Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Apache Software Foundation | Apache ActiveMQ Client | 0 ~ 5.19.3 | - | |
| Apache Software Foundation | Apache ActiveMQ Broker | 0 ~ 5.19.3 | - | |
| Apache Software Foundation | Apache ActiveMQ | 0 ~ 5.19.3 | - | |
| Apache Software Foundation | Apache ActiveMQ Web | 0 ~ 5.19.3 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-34197 | Apache ActiveMQ Broker, Apache ActiveMQ All, Apache ActiveMQ: Authenticated users could pe | |
| CVE-2026-35554 | Apache Kafka Clients: Kafka Producer Message Corruption and Misrouting via Buffer Pool Rac | |
| CVE-2026-27314 | Apache Cassandra: Privilege escalation via ADD IDENTITY authorization bypass | |
| CVE-2026-27315 | Apache Cassandra: cqlsh history sensitive information leak | |
| CVE-2026-32588 | Apache Cassandra: Authenticated DoS via ALTER ROLE Password Hashing |
No comments yet