Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-4432

Опубликовано: 01 июн. 2016
Источник: debian
EPSS Низкий

Описание

The AMQP 0-8, 0-9, 0-91, and 0-10 connection handling in Apache Qpid Java before 6.0.3 might allow remote attackers to bypass authentication and consequently perform actions via vectors related to connection state logging.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
qpid-javaitppackage

EPSS

Процентиль: 60%
0.0039
Низкий

Связанные уязвимости

CVSS3: 9.1
ubuntu
больше 9 лет назад

The AMQP 0-8, 0-9, 0-91, and 0-10 connection handling in Apache Qpid Java before 6.0.3 might allow remote attackers to bypass authentication and consequently perform actions via vectors related to connection state logging.

redhat
больше 9 лет назад

The AMQP 0-8, 0-9, 0-91, and 0-10 connection handling in Apache Qpid Java before 6.0.3 might allow remote attackers to bypass authentication and consequently perform actions via vectors related to connection state logging.

CVSS3: 9.1
nvd
больше 9 лет назад

The AMQP 0-8, 0-9, 0-91, and 0-10 connection handling in Apache Qpid Java before 6.0.3 might allow remote attackers to bypass authentication and consequently perform actions via vectors related to connection state logging.

CVSS3: 9.1
github
больше 7 лет назад

AMQP 0-8, 0-9, 0-91, and 0-10 connection handling in Apache Qpid Java before 6.0.3 might allow remote attackers to bypass authentication

EPSS

Процентиль: 60%
0.0039
Низкий