A vulnerability, which was classified as problematic, has been found in Apache Portable Runtime up to 1.6.2/1.7.0. This issue affects the function apr_time_exp
. Upgrading to version 1.6.3 eliminates this vulnerability. Applying a patch is able to eliminate this problem. The bugfix is ready for download at dist.apache.org. The best possible mitigation is suggested to be upgrading to the latest version.
Apache Portable Runtime up to 1.6.2/1.7.0 apr_time_exp out-of-bounds read
- Virtual Patching
- August 23, 2021
- 2:05 pm
CVE-2024-21511 : MYSQL2 UP TO 3.9.6 READCODEFOR TIMEZONE CODE INJECTION
Description Versions of the package mysql2 before 3.9.7 are vulnerable to Arbitrary Code Injection due to improper sanitization of the
CVE-2024-29733 : APACHE AIRFLOW UP TO 3.6.X FTP PROVIDER CERTIFICATE VALIDATION
Description Improper Certificate Validation vulnerability in Apache Airflow FTP Provider. The FTP hook lacks complete certificate validation in FTP_TLS connections,
CVE-2024-29204 : IVANTI AVALANCHE UP TO 6.4.2 WLAVALANCHESERVICE HEAP-BASED OVERFLOW
Description A Heap Overflow vulnerability in WLAvalancheService component of Ivanti Avalanche before 6.4.3 allows a remote unauthenticated attacker to execute