📦 Consul
by Hashicorp
🔍 What is Consul?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This vulnerability allows users with service:write permissions in Consul to modify Envoy proxy configurations for downstream services they don't own. Attackers could redirect, intercept, or manipulate...
This vulnerability in HashiCorp Consul's Envoy proxy allows TLS connections to bypass service identity validation. Attackers could potentially intercept or manipulate traffic between services by imper...
This vulnerability allows attackers to bypass audit logging in HashiCorp Consul Enterprise by sending specifically crafted HTTP events. This affects Consul Enterprise versions 1.8.0 through 1.9.4, pot...
Consul's key/value endpoint is vulnerable to denial of service due to incorrect Content Length header validation. Attackers can send malformed requests to crash or degrade Consul service availability....
Consul's event endpoint is vulnerable to denial of service (DoS) attacks due to lack of validation on Content-Length headers, allowing attackers to send excessively large requests that consume server ...