RocketMQ versions 5.1.0 and below have remote command execution risk caused by leaked components on the extranet without permission verification, allowing attackers to execute commands or forge protocol content
Reporter | Title | Published | Views | Family All 50 |
---|---|---|---|---|
![]() | Apache RocketMQ may have remote code execution vulnerability when using update configuration function | 6 Jul 202321:15 | β | osv |
![]() | CVE-2023-33246 | 24 May 202315:15 | β | osv |
![]() | RocketMQ NameServer component Code Injection vulnerability | 12 Jul 202312:31 | β | osv |
![]() | CVE-2023-37582 | 12 Jul 202310:15 | β | osv |
![]() | Muhstik Botnet Exploiting Apache RocketMQ Flaw to Expand DDoS Attacks | 6 Jun 202413:14 | β | thn |
![]() | Alert: Juniper Firewalls, Openfire, and Apache RocketMQ Under Attack from New Exploits | 30 Aug 202311:15 | β | thn |
![]() | Apache RocketMQ Command Execution Vulnerability | 28 May 202300:00 | β | cnvd |
![]() | Apache RocketMQ 5.1.0 Arbitrary Code Injection Exploit | 10 Jul 202300:00 | β | zdt |
![]() | Exploit for Code Injection in Apache Rocketmq | 6 Jun 202311:24 | β | githubexploit |
![]() | Exploit for Code Injection in Apache Rocketmq | 13 Jun 202304:01 | β | githubexploit |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactΒ us for a demo andΒ discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo