{"uuid": "45306d84-42f0-4469-b20f-548f2b3880fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46604", "type": "published-proof-of-concept", "source": "https://t.me/KomunitiSiber/1077", "content": "New PoC Exploit for Apache ActiveMQ Flaw Could Let Attackers Fly Under the Radar\nhttps://thehackernews.com/2023/11/new-poc-exploit-for-apache-activemq.html\n\nCybersecurity researchers have demonstrated a new technique that exploits a critical security flaw in Apache ActiveMQ to achieve arbitrary code execution in memory.\nTracked as\u00a0CVE-2023-46604\u00a0(CVSS score: 10.0), the vulnerability is a remote code execution bug that could permit a threat actor to run arbitrary shell commands.\nIt was patched by Apache in ActiveMQ versions 5.15.16, 5.16.7, 5.17.6,", "creation_timestamp": "2023-11-15T15:58:54.000000Z"}