Filtered by vendor Rws
Subscriptions
Filtered by product Worldserver
Subscriptions
Total
5 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2022-34270 | 1 Rws | 1 Worldserver | 2025-04-16 | 9.8 Critical |
An issue was discovered in RWS WorldServer before 11.7.3. Regular users can create users with the Administrator role via UserWSUserManager. | ||||
CVE-2022-34269 | 1 Rws | 1 Worldserver | 2025-04-16 | 8.8 High |
An issue was discovered in RWS WorldServer before 11.7.3. An authenticated, remote attacker can perform a ws-legacy/load_dtd?system_id= blind SSRF attack to deploy JSP code to the Apache Axis service running on the localhost interface, leading to command execution. | ||||
CVE-2023-38357 | 1 Rws | 1 Worldserver | 2024-11-21 | 5.3 Medium |
Session tokens in RWS WorldServer 11.7.3 and earlier have a low entropy and can be enumerated, leading to unauthorized access to user sessions. | ||||
CVE-2022-34268 | 1 Rws | 1 Worldserver | 2024-11-21 | 9.8 Critical |
An issue was discovered in RWS WorldServer before 11.7.3. /clientLogin deserializes Java objects without authentication, leading to command execution on the host. | ||||
CVE-2022-34267 | 1 Rws | 1 Worldserver | 2024-11-21 | 9.8 Critical |
An issue was discovered in RWS WorldServer before 11.7.3. Adding a token parameter with the value of 02 bypasses all authentication requirements. Arbitrary Java code can be uploaded and executed via a .jar archive to the ws-api/v2/customizations/api endpoint. |
Page 1 of 1.