High Severity Vulnerabilities

Found 5145 vulnerabilities at High severity.

Reference
Title
Technology
Envoy Proxy Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability
Envoy Proxy Improper Check for Unusual or Exceptional Conditions Vulnerability
Envoy Proxy Incorrect Authorization Vulnerability
Envoy Proxy Excessive Iteration Vulnerability
Envoy Proxy Incorrect Authorization Vulnerability
Envoy Proxy Incorrect Authorization Vulnerability
Envoy Proxy Excessive Iteration Vulnerability
Envoy Proxy Improper Check for Unusual or Exceptional Conditions Vulnerability
Envoy Proxy Always-Incorrect Control Flow Implementation Vulnerability
Envoy Proxy Use After Free Vulnerability
Envoy Proxy Use After Free Vulnerability
Envoy Proxy NULL Pointer Dereference Vulnerability
Envoy Proxy Reachable Assertion Vulnerability
Envoy Proxy Use After Free Vulnerability
Envoy Proxy Improper Handling of Highly Compressed Data (Data Amplification) Vulnerability
Envoy Proxy Vulnerability
Envoy Proxy Incomplete Cleanup Vulnerability
Envoy Proxy Use After Free Vulnerability
Envoy Proxy Use After Free Vulnerability
Envoy Proxy Vulnerability
Envoy Proxy Improper Handling of Exceptional Conditions Vulnerability
Envoy Proxy NULL Pointer Dereference Vulnerability
Envoy Proxy Inconsistent Interpretation of HTTP Requests (HTTP Request/Response Smuggling) Vulnerability
Envoy Proxy Use After Free Vulnerability
Envoy Proxy Integer Underflow (Wrap or Wraparound) Vulnerability
Envoy Proxy Loop with Unreachable Exit Condition (Infinite Loop) Vulnerability
Envoy Proxy Other Vulnerability
Envoy Proxy Uncontrolled Resource Consumption Vulnerability
Envoy Proxy NULL Pointer Dereference Vulnerability
Envoy Proxy Vulnerability