haproxy18 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the haproxy18 package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Resource Exhaustion

*
  • M
Improper Input Validation

*
  • M
HTTP Request Smuggling

*
  • L
Information Exposure

<0:1.8.8-1.el7
  • H
Arbitrary Code Injection

<0:1.8.17-3.el7
  • H
Arbitrary Code Injection

<0:1.8.17-3.el7
  • M
Improper Input Validation

<0:1.8.1-5.el7
  • H
Cross-site Scripting (XSS)

<0:1.8.17-3.el7
  • M
Improper Authorization

<0:1.8.1-5.el7
  • H
Static Code Injection

<0:1.8.17-3.el7
  • H
Static Code Injection

<0:1.8.17-3.el7
  • H
Out-of-bounds Write

<0:1.8.14-2.el7
  • H
Static Code Injection

<0:1.8.17-3.el7
  • H
Session Fixation

<0:1.8.17-3.el7
  • H
Session Fixation

<0:1.8.17-3.el7
  • H
Static Code Injection

<0:1.8.17-3.el7
  • H
Static Code Injection

<0:1.8.17-3.el7
  • H
Cross-site Scripting (XSS)

<0:1.8.17-3.el7
  • H
Cross-site Scripting (XSS)

<0:1.8.17-3.el7
  • H
Cross-site Request Forgery (CSRF)

<0:1.8.17-3.el7
  • M
Incomplete Cleanup

*
  • H
HTTP Request Smuggling

*
  • M
Resource Exhaustion

*
  • M
Improper Input Validation

*
  • M
HTTP Request Smuggling

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • H
Out-of-bounds Read

<0:1.8.17-3.el7
  • M
Out-of-bounds Read

<0:1.8.17-3.el7
  • M
Out-of-bounds Read

<0:1.8.17-3.el7
  • H
Resource Exhaustion

*
  • H
Resource Exhaustion

*
  • H
Resource Exhaustion

*
  • H
Resource Exhaustion

<0:1.8.17-3.el7
  • M
Out-of-bounds Read

<0:1.8.17-3.el7
  • H
Out-of-bounds Read

<0:1.8.17-3.el7
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • H
Out-of-bounds Read

<0:1.8.14-2.el7
  • M
Out-of-bounds Read

<0:1.8.14-2.el7
  • M
Heap-based Buffer Overflow

<0:1.8.8-1.el7
  • M
Cryptographic Issues

*
  • M
HTTP Request Smuggling

*
  • M
HTTP Request Smuggling

*
  • C
HTTP Request Smuggling

<0:1.8.23-3.el7
  • C
Improper Input Validation

<0:1.8.23-3.el7
  • C
Improper Input Validation

<0:1.8.23-3.el7