Envoyproxy

Envoy

90 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.02%
  • Veröffentlicht 04.06.2024 21:15:34
  • Zuletzt bearbeitet 21.11.2024 09:18:30

Envoy is a cloud-native, open source edge and service proxy. Envoy exposed an out-of-memory (OOM) vector from the mirror response, since async HTTP client will buffer the response with an unbounded buffer.

Exploit
  • EPSS 0.03%
  • Veröffentlicht 04.06.2024 21:15:34
  • Zuletzt bearbeitet 21.11.2024 09:18:30

Envoy is a cloud-native, open source edge and service proxy. Due to how Envoy invoked the nlohmann JSON library, the library could throw an uncaught exception from downstream data if incomplete UTF-8 strings were serialized. The uncaught exception wo...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 04.06.2024 21:15:33
  • Zuletzt bearbeitet 21.11.2024 09:16:08

Envoy is a cloud-native, open source edge and service proxy. There is a crash at `QuicheDataReader::PeekVarInt62Length()`. It is caused by integer underflow in the `QuicStreamSequencerBuffer::PeekRegion()` implementation.

Exploit
  • EPSS 0.03%
  • Veröffentlicht 04.06.2024 21:15:33
  • Zuletzt bearbeitet 21.11.2024 09:16:08

Envoy is a cloud-native, open source edge and service proxy. A crash was observed in `EnvoyQuicServerStream::OnInitialHeadersComplete()` with following call stack. It is a use-after-free caused by QUICHE continuing push request headers after `StopRea...

  • EPSS 0.06%
  • Veröffentlicht 04.06.2024 21:15:33
  • Zuletzt bearbeitet 21.11.2024 08:57:30

Envoy is a cloud-native, open source edge and service proxy. A theoretical request smuggling vulnerability exists through Envoy if a server can be tricked into adding an upgrade header into a response. Per RFC https://www.rfc-editor.org/rfc/rfc7230#s...

  • EPSS 0.14%
  • Veröffentlicht 18.04.2024 15:15:30
  • Zuletzt bearbeitet 04.09.2025 19:39:08

Envoy is a cloud-native, open source edge and service proxy. When an upstream TLS cluster is used with `auto_sni` enabled, a request containing a `host`/`:authority` header longer than 255 characters triggers an abnormal termination of Envoy process....

  • EPSS 88.81%
  • Veröffentlicht 04.04.2024 20:15:08
  • Zuletzt bearbeitet 04.11.2025 19:17:06

Envoy is a cloud-native, open source edge and service proxy. The HTTP/2 protocol stack in Envoy versions prior to 1.29.3, 1.28.2, 1.27.4, and 1.26.8 are vulnerable to CPU exhaustion due to flood of CONTINUATION frames. Envoy's HTTP/2 codec allows the...

  • EPSS 19.05%
  • Veröffentlicht 04.04.2024 15:15:38
  • Zuletzt bearbeitet 04.11.2025 19:17:04

Envoy is a cloud-native, open-source edge and service proxy. In versions 1.29.0 and 1.29.1, theEnvoy HTTP/2 protocol stack is vulnerable to the flood of CONTINUATION frames. Envoy's HTTP/2 codec does not reset a request when header map limits have be...

  • EPSS 0.14%
  • Veröffentlicht 09.02.2024 23:15:09
  • Zuletzt bearbeitet 21.11.2024 08:57:31

Envoy is a high-performance edge/middle/service proxy. When PPv2 is enabled both on a listener and subsequent cluster, the Envoy instance will segfault when attempting to craft the upstream PPv2 header. This occurs when the downstream request has a c...

  • EPSS 0.04%
  • Veröffentlicht 09.02.2024 23:15:09
  • Zuletzt bearbeitet 21.11.2024 08:57:30

Envoy is a high-performance edge/middle/service proxy. Envoy crashes in Proxy protocol when using an address type that isn’t supported by the OS. Envoy is susceptible to crashing on a host with IPv6 disabled and a listener config with proxy protocol ...