{"url":"http://public2.vulnerablecode.io/api/packages/568999?format=json","purl":"pkg:maven/org.apache.tomee/openejb-lite@1.0.0","type":"maven","namespace":"org.apache.tomee","name":"openejb-lite","version":"1.0.0","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"8.0.8","latest_non_vulnerable_version":"8.0.8","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/12850?format=json","vulnerability_id":"VCID-5vbc-strc-5ue5","summary":"Missing Authentication for Critical Function\nIf Apache TomEE is configured to use the embedded ActiveMQ broker, and the broker URI includes the useJMX=true parameter, a JMX port is opened on TCP port 1099, which does not include authentication. This affects Apache TomEE 8.0.0-M1 - 8.0.1, Apache TomEE 7.1.0 - 7.1.2, Apache TomEE 7.0.0-M1 - 7.0.7, Apache TomEE 1.0.0 - 1.7.5.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-11969","reference_id":"","reference_type":"","scores":[{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78224","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78088","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78097","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78127","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78109","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78135","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78141","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78166","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78148","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78144","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78178","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78177","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78172","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78204","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.7821","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-11969"},{"reference_url":"https://lists.apache.org/thread.html/r85b87478f8aa4751aa3a06e88622e80ffabae376ee7283e147ee56b9@%3Cdev.tomee.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/r85b87478f8aa4751aa3a06e88622e80ffabae376ee7283e147ee56b9@%3Cdev.tomee.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/rbd23418646dedda70a546331ea1c1d115b8975b7e7dc452d10e2e773@%3Cannounce.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/rbd23418646dedda70a546331ea1c1d115b8975b7e7dc452d10e2e773@%3Cannounce.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/rbd23418646dedda70a546331ea1c1d115b8975b7e7dc452d10e2e773%40%3Cdev.tomee.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/rbd23418646dedda70a546331ea1c1d115b8975b7e7dc452d10e2e773%40%3Cdev.tomee.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/ref088c4732e1a8dd0bbbb96e13ffafcfe65f984238ffa55f438d78fe@%3Cdev.tomee.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/ref088c4732e1a8dd0bbbb96e13ffafcfe65f984238ffa55f438d78fe@%3Cdev.tomee.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/ref088c4732e1a8dd0bbbb96e13ffafcfe65f984238ffa55f438d78fe@%3Cusers.tomee.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/ref088c4732e1a8dd0bbbb96e13ffafcfe65f984238ffa55f438d78fe@%3Cusers.tomee.apache.org%3E"},{"reference_url":"http://www.openwall.com/lists/oss-security/2020/12/16/2","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.openwall.com/lists/oss-security/2020/12/16/2"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-11969","reference_id":"CVE-2020-11969","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-11969"},{"reference_url":"https://github.com/advisories/GHSA-836g-5fr5-fgcr","reference_id":"GHSA-836g-5fr5-fgcr","reference_type":"","scores":[{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-836g-5fr5-fgcr"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/261743?format=json","purl":"pkg:maven/org.apache.tomee/openejb-lite@7.0.0-M1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-46y3-rx34-pyc6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.tomee/openejb-lite@7.0.0-M1"},{"url":"http://public2.vulnerablecode.io/api/packages/208148?format=json","purl":"pkg:maven/org.apache.tomee/openejb-lite@7.1.3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-46y3-rx34-pyc6"},{"vulnerability":"VCID-dr52-xewb-k7hv"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.tomee/openejb-lite@7.1.3"},{"url":"http://public2.vulnerablecode.io/api/packages/208151?format=json","purl":"pkg:maven/org.apache.tomee/openejb-lite@8.0.2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-46y3-rx34-pyc6"},{"vulnerability":"VCID-dr52-xewb-k7hv"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.tomee/openejb-lite@8.0.2"}],"aliases":["CVE-2020-11969","GHSA-836g-5fr5-fgcr"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5vbc-strc-5ue5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/12646?format=json","vulnerability_id":"VCID-dr52-xewb-k7hv","summary":"Remote code execution in Apache TomEE\nIf Apache TomEE - - - - is configured to use the embedded ActiveMQ broker, and the broker config is misconfigured, a JMX port is opened on TCP port, which does not include authentication. CVE-2020-11969 previously addressed the creation of the JMX management interface, however the incomplete fix does not cover this edge case.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-13931","reference_id":"","reference_type":"","scores":[{"value":"0.01368","scoring_system":"epss","scoring_elements":"0.80285","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01368","scoring_system":"epss","scoring_elements":"0.80202","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01368","scoring_system":"epss","scoring_elements":"0.80222","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01368","scoring_system":"epss","scoring_elements":"0.80208","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01368","scoring_system":"epss","scoring_elements":"0.80203","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01368","scoring_system":"epss","scoring_elements":"0.80232","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01368","scoring_system":"epss","scoring_elements":"0.80233","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01368","scoring_system":"epss","scoring_elements":"0.80236","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01368","scoring_system":"epss","scoring_elements":"0.80262","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01368","scoring_system":"epss","scoring_elements":"0.80269","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01368","scoring_system":"epss","scoring_elements":"0.8015","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01368","scoring_system":"epss","scoring_elements":"0.80157","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01368","scoring_system":"epss","scoring_elements":"0.80177","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01368","scoring_system":"epss","scoring_elements":"0.80166","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01368","scoring_system":"epss","scoring_elements":"0.80194","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-13931"},{"reference_url":"https://lists.apache.org/thread.html/r7f98907165b355dc65f28a57f15103a06173ce03261115fa46d569b4@%3Cdev.tomee.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/r7f98907165b355dc65f28a57f15103a06173ce03261115fa46d569b4@%3Cdev.tomee.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/r85b87478f8aa4751aa3a06e88622e80ffabae376ee7283e147ee56b9@%3Cdev.tomee.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/r85b87478f8aa4751aa3a06e88622e80ffabae376ee7283e147ee56b9@%3Cdev.tomee.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/ref088c4732e1a8dd0bbbb96e13ffafcfe65f984238ffa55f438d78fe%40%3Cdev.tomee.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/ref088c4732e1a8dd0bbbb96e13ffafcfe65f984238ffa55f438d78fe%40%3Cdev.tomee.apache.org%3E"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-13931","reference_id":"CVE-2020-13931","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-13931"},{"reference_url":"https://github.com/advisories/GHSA-mp28-rq7g-qx62","reference_id":"GHSA-mp28-rq7g-qx62","reference_type":"","scores":[{"value":"CRITICAL","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-mp28-rq7g-qx62"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/261743?format=json","purl":"pkg:maven/org.apache.tomee/openejb-lite@7.0.0-M1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-46y3-rx34-pyc6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.tomee/openejb-lite@7.0.0-M1"},{"url":"http://public2.vulnerablecode.io/api/packages/223945?format=json","purl":"pkg:maven/org.apache.tomee/openejb-lite@7.1.4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-46y3-rx34-pyc6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.tomee/openejb-lite@7.1.4"},{"url":"http://public2.vulnerablecode.io/api/packages/223947?format=json","purl":"pkg:maven/org.apache.tomee/openejb-lite@8.0.4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-46y3-rx34-pyc6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.tomee/openejb-lite@8.0.4"}],"aliases":["CVE-2020-13931","GHSA-mp28-rq7g-qx62"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dr52-xewb-k7hv"}],"fixing_vulnerabilities":[],"risk_score":"4.5","resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.tomee/openejb-lite@1.0.0"}