкий
около 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:3125-1

Security update for haproxy

1%
Низкий
около 6 лет назад
github логотип
GHSA-7r84-r685-grmg

A flaw was found in HAProxy before 2.0.6. In legacy mode, messages featuring a transfer-encoding header missing the "chunked" value were not being correctly rejected. The impact was limited but if combined with the "http-reuse always" setting, it could be used to help construct an HTTP request smuggling attack against a vulnerable component employing a lenient parser that would ignore the content-length header as soon as it saw a transfer-encoding one (even if not entirely valid according to the specification).

CVSS3: 7.5
1%
Низкий
больше 3 лет назад
fstec логотип
BDU:2023-07810

Уязвимость серверного программного обеспечения HAProxy, связанная с недостатками обработки HTTP-запросов, позволяющая нарушителю оказать воздействие на целостность данных

CVSS3: 7.5
1%
Низкий
больше 6 лет назад
oracle-oval логотип
ELSA-2020-1725

ELSA-2020-1725: haproxy security, bug fix, and enhancement update (MODERATE)

почти 6 лет назад

Уязвимостей на страницу