Wwbn

Avideo

164 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.03%
  • Veröffentlicht 23.03.2026 18:38:22
  • Zuletzt bearbeitet 25.03.2026 18:02:12

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `remindMe.json.php` endpoint passes `$_REQUEST['live_schedule_id']` through multiple functions without sanitization until it reaches `Scheduler_commands::getAllAc...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 23.03.2026 18:28:13
  • Zuletzt bearbeitet 25.03.2026 18:00:14

WWBN AVideo is an open source video platform. In versions up to and including 26.0, a user with the "Videos Moderator" permission can escalate privileges to perform full video management operations — including ownership transfer and deletion of any v...

Exploit
  • EPSS 0.02%
  • Veröffentlicht 23.03.2026 18:26:32
  • Zuletzt bearbeitet 25.03.2026 14:54:19

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `plugin/Permissions/setPermission.json.php` endpoint accepts GET parameters for a state-changing operation that modifies user group permissions. The endpoint has ...

Exploit
  • EPSS 0.07%
  • Veröffentlicht 23.03.2026 18:25:07
  • Zuletzt bearbeitet 25.03.2026 17:55:16

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the restreamer endpoint constructs a log file path by embedding user-controlled `users_id` and `liveTransmitionHistory_id` values from the JSON request body without a...

Exploit
  • EPSS 0.29%
  • Veröffentlicht 23.03.2026 18:23:20
  • Zuletzt bearbeitet 25.03.2026 17:54:10

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `ImageGallery::saveFile()` method validates uploaded file content using `finfo` MIME type detection but derives the saved filename extension from the user-supplie...

Exploit
  • EPSS 0.17%
  • Veröffentlicht 23.03.2026 18:21:59
  • Zuletzt bearbeitet 25.03.2026 17:52:58

WWBN AVideo is an open source video platform. In versions up to and including 26.0, an unauthenticated API endpoint (`APIName=locale`) concatenates user input into an `include` path with no canonicalization or whitelist. Path traversal is accepted, s...

Exploit
  • EPSS 0.02%
  • Veröffentlicht 23.03.2026 18:17:47
  • Zuletzt bearbeitet 25.03.2026 17:51:40

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the API plugin exposes a `decryptString` action without any authentication. Anyone can submit ciphertext and receive plaintext. Ciphertext is issued publicly (e.g., `...

Exploit
  • EPSS 0.06%
  • Veröffentlicht 23.03.2026 16:32:28
  • Zuletzt bearbeitet 24.03.2026 16:55:37

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `objects/pluginImport.json.php` endpoint allows admin users to upload and install plugin ZIP files containing executable PHP code, but lacks any CSRF protection. ...

Exploit
  • EPSS 0.05%
  • Veröffentlicht 23.03.2026 16:29:47
  • Zuletzt bearbeitet 24.03.2026 17:01:02

WWBN AVideo is an open source video platform. In versions up to and including 26.0, an unauthenticated server-side request forgery vulnerability in `plugin/Live/test.php` allows any remote user to make the AVideo server send HTTP requests to arbitrar...

Exploit
  • EPSS 0.15%
  • Veröffentlicht 23.03.2026 16:28:20
  • Zuletzt bearbeitet 24.03.2026 18:08:01

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the endpoint `plugin/Permissions/View/Users_groups_permissions/list.json.php` lacks any authentication or authorization check, allowing unauthenticated users to retri...