Total vulnerabilities in the database
The Python client in Apache Qpid before 2.2 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
Software | From | Fixed in |
---|---|---|
redhat / enterprise_mrg | 2.0 | 2.0.x |
apache / qpid | 0.14 | 0.14.x |
apache / qpid | 0.7 | 0.7.x |
apache / qpid | 0.15 | 0.15.x |
apache / qpid | 0.10 | 0.10.x |
apache / qpid | 0.17 | 0.17.x |
apache / qpid | - | 0.20.x |
apache / qpid | 0.9 | 0.9.x |
apache / qpid | 0.13 | 0.13.x |
apache / qpid | 0.6 | 0.6.x |
apache / qpid | 0.11 | 0.11.x |
apache / qpid | 0.12 | 0.12.x |
apache / qpid | 0.18 | 0.18.x |
apache / qpid | 0.16 | 0.16.x |
apache / qpid | 0.19 | 0.19.x |
apache / qpid | 0.5 | 0.5.x |
apache / qpid | 0.8 | 0.8.x |