Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-pwbk-99g5-9fhm
SummaryCross-site scripting (XSS) vulnerability in createDestination.action in Apache ActiveMQ before 5.3.1 allows remote authenticated users to inject arbitrary web script or HTML via the JMSDestination parameter in a queue action.
Aliases
0
alias CVE-2010-0684
1
alias GHSA-mxf7-pv8q-294h
Fixed_packages
0
url pkg:maven/org.apache.activemq/activemq-parent@5.3.1
purl pkg:maven/org.apache.activemq/activemq-parent@5.3.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a3nb-p5p6-zbf7
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.activemq/activemq-parent@5.3.1
Affected_packages
0
url pkg:maven/org.apache.activemq/activemq-parent@4.1.1
purl pkg:maven/org.apache.activemq/activemq-parent@4.1.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a3nb-p5p6-zbf7
1
vulnerability VCID-pwbk-99g5-9fhm
2
vulnerability VCID-yw5q-dtaz-1kc1
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.activemq/activemq-parent@4.1.1
1
url pkg:maven/org.apache.activemq/activemq-parent@4.1.2
purl pkg:maven/org.apache.activemq/activemq-parent@4.1.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a3nb-p5p6-zbf7
1
vulnerability VCID-pwbk-99g5-9fhm
2
vulnerability VCID-yw5q-dtaz-1kc1
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.activemq/activemq-parent@4.1.2
2
url pkg:maven/org.apache.activemq/activemq-parent@5.0.0
purl pkg:maven/org.apache.activemq/activemq-parent@5.0.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a3nb-p5p6-zbf7
1
vulnerability VCID-pwbk-99g5-9fhm
2
vulnerability VCID-yw5q-dtaz-1kc1
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.activemq/activemq-parent@5.0.0
3
url pkg:maven/org.apache.activemq/activemq-parent@5.1.0
purl pkg:maven/org.apache.activemq/activemq-parent@5.1.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a3nb-p5p6-zbf7
1
vulnerability VCID-pwbk-99g5-9fhm
2
vulnerability VCID-yw5q-dtaz-1kc1
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.activemq/activemq-parent@5.1.0
4
url pkg:maven/org.apache.activemq/activemq-parent@5.2.0
purl pkg:maven/org.apache.activemq/activemq-parent@5.2.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a3nb-p5p6-zbf7
1
vulnerability VCID-pwbk-99g5-9fhm
2
vulnerability VCID-yw5q-dtaz-1kc1
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.activemq/activemq-parent@5.2.0
5
url pkg:maven/org.apache.activemq/activemq-parent@5.3.0
purl pkg:maven/org.apache.activemq/activemq-parent@5.3.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a3nb-p5p6-zbf7
1
vulnerability VCID-pwbk-99g5-9fhm
2
vulnerability VCID-yw5q-dtaz-1kc1
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.activemq/activemq-parent@5.3.0
References
0
reference_url http://activemq.apache.org/activemq-531-release.html
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url http://activemq.apache.org/activemq-531-release.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0684.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0684.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-0684
reference_id
reference_type
scores
0
value 0.00388
scoring_system epss
scoring_elements 0.59918
published_at 2026-04-09T12:55:00Z
1
value 0.00388
scoring_system epss
scoring_elements 0.59905
published_at 2026-04-13T12:55:00Z
2
value 0.00388
scoring_system epss
scoring_elements 0.59923
published_at 2026-04-12T12:55:00Z
3
value 0.00388
scoring_system epss
scoring_elements 0.59782
published_at 2026-04-01T12:55:00Z
4
value 0.00388
scoring_system epss
scoring_elements 0.59859
published_at 2026-04-02T12:55:00Z
5
value 0.00388
scoring_system epss
scoring_elements 0.59884
published_at 2026-04-04T12:55:00Z
6
value 0.00388
scoring_system epss
scoring_elements 0.59854
published_at 2026-04-07T12:55:00Z
7
value 0.00388
scoring_system epss
scoring_elements 0.59904
published_at 2026-04-08T12:55:00Z
8
value 0.00388
scoring_system epss
scoring_elements 0.59939
published_at 2026-04-11T12:55:00Z
9
value 0.00388
scoring_system epss
scoring_elements 0.59935
published_at 2026-04-21T12:55:00Z
10
value 0.00388
scoring_system epss
scoring_elements 0.59951
published_at 2026-04-18T12:55:00Z
11
value 0.00388
scoring_system epss
scoring_elements 0.59944
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-0684
3
reference_url http://secunia.com/advisories/39223
reference_id
reference_type
scores
url http://secunia.com/advisories/39223
4
reference_url http://securitytracker.com/id?1023778
reference_id
reference_type
scores
url http://securitytracker.com/id?1023778
5
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/57397
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://exchange.xforce.ibmcloud.com/vulnerabilities/57397
6
reference_url https://github.com/apache/activemq
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/apache/activemq
7
reference_url https://github.com/apache/activemq/commit/1f464b9412e1b1c08d40c8ffac40edd52731da48
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/apache/activemq/commit/1f464b9412e1b1c08d40c8ffac40edd52731da48
8
reference_url https://github.com/apache/activemq/commit/2895197d0dad246757d8d1d9eea181cbf0543ae9
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/apache/activemq/commit/2895197d0dad246757d8d1d9eea181cbf0543ae9
9
reference_url https://github.com/apache/activemq/commit/9dc43f3ffe85c9c56faee235a21f23bfceb865c8
reference_id
reference_type
scores
url https://github.com/apache/activemq/commit/9dc43f3ffe85c9c56faee235a21f23bfceb865c8
10
reference_url https://github.com/apache/activemq/commit/fed39c3619825bd92990cf1aa7a4e85119e00a6e
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/apache/activemq/commit/fed39c3619825bd92990cf1aa7a4e85119e00a6e
11
reference_url https://issues.apache.org/activemq/browse/AMQ-2613
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://issues.apache.org/activemq/browse/AMQ-2613
12
reference_url https://issues.apache.org/activemq/browse/AMQ-2625
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://issues.apache.org/activemq/browse/AMQ-2625
13
reference_url https://web.archive.org/web/20100407054019/http://secunia.com/advisories/39223
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20100407054019/http://secunia.com/advisories/39223
14
reference_url https://web.archive.org/web/20101221101403/http://securitytracker.com/alerts/2010/Mar/1023778.html
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20101221101403/http://securitytracker.com/alerts/2010/Mar/1023778.html
15
reference_url https://web.archive.org/web/20200228042520/http://www.securityfocus.com/bid/39119
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20200228042520/http://www.securityfocus.com/bid/39119
16
reference_url https://web.archive.org/web/20201130115007/http://www.securityfocus.com/archive/1/510419/100/0/threaded
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20201130115007/http://www.securityfocus.com/archive/1/510419/100/0/threaded
17
reference_url http://www.securityfocus.com/archive/1/510419/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/510419/100/0/threaded
18
reference_url http://www.securityfocus.com/bid/39119
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/39119
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=580882
reference_id 580882
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=580882
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-0684
reference_id CVE-2010-0684
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2010-0684
21
reference_url http://www.rajatswarup.com/CVE-2010-0684.txt
reference_id CVE-2010-0684.TXT
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url http://www.rajatswarup.com/CVE-2010-0684.txt
22
reference_url https://github.com/advisories/GHSA-mxf7-pv8q-294h
reference_id GHSA-mxf7-pv8q-294h
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-mxf7-pv8q-294h
Weaknesses
0
cwe_id 1035
name OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017.
1
cwe_id 79
name Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
description The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
2
cwe_id 937
name OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013.
Exploits
Severity_range_score0.1 - 3
Exploitability0.5
Weighted_severity2.7
Risk_score1.4
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-pwbk-99g5-9fhm