Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| envoyproxy | envoy | >= 1.20.0, < 1.20.2 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2021-43826 | 7.5 HIGH | Crash when tunneling TCP over HTTP in Envoy |
| CVE-2022-21655 | 7.5 HIGH | Incorrect handling of internal redirects results in crash in Envoy |
| CVE-2021-43824 | 7.5 HIGH | Null pointer dereference in envoy |
| CVE-2022-21654 | 7.4 HIGH | Incorrect configuration handling allows TLS session re-use without re-validation in Envoy |
| CVE-2022-21656 | 7.4 HIGH | X.509 subjectAltName matching bypass in Envoy |
| CVE-2022-21657 | 6.8 MEDIUM | X.509 Extended Key Usage and Trust Purposes bypass in Envoy |
| CVE-2021-43825 | 6.1 MEDIUM | Use-after-free in Envoy |
No comments yet