Security
Games
Windows
Linux
Android
IOS
News
Reviews
AI
CVE-2020-35470 Vulnerability Details
/
/
/
CVE-2020-35470 Metadata Quick Info
CVE Published: 15/12/2020
|
CVE Updated: 04/08/2024
|
CVE Year: 2020
Source: mitre
|
Vendor: n/a
|
Product: n/a
Status : PUBLISHED
CVE-2020-35470 Description
Envoy before 1.16.1 logs an incorrect downstream address because it considers only the directly connected peer, not the information in the proxy protocol header. This affects situations with tcp-proxy as the network filter (not HTTP filters).
Metrics
CVSS Version: 3.1
|
Base Score: n/a
Vector: n/a
l➤ Exploitability Metrics:
Attack Vector (AV)*
Attack Complexity (AC)*
Privileges Required (PR)*
User Interaction (UI)*
Scope (S)*
l➤ Impact Metrics:
Confidentiality Impact (C)*
Integrity Impact (I)*
Availability Impact (A)*
Weakness Enumeration (CWE)
CWE-ID:
CWE Name: n/a
Source: n/a
Common Attack Pattern Enumeration and Classification (CAPEC)
CAPEC-ID:
CAPEC Description:
Source: NVD (National Vulnerability Database).
Last added CVEs
▸ CVE-2024-9999 ◂
Discovered: 12/11/2024
Status: PUBLISHED
▸ CVE-2024-9997 ◂
Discovered: 29/10/2024
Status: PUBLISHED
▸ CVE-2024-9996 ◂
Discovered: 29/10/2024
Status: PUBLISHED
Tags:
CVE-2020-35470 Vulnerability Details