CVE编号
利用情况
补丁情况
披露时间
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | haproxy | haproxy | * |
From (including) 1.8.0 |
Up to (including) 1.8.9 |
||||
运行在以下环境 | |||||||||
系统 | debian_10 | haproxy | * |
Up to (excluding) 1.8.9-2 |
|||||
运行在以下环境 | |||||||||
系统 | debian_11 | haproxy | * |
Up to (excluding) 1.8.9-2 |
|||||
运行在以下环境 | |||||||||
系统 | debian_12 | haproxy | * |
Up to (excluding) 1.8.9-2 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_28 | haproxy | * |
Up to (excluding) 1.8.12-2.fc28 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.0 | haproxy | * |
Up to (excluding) 1.8.14 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_18.04 | haproxy | * |
Up to (excluding) 1.8.8-1ubuntu0.1 |
|||||