Wwbn

Avideo

164 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Medienbericht
  • EPSS 50.86%
  • Veröffentlicht 06.03.2026 07:16:02
  • Zuletzt bearbeitet 10.03.2026 19:14:24

AVideo is a video-sharing Platform software. Prior to version 7.0, an unauthenticated attacker can execute arbitrary OS commands on the server by injecting shell command substitution into the base64Url GET parameter. This can lead to full server comp...

  • EPSS 20.93%
  • Veröffentlicht 06.03.2026 03:05:21
  • Zuletzt bearbeitet 16.03.2026 15:06:55

WWBN AVideo is an open source video platform. Prior to version 24.0, an unauthenticated SQL Injection vulnerability exists in AVideo within the objects/videos.json.php and objects/video.php components. The application fails to properly sanitize the c...

  • EPSS 0.28%
  • Veröffentlicht 06.03.2026 03:04:57
  • Zuletzt bearbeitet 16.03.2026 15:03:31

WWBN AVideo is an open source video platform. Prior to version 24.0, an authenticated Remote Code Execution (RCE) vulnerability was identified in AVideo related to the plugin upload/import functionality. The issue allowed an authenticated administrat...

Exploit
  • EPSS 0.08%
  • Veröffentlicht 06.03.2026 03:04:43
  • Zuletzt bearbeitet 16.03.2026 14:49:52

WWBN AVideo is an open source video platform. Prior to version 24.0, the official docker-compose.yml publishes the memcached service on host port 11211 (0.0.0.0:11211) with no authentication, while the Dockerfile configures PHP to store all user sess...

  • EPSS 0.04%
  • Veröffentlicht 24.02.2026 14:56:55
  • Zuletzt bearbeitet 25.02.2026 16:52:33

WWBN AVideo is an open source video platform. Prior to version 22.0, the `aVideoEncoder.json.php` API endpoint accepts a `downloadURL` parameter and fetches the referenced resource server-side without proper validation or an allow-list. This allows a...

  • EPSS 0.01%
  • Veröffentlicht 24.02.2026 14:53:20
  • Zuletzt bearbeitet 26.02.2026 19:57:52

WWBN AVideo is an open source video platform. Prior to version 21.0, AVideo allows Markdown in video comments and uses Parsedown (v1.7.4) without Safe Mode enabled. Markdown links are not sufficiently sanitized, allowing `javascript:` URIs to be rend...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 11.02.2026 20:49:49
  • Zuletzt bearbeitet 20.02.2026 16:21:56

AVideo Platform 8.1 contains a cross-site request forgery vulnerability that allows attackers to reset user passwords by exploiting the password recovery mechanism. Attackers can craft malicious requests to the recoverPass endpoint using the user's r...

Exploit
  • EPSS 0.13%
  • Veröffentlicht 11.02.2026 20:36:58
  • Zuletzt bearbeitet 18.02.2026 19:36:51

AVideo Platform 8.1 contains an information disclosure vulnerability that allows attackers to enumerate user details through the playlistsFromUser.json.php endpoint. Attackers can retrieve sensitive user information including email, password hash, an...

Exploit
  • EPSS 0.1%
  • Veröffentlicht 11.02.2026 20:33:33
  • Zuletzt bearbeitet 18.02.2026 19:37:05

AVideo Platform 8.1 contains a cross-site request forgery vulnerability that allows attackers to reset user passwords by exploiting the password recovery mechanism. Attackers can craft malicious requests to the recoverPass endpoint using the user's r...

  • EPSS 48.36%
  • Veröffentlicht 19.12.2025 15:37:39
  • Zuletzt bearbeitet 15.04.2026 00:35:42

AVideo versions 14.3.1 prior to 20.1 contain an unauthenticated remote code execution vulnerability caused by predictable generation of an installation salt using PHP uniqid(). The installation timestamp is exposed via a public endpoint, and a derive...