A vulnerability, which was classified as problematic, has been found in Apache Portable Runtime up to 1.6.2/1.7.0. This issue affects the function apr_time_exp
. Upgrading to version 1.6.3 eliminates this vulnerability. Applying a patch is able to eliminate this problem. The bugfix is ready for download at dist.apache.org. The best possible mitigation is suggested to be upgrading to the latest version.
Apache Portable Runtime up to 1.6.2/1.7.0 apr_time_exp out-of-bounds read
- Virtual Patching
- August 23, 2021
- 2:05 pm
CVE-2023-3065 : MOBATIME AMXGT100 UP TO 1.3.20 IMPROPER AUTHENTICATION
Description Improper Authentication vulnerability in Mobatime mobile application AMXGT100 allows Authentication Bypass.This issue affects Mobatime mobile application AMXGT100 through 1.3.20.
CVE-2023-2781 : USER EMAIL VERIFICATION FOR WOOCOMMERCE PLUGIN UP TO 3.5.0 ON WORDPRESS IMPROPER AUTHENTICATION
Description The User Email Verification for WooCommerce plugin for WordPress is vulnerable to authentication bypass via authenticate_user_by_email in versions up
CVE-2023-33965 : BROOK PRIOR 20230606 TPROXY SERVER OS COMMAND INJECTION
Description Brook is a cross-platform programmable network tool. The `tproxy` server is vulnerable to a drive-by command injection. An attacker