Логотип exploitDog
bind:CVE-2024-49587
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-49587

Количество 2

Количество 2

nvd логотип

CVE-2024-49587

около 2 месяцев назад

Glutton V1 service endpoints were exposed without any authentication on Gotham stacks, this could have allowed users that did not have any permission to hit glutton backend directly and read/update/delete data. The affected service has been patched and automatically deployed to all Apollo-managed Gotham Instances

CVSS3: 9.1
EPSS: Низкий
github логотип

GHSA-4qrv-gcg3-8h65

около 2 месяцев назад

Glutton V1 service endpoints were exposed without any authentication on Gotham stacks, this could have allowed users that did not have any permission to hit glutton backend directly and read/update/delete data. The affected service has been patched and automatically deployed to all Apollo-managed Gotham Instances

CVSS3: 9.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-49587

Glutton V1 service endpoints were exposed without any authentication on Gotham stacks, this could have allowed users that did not have any permission to hit glutton backend directly and read/update/delete data. The affected service has been patched and automatically deployed to all Apollo-managed Gotham Instances

CVSS3: 9.1
0%
Низкий
около 2 месяцев назад
github логотип
GHSA-4qrv-gcg3-8h65

Glutton V1 service endpoints were exposed without any authentication on Gotham stacks, this could have allowed users that did not have any permission to hit glutton backend directly and read/update/delete data. The affected service has been patched and automatically deployed to all Apollo-managed Gotham Instances

CVSS3: 9.1
0%
Низкий
около 2 месяцев назад

Уязвимостей на страницу