Lucene search

K

11 matches found

CVE
CVE
added 2020/03/04 10:15 p.m.103 views

CVE-2020-8660

CNCF Envoy through 1.13.0 TLS inspector bypass. TLS inspector could have been bypassed (not recognized as a TLS client) by a client using only TLS 1.3. Because TLS extensions (SNI, ALPN) were not inspected, those connections might have been matched to a wrong filter chain, possibly bypassing some s...

5.3CVSS5.6AI score0.00025EPSS
CVE
CVE
added 2020/07/01 3:15 p.m.101 views

CVE-2020-12605

Envoy version 1.14.2, 1.13.2, 1.12.4 or earlier may consume excessive amounts of memory when processing HTTP/1.1 headers with long field names or requests with long URLs.

7.5CVSS7.4AI score0.00607EPSS
CVE
CVE
added 2020/07/01 3:15 p.m.96 views

CVE-2020-12604

Envoy version 1.14.2, 1.13.2, 1.12.4 or earlier is susceptible to increased memory usage in the case where an HTTP/2 client requests a large payload but does not send enough window updates to consume the entire stream and does not reset the stream.

7.5CVSS7.3AI score0.00435EPSS
CVE
CVE
added 2020/04/15 2:15 a.m.95 views

CVE-2020-11767

Istio through 1.5.1 and Envoy through 1.14.1 have a data-leak issue. If there is a TCP connection (negotiated with SNI over HTTPS) to *.example.com, a request for a domain concurrently configured explicitly (e.g., abc.example.com) is sent to the server(s) listening behind *.example.com. The outcome...

3.1CVSS3.9AI score0.00087EPSS
CVE
CVE
added 2020/07/01 2:15 p.m.92 views

CVE-2020-12603

Envoy version 1.14.2, 1.13.2, 1.12.4 or earlier may consume excessive amounts of memory when proxying HTTP/2 requests or responses with many small (i.e. 1 byte) data frames.

7.5CVSS7.4AI score0.00607EPSS
CVE
CVE
added 2020/07/01 3:15 p.m.90 views

CVE-2020-8663

Envoy version 1.14.2, 1.13.2, 1.12.4 or earlier may exhaust file descriptors and/or memory when accepting too many connections.

7.5CVSS7.4AI score0.00091EPSS
CVE
CVE
added 2020/12/15 1:15 a.m.78 views

CVE-2020-35471

Envoy before 1.16.1 mishandles dropped and truncated datagrams, as demonstrated by a segmentation fault for a UDP packet size larger than 1500.

7.5CVSS7.5AI score0.00069EPSS
CVE
CVE
added 2020/07/14 10:15 p.m.69 views

CVE-2020-15104

In Envoy before versions 1.12.6, 1.13.4, 1.14.4, and 1.15.0 when validating TLS certificates, Envoy would incorrectly allow a wildcard DNS Subject Alternative Name apply to multiple subdomains. For example, with a SAN of *.example.com, Envoy would incorrectly allow nested.subdomain.example.com, whe...

5.5CVSS5.2AI score0.00116EPSS
CVE
CVE
added 2020/12/15 1:15 a.m.62 views

CVE-2020-35470

Envoy before 1.16.1 logs an incorrect downstream address because it considers only the directly connected peer, not the information in the proxy protocol header. This affects situations with tcp-proxy as the network filter (not HTTP filters).

8.8CVSS8.5AI score0.00781EPSS
CVE
CVE
added 2020/10/01 5:15 p.m.56 views

CVE-2020-25017

Envoy through 1.15.0 only considers the first value when multiple header values are present for some HTTP headers. Envoy’s setCopy() header map API does not replace all existing occurences of a non-inline header.

8.3CVSS8.1AI score0.00053EPSS
CVE
CVE
added 2020/10/01 5:15 p.m.51 views

CVE-2020-25018

Envoy master between 2d69e30 and 3b5acb2 may fail to parse request URL that requires host canonicalization.

7.5CVSS7.5AI score0.02911EPSS