Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| envoyproxy | envoy | >= 1.25.0, < 1.25.3 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2023-27487 | 8.2 HIGH | Envoy client may fake the header `x-envoy-original-path` |
| CVE-2023-27493 | 8.1 HIGH | Envoy doesn't escape HTTP header values |
| CVE-2023-27496 | 6.5 MEDIUM | Envoy may crash when a redirect url without a state param is received in the oauth filter |
| CVE-2023-27488 | 5.4 MEDIUM | Envoy gRPC client produces invalid protobuf when an HTTP header with non-UTF8 value is rec |
| CVE-2023-27492 | 4.8 MEDIUM | Envoy may crash when a large request body is processed in Lua filter |
No comments yet