Show filters
391 Total Results
Displaying 131-140 of 391
Sort by:
Attacker Value
Unknown

CVE-2021-38999

Disclosure Date: November 29, 2021 (last updated February 23, 2025)
IBM MQ Appliance could allow a local attacker to obtain sensitive information by inclusion of sensitive data within trace.
Attacker Value
Unknown

CVE-2021-38875

Disclosure Date: November 22, 2021 (last updated October 07, 2023)
IBM MQ 8.0, 9.0 LTS, 9.1 LTS, 9.2 LTS, 9.1 CD, and 9.2 CD is vulnerable to a denial of service attack caused by an error processing messages. IBM X-Force ID: 208398.
Attacker Value
Unknown

CVE-2021-38949

Disclosure Date: November 15, 2021 (last updated February 23, 2025)
IBM MQ 7.5, 8.0, 9.0 LTS, 9.1 CD, and 9.1 LTS stores user credentials in plain clear text which can be read by a local user. IBM X-Force ID: 211403.
Attacker Value
Unknown

CVE-2021-29843

Disclosure Date: November 05, 2021 (last updated November 28, 2024)
IBM MQ 9.1 LTS, 9.1 CD, 9.2 LTS, and 9.2CD is vulnerable to a denial of service attack caused by an issue processing message properties. IBM X-Force ID: 205203.
Attacker Value
Unknown

CVE-2021-41036

Disclosure Date: November 03, 2021 (last updated February 23, 2025)
In versions prior to 1.1 of the Eclipse Paho MQTT C Client, the client does not check rem_len size in readpacket.
Attacker Value
Unknown

CVE-2020-4938

Disclosure Date: July 09, 2021 (last updated February 23, 2025)
IBM MQ Appliance 9.1 and 9.2 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 191815.
Attacker Value
Unknown

CVE-2020-36400

Disclosure Date: July 01, 2021 (last updated February 22, 2025)
ZeroMQ libzmq 4.3.3 has a heap-based buffer overflow in zmq::tcp_read, a different vulnerability than CVE-2021-20235.
Attacker Value
Unknown

CVE-2021-32719

Disclosure Date: June 28, 2021 (last updated February 22, 2025)
RabbitMQ is a multi-protocol messaging broker. In rabbitmq-server prior to version 3.8.18, when a federation link was displayed in the RabbitMQ management UI via the `rabbitmq_federation_management` plugin, its consumer tag was rendered without proper <script> tag sanitization. This potentially allows for JavaScript code execution in the context of the page. The user must be signed in and have elevated permissions (manage federation upstreams and policies) for this to occur. The vulnerability is patched in RabbitMQ 3.8.18. As a workaround, disable the `rabbitmq_federation_management` plugin and use [CLI tools](https://www.rabbitmq.com/cli.html) instead.
Attacker Value
Unknown

CVE-2021-32718

Disclosure Date: June 28, 2021 (last updated February 22, 2025)
RabbitMQ is a multi-protocol messaging broker. In rabbitmq-server prior to version 3.8.17, a new user being added via management UI could lead to the user's bane being rendered in a confirmation message without proper `<script>` tag sanitization, potentially allowing for JavaScript code execution in the context of the page. In order for this to occur, the user must be signed in and have elevated permissions (other user management). The vulnerability is patched in RabbitMQ 3.8.17. As a workaround, disable `rabbitmq_management` plugin and use CLI tools for management operations and Prometheus and Grafana for metrics and monitoring.
Attacker Value
Unknown

CVE-2021-33176

Disclosure Date: June 08, 2021 (last updated February 22, 2025)
VerneMQ MQTT Broker versions prior to 1.12.0 are vulnerable to a denial of service attack as a result of excessive memory consumption due to the handling of untrusted inputs. These inputs cause the message broker to consume large amounts of memory, resulting in the application being terminated by the operating system.