Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apache qpid 0.17 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2013-1909
The Python client in Apache Qpid prior to 2.2 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle malicious users to spoof SSL servers via an arbitra...
Redhat Enterprise Mrg 2.0
Apache Qpid 0.14
Apache Qpid 0.7
Apache Qpid 0.15
Apache Qpid 0.10
Apache Qpid 0.17
Apache Qpid
Apache Qpid 0.9
Apache Qpid 0.13
Apache Qpid 0.6
Apache Qpid 0.11
Apache Qpid 0.12
Apache Qpid 0.18
Apache Qpid 0.16
Apache Qpid 0.19
Apache Qpid 0.5
Apache Qpid 0.8
NA
CVE-2012-4446
The default configuration for Apache Qpid 0.20 and previous versions, when the federation_tag attribute is enabled, accepts AMQP connections without checking the source user ID, which allows remote malicious users to bypass authentication and have other unspecified impact via an ...
Apache Qpid 0.14
Apache Qpid 0.7
Apache Qpid 0.15
Apache Qpid 0.10
Apache Qpid 0.17
Apache Qpid
Apache Qpid 0.9
Apache Qpid 0.13
Apache Qpid 0.6
Apache Qpid 0.11
Apache Qpid 0.12
Apache Qpid 0.18
Apache Qpid 0.16
Apache Qpid 0.19
Apache Qpid 0.5
Apache Qpid 0.8
NA
CVE-2012-4458
The AMQP type decoder in Apache Qpid 0.20 and previous versions allows remote malicious users to cause a denial of service (memory consumption and server crash) via a large number of zero width elements in the client-properties map in a connection.start-ok message.
Apache Qpid 0.14
Apache Qpid 0.7
Apache Qpid 0.15
Apache Qpid 0.10
Apache Qpid 0.17
Apache Qpid
Apache Qpid 0.9
Apache Qpid 0.13
Apache Qpid 0.6
Apache Qpid 0.11
Apache Qpid 0.12
Apache Qpid 0.18
Apache Qpid 0.16
Apache Qpid 0.19
Apache Qpid 0.5
Apache Qpid 0.8
NA
CVE-2012-4459
Integer overflow in the qpid::framing::Buffer::checkAvailable function in Apache Qpid 0.20 and previous versions allows remote malicious users to cause a denial of service (crash) via a crafted message, which triggers an out-of-bounds read.
Apache Qpid 0.14
Apache Qpid 0.7
Apache Qpid 0.15
Apache Qpid 0.10
Apache Qpid 0.17
Apache Qpid
Apache Qpid 0.9
Apache Qpid 0.13
Apache Qpid 0.6
Apache Qpid 0.11
Apache Qpid 0.12
Apache Qpid 0.18
Apache Qpid 0.16
Apache Qpid 0.19
Apache Qpid 0.5
Apache Qpid 0.8
NA
CVE-2012-4460
The serializing/deserializing functions in the qpid::framing::Buffer class in Apache Qpid 0.20 and previous versions allow remote malicious users to cause a denial of service (assertion failure and daemon exit) via unspecified vectors. NOTE: this issue could also trigger an out-o...
Apache Qpid 0.14
Apache Qpid 0.7
Apache Qpid 0.15
Apache Qpid 0.10
Apache Qpid 0.17
Apache Qpid
Apache Qpid 0.9
Apache Qpid 0.13
Apache Qpid 0.6
Apache Qpid 0.11
Apache Qpid 0.12
Apache Qpid 0.18
Apache Qpid 0.16
Apache Qpid 0.19
Apache Qpid 0.5
Apache Qpid 0.8
NA
CVE-2012-2145
Apache Qpid 0.17 and previous versions does not properly restrict incoming client connections, which allows remote malicious users to cause a denial of service (file descriptor consumption) via a large number of incomplete connections.
Apache Qpid 0.14
Apache Qpid 0.7
Apache Qpid 0.10
Apache Qpid 0.9
Apache Qpid 0.6
Apache Qpid 0.12
Apache Qpid 0.16
Apache Qpid
Apache Qpid 0.8
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started