CVE Vulnerabilities for "vendor:emqx"
Showing 1-10 of 26 CVEs (filtered from 316,546 total)
An access control issue in NanoMQ v0.21.10 allows attackers to bypass security restrictions and access sensitive system topic messages using MQTT wildcard characters.
NanoMQ v0.17.9 was discovered to contain a heap use-after-free vulnerability via the component sub_Ctx_handle. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted SUBSCRIBE message.
NanoMQ 0.17.5 was discovered to contain a segmentation fault via the component /nanomq/pub_handler.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted PUBLISH message.
NanoMQ v0.22.10 was discovered to contain a memory leak which allows attackers to cause a Denial of Service (DoS) via a crafted PUBLISH message.
NanoMQ v0.22.10 was discovered to contain a heap overflow which allows attackers to cause a Denial of Service (DoS) via a crafted CONNECT message.
A segmentation fault in NanoMQ v0.21.10 allows attackers to cause a Denial of Service (DoS) via crafted messages.
A vulnerability classified as problematic was found in emqx neuron up to 2.10.0. Affected by this vulnerability is an unknown functionality of the file /api/v2/schema of the component JSON File Handler. The manipulation leads to information disclosure. The attack can be launched remotely. The patch is named c9ce39747e0372aaa2157b2b56174914a12c06d8. It is recommended to apply a patch to fix this issue.
A vulnerability classified as critical has been found in emqx neuron up to 2.10.0. Affected is the function handle_add_plugin in the library cmd.library of the file plugins/restful/plugin_handle.c. The manipulation leads to buffer overflow. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue.
An invalid read size in Nanomq v0.21.9 allows attackers to cause a Denial of Service (DoS).
A heap-buffer-overflow vulnerability in the read_byte function in NanoMQ v.0.21.7 allows attackers to cause a denial of service via transmission of crafted hexstreams.
| Description | Year | ||||
|---|---|---|---|---|---|
8.8HIGH | 0.1%Minimal | - | 2024 | ||
7.5HIGH | 0.1%Minimal | - | 2024 | ||
7.5HIGH | 0.1%Minimal | - | 2024 | ||
6.5MEDIUM | 0.1%Minimal | - | 2024 | ||
6.5MEDIUM | 0.1%Minimal | - | 2024 | ||
7.5HIGH | 0.1%Minimal | - | 2024 | ||
5.3MEDIUM | 0.2%Minimal | - | 2024 | ||
5.3MEDIUM | 0.5%Minimal | - | 2024 | ||
7.5HIGH | 0.1%Minimal | - | 2024 | ||
6.8MEDIUM | 0.1%Minimal | - | 2024 |