6.2.3
13 years ago
16 days ago
Known vulnerabilities in the org.apache.activemq:activemq-broker package. This does not include vulnerabilities belonging to this package’s dependencies.
Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.
Fix for free| Vulnerability | Vulnerable Version |
|---|---|
org.apache.activemq:activemq-broker is a high performance Apache 2.0 licensed Message Broker and JMS 1.1 implementation. Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling in NIO SSL transport processing. An attacker can cause the broker to exhaust all available memory and disrupt service availability by rapidly triggering TLS 1.3 handshake KeyUpdates from a client connection. How to fix Allocation of Resources Without Limits or Throttling? Upgrade | [,5.19.5)[6.0.0,6.2.4) |
org.apache.activemq:activemq-broker is a high performance Apache 2.0 licensed Message Broker and JMS 1.1 implementation. Affected versions of this package are vulnerable to Directory Traversal via improper validation of classpath path names in the Note: Due to a path separator resolution bug, Windows users are recommended to upgrade to versions 5.19.4 and 6.2.3. How to fix Directory Traversal? Upgrade | [,5.19.3)[6.0.0,6.2.2) |
org.apache.activemq:activemq-broker is a high performance Apache 2.0 licensed Message Broker and JMS 1.1 implementation. Affected versions of this package are vulnerable to Improper Authentication. Apache ActiveMQ uses How to fix Improper Authentication? Upgrade | [,5.15.12) |
org.apache.activemq:activemq-broker is a high performance Apache 2.0 licensed Message Broker and JMS 1.1 implementation. Affected versions of this package are vulnerable to Man-in-the-Middle (MitM) due to missing TLS hostname verification. How to fix Man-in-the-Middle (MitM)? Upgrade | [5.13.0,5.15.6) |