Filtered by vendor Rws
Subscriptions
Total
8 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2022-34270 | 1 Rws | 1 Worldserver | 2025-04-16 | 9.8 Critical |
An issue was discovered in RWS WorldServer before 11.7.3. Regular users can create users with the Administrator role via UserWSUserManager. | ||||
CVE-2022-34269 | 1 Rws | 1 Worldserver | 2025-04-16 | 8.8 High |
An issue was discovered in RWS WorldServer before 11.7.3. An authenticated, remote attacker can perform a ws-legacy/load_dtd?system_id= blind SSRF attack to deploy JSP code to the Apache Axis service running on the localhost interface, leading to command execution. | ||||
CVE-2005-4548 | 1 Rws | 1 Statistics Counter | 2025-04-03 | N/A |
SQL injection vulnerability in the "user area" in RWS Statistics Counter before 2.4.1 allows remote attackers to execute arbitrary SQL commands via unknown vectors. | ||||
CVE-2024-43025 | 1 Rws | 1 Multitrans | 2025-03-25 | 6.1 Medium |
An HTML injection vulnerability in RWS MultiTrans v7.0.23324.2 and earlier allows attackers to alter the HTML-layout and possibly execute a phishing attack via a crafted payload injected into a sent e-mail. | ||||
CVE-2024-43024 | 1 Rws | 1 Multitrans | 2025-03-25 | 6.1 Medium |
Multiple stored cross-site scripting (XSS) vulnerabilities in RWS MultiTrans v7.0.23324.2 and earlier allow attackers to execute arbitrary web scripts or HTML via a crafted payload. | ||||
CVE-2023-38357 | 1 Rws | 1 Worldserver | 2024-11-21 | 5.3 Medium |
Session tokens in RWS WorldServer 11.7.3 and earlier have a low entropy and can be enumerated, leading to unauthorized access to user sessions. | ||||
CVE-2022-34268 | 1 Rws | 1 Worldserver | 2024-11-21 | 9.8 Critical |
An issue was discovered in RWS WorldServer before 11.7.3. /clientLogin deserializes Java objects without authentication, leading to command execution on the host. | ||||
CVE-2022-34267 | 1 Rws | 1 Worldserver | 2024-11-21 | 9.8 Critical |
An issue was discovered in RWS WorldServer before 11.7.3. Adding a token parameter with the value of 02 bypasses all authentication requirements. Arbitrary Java code can be uploaded and executed via a .jar archive to the ws-api/v2/customizations/api endpoint. |
Page 1 of 1.