- EPSS 0.01%
- Veröffentlicht 13.04.2026 00:00:00
- Zuletzt bearbeitet 22.04.2026 19:17:02
An issue was discovered in HAProxy before 3.3.6. The HTTP/3 parser does not check that the received body length matches a previously announced content-length when the stream is closed via a frame with an empty payload. This can cause desynchronizatio...
CVE-2026-5501
- EPSS 0.02%
- Veröffentlicht 10.04.2026 04:17:17
- Zuletzt bearbeitet 27.04.2026 17:57:21
wolfSSL_X509_verify_cert in the OpenSSL compatibility layer accepts a certificate chain in which the leaf's signature is not checked, if the attacker supplies an untrusted intermediate with Basic Constraints `CA:FALSE` that is legitimately signed by ...
CVE-2025-11230
- EPSS 0.47%
- Veröffentlicht 19.11.2025 09:28:39
- Zuletzt bearbeitet 19.12.2025 16:44:55
Inefficient algorithm complexity in mjson in HAProxy allows remote attackers to cause a denial of service via specially crafted JSON requests.
CVE-2025-32464
- EPSS 4.65%
- Veröffentlicht 09.04.2025 00:00:00
- Zuletzt bearbeitet 15.04.2026 00:35:42
HAProxy 2.2 through 3.1.6, in certain uncommon configurations, has a sample_conv_regsub heap-based buffer overflow because of mishandling of the replacement of multiple short patterns with a longer one.
CVE-2024-53008
- EPSS 0.16%
- Veröffentlicht 28.11.2024 03:15:16
- Zuletzt bearbeitet 15.04.2026 00:35:42
Inconsistent interpretation of HTTP requests ('HTTP Request/Response Smuggling') issue exists in HAProxy. If this vulnerability is exploited, a remote attacker may access a path that is restricted by ACL (Access Control List) set on the product. As ...
CVE-2024-49214
- EPSS 0.11%
- Veröffentlicht 14.10.2024 04:15:05
- Zuletzt bearbeitet 15.04.2026 00:35:42
QUIC in HAProxy 3.1.x before 3.1-dev7, 3.0.x before 3.0.5, and 2.9.x before 2.9.11 allows opening a 0-RTT session with a spoofed IP address. This can bypass the IP allow/block list functionality.
CVE-2024-45506
- EPSS 1.5%
- Veröffentlicht 04.09.2024 15:15:14
- Zuletzt bearbeitet 14.03.2025 20:15:13
HAProxy 2.9.x before 2.9.10, 3.0.x before 3.0.4, and 3.1.x through 3.1-dev6 allows a remote denial of service for HTTP/2 zero-copy forwarding (h2_send loop) under a certain set of conditions, as exploited in the wild in 2024.
CVE-2023-45539
- EPSS 0.03%
- Veröffentlicht 28.11.2023 20:15:07
- Zuletzt bearbeitet 21.11.2024 08:26:56
HAProxy before 2.8.2 accepts # as part of the URI component, which might allow remote attackers to obtain sensitive information or have unspecified other impact upon misinterpretation of a path_end rule, such as routing index.html#.png to a static se...
CVE-2023-40225
- EPSS 0.03%
- Veröffentlicht 10.08.2023 21:15:10
- Zuletzt bearbeitet 21.11.2024 08:19:02
HAProxy through 2.0.32, 2.1.x and 2.2.x through 2.2.30, 2.3.x and 2.4.x through 2.4.23, 2.5.x and 2.6.x before 2.6.15, 2.7.x before 2.7.10, and 2.8.x before 2.8.2 forwards empty Content-Length headers, violating RFC 9110 section 8.6. In uncommon case...
CVE-2023-25950
- EPSS 0.08%
- Veröffentlicht 11.04.2023 09:15:07
- Zuletzt bearbeitet 11.02.2025 16:15:32
HTTP request/response smuggling vulnerability in HAProxy version 2.7.0, and 2.6.1 to 2.6.7 allows a remote attacker to alter a legitimate user's request. As a result, the attacker may obtain sensitive information or cause a denial-of-service (DoS) co...