aedes@0.29.1 vulnerabilities
Stream-based MQTT broker
-
latest version
0.51.1
-
latest non vulnerable version
-
first published
9 years ago
-
latest version published
19 hours ago
-
licenses detected
- >=0
Direct Vulnerabilities
Known vulnerabilities in the aedes package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
aedes is a stream-based MQTT broker. Affected versions of this package are vulnerable to Denial of Service (DoS). How to fix Denial of Service (DoS)? Upgrade |
<0.42.1
|
aedes is a Barebone MQTT server that can run on any stream server. Affected versions of this package are vulnerable to Improper Authorization. A user can connect and subscribe to "will" from a client.
From another client, a user may connect with a last will message with topic "will". Then by sending message to "test", the connection will break (because of authorization failure).
Breaking the connection will trigger the LWT, and thus sends a message to How to fix Improper Authorization? Upgrade |
<0.35.1
|
aedes is a Barebone MQTT server that can run on any stream server. Affected versions of this package are vulnerable to Improper Authorization. A user can connect and subscribe to "will" from a client.
From another client, a user may connect with a last will message with topic "will". Then by sending message to "test", the connection will break (because of authorization failure).
Breaking the connection will trigger the LWT, and thus sends a message to How to fix Improper Authorization? Upgrade |
<0.35.1
|