Apache

Activemq

50 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 5.3%
  • Published 14.05.2020 17:15:12
  • Last modified 21.11.2024 05:11:39

In Apache ActiveMQ 5.0.0 to 5.15.11, the webconsole admin GUI is open to XSS, in the view that lists the contents of a queue.

  • EPSS 0.09%
  • Published 01.08.2019 14:15:10
  • Last modified 21.11.2024 02:36:58

It was found that the Apache ActiveMQ client before 5.14.5 exposed a remote shutdown command in the ActiveMQConnection class. An attacker logged into a compromised broker could use this flaw to achieve denial of service on a connected client.

  • EPSS 0.29%
  • Published 23.05.2019 14:29:07
  • Last modified 21.11.2024 04:16:28

An issue is present in Apache ZooKeeper 1.0.0 to 3.4.13 and 3.5.0-alpha to 3.5.4-beta. ZooKeeper’s getACL() command doesn’t check any permission when retrieves the ACLs of the requested node and returns all information contained in the ACL Id field a...

Exploit
  • EPSS 15.05%
  • Published 15.05.2019 17:29:00
  • Last modified 23.05.2025 16:54:47

Xstream API versions up to 1.4.6 and version 1.4.10, if the security framework has not been initialized, may allow a remote attacker to run arbitrary shell commands by manipulating the processed input stream when unmarshaling XML or any supported for...

  • EPSS 25.44%
  • Published 22.04.2019 20:29:00
  • Last modified 21.11.2024 04:18:43

In Eclipse Jetty version 9.2.26 and older, 9.3.25 and older, and 9.4.15 and older, the server is vulnerable to XSS conditions if a remote client USES a specially formatted URL against the DefaultServlet or ResourceHandler that is configured for showi...

  • EPSS 11.84%
  • Published 28.03.2019 22:29:00
  • Last modified 21.11.2024 04:16:31

In Apache ActiveMQ 5.0.0 - 5.15.8, unmarshalling corrupt MQTT frame can lead to broker Out of Memory exception making it unresponsive.

  • EPSS 78.78%
  • Published 10.10.2018 14:29:00
  • Last modified 21.11.2024 04:13:04

An instance of a cross-site scripting vulnerability was identified to be present in the web based administration console on the queue.jsp page of Apache ActiveMQ versions 5.0.0 to 5.15.5. The root cause of this issue is improper data filtering of the...

  • EPSS 0.59%
  • Published 10.09.2018 20:29:00
  • Last modified 21.11.2024 03:44:00

TLS hostname verification when using the Apache ActiveMQ Client before 5.15.6 was missing which could make the client vulnerable to a MITM attack between a Java application using the ActiveMQ client and the ActiveMQ server. This is now enabled by def...

  • EPSS 65.73%
  • Published 13.02.2018 20:29:00
  • Last modified 21.11.2024 03:15:03

When using the OpenWire protocol in ActiveMQ versions 5.14.0 to 5.15.2 it was found that certain system details (such as the OS and kernel version) are exposed as plain text.

  • EPSS 1.79%
  • Published 10.01.2018 15:29:00
  • Last modified 21.11.2024 02:56:52

In Apache ActiveMQ 5.x before 5.14.2, an instance of a cross-site scripting vulnerability was identified to be present in the web based administration console. The root cause of this issue is improper user data output validation.