VMware Spring Advanced Message Queuing Protocol (AMQP) 1.1.4 A

CPE Details

VMware Spring Advanced Message Queuing Protocol (AMQP) 1.1.4 A
1.1.4
2020-05-28
15h41 +00:00
2020-05-28
15h41 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:vmware:spring_advanced_message_queuing_protocol:1.1.4:a:*:*:*:*:*:*

Informations

Vendor

vmware

Product

spring_advanced_message_queuing_protocol

Version

1.1.4

Update

a

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2023-34050 2023-10-19 07h11 +00:00 In spring AMQP versions 1.0.0 to 2.4.16 and 3.0.0 to 3.0.9 , allowed list patterns for deserializable class names were added to Spring AMQP, allowing users to lock down deserialization of data in messages from untrusted sources; however by default, when no allowed list was provided, all classes could be deserialized. Specifically, an application is vulnerable if * the SimpleMessageConverter or SerializerMessageConverter is used * the user does not configure allowed list patterns * untrusted message originators gain permissions to write messages to the RabbitMQ broker to send malicious content
5
Moyen
CVE-2016-2173 2017-04-21 18h00 +00:00 org.springframework.core.serializer.DefaultDeserializer in Spring AMQP before 1.5.5 allows remote attackers to execute arbitrary code.
9.8
Critique