Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/activemq@0?distro=trixie
purl pkg:deb/debian/activemq@0?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (11)
Vulnerability Summary Aliases
VCID-3222-6uvd-7be5 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Multiple cross-site scripting (XSS) vulnerabilities in the web based administration console in Apache ActiveMQ 5.x before 5.10.1 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. CVE-2014-8110
GHSA-9cvr-8xq4-2m73
VCID-4up3-b171-g7aj Apache ActiveMQ default configuration subject to denial of service The default configuration of Apache ActiveMQ before 5.8.0 enables a sample web application, which allows remote attackers to cause a denial of service (broker resource consumption) via HTTP requests. CVE-2012-6551
GHSA-34fp-xvxp-rg22
VCID-99na-8tpm-syh1 The web-based administration console in Apache ActiveMQ 5.x before 5.13.2 does not send an X-Frame-Options HTTP header, which makes it easier for remote attackers to conduct clickjacking attacks via a crafted web page that contains a (1) FRAME or (2) IFRAME element. CVE-2016-0734
GHSA-w525-w93j-rxgm
VCID-a7j9-mzvg-cycr Cross-site scripting (XSS) vulnerability in the Portfolio publisher servlet in the demo web application in Apache ActiveMQ before 5.9.0 allows remote attackers to inject arbitrary web script or HTML via the refresh parameter to demo/portfolioPublish, a different vulnerability than CVE-2012-6092. CVE-2013-1880
GHSA-c9gx-27hq-wcvj
VCID-anw6-f8f2-q3hx Multiple cross-site scripting (XSS) vulnerabilities in the web demos in Apache ActiveMQ before 5.8.0 allow remote attackers to inject arbitrary web script or HTML via (1) the refresh parameter to PortfolioPublishServlet.java (aka demo/portfolioPublish or Market Data Publisher), or vectors involving (2) debug logs or (3) subscribe messages in webapp/websocket/chat.js. NOTE: AMQ-4124 is covered by CVE-2012-6551. CVE-2012-6092
GHSA-rp9p-863f-9c4h
VCID-pe37-xakm-3qb4 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') A regression has been introduced in the commit preventing JMX re-bind. By passing an empty environment map to RMIConnectorServer, instead of the map that contains the authentication credentials, it leaves ActiveMQ open to the following attack: https://docs.oracle.com/javase/8/docs/technotes/guides/management/agent.html "A remote client could create a javax.management.loading.MLet MBean and use it to create new MBeans from arbitrary URLs, at least if there is no security manager. In other words, a rogue remote client could make your Java application execute arbitrary code." Mitigation: Upgrade to Apache ActiveMQ 5.15.13 CVE-2020-11998
GHSA-wqfh-9m4g-7x6x
VCID-rsxq-hkds-vueh Improper Authentication in Apache ActiveMQ The web console in Apache ActiveMQ before 5.8.0 does not require authentication, which allows remote attackers to obtain sensitive information or cause a denial of service via HTTP requests. CVE-2013-3060
GHSA-p358-58jj-hp65
VCID-tyaw-6dpw-mudm Apache ActiveMQ, Apache ActiveMQ All, Apache ActiveMQ MQTT vulnerable to Integer Overflow or Wraparound Integer Overflow or Wraparound vulnerability in Apache ActiveMQ, Apache ActiveMQ All, Apache ActiveMQ MQTT. The fix for "CVE-2025-66168: MQTT control packet remaining length field is not properly validated" was only applied to 5.19.2 (and future 5.19.x) releases but was missed for all 6.0.0+ versions. This issue affects Apache ActiveMQ: from 6.0.0 before 6.2.4; Apache ActiveMQ All: from 6.0.0 before 6.2.4; Apache ActiveMQ MQTT: from 6.0.0 before 6.2.4. Users are recommended to upgrade to version 6.2.4 or a 5.19.x version starting with 5.19.2 or later (currently latest is 5.19.5), which fixes the issue. CVE-2026-40046
GHSA-xvqc-pp94-fmpx
VCID-uc2f-713u-skcc Cross-site scripting (XSS) vulnerability in scheduled.jsp in Apache ActiveMQ 5.8.0 and earlier allows remote attackers to inject arbitrary web script or HTML via vectors involving the "cron of a message." CVE-2013-1879
GHSA-mfhr-3xmc-r2gg
VCID-vbqu-ak2c-gqez Directory traversal vulnerability in the fileserver upload/download functionality for blob messages in Apache ActiveMQ 5.x before 5.11.2 for Windows allows remote attackers to create JSP files in arbitrary directories via unspecified vectors. CVE-2015-1830
GHSA-3v63-f83x-37x4
VCID-wema-7dnk-bkhy Apache ActiveMQ's default configuration doesn't secure the API web context In Apache ActiveMQ 6.x, the default configuration doesn't secure the API web context (where the Jolokia JMX REST API and the Message REST API are located). It means that anyone can use these layers without any required authentication. Potentially, anyone can interact with the broker (using Jolokia JMX REST API) and/or produce/consume messages or purge/delete destinations (using the Message REST API). To mitigate, users can update the default conf/jetty.xml configuration file to add authentication requirement: <bean id="securityConstraintMapping" class="org.eclipse.jetty.security.ConstraintMapping">   <property name="constraint" ref="securityConstraint" />   <property name="pathSpec" value="/" /> </bean> Or we encourage users to upgrade to Apache ActiveMQ 6.1.2 where the default configuration has been updated with authentication by default. CVE-2024-32114
GHSA-gj5m-m88j-v7c3

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T12:06:07.070963+00:00 Debian Importer Fixing VCID-tyaw-6dpw-mudm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:59:50.291834+00:00 Debian Importer Fixing VCID-vbqu-ak2c-gqez https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:41:00.260811+00:00 Debian Importer Fixing VCID-3222-6uvd-7be5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:37:39.078682+00:00 Debian Importer Fixing VCID-rsxq-hkds-vueh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:06:01.360071+00:00 Debian Importer Fixing VCID-anw6-f8f2-q3hx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:21:03.462786+00:00 Debian Importer Fixing VCID-pe37-xakm-3qb4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:51:26.290862+00:00 Debian Importer Fixing VCID-a7j9-mzvg-cycr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:46:39.349096+00:00 Debian Importer Fixing VCID-4up3-b171-g7aj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:22:16.618687+00:00 Debian Importer Fixing VCID-uc2f-713u-skcc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:50:58.132433+00:00 Debian Importer Fixing VCID-wema-7dnk-bkhy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:45:12.041123+00:00 Debian Importer Fixing VCID-99na-8tpm-syh1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T08:11:33.954672+00:00 Debian Importer Fixing VCID-vbqu-ak2c-gqez https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:57:37.923113+00:00 Debian Importer Fixing VCID-3222-6uvd-7be5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:55:28.698961+00:00 Debian Importer Fixing VCID-rsxq-hkds-vueh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:32:21.290081+00:00 Debian Importer Fixing VCID-anw6-f8f2-q3hx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:58:13.875274+00:00 Debian Importer Fixing VCID-pe37-xakm-3qb4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:35:24.261795+00:00 Debian Importer Fixing VCID-a7j9-mzvg-cycr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:31:46.707879+00:00 Debian Importer Fixing VCID-4up3-b171-g7aj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T17:46:36.358339+00:00 Debian Importer Fixing VCID-tyaw-6dpw-mudm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:15:30.931630+00:00 Debian Importer Fixing VCID-uc2f-713u-skcc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:56:40.791125+00:00 Debian Importer Fixing VCID-wema-7dnk-bkhy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:52:52.188291+00:00 Debian Importer Fixing VCID-99na-8tpm-syh1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-02T17:13:22.475782+00:00 Debian Importer Fixing VCID-vbqu-ak2c-gqez https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:12:25.427866+00:00 Debian Importer Fixing VCID-3222-6uvd-7be5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:12:14.480932+00:00 Debian Importer Fixing VCID-rsxq-hkds-vueh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:23.615992+00:00 Debian Importer Fixing VCID-anw6-f8f2-q3hx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:07:48.483028+00:00 Debian Importer Fixing VCID-pe37-xakm-3qb4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:06:09.246673+00:00 Debian Importer Fixing VCID-a7j9-mzvg-cycr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:05:53.349432+00:00 Debian Importer Fixing VCID-4up3-b171-g7aj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:04:43.509892+00:00 Debian Importer Fixing VCID-uc2f-713u-skcc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:02:54.721778+00:00 Debian Importer Fixing VCID-wema-7dnk-bkhy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:02:35.766478+00:00 Debian Importer Fixing VCID-99na-8tpm-syh1 https://security-tracker.debian.org/tracker/data/json 38.1.0