{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T19:21:09.953","vulnerabilities":[{"cve":{"id":"CVE-2024-45807","sourceIdentifier":"security-advisories@github.com","published":"2024-09-20T00:15:02.520","lastModified":"2024-09-25T17:12:38.380","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Envoy is a cloud-native high-performance edge/middle/service proxy. Envoy's 1.31 is using `oghttp` as the default HTTP/2 codec, and there are potential bugs around stream management in the codec. To resolve this Envoy will switch off the `oghttp2` by default. The impact of this issue is that envoy will crash. This issue has been addressed in release version 1.31.2. All users are advised to upgrade. There are no known workarounds for this issue."},{"lang":"es","value":"Envoy es un proxy de servicio, de borde y de medio alcance de alto rendimiento nativo de la nube. La versión 1.31 de Envoy utiliza `oghttp` como el códec HTTP/2 predeterminado y existen posibles errores en la administración de transmisiones en el códec. Para resolver esto, Envoy desactivará `oghttp2` de manera predeterminada. El impacto de este problema es que Envoy se bloqueará. Este problema se ha solucionado en la versión 1.31.2. Se recomienda a todos los usuarios que actualicen. No existen workarounds conocidas para este problema."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-670"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*","versionStartIncluding":"1.31.0","versionEndExcluding":"1.31.2","matchCriteriaId":"C765FFC0-2FF7-4318-A347-2AFCAD0E7C74"}]}]}],"references":[{"url":"https://github.com/envoyproxy/envoy/security/advisories/GHSA-qc52-r4x5-9w37","source":"security-advisories@github.com","tags":["Vendor Advisory"]}]}}]}