"A vulnerability was found that makes it possible to abuse the HTTP/2 parser, allowing an attacker to prepend hostnames to a request, append top-level domains to an existing domain, and inject invalid characters through the :method pseudo-header." https://www.haproxy.com/blog/august-2021-haproxy-2-0-http-2-vulnerabilities-fixed/
3 lines
117 B
Plaintext
3 lines
117 B
Plaintext
SHA256 (haproxy-2.3.13.tar.gz) = xlGkTxoRWAhZYupkhSqxY+DSHF7w6kssUhhyjtTb4lc=
|
|
SIZE (haproxy-2.3.13.tar.gz) = 2953437
|