CVE-2021-21378
- EPSS 0.42%
- Veröffentlicht 11.03.2021 03:15:12
- Zuletzt bearbeitet 21.11.2024 05:48:14
Envoy is a cloud-native high-performance edge/middle/service proxy. In Envoy version 1.17.0 an attacker can bypass authentication by presenting a JWT token with an issuer that is not in the provider list when Envoy's JWT Authentication filter is conf...
CVE-2020-35471
- EPSS 0.07%
- Veröffentlicht 15.12.2020 01:15:13
- Zuletzt bearbeitet 21.11.2024 05:27:21
Envoy before 1.16.1 mishandles dropped and truncated datagrams, as demonstrated by a segmentation fault for a UDP packet size larger than 1500.
CVE-2020-35470
- EPSS 0.78%
- Veröffentlicht 15.12.2020 01:15:13
- Zuletzt bearbeitet 21.11.2024 05:27:21
Envoy before 1.16.1 logs an incorrect downstream address because it considers only the directly connected peer, not the information in the proxy protocol header. This affects situations with tcp-proxy as the network filter (not HTTP filters).
CVE-2020-25018
- EPSS 2.91%
- Veröffentlicht 01.10.2020 17:15:13
- Zuletzt bearbeitet 21.11.2024 05:16:32
Envoy master between 2d69e30 and 3b5acb2 may fail to parse request URL that requires host canonicalization.
CVE-2020-25017
- EPSS 0.05%
- Veröffentlicht 01.10.2020 17:15:13
- Zuletzt bearbeitet 21.11.2024 05:16:31
Envoy through 1.15.0 only considers the first value when multiple header values are present for some HTTP headers. Envoy’s setCopy() header map API does not replace all existing occurences of a non-inline header.
CVE-2020-15104
- EPSS 0.12%
- Veröffentlicht 14.07.2020 22:15:10
- Zuletzt bearbeitet 21.11.2024 05:04:49
In Envoy before versions 1.12.6, 1.13.4, 1.14.4, and 1.15.0 when validating TLS certificates, Envoy would incorrectly allow a wildcard DNS Subject Alternative Name apply to multiple subdomains. For example, with a SAN of *.example.com, Envoy would in...
CVE-2020-8663
- EPSS 0.11%
- Veröffentlicht 01.07.2020 15:15:15
- Zuletzt bearbeitet 21.11.2024 05:39:13
Envoy version 1.14.2, 1.13.2, 1.12.4 or earlier may exhaust file descriptors and/or memory when accepting too many connections.
CVE-2020-12605
- EPSS 0.79%
- Veröffentlicht 01.07.2020 15:15:12
- Zuletzt bearbeitet 21.11.2024 04:59:54
Envoy version 1.14.2, 1.13.2, 1.12.4 or earlier may consume excessive amounts of memory when processing HTTP/1.1 headers with long field names or requests with long URLs.
CVE-2020-12604
- EPSS 0.44%
- Veröffentlicht 01.07.2020 15:15:12
- Zuletzt bearbeitet 21.11.2024 04:59:54
Envoy version 1.14.2, 1.13.2, 1.12.4 or earlier is susceptible to increased memory usage in the case where an HTTP/2 client requests a large payload but does not send enough window updates to consume the entire stream and does not reset the stream.
CVE-2020-12603
- EPSS 0.79%
- Veröffentlicht 01.07.2020 14:15:14
- Zuletzt bearbeitet 21.11.2024 04:59:54
Envoy version 1.14.2, 1.13.2, 1.12.4 or earlier may consume excessive amounts of memory when proxying HTTP/2 requests or responses with many small (i.e. 1 byte) data frames.