VYPR

Bitnami package

activemq

pkg:bitnami/activemq

Vulnerabilities (29)

  • CVE-2026-41044HigApr 24, 2026
    affected < 5.19.6fixed 5.19.6

    Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability in Apache ActiveMQ, Apache ActiveMQ Broker, Apache ActiveMQ All. An authenticated attacker can use the admin web console page to construct a malicious broker name that bypasses nam

  • CVE-2026-41043MedApr 24, 2026
    affected < 5.19.6fixed 5.19.6

    Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in Apache ActiveMQ, Apache ActiveMQ Web. An authenticated attacker can show malicious content when browsing queues in the web console by overriding the content type to be HTML (instead of

  • CVE-2026-40466HigApr 24, 2026
    affected < 5.19.6fixed 5.19.6

    Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability in Apache ActiveMQ Broker, Apache ActiveMQ All, Apache ActiveMQ. An authenticated attacker may bypass the fix in CVE-2026-34197 by adding a connector using an HTTP Discovery tran

  • CVE-2026-39304HigApr 10, 2026
    affected < 5.19.4fixed 5.19.4

    Denial of Service via Out of Memory vulnerability in Apache ActiveMQ Client, Apache ActiveMQ Broker, Apache ActiveMQ. ActiveMQ NIO SSL transports do not correctly handle TLSv1.3 handshake KeyUpdates triggered by clients. This makes it possible for a client to rapidly trigger upd

  • CVE-2026-40046HigApr 9, 2026
    affected >= 6.0.0, < 6.2.4fixed 6.2.4

    Integer Overflow or Wraparound vulnerability in Apache ActiveMQ, Apache ActiveMQ All, Apache ActiveMQ MQTT. The fix for "CVE-2025-66168: MQTT control packet remaining length field is not properly validated" was only applied to 5.19.2 (and future 5.19.x) releases but was missed f

  • CVE-2026-34197HigKEVApr 7, 2026
    affected < 5.19.4fixed 5.19.4

    Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability in Apache ActiveMQ Broker, Apache ActiveMQ. Apache ActiveMQ Classic exposes the Jolokia JMX-HTTP bridge at /api/jolokia/ on the web console. The default Jolokia access policy permi

  • CVE-2026-33227MedApr 7, 2026
    affected < 5.19.3fixed 5.19.3

    Improper validation and restriction of a classpath path name vulnerability in Apache ActiveMQ Client, Apache ActiveMQ Broker, Apache ActiveMQ All, Apache ActiveMQ Web, Apache ActiveMQ. In two instances (when creating a Stomp consumer and also browsing messages in the Web co

  • CVE-2025-66168MedMar 4, 2026
    affected < 5.19.2fixed 5.19.2

    WARNING: Users of 6.x should upgrade to 6.2.4 or later as the fix was missed in previous 6.x releases. See the  following for more details: https://activemq.apache.org/security-advisories.data/CVE-2026-40046-announcement.txt https://www.cve.org/CVERecord?id=CVE-2026-40046

  • CVE-2025-27533May 7, 2025
    affected >= 5.16.0, < 5.16.8fixed 5.16.8

    Memory Allocation with Excessive Size Value vulnerability in Apache ActiveMQ. During unmarshalling of OpenWire commands the size value of buffers was not properly validated which could lead to excessive memory allocation and be exploited to cause a denial of service (DoS) by dep

  • CVE-2024-32114May 2, 2024
    affected >= 6.0.0, < 6.1.2fixed 6.1.2

    In Apache ActiveMQ 6.x, the default configuration doesn't secure the API web context (where the Jolokia JMX REST API and the Message REST API are located). It means that anyone can use these layers without any required authentication. Potentially, anyone can interact with the bro

  • CVE-2022-41678Nov 28, 2023
    affected < 5.16.6fixed 5.16.6

    Once an user is authenticated on Jolokia, he can potentially trigger arbitrary code execution.  In details, in ActiveMQ configurations, jetty allows org.jolokia.http.AgentServlet to handler request to /api/jolokia org.jolokia.http.HttpRequestHandler#handlePostRequest is able to

  • CVE-2023-46604KEVOct 27, 2023
    affected < 5.15.16fixed 5.15.16

    The Java OpenWire protocol marshaller is vulnerable to Remote Code Execution. This vulnerability may allow a remote attacker with network access to either a Java-based OpenWire broker or client to run arbitrary shell commands by manipulating serialized class types in the OpenW

  • CVE-2021-21348Mar 22, 2021
    affected < 5.15.14fixed 5.15.14

    XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to occupy a thread that consumes maximum CPU time and will never return. No user is affected, who followed the recomm

  • CVE-2021-21349Mar 22, 2021
    affected < 5.15.14fixed 5.15.14

    XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stre

  • CVE-2021-21350Mar 22, 2021
    affected < 5.15.14fixed 5.15.14

    XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to execute arbitrary code only by manipulating the processed input stream. No user is affected, who followed the reco

  • CVE-2021-21351Mar 22, 2021
    affected < 5.15.14fixed 5.15.14

    XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected,

  • CVE-2021-21341Mar 22, 2021
    affected < 5.15.14fixed 5.15.14

    XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is vulnerability which may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting

  • CVE-2021-21342Mar 22, 2021
    affected < 5.15.14fixed 5.15.14

    XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability where the processed stream at unmarshalling time contains type information to recreate the formerly written objects. XStream creates therefore new inst

  • CVE-2021-21343Mar 22, 2021
    affected < 5.15.14fixed 5.15.14

    XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability where the processed stream at unmarshalling time contains type information to recreate the formerly written objects. XStream creates therefore new inst

  • CVE-2021-21344Mar 22, 2021
    affected < 5.15.14fixed 5.15.14

    XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is aff

Page 1 of 2