Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cncf envoy vulnerabilities and exploits
(subscribe to this query)
5.3
CVSSv3
CVE-2020-8660
CNCF Envoy up to and including 1.13.0 TLS inspector bypass. TLS inspector could have been bypassed (not recognized as a TLS client) by a client using only TLS 1.3. Because TLS extensions (SNI, ALPN) were not inspected, those connections might have been matched to a wrong filter c...
Envoyproxy Envoy
7.5
CVSSv3
CVE-2020-8661
CNCF Envoy up to and including 1.13.0 may consume excessive amounts of memory when responding internally to pipelined requests.
Cncf Envoy
Redhat Openshift Service Mesh 1.0.9
5.3
CVSSv3
CVE-2020-8664
CNCF Envoy up to and including 1.13.0 has incorrect Access Control when using SDS with Combined Validation Context. Using the same secret (e.g. trusted CA) across many resources together with the combined validation context could lead to the “static” part of the valid...
Cncf Envoy
7.5
CVSSv3
CVE-2020-8659
CNCF Envoy up to and including 1.13.0 may consume excessive amounts of memory when proxying HTTP/1.1 requests or responses with many small (i.e. 1 byte) chunks.
Cncf Envoy
Redhat Openshift Service Mesh 1.0
Debian Debian Linux 9.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4367
CVE-2024-35977
CVE-2023-49335
man-in-the-middle
CVE-2024-4947
CVE-2024-31714
memory leak
SQL
CVE-2024-35994
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started