Known Vulnerabilities for Rabbitmq by Pivotal Software

Listed below are 10 of the newest known vulnerabilities associated with "Rabbitmq" by "Pivotal Software".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2020-5419 RabbitMQ versions 3.8.x prior to 3.8.7 are prone to a Windows-specific binary planting security vulnerability that allows for... 6.7 - MEDIUM 2020-08-31 2022-03-17
CVE-2019-11291 Pivotal RabbitMQ, 3.7 versions prior to v3.7.20 and 3.8 version prior to v3.8.1, and RabbitMQ for PCF, 1.16.x versions prior ... 4.8 - MEDIUM 2019-11-22 2022-07-01
CVE-2019-11287 Pivotal RabbitMQ, versions 3.7.x prior to 3.7.21 and 3.8.x prior to 3.8.1, and RabbitMQ for Pivotal Platform, 1.16.x versions... 7.5 - HIGH 2019-11-23 2023-11-07
CVE-2019-11281 Pivotal RabbitMQ, versions prior to v3.7.18, and RabbitMQ for PCF, versions 1.15.x prior to 1.15.13, versions 1.16.x prior to... 4.8 - MEDIUM 2019-10-16 2023-11-07
CVE-2018-11087 Pivotal Spring AMQP, 1.x versions prior to 1.7.10 and 2.x versions prior to 2.0.6, expose a man-in-the-middle vulnerability d... 5.9 - MEDIUM 2018-09-14 2020-08-24
CVE-2018-1279 Pivotal RabbitMQ for PCF, all versions, uses a deterministically generated cookie that is shared between all machines when co... 6.5 - MEDIUM 2018-12-10 2019-10-09
CVE-2017-4967 An issue was discovered in these Pivotal RabbitMQ versions: all 3.4.x versions, all 3.5.x versions, and 3.6.x versions prior ... 6.1 - MEDIUM 2017-06-13 2022-05-15
CVE-2017-4966 An issue was discovered in these Pivotal RabbitMQ versions: all 3.4.x versions, all 3.5.x versions, and 3.6.x versions prior ... 7.8 - HIGH 2017-06-13 2022-05-15
CVE-2017-4965 An issue was discovered in these Pivotal RabbitMQ versions: all 3.4.x versions, all 3.5.x versions, and 3.6.x versions prior ... 6.1 - MEDIUM 2017-06-13 2022-05-15
CVE-2016-0929 The metrics-collection component in RabbitMQ for Pivotal Cloud Foundry (PCF) 1.6.x before 1.6.4 logs command lines of failed ... 7.5 - HIGH 2016-09-18 2016-11-28

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationPivotal SoftwareRabbitmq5.4.0AllAllAll
ApplicationPivotal SoftwareRabbitmq4.8.0AllAllAll
ApplicationPivotal SoftwareRabbitmq4.1AllAllAll
ApplicationPivotal SoftwareRabbitmq3.8.8AllAllAll
ApplicationPivotal SoftwareRabbitmq3.8.7AllAllAll
ApplicationPivotal SoftwareRabbitmq3.8.6-AllAll
ApplicationPivotal SoftwareRabbitmq3.8.6beta1AllAll
ApplicationPivotal SoftwareRabbitmq3.8.6rc1AllAll
ApplicationPivotal SoftwareRabbitmq3.8.6rc2AllAll
ApplicationPivotal SoftwareRabbitmq3.8.5-AllAll
ApplicationPivotal SoftwareRabbitmq3.8.5rc1AllAll
ApplicationPivotal SoftwareRabbitmq3.8.5rc2AllAll
ApplicationPivotal SoftwareRabbitmq3.8.4-AllAll
ApplicationPivotal SoftwareRabbitmq3.8.4beta1AllAll
ApplicationPivotal SoftwareRabbitmq3.8.4rc1AllAll
ApplicationPivotal SoftwareRabbitmq3.8.4rc2AllAll
ApplicationPivotal SoftwareRabbitmq3.8.4rc3AllAll
ApplicationPivotal SoftwareRabbitmq3.8.3-AllAll
ApplicationPivotal SoftwareRabbitmq3.8.3beta1AllAll
ApplicationPivotal SoftwareRabbitmq3.8.3beta2AllAll
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report