CVE-2024-23326 Envoy vulnerability through incorrect HTTP response handlin
Reporter | Title | Published | Views | Family All 9 |
---|---|---|---|---|
Veracode | Request Smuggling | 7 Jun 202405:23 | – | veracode |
NVD | CVE-2024-23326 | 4 Jun 202421:15 | – | nvd |
Cvelist | CVE-2024-23326 Envoy incorrectly accepts HTTP 200 response for entering upgrade mode | 4 Jun 202420:05 | – | cvelist |
OSV | BIT-envoy-2024-23326 | 6 Jun 202407:20 | – | osv |
RedhatCVE | CVE-2024-23326 | 14 Jun 202412:12 | – | redhatcve |
CVE | CVE-2024-23326 | 4 Jun 202421:15 | – | cve |
Tenable Nessus | Amazon Linux 2 : ecs-service-connect-agent (ALASECS-2024-037) | 24 Jun 202400:00 | – | nessus |
Tenable Nessus | Amazon Linux 2023 : ecs-service-connect-agent (ALAS2023-2024-647) | 24 Jun 202400:00 | – | nessus |
RedHat Linux | (RHSA-2024:7725) Important: Red Hat OpenShift Service Mesh Containers for 2.5.5 | 7 Oct 202408:21 | – | redhat |
[
{
"vendor": "envoyproxy",
"product": "envoy",
"versions": [
{
"status": "affected",
"version": ">= 1.13.0, <= 1.30.1"
},
{
"status": "affected",
"version": ">= 1.29.0, <= 1.29.4"
},
{
"status": "affected",
"version": ">= 1.28.0, <= 1.28.3"
},
{
"status": "affected",
"version": "<= 1.27.5"
}
]
}
]
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo