Page 2 of 8 results (0.010 seconds)

CVSS: 7.5EPSS: 0%CPEs: 6EXPL: 0

Pomerium is an open source identity-aware access proxy. Envoy, which Pomerium is based on, incorrectly handles resetting of HTTP/2 streams with excessive complexity. This can lead to high CPU utilization when a large number of streams are reset. This can result in a DoS condition. Pomerium versions 0.14.8 and 0.15.1 contain an upgraded envoy binary with this vulnerability patched. • https://github.com/envoyproxy/envoy/security/advisories/GHSA-3xh3-33v5-chcc https://github.com/pomerium/pomerium/security/advisories/GHSA-5wjf-62hw-q78r https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ • CWE-834: Excessive Iteration •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

Pomerium from version 0.10.0-0.13.3 has an Open Redirect in the user sign-in/out process Pomerium desde la versión 0.10.0-0.13.3, presenta un Redireccionamiento Abierto en el proceso de inicio y cierre de sesión del usuario • https://github.com/pomerium/pomerium/security/advisories/GHSA-fv82-r8qv-ch4v • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

Pomerium before 0.13.4 has an Open Redirect (issue 1 of 2). Pomerium versiones anteriores a 0.13.4, presenta un redireccionamiento abierto (problema 1 de 2). • https://github.com/pomerium/pomerium/security/advisories/GHSA-35vc-w93w-75c2 • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •