Register Login
  • SaaS Solutions
    • Vulnerability Intelligence
    • Vulnerability Management
  • Pricing
  • Vulnerabilities
  • Reports
  • Blog
  • Contact Us
  1. Main
  2. Vulnerability Database
  3. Microsoft
  4. Azure AMQP library for C

Known Vulnerabilities in Azure AMQP library for C

Show more ↓
LTS_07_2022_Ref02
LTS_07_2020_Ref02
2024-01-01
2020-12-09
2020-07-19
2018-11-20
2018-10-03
2018-09-11
2018-07-11
2018-07-03
2018-06-27
2018-06-26
2018-06-15
2018-04-13
2018-04-04
2018-04-02
2018-03-16
2018-03-07-temp-pod
2018-03-01-temp-pod-1
2018-02-09
2018-01-29
2018-01-12
2017-12-14
2017-11-17
2017-11-03
2017-10-20
2017-10-09
2017-10-06
2017-09-25
2017-09-08
2017-08-25
2017-08-11
2017-07-28
2017-07-14
2017-06-30
2017-06-16-test2
2017-06-16
2017-06-02
2017-05-19
2017-05-05
2017-04-21
2017-04-07
2017-04-06
2017-02-24
2017-02-10
2017-01-27
2017-01-20
2016-11-17
2016-10-14
2016-09-09
2016-08-26
2016-08-16
2016-06-27
2016-03-03
1.2.11
1.2.10
1.2.9
1.2.8
1.2.7
1.2.6
1.2.5
1.2.4
1.2.3
1.2.2
1.2.1
1.2.0
1.1.8
1.1.7
1.0.0-pre-release-1.0.9
1.0.0-pre-release-1.0.8
LTS_02_2020_Ref02
LTS_02_2020_Ref01
LTS_01_2018_Ref01



Multiple vulnerabilities in Microsoft Azure AMQP library for C01 Apr, 2024
Medium Patched


Stay Connected

  • Twitter
  • Facebook
  • Linkedin
  • Official YouTube channel of Cybersecurity Help s.r.o.
  • RSS
Security Services
  • Actionable & Personalized Vulnerability Intelligence
  • On-Demand Security Consulting
  • Pricing
IT-Consulting
  • IT Infrastructure Outsourcing Services
  • Web Applications Support & Deployment
  • On-Demand Consulting
Partner Links
  • SSL/TLS Security Test by ImmuniWeb
  • Web Server Security Test by ImmuniWeb
Blog
  • Ulefone and Krüger&Matz smartphones found with dangerous preloaded app flaws
  • New cryptojacking campaign exploits DevOps servers via misconfigurations
  • Google rolls out emergency Chrome update to patch actively exploited flaw
  • Tech giants to launch public glossary to avoid confusion over hacking group codenames
  • Critical vBulletin vulnerability exploited in the wild
  • Read all articles →
Contacts | Terms of use | Privacy Policy

© 2025 Cybersecurity Help s.r.o.