A vulnerability has been found in Envoy up to 1.16.4/1.17.3/1.17.x/1.18.3/1.19.0 and classified as critical. This vulnerability affects an unknown code of the file /app1/admin#foo. Upgrading to version 1.16.5, 1.17.4, 1.18.0, 1.18.4 or 1.19.1 eliminates this vulnerability. The upgrade is hosted for download at envoyproxy.io.
Envoy up to 1.16.4/1.17.3/1.17.x/1.18.3/1.19.0 /app1/admin#foo authorization
- Virtual Patching
- August 25, 2021
- 11:04 am
CVE-2024-31869 : APACHE AIRFLOW UP TO 2.8.4 CONFIGURATION UI PAGE INFORMATION DISCLOSURE
Description Airflow versions 2.7.0 through 2.8.4 have a vulnerability that allows an authenticated user to see sensitive provider configuration via
CVE-2024-24856 : LINUX KERNEL UP TO 6.8 ACPI_ALLOCATE_ZEROED NULL POINTER DEREFERENCE
Description The memory allocation function ACPI_ALLOCATE_ZEROED does not guarantee a successful allocation, but the subsequent code directly dereferences the pointer
CVE-2024-2912 : BENTOML FRAMEWORK UP TO 1.2.4 POST REQUEST INSECURE DEFAULT INITIALIZATION OF RESOURCE
Description An insecure deserialization vulnerability exists in the BentoML framework, allowing remote code execution (RCE) by sending a specially crafted