Softwareag Softwareag

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in any Softwareag product.

RSS Feeds for Softwareag security vulnerabilities

Create a CVE RSS feed including security vulnerabilities found in Softwareag products with stack.watch. Just hit watch, then grab your custom RSS feed url.

Products by Softwareag Sorted by Most Security Vulnerabilities since 2018

Softwareag Mashzone Nextgen4 vulnerabilities

Softwareag Connx2 vulnerabilities

Softwareag Quartz2 vulnerabilities

Softwareag Webmethods2 vulnerabilities

By the Year

In 2026 there have been 0 vulnerabilities in Softwareag. Softwareag did not have any published security vulnerabilities last year.




Year Vulnerabilities Average Score
2026 0 0.00
2025 0 0.00
2024 1 8.80
2023 2 8.15
2022 6 7.40
2021 0 0.00
2020 1 9.80
2019 1 9.80

It may take a day or so for new Softwareag vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Softwareag Security Vulnerabilities

CVE Date Vulnerability Products
CVE-2024-45075 Sep 04, 2024
IBM webMethods Integration 10.15 Auth Escalation via Scheduler Task IBM webMethods Integration 10.15 could allow an authenticated user to create scheduler tasks that would allow them to escalate their privileges to administrator due to missing authentication.
Webmethods
CVE-2023-6578 Dec 07, 2023
Software AG WebMethods 10.11/10.15 wm.server/connect Improper Access Control A vulnerability classified as critical has been found in Software AG WebMethods 10.11.x/10.15.x. Affected is an unknown function of the file wm.server/connect/. The manipulation leads to improper access controls. It is possible to launch the attack remotely. To access a file like /assets/ a popup may request username and password. By just clicking CANCEL you will be redirected to the directory. If you visited /invoke/wm.server/connect, you'll be able to see details like internal IPs, ports, and versions. In some cases if access to /assets/ is refused, you may enter /assets/x as a wrong value, then come back to /assets/ which we will show the requested data. It appears that insufficient access control is depending on referrer header data. VDB-247158 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Webmethods
CVE-2023-39017 Jul 28, 2023
Quartz Scheduler 2.3.2 and earlier: Code Injection in SendQueueMessageJob quartz-jobs 2.3.2 and below was discovered to contain a code injection vulnerability in the component org.quartz.jobs.ee.jms.SendQueueMessageJob.execute. This vulnerability is exploited via passing an unchecked argument. NOTE: this is disputed by multiple parties because it is not plausible that untrusted user input would reach the code location where injection must occur.
Quartz
CVE-2021-40650 Jun 14, 2022
In Connx Version 6.2.0.1269 (20210623), a cookie In Connx Version 6.2.0.1269 (20210623), a cookie can be issued by the application and not have the secure flag set.
Connx
CVE-2021-40649 Jun 14, 2022
In Connx Version 6.2.0.1269 (20210623), a cookie In Connx Version 6.2.0.1269 (20210623), a cookie can be issued by the application and not have the HttpOnly flag set.
Connx
CVE-2021-33207 Apr 05, 2022
The HTTP client in MashZone NextGen through 10.7 GA deserializes untrusted data when it gets an HTTP response with a 570 status code. The HTTP client in MashZone NextGen through 10.7 GA deserializes untrusted data when it gets an HTTP response with a 570 status code.
Mashzone Nextgen
CVE-2021-33523 Mar 30, 2022
MashZone NextGen through 10.7 GA allows a remote authenticated user, with access to the admin console, to upload a new JDBC driver MashZone NextGen through 10.7 GA allows a remote authenticated user, with access to the admin console, to upload a new JDBC driver that can execute arbitrary commands on the underlying host. This occurs in com.idsscheer.ppmmashup.business.jdbc.DriverUploadController.
Mashzone Nextgen
CVE-2021-33208 Mar 30, 2022
The "Register an Ehcache Configuration File" admin feature in MashZone NextGen through 10.7 GA The "Register an Ehcache Configuration File" admin feature in MashZone NextGen through 10.7 GA allows XXE attacks via a malicious XML configuration file.
Mashzone Nextgen
CVE-2021-33581 Mar 30, 2022
MashZone NextGen through 10.7 GA has an SSRF vulnerability MashZone NextGen through 10.7 GA has an SSRF vulnerability that allows an attacker to interact with arbitrary TCP services, by abusing the feature to check the availability of a PPM connection. This occurs in com.idsscheer.ppmmashup.web.webservice.impl.ZPrestoAdminWebService.
Mashzone Nextgen
CVE-2020-35469 Dec 16, 2020
The Software AG Terracotta Server OSS Docker image 5.4.1 contains a blank password for the root user The Software AG Terracotta Server OSS Docker image 5.4.1 contains a blank password for the root user. Systems deployed using affected versions of the Terracotta Server OSS container may allow a remote attacker to achieve root access with a blank password.
Terracotta Server Oss
CVE-2019-13990 Jul 26, 2019
initDocumentParser in xml/XMLSchedulingDataProcessor.java in Terracotta Quartz Scheduler through 2.3.0 initDocumentParser in xml/XMLSchedulingDataProcessor.java in Terracotta Quartz Scheduler through 2.3.0 allows XXE attacks via a job description.
Quartz
Built by Foundeo Inc., with data from the National Vulnerability Database (NVD). Privacy Policy. Use of this site is governed by the Legal Terms
Disclaimer
CONTENT ON THIS WEBSITE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. Always check with your vendor for the most up to date, and accurate information.