Lucene search

K

5 matches found

CVE
CVE
added 2019/11/23 12:15 a.m.275 views

CVE-2019-11287

Pivotal RabbitMQ, versions 3.7.x prior to 3.7.21 and 3.8.x prior to 3.8.1, and RabbitMQ for Pivotal Platform, 1.16.x versions prior to 1.16.7 and 1.17.x versions prior to 1.17.4, contain a web management plugin that is vulnerable to a denial of service attack. The "X-Reason" HTTP Header can be leve...

7.5CVSS5.6AI score0.00942EPSS
CVE
CVE
added 2019/11/22 11:15 p.m.163 views

CVE-2019-11291

Pivotal RabbitMQ, 3.7 versions prior to v3.7.20 and 3.8 version prior to v3.8.1, and RabbitMQ for PCF, 1.16.x versions prior to 1.16.7 and 1.17.x versions prior to 1.17.4, contain two endpoints, federation and shovel, which do not properly sanitize user input. A remote authenticated malicious user ...

4.8CVSS4AI score0.00516EPSS
CVE
CVE
added 2022/10/06 6:16 p.m.146 views

CVE-2022-31008

RabbitMQ is a multi-protocol messaging and streaming broker. In affected versions the shovel and federation plugins perform URI obfuscation in their worker (link) state. The encryption key used to encrypt the URI was seeded with a predictable secret. This means that in case of certain exceptions re...

7.5CVSS6.1AI score0.0005EPSS
CVE
CVE
added 2021/05/18 1:15 p.m.73 views

CVE-2021-22117

RabbitMQ installers on Windows prior to version 3.8.16 do not harden plugin directory permissions, potentially allowing attackers with sufficient local filesystem permissions to add arbitrary plugins.

7.8CVSS7.4AI score0.0013EPSS
CVE
CVE
added 2020/08/31 3:15 p.m.48 views

CVE-2020-5419

RabbitMQ versions 3.8.x prior to 3.8.7 are prone to a Windows-specific binary planting security vulnerability that allows for arbitrary code execution. An attacker with write privileges to the RabbitMQ installation directory and local access on Windows could carry out a local binary hijacking (plan...

6.7CVSS6.9AI score0.00065EPSS