Show filters
391 Total Results
Displaying 131-140 of 391
Sort by:
Attacker Value
Unknown
CVE-2021-38999
Disclosure Date: November 29, 2021 (last updated February 23, 2025)
IBM MQ Appliance could allow a local attacker to obtain sensitive information by inclusion of sensitive data within trace.
0
Attacker Value
Unknown
CVE-2021-38875
Disclosure Date: November 22, 2021 (last updated October 07, 2023)
IBM MQ 8.0, 9.0 LTS, 9.1 LTS, 9.2 LTS, 9.1 CD, and 9.2 CD is vulnerable to a denial of service attack caused by an error processing messages. IBM X-Force ID: 208398.
0
Attacker Value
Unknown
CVE-2021-38949
Disclosure Date: November 15, 2021 (last updated February 23, 2025)
IBM MQ 7.5, 8.0, 9.0 LTS, 9.1 CD, and 9.1 LTS stores user credentials in plain clear text which can be read by a local user. IBM X-Force ID: 211403.
0
Attacker Value
Unknown
CVE-2021-29843
Disclosure Date: November 05, 2021 (last updated November 28, 2024)
IBM MQ 9.1 LTS, 9.1 CD, 9.2 LTS, and 9.2CD is vulnerable to a denial of service attack caused by an issue processing message properties. IBM X-Force ID: 205203.
0
Attacker Value
Unknown
CVE-2021-41036
Disclosure Date: November 03, 2021 (last updated February 23, 2025)
In versions prior to 1.1 of the Eclipse Paho MQTT C Client, the client does not check rem_len size in readpacket.
0
Attacker Value
Unknown
CVE-2020-4938
Disclosure Date: July 09, 2021 (last updated February 23, 2025)
IBM MQ Appliance 9.1 and 9.2 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 191815.
0
Attacker Value
Unknown
CVE-2020-36400
Disclosure Date: July 01, 2021 (last updated February 22, 2025)
ZeroMQ libzmq 4.3.3 has a heap-based buffer overflow in zmq::tcp_read, a different vulnerability than CVE-2021-20235.
0
Attacker Value
Unknown
CVE-2021-32719
Disclosure Date: June 28, 2021 (last updated February 22, 2025)
RabbitMQ is a multi-protocol messaging broker. In rabbitmq-server prior to version 3.8.18, when a federation link was displayed in the RabbitMQ management UI via the `rabbitmq_federation_management` plugin, its consumer tag was rendered without proper <script> tag sanitization. This potentially allows for JavaScript code execution in the context of the page. The user must be signed in and have elevated permissions (manage federation upstreams and policies) for this to occur. The vulnerability is patched in RabbitMQ 3.8.18. As a workaround, disable the `rabbitmq_federation_management` plugin and use [CLI tools](https://www.rabbitmq.com/cli.html) instead.
0
Attacker Value
Unknown
CVE-2021-32718
Disclosure Date: June 28, 2021 (last updated February 22, 2025)
RabbitMQ is a multi-protocol messaging broker. In rabbitmq-server prior to version 3.8.17, a new user being added via management UI could lead to the user's bane being rendered in a confirmation message without proper `<script>` tag sanitization, potentially allowing for JavaScript code execution in the context of the page. In order for this to occur, the user must be signed in and have elevated permissions (other user management). The vulnerability is patched in RabbitMQ 3.8.17. As a workaround, disable `rabbitmq_management` plugin and use CLI tools for management operations and Prometheus and Grafana for metrics and monitoring.
0
Attacker Value
Unknown
CVE-2021-33176
Disclosure Date: June 08, 2021 (last updated February 22, 2025)
VerneMQ MQTT Broker versions prior to 1.12.0 are vulnerable to a denial of service attack as a result of excessive memory consumption due to the handling of untrusted inputs. These inputs cause the message broker to consume large amounts of memory, resulting in the application being terminated by the operating system.
0