Filtered by vendor Softwareag
Subscribe
Total
10 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2019-13990 | 5 Apache, Atlassian, Netapp and 2 more | 31 Tomee, Jira Service Management, Active Iq Unified Manager and 28 more | 2024-10-15 | 7.5 HIGH | 9.8 CRITICAL |
initDocumentParser in xml/XMLSchedulingDataProcessor.java in Terracotta Quartz Scheduler through 2.3.0 allows XXE attacks via a job description. | |||||
CVE-2023-39017 | 1 Softwareag | 1 Quartz | 2024-08-02 | N/A | 9.8 CRITICAL |
quartz-jobs 2.3.2 and below was discovered to contain a code injection vulnerability in the component org.quartz.jobs.ee.jms.SendQueueMessageJob.execute. This vulnerability is exploited via passing an unchecked argument. | |||||
CVE-2023-6578 | 1 Softwareag | 1 Webmethods | 2024-05-17 | 7.5 HIGH | 6.5 MEDIUM |
A vulnerability classified as critical has been found in Software AG WebMethods 10.11.x/10.15.x. Affected is an unknown function of the file wm.server/connect/. The manipulation leads to improper access controls. It is possible to launch the attack remotely. To access a file like /assets/ a popup may request username and password. By just clicking CANCEL you will be redirected to the directory. If you visited /invoke/wm.server/connect, you'll be able to see details like internal IPs, ports, and versions. In some cases if access to /assets/ is refused, you may enter /assets/x as a wrong value, then come back to /assets/ which we will show the requested data. It appears that insufficient access control is depending on referrer header data. VDB-247158 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | |||||
CVE-2021-40649 | 1 Softwareag | 1 Connx | 2024-02-04 | 6.4 MEDIUM | 6.5 MEDIUM |
In Connx Version 6.2.0.1269 (20210623), a cookie can be issued by the application and not have the HttpOnly flag set. | |||||
CVE-2021-40650 | 1 Softwareag | 1 Connx | 2024-02-04 | 4.3 MEDIUM | 6.5 MEDIUM |
In Connx Version 6.2.0.1269 (20210623), a cookie can be issued by the application and not have the secure flag set. | |||||
CVE-2021-33523 | 1 Softwareag | 1 Mashzone Nextgen | 2024-02-04 | 6.5 MEDIUM | 7.2 HIGH |
MashZone NextGen through 10.7 GA allows a remote authenticated user, with access to the admin console, to upload a new JDBC driver that can execute arbitrary commands on the underlying host. This occurs in com.idsscheer.ppmmashup.business.jdbc.DriverUploadController. | |||||
CVE-2021-33208 | 1 Softwareag | 1 Mashzone Nextgen | 2024-02-04 | 6.5 MEDIUM | 7.2 HIGH |
The "Register an Ehcache Configuration File" admin feature in MashZone NextGen through 10.7 GA allows XXE attacks via a malicious XML configuration file. | |||||
CVE-2021-33581 | 1 Softwareag | 1 Mashzone Nextgen | 2024-02-04 | 6.5 MEDIUM | 7.2 HIGH |
MashZone NextGen through 10.7 GA has an SSRF vulnerability that allows an attacker to interact with arbitrary TCP services, by abusing the feature to check the availability of a PPM connection. This occurs in com.idsscheer.ppmmashup.web.webservice.impl.ZPrestoAdminWebService. | |||||
CVE-2021-33207 | 1 Softwareag | 1 Mashzone Nextgen | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
The HTTP client in MashZone NextGen through 10.7 GA deserializes untrusted data when it gets an HTTP response with a 570 status code. | |||||
CVE-2020-35469 | 1 Softwareag | 1 Terracotta Server Oss | 2024-02-04 | 10.0 HIGH | 9.8 CRITICAL |
The Software AG Terracotta Server OSS Docker image 5.4.1 contains a blank password for the root user. Systems deployed using affected versions of the Terracotta Server OSS container may allow a remote attacker to achieve root access with a blank password. |