Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cncf envoy vulnerabilities and exploits
(subscribe to this query)
5.3
CVSSv3
CVE-2020-8664
CNCF Envoy up to and including 1.13.0 has incorrect Access Control when using SDS with Combined Validation Context. Using the same secret (e.g. trusted CA) across many resources together with the combined validation context could lead to the “static” part of the valid...
Cncf Envoy
7.5
CVSSv3
CVE-2020-8661
CNCF Envoy up to and including 1.13.0 may consume excessive amounts of memory when responding internally to pipelined requests.
Cncf Envoy
Redhat Openshift Service Mesh 1.0.9
7.5
CVSSv3
CVE-2020-8659
CNCF Envoy up to and including 1.13.0 may consume excessive amounts of memory when proxying HTTP/1.1 requests or responses with many small (i.e. 1 byte) chunks.
Cncf Envoy
Redhat Openshift Service Mesh 1.0
Debian Debian Linux 9.0
5.3
CVSSv3
CVE-2020-8660
CNCF Envoy up to and including 1.13.0 TLS inspector bypass. TLS inspector could have been bypassed (not recognized as a TLS client) by a client using only TLS 1.3. Because TLS extensions (SNI, ALPN) were not inspected, those connections might have been matched to a wrong filter c...
Envoyproxy Envoy
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-3400
deserialization
CVE-2024-21788
CVE-2023-42433
CVE-2024-21841
CVE-2024-22095
local file inclusion
memory leak
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started