Apache

Activemq

50 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 5.3%
  • Veröffentlicht 14.05.2020 17:15:12
  • Zuletzt bearbeitet 21.11.2024 05:11:39

In Apache ActiveMQ 5.0.0 to 5.15.11, the webconsole admin GUI is open to XSS, in the view that lists the contents of a queue.

  • EPSS 0.08%
  • Veröffentlicht 01.08.2019 14:15:10
  • Zuletzt bearbeitet 21.11.2024 02:36:58

It was found that the Apache ActiveMQ client before 5.14.5 exposed a remote shutdown command in the ActiveMQConnection class. An attacker logged into a compromised broker could use this flaw to achieve denial of service on a connected client.

  • EPSS 0.22%
  • Veröffentlicht 23.05.2019 14:29:07
  • Zuletzt bearbeitet 21.11.2024 04:16:28

An issue is present in Apache ZooKeeper 1.0.0 to 3.4.13 and 3.5.0-alpha to 3.5.4-beta. ZooKeeper’s getACL() command doesn’t check any permission when retrieves the ACLs of the requested node and returns all information contained in the ACL Id field a...

Exploit
  • EPSS 15.05%
  • Veröffentlicht 15.05.2019 17:29:00
  • Zuletzt bearbeitet 23.05.2025 16:54:47

Xstream API versions up to 1.4.6 and version 1.4.10, if the security framework has not been initialized, may allow a remote attacker to run arbitrary shell commands by manipulating the processed input stream when unmarshaling XML or any supported for...

  • EPSS 25.44%
  • Veröffentlicht 22.04.2019 20:29:00
  • Zuletzt bearbeitet 21.11.2024 04:18:43

In Eclipse Jetty version 9.2.26 and older, 9.3.25 and older, and 9.4.15 and older, the server is vulnerable to XSS conditions if a remote client USES a specially formatted URL against the DefaultServlet or ResourceHandler that is configured for showi...

  • EPSS 10.46%
  • Veröffentlicht 28.03.2019 22:29:00
  • Zuletzt bearbeitet 21.11.2024 04:16:31

In Apache ActiveMQ 5.0.0 - 5.15.8, unmarshalling corrupt MQTT frame can lead to broker Out of Memory exception making it unresponsive.

  • EPSS 80.06%
  • Veröffentlicht 10.10.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 04:13:04

An instance of a cross-site scripting vulnerability was identified to be present in the web based administration console on the queue.jsp page of Apache ActiveMQ versions 5.0.0 to 5.15.5. The root cause of this issue is improper data filtering of the...

  • EPSS 0.49%
  • Veröffentlicht 10.09.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:44:00

TLS hostname verification when using the Apache ActiveMQ Client before 5.15.6 was missing which could make the client vulnerable to a MITM attack between a Java application using the ActiveMQ client and the ActiveMQ server. This is now enabled by def...

  • EPSS 65.73%
  • Veröffentlicht 13.02.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:15:03

When using the OpenWire protocol in ActiveMQ versions 5.14.0 to 5.15.2 it was found that certain system details (such as the OS and kernel version) are exposed as plain text.

  • EPSS 1.79%
  • Veröffentlicht 10.01.2018 15:29:00
  • Zuletzt bearbeitet 21.11.2024 02:56:52

In Apache ActiveMQ 5.x before 5.14.2, an instance of a cross-site scripting vulnerability was identified to be present in the web based administration console. The root cause of this issue is improper user data output validation.