CVE编号
利用情况
补丁情况
披露时间
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | haproxy | haproxy | * |
From (including) 2.2.0 |
Up to (excluding) 2.5.2 |
||||
运行在以下环境 | |||||||||
应用 | redhat | openshift_container_platform | 4.0 | - | |||||
运行在以下环境 | |||||||||
应用 | redhat | software_collections | - | - | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.12 | haproxy | * |
Up to (excluding) 2.2.21-r0 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.13 | haproxy | * |
Up to (excluding) 2.2.21-r0 |
|||||
运行在以下环境 | |||||||||
系统 | amazon_2 | haproxy2 | * |
Up to (excluding) 2.2.17-1.amzn2.0.2 |
|||||
运行在以下环境 | |||||||||
系统 | debian_10 | haproxy | * |
Up to (excluding) 1.8.19-1+deb10u3 |
|||||
运行在以下环境 | |||||||||
系统 | debian_11 | haproxy | * |
Up to (excluding) 2.2.9-2+deb11u3 |
|||||
运行在以下环境 | |||||||||
系统 | debian_12 | haproxy | * |
Up to (excluding) 2.4.13-1 |
|||||
运行在以下环境 | |||||||||
系统 | debian_9 | haproxy | * |
Up to (including) 1.7.5-2 |
|||||
运行在以下环境 | |||||||||
系统 | debian_sid | haproxy | * |
Up to (excluding) 2.4.13-1 |
|||||
运行在以下环境 | |||||||||
系统 | kylinos_aarch64_V10SP2 | haproxy | * |
Up to (excluding) 2.2.16-3.ky10 |
|||||
运行在以下环境 | |||||||||
系统 | kylinos_x86_64_V10SP2 | haproxy | * |
Up to (excluding) 2.2.16-3.ky10 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.4 | haproxy | * |
Up to (excluding) 2.4.8 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_20.04 | haproxy | * |
Up to (excluding) 2.0.13-2ubuntu0.5 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_21.10 | haproxy | * |
Up to (excluding) 2.2.9-2ubuntu2.1 |
|||||