Softwareag
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in any Softwareag product.
RSS Feeds for Softwareag security vulnerabilities
Create a CVE RSS feed including security vulnerabilities found in Softwareag products with stack.watch. Just hit watch, then grab your custom RSS feed url.
Products by Softwareag Sorted by Most Security Vulnerabilities since 2018
By the Year
In 2026 there have been 0 vulnerabilities in Softwareag. Softwareag did not have any published security vulnerabilities last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 0 | 0.00 |
| 2024 | 1 | 8.80 |
| 2023 | 2 | 8.15 |
| 2022 | 6 | 7.40 |
| 2021 | 0 | 0.00 |
| 2020 | 1 | 9.80 |
| 2019 | 1 | 9.80 |
It may take a day or so for new Softwareag vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Softwareag Security Vulnerabilities
| CVE | Date | Vulnerability | Products |
|---|---|---|---|
| CVE-2024-45075 | Sep 04, 2024 |
IBM webMethods Integration 10.15 Auth Escalation via Scheduler TaskIBM webMethods Integration 10.15 could allow an authenticated user to create scheduler tasks that would allow them to escalate their privileges to administrator due to missing authentication. |
|
| CVE-2023-6578 | Dec 07, 2023 |
Software AG WebMethods 10.11/10.15 wm.server/connect Improper Access ControlA vulnerability classified as critical has been found in Software AG WebMethods 10.11.x/10.15.x. Affected is an unknown function of the file wm.server/connect/. The manipulation leads to improper access controls. It is possible to launch the attack remotely. To access a file like /assets/ a popup may request username and password. By just clicking CANCEL you will be redirected to the directory. If you visited /invoke/wm.server/connect, you'll be able to see details like internal IPs, ports, and versions. In some cases if access to /assets/ is refused, you may enter /assets/x as a wrong value, then come back to /assets/ which we will show the requested data. It appears that insufficient access control is depending on referrer header data. VDB-247158 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. |
|
| CVE-2023-39017 | Jul 28, 2023 |
Quartz Scheduler 2.3.2 and earlier: Code Injection in SendQueueMessageJobquartz-jobs 2.3.2 and below was discovered to contain a code injection vulnerability in the component org.quartz.jobs.ee.jms.SendQueueMessageJob.execute. This vulnerability is exploited via passing an unchecked argument. NOTE: this is disputed by multiple parties because it is not plausible that untrusted user input would reach the code location where injection must occur. |
|
| CVE-2021-40650 | Jun 14, 2022 |
In Connx Version 6.2.0.1269 (20210623), a cookieIn Connx Version 6.2.0.1269 (20210623), a cookie can be issued by the application and not have the secure flag set. |
|
| CVE-2021-40649 | Jun 14, 2022 |
In Connx Version 6.2.0.1269 (20210623), a cookieIn Connx Version 6.2.0.1269 (20210623), a cookie can be issued by the application and not have the HttpOnly flag set. |
|
| CVE-2021-33207 | Apr 05, 2022 |
The HTTP client in MashZone NextGen through 10.7 GA deserializes untrusted data when it gets an HTTP response with a 570 status code.The HTTP client in MashZone NextGen through 10.7 GA deserializes untrusted data when it gets an HTTP response with a 570 status code. |
|
| CVE-2021-33523 | Mar 30, 2022 |
MashZone NextGen through 10.7 GA allows a remote authenticated user, with access to the admin console, to upload a new JDBC driverMashZone NextGen through 10.7 GA allows a remote authenticated user, with access to the admin console, to upload a new JDBC driver that can execute arbitrary commands on the underlying host. This occurs in com.idsscheer.ppmmashup.business.jdbc.DriverUploadController. |
|
| CVE-2021-33208 | Mar 30, 2022 |
The "Register an Ehcache Configuration File" admin feature in MashZone NextGen through 10.7 GAThe "Register an Ehcache Configuration File" admin feature in MashZone NextGen through 10.7 GA allows XXE attacks via a malicious XML configuration file. |
|
| CVE-2021-33581 | Mar 30, 2022 |
MashZone NextGen through 10.7 GA has an SSRF vulnerabilityMashZone NextGen through 10.7 GA has an SSRF vulnerability that allows an attacker to interact with arbitrary TCP services, by abusing the feature to check the availability of a PPM connection. This occurs in com.idsscheer.ppmmashup.web.webservice.impl.ZPrestoAdminWebService. |
|
| CVE-2020-35469 | Dec 16, 2020 |
The Software AG Terracotta Server OSS Docker image 5.4.1 contains a blank password for the root userThe Software AG Terracotta Server OSS Docker image 5.4.1 contains a blank password for the root user. Systems deployed using affected versions of the Terracotta Server OSS container may allow a remote attacker to achieve root access with a blank password. |
|
| CVE-2019-13990 | Jul 26, 2019 |
initDocumentParser in xml/XMLSchedulingDataProcessor.java in Terracotta Quartz Scheduler through 2.3.0initDocumentParser in xml/XMLSchedulingDataProcessor.java in Terracotta Quartz Scheduler through 2.3.0 allows XXE attacks via a job description. |
|