Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
envoyproxy envoy vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2021-28683
An issue exists in Envoy up to and including 1.71.1. There is a remotely exploitable NULL pointer dereference and crash in TLS when an unknown TLS alert code is received.
Envoyproxy Envoy 1.16.2
Envoyproxy Envoy 1.17.1
7.5
CVSSv3
CVE-2020-35471
Envoy prior to 1.16.1 mishandles dropped and truncated datagrams, as demonstrated by a segmentation fault for a UDP packet size larger than 1500.
Envoyproxy Envoy
7.5
CVSSv3
CVE-2020-25018
Envoy master between 2d69e30 and 3b5acb2 may fail to parse request URL that requires host canonicalization.
Envoyproxy Envoy
7.5
CVSSv3
CVE-2020-8663
Envoy version 1.14.2, 1.13.2, 1.12.4 or earlier may exhaust file descriptors and/or memory when accepting too many connections.
Envoyproxy Envoy
7.5
CVSSv3
CVE-2020-12605
Envoy version 1.14.2, 1.13.2, 1.12.4 or earlier may consume excessive amounts of memory when processing HTTP/1.1 headers with long field names or requests with long URLs.
Envoyproxy Envoy
Envoyproxy Envoy 1.13.2
Envoyproxy Envoy 1.14.2
7.5
CVSSv3
CVE-2020-12604
Envoy version 1.14.2, 1.13.2, 1.12.4 or earlier is susceptible to increased memory usage in the case where an HTTP/2 client requests a large payload but does not send enough window updates to consume the entire stream and does not reset the stream.
Envoyproxy Envoy
Envoyproxy Envoy 1.13.2
Envoyproxy Envoy 1.14.2
7.5
CVSSv3
CVE-2020-12603
Envoy version 1.14.2, 1.13.2, 1.12.4 or earlier may consume excessive amounts of memory when proxying HTTP/2 requests or responses with many small (i.e. 1 byte) data frames.
Envoyproxy Envoy
Envoyproxy Envoy 1.13.2
Envoyproxy Envoy 1.14.2
7.5
CVSSv3
CVE-2019-18838
An issue exists in Envoy 1.12.0. Upon receipt of a malformed HTTP request without a Host header, it sends an internally generated "Invalid request" response. This internally generated response is dispatched through the configured encoder filter chain before being sent t...
Envoyproxy Envoy
7.5
CVSSv3
CVE-2019-18836
Envoy 1.12.0 allows a remote denial of service because of resource loops, as demonstrated by a single idle TCP connection being able to keep a worker thread in an infinite busy loop when continue_on_listener_filters_timeout is used."
Envoyproxy Envoy 1.12.0
Istio Istio
7.5
CVSSv3
CVE-2019-15226
Upon receiving each incoming request header data, Envoy will iterate over existing request headers to verify that the total size of the headers stays below a maximum limit. The implementation in versions 1.10.0 up to and including 1.11.1 for HTTP/1.x traffic and all versions of E...
Envoyproxy Envoy 1.0.0
Envoyproxy Envoy 1.1.0
Envoyproxy Envoy 1.2.0
Envoyproxy Envoy 1.4.0
Envoyproxy Envoy 1.6.0
Envoyproxy Envoy 1.11.0
Envoyproxy Envoy 1.11.2
Envoyproxy Envoy 1.7.1
Envoyproxy Envoy 1.8.0
Envoyproxy Envoy 1.9.0
Envoyproxy Envoy 1.9.1
Envoyproxy Envoy 1.3.0
Envoyproxy Envoy 1.5.0
Envoyproxy Envoy 1.7.0
Envoyproxy Envoy 1.10.0
Envoyproxy Envoy 1.11.1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7073
CVE-2024-5496
CVE-2024-5495
XPath injection
bypass
CVE-2024-30043
CVE-2024-24919
denial of service
CVE-2024-35468
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »