📦 Contour
by Projectcontour
🔍 What is Contour?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This vulnerability in Contour v1.28.3 allows attackers to access Kubernetes service account tokens due to insecure permissions. Attackers can use these tokens to escalate privileges and access sensiti...
CVE-2023-44487 is an HTTP/2 protocol vulnerability that allows attackers to cause denial of service by rapidly resetting streams, consuming server resources. This affects any system using HTTP/2, incl...
This vulnerability in Contour Kubernetes ingress controller allows attackers to access Envoy's admin interface via specially crafted ExternalName Services. This enables remote denial of service, traff...