Telemessage Smarsh Telemessage

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Smarsh Telemessage.

By the Year

In 2026 there have been 0 vulnerabilities in Smarsh Telemessage. Last year, in 2025 Telemessage had 2 security vulnerabilities published. Right now, Telemessage is on track to have less security vulnerabilities in 2026 than it did last year.

Year Vulnerabilities Average Score
2026 0 0.00
2025 2 4.65

It may take a day or so for new Telemessage vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Smarsh Telemessage Security Vulnerabilities

TeleMessage JSP Heap Dump Disclosure of HTTP Passwords
CVE-2025-48928 4 - Medium - May 28, 2025

The TeleMessage service through 2025-05-05 is based on a JSP application in which the heap content is roughly equivalent to a "core dump" in which a password previously sent over HTTP would be included in this dump, as exploited in the wild in May 2025.

Exposure of Core Dump File to an Unauthorized Control Sphere

TeleMessage: Exposed Actuator /heapdump Endpoint Allows Heap Dump Leak
CVE-2025-48927 5.3 - Medium - May 28, 2025

The TeleMessage service through 2025-05-05 configures Spring Boot Actuator with an exposed heap dump endpoint at a /heapdump URI, as exploited in the wild in May 2025.

Insecure Default Initialization of Resource

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Smarsh Telemessage or by Smarsh? Click the Watch button to subscribe.

Smarsh
Vendor

subscribe