6.2.3
18 years ago
25 days ago
Known vulnerabilities in the org.apache.activemq:activemq-all package. This does not include vulnerabilities belonging to this package’s dependencies.
Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.
Fix for free| Vulnerability | Vulnerable Version |
|---|---|
org.apache.activemq:activemq-all is a package that puts together an ActiveMQ jar bundle. Affected versions of this package are vulnerable to Arbitrary Code Injection over the How to fix Arbitrary Code Injection? Upgrade | [,5.19.4)[6.0.0,6.2.3) |
org.apache.activemq:activemq-all is a package that puts together an ActiveMQ jar bundle. Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling in NIO SSL transport processing. An attacker can cause the broker to exhaust all available memory and disrupt service availability by rapidly triggering TLS 1.3 handshake KeyUpdates from a client connection. How to fix Allocation of Resources Without Limits or Throttling? Upgrade | [,5.19.5)[6.0.0,6.2.4) |
org.apache.activemq:activemq-all is a package that puts together an ActiveMQ jar bundle. Affected versions of this package are vulnerable to Integer Overflow or Wraparound when decoding malformed MQTT packets, due to improper validation of the Remaining Length. An attacker can cause the broker to misinterpret payloads as multiple MQTT control packets by sending malicious packets. Note: This is only exploitable if the MQTT transport connector is enabled. This issue got CVE-2026-40046 assigned specifically to track backports to 6.x.x version line. How to fix Integer Overflow or Wraparound? Upgrade | [,5.19.2)[6.0.0,6.2.4) |