Логотип exploitDog
bind:"BDU:2021-03549" OR bind:"CVE-2020-15166"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2021-03549" OR bind:"CVE-2020-15166"

Количество 8

Количество 8

fstec логотип

BDU:2021-03549

больше 5 лет назад

Уязвимость множества компонентов системы обмена сообщениями ZeroMQ, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2020-15166

больше 5 лет назад

In ZeroMQ before version 4.3.3, there is a denial-of-service vulnerability. Users with TCP transport public endpoints, even with CURVE/ZAP enabled, are impacted. If a raw TCP socket is opened and connected to an endpoint that is fully configured with CURVE/ZAP, legitimate clients will not be able to exchange any message. Handshakes complete successfully, and messages are delivered to the library, but the server application never receives them. This is patched in version 4.3.3.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2020-15166

больше 5 лет назад

In ZeroMQ before version 4.3.3, there is a denial-of-service vulnerability. Users with TCP transport public endpoints, even with CURVE/ZAP enabled, are impacted. If a raw TCP socket is opened and connected to an endpoint that is fully configured with CURVE/ZAP, legitimate clients will not be able to exchange any message. Handshakes complete successfully, and messages are delivered to the library, but the server application never receives them. This is patched in version 4.3.3.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2020-15166

больше 5 лет назад

In ZeroMQ before version 4.3.3, there is a denial-of-service vulnerability. Users with TCP transport public endpoints, even with CURVE/ZAP enabled, are impacted. If a raw TCP socket is opened and connected to an endpoint that is fully configured with CURVE/ZAP, legitimate clients will not be able to exchange any message. Handshakes complete successfully, and messages are delivered to the library, but the server application never receives them. This is patched in version 4.3.3.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2020-15166

больше 5 лет назад

In ZeroMQ before version 4.3.3, there is a denial-of-service vulnerabi ...

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:1910-1

около 5 лет назад

Security update for zeromq

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:1907-1

около 5 лет назад

Security update for zeromq

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3264-1

больше 5 лет назад

Security update for zeromq

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2021-03549

Уязвимость множества компонентов системы обмена сообщениями ZeroMQ, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
0%
Низкий
больше 5 лет назад
ubuntu логотип
CVE-2020-15166

In ZeroMQ before version 4.3.3, there is a denial-of-service vulnerability. Users with TCP transport public endpoints, even with CURVE/ZAP enabled, are impacted. If a raw TCP socket is opened and connected to an endpoint that is fully configured with CURVE/ZAP, legitimate clients will not be able to exchange any message. Handshakes complete successfully, and messages are delivered to the library, but the server application never receives them. This is patched in version 4.3.3.

CVSS3: 7.5
0%
Низкий
больше 5 лет назад
redhat логотип
CVE-2020-15166

In ZeroMQ before version 4.3.3, there is a denial-of-service vulnerability. Users with TCP transport public endpoints, even with CURVE/ZAP enabled, are impacted. If a raw TCP socket is opened and connected to an endpoint that is fully configured with CURVE/ZAP, legitimate clients will not be able to exchange any message. Handshakes complete successfully, and messages are delivered to the library, but the server application never receives them. This is patched in version 4.3.3.

CVSS3: 7.5
0%
Низкий
больше 5 лет назад
nvd логотип
CVE-2020-15166

In ZeroMQ before version 4.3.3, there is a denial-of-service vulnerability. Users with TCP transport public endpoints, even with CURVE/ZAP enabled, are impacted. If a raw TCP socket is opened and connected to an endpoint that is fully configured with CURVE/ZAP, legitimate clients will not be able to exchange any message. Handshakes complete successfully, and messages are delivered to the library, but the server application never receives them. This is patched in version 4.3.3.

CVSS3: 7.5
0%
Низкий
больше 5 лет назад
debian логотип
CVE-2020-15166

In ZeroMQ before version 4.3.3, there is a denial-of-service vulnerabi ...

CVSS3: 7.5
0%
Низкий
больше 5 лет назад
suse-cvrf логотип
openSUSE-SU-2020:1910-1

Security update for zeromq

0%
Низкий
около 5 лет назад
suse-cvrf логотип
openSUSE-SU-2020:1907-1

Security update for zeromq

0%
Низкий
около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3264-1

Security update for zeromq

0%
Низкий
больше 5 лет назад

Уязвимостей на страницу