CVE-2024-23326 NVD security document
Reporter | Title | Published | Views | Family All 10 |
---|---|---|---|---|
![]() | CVE-2024-23326 Envoy incorrectly accepts HTTP 200 response for entering upgrade mode | 4 Jun 202420:05 | – | vulnrichment |
![]() | Request Smuggling | 7 Jun 202405:23 | – | veracode |
![]() | BIT-ENVOY-2024-23326 | 6 Jun 202407:20 | – | osv |
![]() | CVE-2024-23326 | 4 Jun 202421:15 | – | osv |
![]() | CVE-2024-23326 Envoy incorrectly accepts HTTP 200 response for entering upgrade mode | 4 Jun 202420:05 | – | cvelist |
![]() | CVE-2024-23326 | 14 Jun 202412:12 | – | redhatcve |
![]() | CVE-2024-23326 | 4 Jun 202421:15 | – | nvd |
![]() | Amazon Linux 2 : ecs-service-connect-agent (ALASECS-2024-037) | 24 Jun 202400:00 | – | nessus |
![]() | Amazon Linux 2023 : ecs-service-connect-agent (ALAS2023-2024-647) | 24 Jun 202400:00 | – | nessus |
![]() | (RHSA-2024:7725) Important: Red Hat OpenShift Service Mesh Containers for 2.5.5 | 7 Oct 202408:21 | – | redhat |
[
{
"vendor": "envoyproxy",
"product": "envoy",
"versions": [
{
"version": ">= 1.13.0, <= 1.30.1",
"status": "affected"
},
{
"version": ">= 1.29.0, <= 1.29.4",
"status": "affected"
},
{
"version": ">= 1.28.0, <= 1.28.3",
"status": "affected"
},
{
"version": "<= 1.27.5",
"status": "affected"
}
]
}
]
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo