Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
smartbear vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2023-22889
SmartBear Zephyr Enterprise up to and including 7.15.0 mishandles user-defined input during report generation. This could lead to remote code execution by unauthenticated users.
Smartbear Zephyr Enterprise
9.8
CVSSv3
CVE-2020-12835
An issue exists in SmartBear ReadyAPI SoapUI Pro 3.2.5. Due to unsafe use of an Java RMI based protocol in an unsafe configuration, an attacker can inject malicious serialized objects into the communication, resulting in remote code execution in the context of a client-side Netwo...
Smartbear Readyapi 3.2.5
9.8
CVSSv3
CVE-2019-17495
A Cascading Style Sheets (CSS) injection vulnerability in Swagger UI prior to 3.23.11 allows malicious users to use the Relative Path Overwrite (RPO) technique to perform CSS-based input field value exfiltration, such as exfiltration of a CSRF token value. In other words, this pr...
Smartbear Swagger Ui
Oracle Utilities Framework 4.3.0.6.0
Oracle Utilities Framework 4.4.0.0.0
Oracle Banking Digital Experience 19.1
Oracle Utilities Framework 4.4.0.2.0
Oracle Banking Digital Experience 19.2
Oracle Banking Digital Experience 20.1
Oracle Primavera Gateway
Oracle Banking Platform
Oracle Banking Digital Experience 21.1
Oracle Banking Apis
Oracle Banking Apis 19.1
Oracle Banking Apis 19.2
Oracle Banking Apis 20.1
Oracle Banking Apis 21.1
Oracle Banking Digital Experience
4 Github repositories
8.8
CVSSv3
CVE-2020-26118
In SmartBear Collaborator Server up to and including 13.3.13302, use of the Google Web Toolkit (GWT) API introduces a post-authentication Java deserialization vulnerability. The application's UpdateMemento class accepts a serialized Java object directly from the user without...
Smartbear Collaborator
8.8
CVSSv3
CVE-2018-20580
The WSDL import functionality in SmartBear ReadyAPI 2.5.0 and 2.6.0 allows remote malicious users to execute arbitrary Java code via a crafted request parameter in a WSDL file.
Smartbear Readyapi 2.5.0
Smartbear Readyapi 2.6.0
1 EDB exploit
1 Github repository
8.1
CVSSv3
CVE-2023-22891
There exists a privilege escalation vulnerability in SmartBear Zephyr Enterprise up to and including 7.15.0 that could be exploited by authorized users to reset passwords for other accounts.
Smartbear Zephyr Enterprise
7.8
CVSSv3
CVE-2019-12180
An issue exists in SmartBear ReadyAPI up to and including 2.8.2 and 3.0.0 and SoapUI up to and including 5.5. When opening a project, the Groovy "Load Script" is automatically executed. This allows an malicious user to execute arbitrary Groovy Language code (Java script...
Smartbear Readyapi
Smartbear Soapui
1 Github repository
7.8
CVSSv3
CVE-2017-16670
The project import functionality in SoapUI 5.3.0 allows remote malicious users to execute arbitrary Java code via a crafted request parameter in a WSDL project file.
Smartbear Soapui 5.3.0
7.5
CVSSv3
CVE-2023-22890
SmartBear Zephyr Enterprise up to and including 7.15.0 allows unauthenticated users to upload large files, which could exhaust the local drive space, causing a denial of service condition.
Smartbear Zephyr Enterprise
7.5
CVSSv3
CVE-2023-22892
There exists an information disclosure vulnerability in SmartBear Zephyr Enterprise up to and including 7.15.0 that could be exploited by unauthenticated users to read arbitrary files from Zephyr instances.
Smartbear Zephyr Enterprise
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
SSTI
CVE-2024-35863
CVE-2024-35910
man-in-the-middle
CVE-2024-35912
CVE-2024-25742
LFI
CVE-2024-32002
CVE-2024-22120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »