Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Spring_advanced_message_queuing_protocol
(Pivotal_software)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 2 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2018-09-14 | CVE-2018-11087 | Pivotal Spring AMQP, 1.x versions prior to 1.7.10 and 2.x versions prior to 2.0.6, expose a man-in-the-middle vulnerability due to lack of hostname validation. A malicious user that has the ability to intercept traffic would be able to view data in transit. | Rabbitmq, Spring_advanced_message_queuing_protocol | 5.9 | ||
2017-11-27 | CVE-2017-8045 | In Pivotal Spring AMQP versions prior to 1.7.4, 1.6.11, and 1.5.7, an org.springframework.amqp.core.Message may be unsafely deserialized when being converted into a string. A malicious payload could be crafted to exploit this and enable a remote code execution attack. | Spring_advanced_message_queuing_protocol | 9.8 |