Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
smartbear soapui vulnerabilities and exploits
(subscribe to this query)
9.3
CVSSv2
CVE-2019-12180
An issue exists in SmartBear ReadyAPI up to and including 2.8.2 and 3.0.0 and SoapUI up to and including 5.5. When opening a project, the Groovy "Load Script" is automatically executed. This allows an malicious user to execute arbitrary Groovy Language code (Java script...
Smartbear Readyapi
Smartbear Soapui
1 Github repository
9.3
CVSSv2
CVE-2014-1202
The WSDL/WADL import functionality in SoapUI prior to 4.6.4 allows remote malicious users to execute arbitrary Java code via a crafted request parameter in a WSDL file.
Smartbear Soapui
Smartbear Soapui 4.6.2
Smartbear Soapui 4.0
Eviware Soapui 3.5.1
Eviware Soapui 3.5
Smartbear Soapui 4.5.1
Smartbear Soapui 4.5
Eviware Soapui 3.0.1
Eviware Soapui 2.5.1
Smartbear Soapui 4.0.1
Eviware Soapui 3.6.1
Eviware Soapui 3.6
Smartbear Soapui 4.6.1
Smartbear Soapui 4.6.0
Smartbear Soapui 4.5.2
1 EDB exploit
7.5
CVSSv2
CVE-2020-12835
An issue exists in SmartBear ReadyAPI SoapUI Pro 3.2.5. Due to unsafe use of an Java RMI based protocol in an unsafe configuration, an attacker can inject malicious serialized objects into the communication, resulting in remote code execution in the context of a client-side Netwo...
Smartbear Readyapi 3.2.5
6.8
CVSSv2
CVE-2017-16670
The project import functionality in SoapUI 5.3.0 allows remote malicious users to execute arbitrary Java code via a crafted request parameter in a WSDL project file.
Smartbear Soapui 5.3.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
path traversal
CVE-2024-26978
CVE-2024-26982
wireless
CVE-2023-6949
CVE-2024-26980
CVE-2024-32766
CVE-2024-26939
cache poisoning
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started