Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/activemq@5.14.3-3
purl pkg:deb/debian/activemq@5.14.3-3
Next non-vulnerable version 5.17.6+dfsg-2
Latest non-vulnerable version 5.17.6+dfsg-2
Risk 10.0
Vulnerabilities affecting this package (11)
Vulnerability Summary Fixed by
VCID-18k1-3h2s-8uex
Aliases:
CVE-2020-1941
GHSA-cc94-3v9c-7rm8
Apache ActiveMQ webconsole admin GUI is open to XSS In Apache ActiveMQ 5.0.0 to 5.15.11, the webconsole admin GUI is open to XSS, in the view that lists the contents of a queue.
5.16.1-1
Affected by 3 other vulnerabilities.
VCID-37ws-cqf7-4udm
Aliases:
CVE-2020-13947
GHSA-66gw-ch5v-74v8
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') An instance of a cross-site scripting vulnerability was identified to be present in the web based administration console on the message.jsp page of Apache ActiveMQ versions 5.15.12 through 5.16.0.
5.16.1-1
Affected by 3 other vulnerabilities.
VCID-5kmj-whmc-4bfa
Aliases:
CVE-2017-15709
GHSA-7qm4-p377-fr2r
When using the OpenWire protocol in ActiveMQ versions 5.14.0 to 5.15.2 it was found that certain system details (such as the OS and kernel version) are exposed as plain text.
5.15.8-2
Affected by 8 other vulnerabilities.
VCID-6fqa-fzda-x3ej
Aliases:
CVE-2021-26117
GHSA-9mgm-gcq8-86wq
Improper Authentication in Apache ActiveMQ and Apache Artemis The optional ActiveMQ LDAP login module can be configured to use anonymous access to the LDAP server. In this case, for Apache ActiveMQ Artemis prior to version 2.16.0 and Apache ActiveMQ prior to versions 5.16.1 and 5.15.14, the anonymous context is used to verify a valid users password in error, resulting in no check on the password.
5.16.1-1
Affected by 3 other vulnerabilities.
VCID-9z4y-wq57-vyaf
Aliases:
CVE-2019-0222
GHSA-jpv3-g4cc-6vfx
Code Injection In Apache ActiveMQ, unmarshalling corrupt MQTT frame can lead to broker Out of Memory exception making it unresponsive.
5.16.1-1
Affected by 3 other vulnerabilities.
VCID-a3nb-p5p6-zbf7
Aliases:
CVE-2020-13920
GHSA-xgrx-xpv2-6vp4
Missing Authentication for Critical Function Apache ActiveMQ uses LocateRegistry.createRegistry() to create the JMX RMI registry and binds the server to the "jmxrmi" entry. It is possible to connect to the registry without authentication and call the rebind method to rebind jmxrmi to something else. If an attacker creates another server to proxy the original, and bound that, he effectively becomes a man in the middle and is able to intercept the credentials when an user connects. Upgrade to Apache ActiveMQ 5.15.12.
5.16.1-1
Affected by 3 other vulnerabilities.
VCID-f5x2-zvxa-yba5
Aliases:
CVE-2023-46604
GHSA-crg9-44h2-xw35
False positive This advisory has been marked as a false positive.
5.17.2+dfsg-2+deb12u1
Affected by 1 other vulnerability.
VCID-fb7w-5fvt-zqe3
Aliases:
CVE-2018-8006
GHSA-hvwm-2624-rp9x
Cross-site Scripting An instance of a cross-site scripting vulnerability was identified to be present in the web based administration console on the `queue.jsp` page of Apache ActiveMQ.
5.15.8-2
Affected by 8 other vulnerabilities.
VCID-k4jb-36cp-1fc4
Aliases:
CVE-2022-41678
GHSA-53v4-42fg-g287
False positive This advisory has been marked as a false positive.
5.17.2+dfsg-2+deb12u1
Affected by 1 other vulnerability.
VCID-q6zs-spcv-v7ey
Aliases:
CVE-2025-27533
GHSA-whxr-3p84-rf3c
Apache ActiveMQ: Unchecked buffer length can cause excessive memory allocation Memory Allocation with Excessive Size Value vulnerability in Apache ActiveMQ. During unmarshalling of OpenWire commands the size value of buffers was not properly validated which could lead to excessive memory allocation and be exploited to cause a denial of service (DoS) by depleting process memory, thereby affecting applications and services that rely on the availability of the ActiveMQ broker when not using mutual TLS connections. This issue affects Apache ActiveMQ: from 6.0.0 before 6.1.6, from 5.18.0 before 5.18.7, from 5.17.0 before 5.17.7, before 5.16.8. ActiveMQ 5.19.0 is not affected. Users are recommended to upgrade to version 6.1.6+, 5.19.0+, 5.18.7+, 5.17.7, or 5.16.8 or which fixes the issue. Existing users may implement mutual TLS to mitigate the risk on affected brokers.
5.17.2+dfsg-2+deb12u1
Affected by 1 other vulnerability.
5.17.6+dfsg-2
Affected by 0 other vulnerabilities.
VCID-xttf-9hx8-fbdb
Aliases:
CVE-2018-11775
GHSA-m9w8-v359-9ffr
TLS hostname verification when using the Apache ActiveMQ Client before 5.15.6 was missing which could make the client vulnerable to a MITM attack between a Java application using the ActiveMQ client and the ActiveMQ server. This is now enabled by default.
5.15.8-2
Affected by 8 other vulnerabilities.
Vulnerabilities fixed by this package (5)
Vulnerability Summary Aliases
VCID-brq9-y937-8faz Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') The administration web console in Apache ActiveMQ 5.x before 5.11.4, 5.12.x before 5.12.3, and 5.13.x before 5.13.2 allows remote authenticated users to conduct cross-site scripting (XSS) attacks and consequently obtain sensitive information from a Java memory dump via vectors related to creating a queue. CVE-2016-0782
GHSA-8rcq-p4gh-vmj8
VCID-nq1y-96n5-eugd The Fileserver web application in Apache ActiveMQ 5.x before 5.14.0 allows remote attackers to upload and execute arbitrary files via an HTTP PUT followed by an HTTP MOVE request. CVE-2016-3088
GHSA-rxqh-fc23-gxp2
VCID-pf5e-93cg-guav Apache ActiveMQ 5.x before 5.13.0 does not restrict the classes that can be serialized in the broker, which allows remote attackers to execute arbitrary code via a crafted serialized Java Message Service (JMS) ObjectMessage object. CVE-2015-5254
GHSA-q9hr-3pg4-3jp4
VCID-uw15-q255-zbe8 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') In Apache ActiveMQ 5.x before 5.14.2, an instance of a cross-site scripting vulnerability was identified to be present in the web based administration console. The root cause of this issue is improper user data output validation. CVE-2016-6810
GHSA-5jg4-p78r-p5j3
VCID-y7sj-71h1-3qhr It was found that the Apache ActiveMQ client before 5.14.5 exposed a remote shutdown command in the ActiveMQConnection class. An attacker logged into a compromised broker could use this flaw to achieve denial of service on a connected client. CVE-2015-7559
GHSA-jvpp-hxjj-5ccc

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T01:08:43.395722+00:00 Debian Oval Importer Affected by VCID-37ws-cqf7-4udm https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-16T00:34:25.984469+00:00 Debian Oval Importer Affected by VCID-f5x2-zvxa-yba5 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-16T00:25:47.360582+00:00 Debian Oval Importer Affected by VCID-9z4y-wq57-vyaf https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T23:08:37.127631+00:00 Debian Oval Importer Fixing VCID-brq9-y937-8faz https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T22:28:46.827653+00:00 Debian Oval Importer Affected by VCID-fb7w-5fvt-zqe3 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T22:22:44.760174+00:00 Debian Oval Importer Fixing VCID-pf5e-93cg-guav https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T22:06:43.481598+00:00 Debian Oval Importer Affected by VCID-k4jb-36cp-1fc4 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T21:40:42.969797+00:00 Debian Oval Importer Affected by VCID-a3nb-p5p6-zbf7 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T21:01:29.629040+00:00 Debian Oval Importer Affected by VCID-18k1-3h2s-8uex https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T19:45:43.913928+00:00 Debian Oval Importer Affected by VCID-6fqa-fzda-x3ej https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T18:19:03.437631+00:00 Debian Oval Importer Affected by VCID-5kmj-whmc-4bfa https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T18:12:15.713609+00:00 Debian Oval Importer Affected by VCID-q6zs-spcv-v7ey https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T15:57:31.118033+00:00 Debian Oval Importer Fixing VCID-uw15-q255-zbe8 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T15:45:35.060665+00:00 Debian Oval Importer Fixing VCID-y7sj-71h1-3qhr https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T15:40:09.331826+00:00 Debian Oval Importer Affected by VCID-xttf-9hx8-fbdb https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T15:34:02.562468+00:00 Debian Oval Importer Fixing VCID-nq1y-96n5-eugd https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-12T00:40:38.904665+00:00 Debian Oval Importer Affected by VCID-37ws-cqf7-4udm https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-12T00:07:37.601511+00:00 Debian Oval Importer Affected by VCID-f5x2-zvxa-yba5 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T23:59:14.956644+00:00 Debian Oval Importer Affected by VCID-9z4y-wq57-vyaf https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T22:44:37.796900+00:00 Debian Oval Importer Fixing VCID-brq9-y937-8faz https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T22:05:52.942193+00:00 Debian Oval Importer Affected by VCID-fb7w-5fvt-zqe3 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T22:00:01.025273+00:00 Debian Oval Importer Fixing VCID-pf5e-93cg-guav https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T21:44:42.157083+00:00 Debian Oval Importer Affected by VCID-k4jb-36cp-1fc4 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T21:19:31.721789+00:00 Debian Oval Importer Affected by VCID-a3nb-p5p6-zbf7 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T20:41:44.732261+00:00 Debian Oval Importer Affected by VCID-18k1-3h2s-8uex https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T19:28:08.155467+00:00 Debian Oval Importer Affected by VCID-6fqa-fzda-x3ej https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T18:04:19.604181+00:00 Debian Oval Importer Affected by VCID-5kmj-whmc-4bfa https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T17:57:42.414910+00:00 Debian Oval Importer Affected by VCID-q6zs-spcv-v7ey https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T15:45:07.608958+00:00 Debian Oval Importer Fixing VCID-uw15-q255-zbe8 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T15:33:19.372794+00:00 Debian Oval Importer Fixing VCID-y7sj-71h1-3qhr https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T15:27:59.918941+00:00 Debian Oval Importer Affected by VCID-xttf-9hx8-fbdb https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T15:22:01.043115+00:00 Debian Oval Importer Fixing VCID-nq1y-96n5-eugd https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-09T00:10:29.321306+00:00 Debian Oval Importer Affected by VCID-37ws-cqf7-4udm https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T23:38:47.269762+00:00 Debian Oval Importer Affected by VCID-f5x2-zvxa-yba5 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T23:30:50.551863+00:00 Debian Oval Importer Affected by VCID-9z4y-wq57-vyaf https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T22:19:27.903017+00:00 Debian Oval Importer Fixing VCID-brq9-y937-8faz https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T21:42:46.783098+00:00 Debian Oval Importer Affected by VCID-fb7w-5fvt-zqe3 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T21:37:08.750668+00:00 Debian Oval Importer Fixing VCID-pf5e-93cg-guav https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T21:22:31.573192+00:00 Debian Oval Importer Affected by VCID-k4jb-36cp-1fc4 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T20:58:15.471454+00:00 Debian Oval Importer Affected by VCID-a3nb-p5p6-zbf7 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T20:21:42.213148+00:00 Debian Oval Importer Affected by VCID-18k1-3h2s-8uex https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T19:11:39.471451+00:00 Debian Oval Importer Affected by VCID-6fqa-fzda-x3ej https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T17:50:50.316056+00:00 Debian Oval Importer Affected by VCID-5kmj-whmc-4bfa https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T17:44:28.676537+00:00 Debian Oval Importer Affected by VCID-q6zs-spcv-v7ey https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T15:38:49.831344+00:00 Debian Oval Importer Fixing VCID-uw15-q255-zbe8 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T15:27:27.768112+00:00 Debian Oval Importer Fixing VCID-y7sj-71h1-3qhr https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T15:22:21.680051+00:00 Debian Oval Importer Affected by VCID-xttf-9hx8-fbdb https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T15:16:39.882644+00:00 Debian Oval Importer Fixing VCID-nq1y-96n5-eugd https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0