Vulnerabilities (CVE)

Filtered by vendor Envoyproxy Subscribe
Filtered by product Envoy
Total 62 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2019-15225 1 Envoyproxy 1 Envoy 2023-12-10 5.0 MEDIUM 7.5 HIGH
In Envoy through 1.11.1, users may configure a route to match incoming path headers via the libstdc++ regular expression implementation. A remote attacker may send a request with a very long URI to result in a denial of service (memory consumption). This is a related issue to CVE-2019-14993.
CVE-2019-9900 2 Envoyproxy, Redhat 2 Envoy, Openshift Service Mesh 2023-12-10 7.5 HIGH 8.3 HIGH
When parsing HTTP/1.x header values, Envoy 1.9.0 and before does not reject embedded zero characters (NUL, ASCII 0x0). This allows remote attackers crafting header values containing embedded NUL characters to potentially bypass header matching rules, gaining access to unauthorized resources.