Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-ayrb-j36f-zqft
Summaryhaproxy: malformed HTTP header field name can lead to HTTP request/response smuggling
Aliases
0
alias CVE-2023-25950
Fixed_packages
0
url pkg:deb/debian/haproxy@0?distro=trixie
purl pkg:deb/debian/haproxy@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/haproxy@0%3Fdistro=trixie
1
url pkg:deb/debian/haproxy@2.2.9-2%2Bdeb11u6?distro=trixie
purl pkg:deb/debian/haproxy@2.2.9-2%2Bdeb11u6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-97wa-uwp2-57gu
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/haproxy@2.2.9-2%252Bdeb11u6%3Fdistro=trixie
2
url pkg:deb/debian/haproxy@2.6.8-1?distro=trixie
purl pkg:deb/debian/haproxy@2.6.8-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/haproxy@2.6.8-1%3Fdistro=trixie
3
url pkg:deb/debian/haproxy@2.6.12-1%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/haproxy@2.6.12-1%2Bdeb12u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7mfq-cvmr-nbf8
1
vulnerability VCID-97wa-uwp2-57gu
2
vulnerability VCID-rj2h-pnmf-mufp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/haproxy@2.6.12-1%252Bdeb12u3%3Fdistro=trixie
4
url pkg:deb/debian/haproxy@3.0.11-1%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/haproxy@3.0.11-1%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-97wa-uwp2-57gu
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/haproxy@3.0.11-1%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/haproxy@3.2.15-1?distro=trixie
purl pkg:deb/debian/haproxy@3.2.15-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/haproxy@3.2.15-1%3Fdistro=trixie
Affected_packages
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25950.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25950.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-25950
reference_id
reference_type
scores
0
value 0.00045
scoring_system epss
scoring_elements 0.13759
published_at 2026-04-12T12:55:00Z
1
value 0.00045
scoring_system epss
scoring_elements 0.13617
published_at 2026-04-18T12:55:00Z
2
value 0.00045
scoring_system epss
scoring_elements 0.13621
published_at 2026-04-16T12:55:00Z
3
value 0.00045
scoring_system epss
scoring_elements 0.13709
published_at 2026-04-13T12:55:00Z
4
value 0.00062
scoring_system epss
scoring_elements 0.19588
published_at 2026-04-04T12:55:00Z
5
value 0.00062
scoring_system epss
scoring_elements 0.19541
published_at 2026-04-02T12:55:00Z
6
value 0.00062
scoring_system epss
scoring_elements 0.19309
published_at 2026-04-07T12:55:00Z
7
value 0.00062
scoring_system epss
scoring_elements 0.19387
published_at 2026-04-08T12:55:00Z
8
value 0.00062
scoring_system epss
scoring_elements 0.19438
published_at 2026-04-09T12:55:00Z
9
value 0.00062
scoring_system epss
scoring_elements 0.19443
published_at 2026-04-11T12:55:00Z
10
value 0.00065
scoring_system epss
scoring_elements 0.20154
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-25950
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2185854
reference_id 2185854
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2185854
4
reference_url https://jvn.jp/en/jp/JVN38170084/
reference_id JVN38170084
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:38:25Z/
url https://jvn.jp/en/jp/JVN38170084/
5
reference_url https://git.haproxy.org/?p=haproxy-2.7.git%3Ba=commit%3Bh=3ca4223c5e1f18a19dc93b0b09ffdbd295554d46
reference_id ?p=haproxy-2.7.git%3Ba=commit%3Bh=3ca4223c5e1f18a19dc93b0b09ffdbd295554d46
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:38:25Z/
url https://git.haproxy.org/?p=haproxy-2.7.git%3Ba=commit%3Bh=3ca4223c5e1f18a19dc93b0b09ffdbd295554d46
6
reference_url https://www.haproxy.org/
reference_id www.haproxy.org
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:38:25Z/
url https://www.haproxy.org/
Weaknesses
0
cwe_id 444
name Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
description The product acts as an intermediary HTTP agent (such as a proxy or firewall) in the data flow between two entities such as a client and server, but it does not interpret malformed HTTP requests or responses in ways that are consistent with how the messages will be processed by those entities that are at the ultimate destination.
Exploits
Severity_range_score7.3 - 7.3
Exploitabilitynull
Weighted_severitynull
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-ayrb-j36f-zqft