A vulnerability, which was classified as critical, was found in Envoy up to 1.16.4/1.17.3/1.18.3/1.19.0. This affects an unknown part of the component ext-authz Extension. Upgrading to version 1.16.5, 1.17.4, 1.18.4 or 1.19.1 eliminates this vulnerability. The upgrade is hosted for download at envoyproxy.io.
Envoy up to 1.16.4/1.17.3/1.18.3/1.19.0 ext-authz Extension authorization
- Virtual Patching
- August 25, 2021
- 11:04 am
CVE-2024-34515 : SPATIE IMAGE-OPTIMIZER UP TO 1.7.2 PHAR DESERIALIZATION FILE_EXISTS DESERIALIZATION
Description image-optimizer before 1.7.3 allows PHAR deserialization, e.g., the phar:// protocol in arguments to file_exists(). References https://github.com/spatie/image-optimizer/issues/210 https://github.com/spatie/image-optimizer/compare/1.7.2…1.7.3 https://github.com/spatie/image-optimizer/pull/211 For
CVE-2024-32638 : APACHE APISIX 3.8.0/3.9.0 FORWARD-AUTH PLUGIN REQUEST SMUGGLING
Description Inconsistent Interpretation of HTTP Requests (‘HTTP Request Smuggling’) vulnerability in Apache APISIX when using `forward-auth` plugin. This issue affects
CVE-2024-22144 : ELI SCHEETZ ANTI-MALWARE SECURITY AND BRUTE-FORCE FIREWALL PLUGIN CODE INJECTION
Description Improper Control of Generation of Code (‘Code Injection’) vulnerability in Eli Scheetz Anti-Malware Security and Brute-Force Firewall gotmls allows