Wwbn

Avideo

164 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.03%
  • Veröffentlicht 27.03.2026 16:42:28
  • Zuletzt bearbeitet 31.03.2026 16:32:59

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `verifyTokenSocket()` function in `plugin/YPTSocket/functions.php` has its token timeout validation commented out, causing WebSocket tokens to never expire despit...

Exploit
  • EPSS 0.01%
  • Veröffentlicht 27.03.2026 16:39:05
  • Zuletzt bearbeitet 31.03.2026 16:36:54

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `plugin/Live/uploadPoster.php` endpoint allows any authenticated user to overwrite the poster image for any scheduled live stream by supplying an arbitrary `live_...

Exploit
  • EPSS 0.04%
  • Veröffentlicht 27.03.2026 16:32:35
  • Zuletzt bearbeitet 31.03.2026 16:41:04

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `plugin/PlayLists/View/Playlists_schedules/add.json.php` endpoint allows any authenticated user with streaming permission to create or modify broadcast schedules ...

Exploit
  • EPSS 0.01%
  • Veröffentlicht 27.03.2026 16:30:17
  • Zuletzt bearbeitet 31.03.2026 16:43:15

WWBN AVideo is an open source video platform. In versions up to and including 26.0, AVideo allows content owners to password-protect individual videos. The video password is stored in the database in plaintext — no hashing, salting, or encryption is ...

Exploit
  • EPSS 0.06%
  • Veröffentlicht 27.03.2026 16:13:51
  • Zuletzt bearbeitet 31.03.2026 16:46:25

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `fixCleanTitle()` static method in `objects/category.php` constructs a SQL SELECT query by directly interpolating both `$clean_title` and `$id` into the query str...

Exploit
  • EPSS 0.05%
  • Veröffentlicht 27.03.2026 16:12:36
  • Zuletzt bearbeitet 31.03.2026 16:48:14

WWBN AVideo is an open source video platform. In versions up to and including 26.0, in `objects/like.php`, the `getLike()` method constructs a SQL query using a prepared statement placeholder (`?`) for `users_id` but directly concatenates `$this->vid...

Exploit
  • EPSS 0.04%
  • Veröffentlicht 27.03.2026 14:31:06
  • Zuletzt bearbeitet 31.03.2026 18:48:32

WWBN AVideo is an open source video platform. In versions up to and including 26.0, `isSSRFSafeURL()` validates URLs against private/reserved IP ranges before fetching, but `url_get_contents()` follows HTTP redirects without re-validating the redirec...

Exploit
  • EPSS 0.02%
  • Veröffentlicht 27.03.2026 14:29:53
  • Zuletzt bearbeitet 31.03.2026 18:45:13

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the AI plugin's `save.json.php` endpoint loads AI response objects using an attacker-controlled `$_REQUEST['id']` parameter without validating that the AI response be...

Exploit
  • EPSS 0.07%
  • Veröffentlicht 27.03.2026 14:25:12
  • Zuletzt bearbeitet 31.03.2026 18:44:43

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `get_api_video_password_is_correct` API endpoint allows any unauthenticated user to verify whether a given password is correct for any password-protected video. T...

Exploit
  • EPSS 0.07%
  • Veröffentlicht 27.03.2026 14:24:08
  • Zuletzt bearbeitet 31.03.2026 18:38:39

WWBN AVideo is an open source video platform. In versions up to and including 26.0, three `list.json.php` endpoints in the Scheduler plugin lack any authentication check, while every other endpoint in the same plugin directories (`add.json.php`, `del...