Wwbn

Avideo

55 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.88%
  • Veröffentlicht 10.01.2024 16:15:47
  • Zuletzt bearbeitet 21.11.2024 08:30:55

A local file inclusion vulnerability exists in the getLanguageFromBrowser functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary code execution. An attacker can send a series of HTTP requests...

Exploit
  • EPSS 0.34%
  • Veröffentlicht 10.01.2024 16:15:47
  • Zuletzt bearbeitet 21.11.2024 08:30:55

A cross-site scripting (xss) vulnerability exists in the channelBody.php user name functionality of WWBN AVideo 11.6 and dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary Javascript execution. An attacker can get a ...

Exploit
  • EPSS 0.31%
  • Veröffentlicht 10.01.2024 16:15:47
  • Zuletzt bearbeitet 21.11.2024 08:29:53

An information disclosure vulnerability exists in the aVideoEncoder.json.php chunkFile path functionality of WWBN AVideo 11.6 and dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary file read.

Exploit
  • EPSS 3.36%
  • Veröffentlicht 12.05.2023 14:15:10
  • Zuletzt bearbeitet 21.11.2024 08:02:39

WWBN AVideo is an open source video platform. In versions 12.4 and prior, a command injection vulnerability exists at `plugin/CloneSite/cloneClient.json.php` which allows Remote Code Execution if you CloneSite Plugin. This is a bypass to the fix for ...

Exploit
  • EPSS 3.25%
  • Veröffentlicht 08.05.2023 19:15:12
  • Zuletzt bearbeitet 21.11.2024 08:00:59

WWBN AVideo is an open source video platform. In AVideo prior to version 12.4, a normal user can make a Meeting Schedule where the user can invite another user in that Meeting, but it does not properly sanitize the malicious characters when creating ...

Exploit
  • EPSS 66.1%
  • Veröffentlicht 28.04.2023 16:15:10
  • Zuletzt bearbeitet 21.11.2024 08:00:58

AVideo is an open source video platform. Prior to version 12.4, an OS Command Injection vulnerability in an authenticated endpoint `/plugin/CloneSite/cloneClient.json.php` allows attackers to achieve Remote Code Execution. This issue is fixed in vers...

Exploit
  • EPSS 1.85%
  • Veröffentlicht 25.04.2023 16:15:09
  • Zuletzt bearbeitet 03.02.2025 19:15:10

OS injection vulnerability in World Wide Broadcast Network AVideo version before 12.4, allows attackers to execute arbitrary code via the video link field to the Embed a video link feature.

  • EPSS 0.09%
  • Veröffentlicht 25.04.2023 16:15:09
  • Zuletzt bearbeitet 04.02.2025 17:15:11

Cross Site Scripting (XSS) vulnerability in World Wide Broadcast Network AVideo before 12.4, allows attackers to gain sensitive information via the success parameter to /user.

  • EPSS 2.37%
  • Veröffentlicht 22.08.2022 19:15:10
  • Zuletzt bearbeitet 21.11.2024 07:09:54

A sql injection vulnerability exists in the ObjectYPT functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request can lead to a SQL injection. An attacker can send an HTTP request to trigger this vulnerability.T...

Exploit
  • EPSS 0.79%
  • Veröffentlicht 22.08.2022 19:15:10
  • Zuletzt bearbeitet 21.11.2024 07:03:00

A privilege escalation vulnerability exists in the session id functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request can lead to increased privileges. An attacker can get an authenticated user to send a cra...