CVE-2024-34364
- EPSS 0.02%
- Veröffentlicht 04.06.2024 21:15:34
- Zuletzt bearbeitet 21.11.2024 09:18:30
Envoy is a cloud-native, open source edge and service proxy. Envoy exposed an out-of-memory (OOM) vector from the mirror response, since async HTTP client will buffer the response with an unbounded buffer.
CVE-2024-34363
- EPSS 0.03%
- Veröffentlicht 04.06.2024 21:15:34
- Zuletzt bearbeitet 21.11.2024 09:18:30
Envoy is a cloud-native, open source edge and service proxy. Due to how Envoy invoked the nlohmann JSON library, the library could throw an uncaught exception from downstream data if incomplete UTF-8 strings were serialized. The uncaught exception wo...
CVE-2024-32975
- EPSS 0.03%
- Veröffentlicht 04.06.2024 21:15:33
- Zuletzt bearbeitet 21.11.2024 09:16:08
Envoy is a cloud-native, open source edge and service proxy. There is a crash at `QuicheDataReader::PeekVarInt62Length()`. It is caused by integer underflow in the `QuicStreamSequencerBuffer::PeekRegion()` implementation.
CVE-2024-32974
- EPSS 0.03%
- Veröffentlicht 04.06.2024 21:15:33
- Zuletzt bearbeitet 21.11.2024 09:16:08
Envoy is a cloud-native, open source edge and service proxy. A crash was observed in `EnvoyQuicServerStream::OnInitialHeadersComplete()` with following call stack. It is a use-after-free caused by QUICHE continuing push request headers after `StopRea...
CVE-2024-23326
- EPSS 0.06%
- Veröffentlicht 04.06.2024 21:15:33
- Zuletzt bearbeitet 21.11.2024 08:57:30
Envoy is a cloud-native, open source edge and service proxy. A theoretical request smuggling vulnerability exists through Envoy if a server can be tricked into adding an upgrade header into a response. Per RFC https://www.rfc-editor.org/rfc/rfc7230#s...
CVE-2024-32475
- EPSS 0.14%
- Veröffentlicht 18.04.2024 15:15:30
- Zuletzt bearbeitet 04.09.2025 19:39:08
Envoy is a cloud-native, open source edge and service proxy. When an upstream TLS cluster is used with `auto_sni` enabled, a request containing a `host`/`:authority` header longer than 255 characters triggers an abnormal termination of Envoy process....
CVE-2024-30255
- EPSS 88.81%
- Veröffentlicht 04.04.2024 20:15:08
- Zuletzt bearbeitet 04.11.2025 19:17:06
Envoy is a cloud-native, open source edge and service proxy. The HTTP/2 protocol stack in Envoy versions prior to 1.29.3, 1.28.2, 1.27.4, and 1.26.8 are vulnerable to CPU exhaustion due to flood of CONTINUATION frames. Envoy's HTTP/2 codec allows the...
CVE-2024-27919
- EPSS 19.05%
- Veröffentlicht 04.04.2024 15:15:38
- Zuletzt bearbeitet 04.11.2025 19:17:04
Envoy is a cloud-native, open-source edge and service proxy. In versions 1.29.0 and 1.29.1, theEnvoy HTTP/2 protocol stack is vulnerable to the flood of CONTINUATION frames. Envoy's HTTP/2 codec does not reset a request when header map limits have be...
CVE-2024-23327
- EPSS 0.14%
- Veröffentlicht 09.02.2024 23:15:09
- Zuletzt bearbeitet 21.11.2024 08:57:31
Envoy is a high-performance edge/middle/service proxy. When PPv2 is enabled both on a listener and subsequent cluster, the Envoy instance will segfault when attempting to craft the upstream PPv2 header. This occurs when the downstream request has a c...
CVE-2024-23325
- EPSS 0.04%
- Veröffentlicht 09.02.2024 23:15:09
- Zuletzt bearbeitet 21.11.2024 08:57:30
Envoy is a high-performance edge/middle/service proxy. Envoy crashes in Proxy protocol when using an address type that isn’t supported by the OS. Envoy is susceptible to crashing on a host with IPv6 disabled and a listener config with proxy protocol ...