Show filters
391 Total Results
Displaying 141-150 of 391
Sort by:
Attacker Value
Unknown
CVE-2021-33175
Disclosure Date: June 08, 2021 (last updated February 22, 2025)
EMQ X Broker versions prior to 4.2.8 are vulnerable to a denial of service attack as a result of excessive memory consumption due to the handling of untrusted inputs. These inputs cause the message broker to consume large amounts of memory, resulting in the application being terminated by the operating system.
0
Attacker Value
Unknown
CVE-2021-22116
Disclosure Date: June 08, 2021 (last updated February 22, 2025)
RabbitMQ all versions prior to 3.8.16 are prone to a denial of service vulnerability due to improper input validation in AMQP 1.0 client connection endpoint. A malicious user can exploit the vulnerability by sending malicious AMQP messages to the target RabbitMQ instance having the AMQP 1.0 plugin enabled.
0
Attacker Value
Unknown
CVE-2021-3425
Disclosure Date: June 01, 2021 (last updated February 22, 2025)
A flaw was found in the AMQ Broker that discloses JDBC encrypted usernames and passwords when provided in the AMQ Broker application logfile when using the jdbc persistence functionality. Versions shipped in Red Hat AMQ 7 are vulnerable.
0
Attacker Value
Unknown
CVE-2021-20236
Disclosure Date: May 28, 2021 (last updated February 22, 2025)
A flaw was found in the ZeroMQ server in versions before 4.3.3. This flaw allows a malicious client to cause a stack buffer overflow on the server by sending crafted topic subscription requests and then unsubscribing. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
0
Attacker Value
Unknown
CVE-2021-20237
Disclosure Date: May 28, 2021 (last updated February 22, 2025)
An uncontrolled resource consumption (memory leak) flaw was found in ZeroMQ's src/xpub.cpp in versions before 4.3.3. This flaw allows a remote unauthenticated attacker to send crafted PUB messages that consume excessive memory if the CURVE/ZAP authentication is disabled on the server, causing a denial of service. The highest threat from this vulnerability is to system availability.
0
Attacker Value
Unknown
CVE-2021-3536
Disclosure Date: May 20, 2021 (last updated February 22, 2025)
A flaw was found in Wildfly in versions before 23.0.2.Final while creating a new role in domain mode via the admin console, it is possible to add a payload in the name field, leading to XSS. This affects Confidentiality and Integrity.
0
Attacker Value
Unknown
CVE-2021-22117
Disclosure Date: May 18, 2021 (last updated February 22, 2025)
RabbitMQ installers on Windows prior to version 3.8.16 do not harden plugin directory permissions, potentially allowing attackers with sufficient local filesystem permissions to add arbitrary plugins.
0
Attacker Value
Unknown
CVE-2021-20234
Disclosure Date: April 01, 2021 (last updated February 22, 2025)
An uncontrolled resource consumption (memory leak) flaw was found in the ZeroMQ client in versions before 4.3.3 in src/pipe.cpp. This issue causes a client that connects to multiple malicious or compromised servers to crash. The highest threat from this vulnerability is to system availability.
0
Attacker Value
Unknown
CVE-2021-20235
Disclosure Date: April 01, 2021 (last updated February 22, 2025)
There's a flaw in the zeromq server in versions before 4.3.3 in src/decoder_allocators.hpp. The decoder static allocator could have its sized changed, but the buffer would remain the same as it is a static buffer. A remote, unauthenticated attacker who sends a crafted request to the zeromq server could trigger a buffer overflow WRITE of arbitrary data if CURVE/ZAP authentication is not enabled. The greatest impact of this flaw is to application availability, data integrity, and confidentiality.
0
Attacker Value
Unknown
CVE-2021-20218
Disclosure Date: March 16, 2021 (last updated February 22, 2025)
A flaw was found in the fabric8 kubernetes-client in version 4.2.0 and after. This flaw allows a malicious pod/container to cause applications using the fabric8 kubernetes-client `copy` command to extract files outside the working path. The highest threat from this vulnerability is to integrity and system availability. This has been fixed in kubernetes-client-4.13.2 kubernetes-client-5.0.2 kubernetes-client-4.11.2 kubernetes-client-4.7.2
0