Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apache qpid vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2012-4446
The default configuration for Apache Qpid 0.20 and previous versions, when the federation_tag attribute is enabled, accepts AMQP connections without checking the source user ID, which allows remote malicious users to bypass authentication and have other unspecified impact via an ...
Apache Qpid 0.7
Apache Qpid 0.6
Apache Qpid 0.5
Apache Qpid 0.16
Apache Qpid 0.15
Apache Qpid 0.14
Apache Qpid 0.13
Apache Qpid 0.19
Apache Qpid 0.17
Apache Qpid 0.12
Apache Qpid 0.10
Apache Qpid 0.8
Apache Qpid
Apache Qpid 0.18
Apache Qpid 0.11
Apache Qpid 0.9
NA
CVE-2012-2145
Apache Qpid 0.17 and previous versions does not properly restrict incoming client connections, which allows remote malicious users to cause a denial of service (file descriptor consumption) via a large number of incomplete connections.
Apache Qpid 0.8
Apache Qpid 0.7
Apache Qpid 0.12
Apache Qpid 0.14
Apache Qpid 0.16
Apache Qpid
Apache Qpid 0.9
Apache Qpid 0.10
Apache Qpid 0.6
NA
CVE-2012-3467
Apache QPID 0.14, 0.16, and previous versions uses a NullAuthenticator mechanism to authenticate catch-up shadow connections to AMQP brokers, which allows remote malicious users to bypass authentication.
Apache Qpid
Apache Qpid 0.6
Apache Qpid 0.14
Apache Qpid 0.5
NA
CVE-2011-3620
Apache Qpid 0.12 does not properly verify credentials during the joining of a cluster, which allows remote malicious users to obtain access to the messaging functionality and job functionality of a cluster by leveraging knowledge of a cluster-username.
Apache Qpid 0.12
NA
CVE-2009-5005
The Cluster::deliveredEvent function in cluster/Cluster.cpp in Apache Qpid, as used in Red Hat Enterprise MRG prior to 1.3 and other products, allows remote malicious users to cause a denial of service (daemon crash and cluster outage) via invalid AMQP data.
Apache Qpid
Redhat Enterprise Mrg 1.0.2
Redhat Enterprise Mrg 1.1.2
Redhat Enterprise Mrg 1.0.3
Redhat Enterprise Mrg 1.1.1
Redhat Enterprise Mrg 1.0
Redhat Enterprise Mrg 1.2
Redhat Enterprise Mrg
Redhat Enterprise Mrg 1.0.1
NA
CVE-2009-5006
The SessionAdapter::ExchangeHandlerImpl::checkAlternate function in broker/SessionAdapter.cpp in the C++ Broker component in Apache Qpid prior to 0.6, as used in Red Hat Enterprise MRG prior to 1.3 and other products, allows remote authenticated users to cause a denial of service...
Apache Qpid
Redhat Enterprise Mrg 1.2
Redhat Enterprise Mrg 1.0.2
Redhat Enterprise Mrg 1.1.2
Redhat Enterprise Mrg 1.0.3
Redhat Enterprise Mrg 1.0
Redhat Enterprise Mrg
Redhat Enterprise Mrg 1.0.1
Redhat Enterprise Mrg 1.1.1
NA
CVE-2010-3083
sys/ssl/SslSocket.cpp in qpidd in Apache Qpid, as used in Red Hat Enterprise MRG prior to 1.2.2 and other products, when SSL is enabled, allows remote malicious users to cause a denial of service (daemon outage) by connecting to the SSL port but not participating in an SSL handsh...
Apache Qpid 0.6
Apache Qpid 0.5
Redhat Enterprise Mrg
Redhat Enterprise Mrg 1.1.2
Redhat Enterprise Mrg 1.0.3
Redhat Enterprise Mrg 1.1.1
Redhat Enterprise Mrg 1.0.2
Redhat Enterprise Mrg 1.0.1
Redhat Enterprise Mrg 1.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3