Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apache qpid vulnerabilities and exploits
(subscribe to this query)
6.8
CVSSv2
CVE-2012-4446
The default configuration for Apache Qpid 0.20 and previous versions, when the federation_tag attribute is enabled, accepts AMQP connections without checking the source user ID, which allows remote malicious users to bypass authentication and have other unspecified impact via an ...
Apache Qpid 0.7
Apache Qpid 0.6
Apache Qpid 0.5
Apache Qpid 0.16
Apache Qpid 0.15
Apache Qpid 0.14
Apache Qpid 0.13
Apache Qpid 0.19
Apache Qpid 0.17
Apache Qpid 0.12
Apache Qpid 0.10
Apache Qpid 0.8
Apache Qpid
Apache Qpid 0.18
Apache Qpid 0.11
Apache Qpid 0.9
5
CVSSv2
CVE-2012-2145
Apache Qpid 0.17 and previous versions does not properly restrict incoming client connections, which allows remote malicious users to cause a denial of service (file descriptor consumption) via a large number of incomplete connections.
Apache Qpid 0.8
Apache Qpid 0.7
Apache Qpid 0.12
Apache Qpid 0.14
Apache Qpid 0.16
Apache Qpid
Apache Qpid 0.9
Apache Qpid 0.10
Apache Qpid 0.6
5
CVSSv2
CVE-2012-3467
Apache QPID 0.14, 0.16, and previous versions uses a NullAuthenticator mechanism to authenticate catch-up shadow connections to AMQP brokers, which allows remote malicious users to bypass authentication.
Apache Qpid
Apache Qpid 0.6
Apache Qpid 0.14
Apache Qpid 0.5
7.5
CVSSv2
CVE-2011-3620
Apache Qpid 0.12 does not properly verify credentials during the joining of a cluster, which allows remote malicious users to obtain access to the messaging functionality and job functionality of a cluster by leveraging knowledge of a cluster-username.
Apache Qpid 0.12
5
CVSSv2
CVE-2009-5005
The Cluster::deliveredEvent function in cluster/Cluster.cpp in Apache Qpid, as used in Red Hat Enterprise MRG prior to 1.3 and other products, allows remote malicious users to cause a denial of service (daemon crash and cluster outage) via invalid AMQP data.
Apache Qpid
Redhat Enterprise Mrg 1.0.2
Redhat Enterprise Mrg 1.1.2
Redhat Enterprise Mrg 1.0.3
Redhat Enterprise Mrg 1.1.1
Redhat Enterprise Mrg 1.0
Redhat Enterprise Mrg 1.2
Redhat Enterprise Mrg
Redhat Enterprise Mrg 1.0.1
4
CVSSv2
CVE-2009-5006
The SessionAdapter::ExchangeHandlerImpl::checkAlternate function in broker/SessionAdapter.cpp in the C++ Broker component in Apache Qpid prior to 0.6, as used in Red Hat Enterprise MRG prior to 1.3 and other products, allows remote authenticated users to cause a denial of service...
Apache Qpid
Redhat Enterprise Mrg 1.2
Redhat Enterprise Mrg 1.0.2
Redhat Enterprise Mrg 1.1.2
Redhat Enterprise Mrg 1.0.3
Redhat Enterprise Mrg 1.0
Redhat Enterprise Mrg
Redhat Enterprise Mrg 1.0.1
Redhat Enterprise Mrg 1.1.1
4.3
CVSSv2
CVE-2010-3083
sys/ssl/SslSocket.cpp in qpidd in Apache Qpid, as used in Red Hat Enterprise MRG prior to 1.2.2 and other products, when SSL is enabled, allows remote malicious users to cause a denial of service (daemon outage) by connecting to the SSL port but not participating in an SSL handsh...
Apache Qpid 0.6
Apache Qpid 0.5
Redhat Enterprise Mrg
Redhat Enterprise Mrg 1.1.2
Redhat Enterprise Mrg 1.0.3
Redhat Enterprise Mrg 1.1.1
Redhat Enterprise Mrg 1.0.2
Redhat Enterprise Mrg 1.0.1
Redhat Enterprise Mrg 1.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3