{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-03T01:59:19.567","vulnerabilities":[{"cve":{"id":"CVE-2018-11087","sourceIdentifier":"security_alert@emc.com","published":"2018-09-14T20:29:00.417","lastModified":"2025-03-27T19:56:20.387","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Pivotal Spring AMQP, 1.x versions prior to 1.7.10 and 2.x versions prior to 2.0.6, expose a man-in-the-middle vulnerability due to lack of hostname validation. A malicious user that has the ability to intercept traffic would be able to view data in transit."},{"lang":"es","value":"Pivotal Spring AMQP, en versiones 1.x anteriores a la 1.7.10 y versiones 2.x anteriores a la 2.0.6, expone una vulnerabilidad Man-in-the-Middle (MitM) debido a la falta de validación de nombres de host. Un usuario malicioso que pueda interceptar tráfico sería capaz de ver los datos en tránsito."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":5.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.2,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:N/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-295"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:pivotal_software:spring_advanced_message_queuing_protocol:*:*:*:*:*:*:*:*","versionStartIncluding":"1.0.0","versionEndExcluding":"1.7.10","matchCriteriaId":"566164E6-65C1-4C27-99DB-16C4D0C6AB76"},{"vulnerable":true,"criteria":"cpe:2.3:a:pivotal_software:spring_advanced_message_queuing_protocol:*:*:*:*:*:*:*:*","versionStartIncluding":"2.0.0","versionEndExcluding":"2.0.6","matchCriteriaId":"41A3EA77-DF58-4670-8609-C0FA7A407C6E"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:rabbitmq_java_client:*:*:*:*:*:*:*:*","versionEndExcluding":"4.8.0","matchCriteriaId":"CAB8F295-EA89-4565-AE6B-9B8BD193459A"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:rabbitmq_java_client:*:*:*:*:*:*:*:*","versionStartIncluding":"4.8.1","versionEndExcluding":"5.4.0","matchCriteriaId":"C419AB2D-7C18-4F44-84A4-A4202D83AE44"}]}]}],"references":[{"url":"https://pivotal.io/security/cve-2018-11087","source":"security_alert@emc.com","tags":["Mitigation","Vendor Advisory"]},{"url":"https://pivotal.io/security/cve-2018-11087","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mitigation","Vendor Advisory"]}]}}]}