Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/584470?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/584470?format=api", "purl": "pkg:deb/debian/activemq@5.6.0%2Bdfsg1-4?distro=trixie", "type": "deb", "namespace": "debian", "name": "activemq", "version": "5.6.0+dfsg1-4", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "5.6.0+dfsg1-4+deb8u1", "latest_non_vulnerable_version": "5.17.6+dfsg-2", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4672?format=api", "vulnerability_id": "VCID-4x3q-h212-duaz", "summary": "XML external entity (XXE) vulnerability in Apache ActiveMQ 5.x before 5.10.1 allows remote consumers to have unspecified impact via vectors involving an XPath based selector when dequeuing XML messages.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3600.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3600.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3600", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00511", "scoring_system": "epss", "scoring_elements": "0.66518", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00511", "scoring_system": "epss", "scoring_elements": "0.66503", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00511", "scoring_system": "epss", "scoring_elements": "0.66479", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00511", "scoring_system": "epss", "scoring_elements": "0.66403", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00511", "scoring_system": "epss", "scoring_elements": "0.6652", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00511", "scoring_system": "epss", "scoring_elements": "0.66368", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00511", "scoring_system": "epss", "scoring_elements": "0.66485", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00511", "scoring_system": "epss", "scoring_elements": "0.66465", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00511", "scoring_system": "epss", "scoring_elements": "0.66406", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00511", "scoring_system": "epss", "scoring_elements": "0.66433", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00511", "scoring_system": "epss", "scoring_elements": "0.66452", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00511", "scoring_system": "epss", "scoring_elements": "0.66494", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00511", "scoring_system": "epss", "scoring_elements": "0.66477", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00511", "scoring_system": "epss", "scoring_elements": "0.66442", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00511", "scoring_system": "epss", "scoring_elements": "0.66473", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3600" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3600", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3600" }, { "reference_url": "http://seclists.org/oss-sec/2015/q1/427", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://seclists.org/oss-sec/2015/q1/427" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100722", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100722" }, { "reference_url": "https://github.com/apache/activemq", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/activemq" }, { "reference_url": "https://github.com/apache/activemq/commit/3e5ac6326db59f524a0e71f6b717428607d7b67d", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/activemq/commit/3e5ac6326db59f524a0e71f6b717428607d7b67d" }, { "reference_url": "https://github.com/apache/activemq/commit/b9696ac80bb496b52d05c3884f81b0746d9af9e2", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/apache/activemq/commit/b9696ac80bb496b52d05c3884f81b0746d9af9e2" }, { "reference_url": "https://issues.apache.org/jira/browse/AMQ-5333", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://issues.apache.org/jira/browse/AMQ-5333" }, { "reference_url": "https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2@%3Ccommits.activemq.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2@%3Ccommits.activemq.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2%40%3Ccommits.activemq.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2%40%3Ccommits.activemq.apache.org%3E" }, { "reference_url": "http://www.securityfocus.com/bid/72510", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/72510" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1133649", "reference_id": "1133649", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1133649" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777196", "reference_id": "777196", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777196" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:activemq:5.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apache:activemq:5.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:activemq:5.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:activemq:5.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apache:activemq:5.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:activemq:5.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:activemq:5.10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apache:activemq:5.10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:activemq:5.10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:activemq:5.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apache:activemq:5.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:activemq:5.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:activemq:5.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apache:activemq:5.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:activemq:5.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:activemq:5.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apache:activemq:5.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:activemq:5.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:activemq:5.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apache:activemq:5.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:activemq:5.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:activemq:5.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apache:activemq:5.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:activemq:5.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:activemq:5.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apache:activemq:5.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:activemq:5.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:activemq:5.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apache:activemq:5.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:activemq:5.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:activemq:5.4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apache:activemq:5.4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:activemq:5.4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:activemq:5.5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apache:activemq:5.5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:activemq:5.5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:activemq:5.5.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apache:activemq:5.5.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:activemq:5.5.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:activemq:5.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apache:activemq:5.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:activemq:5.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:activemq:5.7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apache:activemq:5.7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:activemq:5.7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:activemq:5.8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apache:activemq:5.8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:activemq:5.8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:activemq:5.9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apache:activemq:5.9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:activemq:5.9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:activemq:5.9.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apache:activemq:5.9.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:activemq:5.9.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3600", "reference_id": "CVE-2014-3600", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3600" }, { "reference_url": "http://activemq.apache.org/security-advisories.data/CVE-2014-3600-announcement.txt", "reference_id": "CVE-2014-3600-ANNOUNCEMENT.TXT", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://activemq.apache.org/security-advisories.data/CVE-2014-3600-announcement.txt" }, { "reference_url": "https://github.com/advisories/GHSA-4vhf-2hv7-8mrx", "reference_id": "GHSA-4vhf-2hv7-8mrx", "reference_type": "", "scores": [ { "value": "CRITICAL", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-4vhf-2hv7-8mrx" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0137", "reference_id": "RHSA-2015:0137", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0137" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0138", "reference_id": "RHSA-2015:0138", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0138" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/584470?format=api", "purl": "pkg:deb/debian/activemq@5.6.0%2Bdfsg1-4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/activemq@5.6.0%252Bdfsg1-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582589?format=api", "purl": "pkg:deb/debian/activemq@5.16.1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/activemq@5.16.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582590?format=api", "purl": "pkg:deb/debian/activemq@5.17.2%2Bdfsg-2%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-q6zs-spcv-v7ey" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/activemq@5.17.2%252Bdfsg-2%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582591?format=api", "purl": "pkg:deb/debian/activemq@5.17.6%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/activemq@5.17.6%252Bdfsg-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2014-3600", "GHSA-4vhf-2hv7-8mrx" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4x3q-h212-duaz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/5111?format=api", "vulnerability_id": "VCID-gxt8-xcsg-3kes", "summary": "The LDAPLoginModule implementation in the Java Authentication and Authorization Service (JAAS) in Apache ActiveMQ 5.x before 5.10.1 allows remote attackers to bypass authentication by logging in with an empty password and valid username, which triggers an unauthenticated bind. NOTE: this identifier has been SPLIT per ADT2 due to different vulnerability types. See CVE-2015-6524 for the use of wildcard operators in usernames.", "references": [ { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-0137.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0137.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-0138.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0138.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3612.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3612.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3612", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00705", "scoring_system": "epss", "scoring_elements": "0.72166", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00705", "scoring_system": "epss", "scoring_elements": "0.72122", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00705", "scoring_system": "epss", "scoring_elements": "0.72107", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00705", "scoring_system": "epss", "scoring_elements": "0.72093", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00705", "scoring_system": "epss", "scoring_elements": "0.72133", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00705", "scoring_system": "epss", "scoring_elements": "0.72141", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00705", "scoring_system": "epss", "scoring_elements": "0.72127", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00705", "scoring_system": "epss", "scoring_elements": "0.7217", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00705", "scoring_system": "epss", "scoring_elements": "0.72179", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00705", "scoring_system": "epss", "scoring_elements": "0.72174", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00705", "scoring_system": "epss", "scoring_elements": "0.72048", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00705", "scoring_system": "epss", "scoring_elements": "0.72054", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00705", "scoring_system": "epss", "scoring_elements": "0.72075", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00705", "scoring_system": "epss", "scoring_elements": "0.72051", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00705", "scoring_system": "epss", "scoring_elements": "0.72088", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00705", "scoring_system": "epss", "scoring_elements": "0.721", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3612" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3612", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3612" }, { "reference_url": "http://seclists.org/oss-sec/2015/q1/427", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://seclists.org/oss-sec/2015/q1/427" }, { "reference_url": "https://github.com/apache/activemq", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/activemq" }, { "reference_url": "https://github.com/apache/activemq/commit/0b5231ada5ce365b41832ba8752ee210145d1cbe", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/apache/activemq/commit/0b5231ada5ce365b41832ba8752ee210145d1cbe" }, { "reference_url": "https://github.com/apache/activemq/commit/22f2f3dde757d31307da772d579815c1d169bc39", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/activemq/commit/22f2f3dde757d31307da772d579815c1d169bc39" }, { "reference_url": "https://issues.apache.org/jira/browse/AMQ-5345", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://issues.apache.org/jira/browse/AMQ-5345" }, { "reference_url": "https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2@%3Ccommits.activemq.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2@%3Ccommits.activemq.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2%40%3Ccommits.activemq.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2%40%3Ccommits.activemq.apache.org%3E" }, { "reference_url": "http://www.securityfocus.com/bid/72513", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.securityfocus.com/bid/72513" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1135912", "reference_id": "1135912", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1135912" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777196", "reference_id": "777196", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777196" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3612", "reference_id": "CVE-2014-3612", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3612" }, { "reference_url": "http://activemq.apache.org/security-advisories.data/CVE-2014-3612-announcement.txt", "reference_id": "CVE-2014-3612-ANNOUNCEMENT.TXT", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://activemq.apache.org/security-advisories.data/CVE-2014-3612-announcement.txt" }, { "reference_url": "https://github.com/advisories/GHSA-72m6-23ff-7q26", "reference_id": "GHSA-72m6-23ff-7q26", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-72m6-23ff-7q26" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0137", "reference_id": "RHSA-2015:0137", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0137" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0138", "reference_id": "RHSA-2015:0138", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0138" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/584470?format=api", "purl": "pkg:deb/debian/activemq@5.6.0%2Bdfsg1-4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/activemq@5.6.0%252Bdfsg1-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582589?format=api", "purl": "pkg:deb/debian/activemq@5.16.1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/activemq@5.16.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582590?format=api", "purl": "pkg:deb/debian/activemq@5.17.2%2Bdfsg-2%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-q6zs-spcv-v7ey" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/activemq@5.17.2%252Bdfsg-2%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582591?format=api", "purl": "pkg:deb/debian/activemq@5.17.6%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/activemq@5.17.6%252Bdfsg-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2014-3612", "GHSA-72m6-23ff-7q26" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gxt8-xcsg-3kes" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/5065?format=api", "vulnerability_id": "VCID-rkj1-fqpn-cyfk", "summary": "The LDAPLoginModule implementation in the Java Authentication and Authorization Service (JAAS) in Apache ActiveMQ 5.x before 5.10.1 allows wildcard operators in usernames, which allows remote attackers to obtain credentials via a brute force attack. NOTE: this identifier was SPLIT from CVE-2014-3612 per ADT2 due to different vulnerability types.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168094.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168094.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168651.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168651.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6524.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6524.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-6524", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01167", "scoring_system": "epss", "scoring_elements": "0.78741", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01167", "scoring_system": "epss", "scoring_elements": "0.78665", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01167", "scoring_system": "epss", "scoring_elements": "0.78695", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01167", "scoring_system": "epss", "scoring_elements": "0.78703", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01167", "scoring_system": "epss", "scoring_elements": "0.7872", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01167", "scoring_system": "epss", "scoring_elements": "0.78591", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01167", "scoring_system": "epss", "scoring_elements": "0.78598", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01167", "scoring_system": "epss", "scoring_elements": "0.78629", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01167", "scoring_system": "epss", "scoring_elements": "0.7861", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01167", "scoring_system": "epss", "scoring_elements": "0.78635", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01167", "scoring_system": "epss", "scoring_elements": "0.78642", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01167", "scoring_system": "epss", "scoring_elements": "0.78667", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01167", "scoring_system": "epss", "scoring_elements": "0.78648", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01167", "scoring_system": "epss", "scoring_elements": "0.78641", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01167", "scoring_system": "epss", "scoring_elements": "0.7867", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01167", "scoring_system": "epss", "scoring_elements": "0.78668", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-6524" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6524", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6524" }, { "reference_url": "https://github.com/apache/activemq", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/activemq" }, { "reference_url": "https://github.com/apache/activemq/commit/0b5231ada5ce365b41832ba8752ee210145d1cbe", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/apache/activemq/commit/0b5231ada5ce365b41832ba8752ee210145d1cbe" }, { "reference_url": "https://github.com/apache/activemq/commit/22f2f3dde757d31307da772d579815c1d169bc39", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/activemq/commit/22f2f3dde757d31307da772d579815c1d169bc39" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1257246", "reference_id": "1257246", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1257246" }, { "reference_url": "http://activemq.apache.org/security-advisories.data/CVE-2014-3612-announcement.txt", "reference_id": "CVE-2014-3612-ANNOUNCEMENT.TXT", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://activemq.apache.org/security-advisories.data/CVE-2014-3612-announcement.txt" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-6524", "reference_id": "CVE-2015-6524", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-6524" }, { "reference_url": "https://github.com/advisories/GHSA-23cr-5hr4-rgwv", "reference_id": "GHSA-23cr-5hr4-rgwv", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-23cr-5hr4-rgwv" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/584470?format=api", "purl": "pkg:deb/debian/activemq@5.6.0%2Bdfsg1-4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/activemq@5.6.0%252Bdfsg1-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582589?format=api", "purl": "pkg:deb/debian/activemq@5.16.1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/activemq@5.16.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582590?format=api", "purl": "pkg:deb/debian/activemq@5.17.2%2Bdfsg-2%2Bdeb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-q6zs-spcv-v7ey" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/activemq@5.17.2%252Bdfsg-2%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582591?format=api", "purl": "pkg:deb/debian/activemq@5.17.6%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/activemq@5.17.6%252Bdfsg-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2015-6524", "GHSA-23cr-5hr4-rgwv" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rkj1-fqpn-cyfk" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/activemq@5.6.0%252Bdfsg1-4%3Fdistro=trixie" }