Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| envoyproxy | envoy | >= 1.25.0, < 1.25.3 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2023-27487 | 8.2 HIGH | Envoy client may fake the header `x-envoy-original-path` |
| CVE-2023-27493 | 8.1 HIGH | Envoy doesn't escape HTTP header values |
| CVE-2023-27488 | 5.4 MEDIUM | Envoy gRPC client produces invalid protobuf when an HTTP header with non-UTF8 value is rec |
| CVE-2023-27491 | 5.4 MEDIUM | Envoy forwards invalid Http2/Http3 downstream headers |
| CVE-2023-27492 | 4.8 MEDIUM | Envoy may crash when a large request body is processed in Lua filter |
No comments yet