This page was not yet optimized for use on mobile devices.
CVE-2015-3281
Data ?
Vulnerability ID | CVE-2015-3281 |
---|---|
Published on | 06.07.2015 15:59 |
Severity | MEDIUM |
Vulnerable configurations ?
- cpe:2.3:a:haproxy:haproxy:1.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:haproxy:haproxy:1.5.10:*:*:*:*:*:*:*
- cpe:2.3:a:haproxy:haproxy:1.5.11:*:*:*:*:*:*:*
- cpe:2.3:a:haproxy:haproxy:1.5.12:*:*:*:*:*:*:*
- cpe:2.3:a:haproxy:haproxy:1.5.13:*:*:*:*:*:*:*
- cpe:2.3:a:haproxy:haproxy:1.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:haproxy:haproxy:1.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:haproxy:haproxy:1.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:haproxy:haproxy:1.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:haproxy:haproxy:1.5.5:*:*:*:*:*:*:*
-
…
Vulnerable certificates ?
The CVE was matched to the following certificates. This means the vulnerability likely affects said certified devices. However, this is an automated process that may have false positives and negatives.