5.8
CVSSv2

CVE-2018-11775

Published: 10/09/2018 Updated: 07/11/2023
CVSS v2 Base Score: 5.8 | Impact Score: 4.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.4 | Impact Score: 5.2 | Exploitability Score: 2.2
VMScore: 516
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N

Vulnerability Summary

TLS hostname verification when using the Apache ActiveMQ Client prior to 5.15.6 was missing which could make the client vulnerable to a MITM attack between a Java application using the ActiveMQ client and the ActiveMQ server. This is now enabled by default.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache activemq

oracle flexcube private banking 2.2.0.1

oracle enterprise repository 12.1.3.0.0

oracle flexcube private banking 2.0.0.0

oracle flexcube private banking 12.0.1.0

oracle flexcube private banking 12.0.3.0

oracle flexcube private banking 12.1.0.0

Vendor Advisories

Synopsis Important: Red Hat Fuse 750 security update Type/Severity Security Advisory: Important Topic A minor version update (from 74 to 75) is now available for Red Hat Fuse The purpose of this text-only errata is to inform you about the security issues fixed in this releaseRed Hat Product Security h ...
Debian Bug report logs - #908950 activemq: CVE-2018-11775: ActiveMQ Client: Missing TLS Hostname Verification Package: src:activemq; Maintainer for src:activemq is Debian Java Maintainers <pkg-java-maintainers@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sun, 16 Sep 2018 14:36: ...
TLS hostname verification when using the Apache ActiveMQ Client before 5156 was missing which could make the client vulnerable to a MITM attack between a Java application using the ActiveMQ client and the ActiveMQ server This is now enabled by default ...
Multiple vulnerabilities have been found in Hitachi Command Suite CVE-2015-7559, CVE-2018-11775, CVE-2019-0222, CVE-2023-46604 Affected products and versions are listed below Please upgrade your version to the appropriate version ...

Github Repositories

Risk Report A Checkmarx SCA coding exercise SCA is the name of our product (Software Composition Analysis) and we provide the users with information on what third party open source packages they use in their code, if these package have any vulnerabilities and how to fix those vulnerabilities This exercise simulates a very basic flow of finding out what vulnerabilities the pac