haproxy20 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the haproxy20 package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Link Following

<0:2.0.16-3.el7
  • H
Incorrect Behavior Order: Early Validation

<0:2.0.16-3.el7
  • H
Incorrect Behavior Order: Early Validation

<0:2.0.16-3.el7
  • H
Link Following

<0:2.0.16-3.el7
  • H
Link Following

<0:2.0.16-3.el7
  • H
Incorrect Behavior Order: Early Validation

<0:2.0.16-3.el7
  • H
OS Command Injection

<0:2.0.16-3.el7
  • H
Information Exposure

<0:2.0.16-3.el7
  • H
Insufficiently Protected Credentials

<0:2.0.16-3.el7
  • H
Link Following

<0:2.0.16-3.el7
  • H
OS Command Injection

<0:2.0.16-3.el7
  • H
OS Command Injection

<0:2.0.16-3.el7
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.0.19-3.el7
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.0.16-3.el7
  • M
HTTP Request Smuggling

<0:2.0.19-2.el7
  • M
HTTP Request Smuggling

<0:2.0.16-2.el7
  • M
Improper Input Validation

<0:2.0.16-2.el7
  • M
Improper Input Validation

<0:2.0.19-2.el7
  • M
HTTP Request Smuggling

<0:2.0.13-3.el7
  • M
Improper Input Validation

<0:2.0.13-3.el7
  • M
Improper Input Validation

<0:2.0.13-3.el7