Search for packages
| purl | pkg:deb/debian/haproxy@2.2.9-2%2Bdeb11u6 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-2zm3-vw55-k3af
Aliases: CVE-2025-32464 |
haproxy: Buffer Overflow via Improper Back-Reference Replacement Length Check |
Affected by 3 other vulnerabilities. |
|
VCID-97wa-uwp2-57gu
Aliases: CVE-2026-33555 |
Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-4zyf-tsw1-8bfv | A vulnerability in HAProxy might lead to remote execution of arbitrary code. |
CVE-2019-19330
|
| VCID-5q7p-8nxf-sfem | A buffer overflow in HAProxy might allow an attacker to execute arbitrary code. |
CVE-2020-11100
|
| VCID-93ba-zj92-zqf1 | haproxy: does not ensure that the scheme and path portions of a URI have the expected characters |
CVE-2021-39240
|
| VCID-9gwz-6dnd-r7fj | haproxy: HTTP request smuggling issue with transfer-encoding header containing an obfuscated "chunked" value |
CVE-2019-18277
|
| VCID-a7s4-6k62-3qh2 | haproxy: Denial of service via set-cookie2 header |
CVE-2022-0711
|
| VCID-atwp-g4uy-3qgg | haproxy: it can lead to a situation with an attacker-controlled HTTP Host header because a mismatch between Host and authority is mishandled |
CVE-2021-39242
|
| VCID-bb8w-k2e1-xbht | haproxy: request smuggling attack in HTTP/1 header parsing |
CVE-2023-25725
|
| VCID-jz63-5mba-3qbx | haproxy: request smuggling attack or response splitting via duplicate content-length header |
CVE-2021-40346
|
| VCID-mrdn-6cwg-j3h8 | haproxy: data leak via fcgi requests |
CVE-2023-0836
|
| VCID-s86j-egny-77cu | haproxy: untrimmed URI fragments may lead to exposure of confidential data on static servers |
CVE-2023-45539
|
| VCID-sy71-5m1g-2yav | haproxy: an HTTP method name may contain a space followed by the name of a protected resource |
CVE-2021-39241
|
| VCID-w1we-d8uq-s3hh | haproxy: segfault DoS |
CVE-2023-0056
|
| VCID-ygb3-7kb1-tqbc | haproxy: Proxy forwards malformed empty Content-Length headers |
CVE-2023-40225
|