Lucene search

K

CVE-2024-23326 Envoy incorrectly accepts HTTP 200 response for entering upgrade mode

🗓️ 04 Jun 2024 20:48:05Reported by GitHub_MType 
vulnrichment
 vulnrichment
🔗 github.com👁 11 Views

CVE-2024-23326 Envoy vulnerability through incorrect HTTP response handlin

Show more
Related
Affected
Refs
[
  {
    "vendor": "envoyproxy",
    "product": "envoy",
    "versions": [
      {
        "status": "affected",
        "version": ">= 1.13.0, <= 1.30.1"
      },
      {
        "status": "affected",
        "version": ">= 1.29.0, <= 1.29.4"
      },
      {
        "status": "affected",
        "version": ">= 1.28.0, <= 1.28.3"
      },
      {
        "status": "affected",
        "version": "<= 1.27.5"
      }
    ]
  }
]

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
04 Jun 2024 20:05Current
6.7Medium risk
Vulners AI Score6.7
CVSS35.9
SSVCNaN
11
.json
Report