Show filters
49 Total Results
Displaying 11-20 of 49
Sort by:
Attacker Value
Unknown
CVE-2023-48728
Disclosure Date: January 10, 2024 (last updated January 18, 2024)
A cross-site scripting (xss) vulnerability exists in the functiongetOpenGraph videoName functionality of WWBN AVideo 11.6 and dev master commit 3c6bb3ff. A specially crafted HTTP request can lead to arbitrary Javascript execution. An attacker can get a user to visit a webpage to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2023-47862
Disclosure Date: January 10, 2024 (last updated January 18, 2024)
A local file inclusion vulnerability exists in the getLanguageFromBrowser functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary code execution. An attacker can send a series of HTTP requests to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2023-47861
Disclosure Date: January 10, 2024 (last updated January 18, 2024)
A cross-site scripting (xss) vulnerability exists in the channelBody.php user name functionality of WWBN AVideo 11.6 and dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary Javascript execution. An attacker can get a user to visit a webpage to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2023-47171
Disclosure Date: January 10, 2024 (last updated January 18, 2024)
An information disclosure vulnerability exists in the aVideoEncoder.json.php chunkFile path functionality of WWBN AVideo 11.6 and dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary file read.
0
Attacker Value
Unknown
CVE-2023-48925
Disclosure Date: December 14, 2023 (last updated February 25, 2025)
SQL injection vulnerability in Buy Addons bavideotab before version 1.0.6, allows attackers to escalate privileges and obtain sensitive information via the component BaVideoTabSaveVideoModuleFrontController::run().
0
Attacker Value
Unknown
CVE-2023-32073
Disclosure Date: May 12, 2023 (last updated February 24, 2025)
WWBN AVideo is an open source video platform. In versions 12.4 and prior, a command injection vulnerability exists at `plugin/CloneSite/cloneClient.json.php` which allows Remote Code Execution if you CloneSite Plugin. This is a bypass to the fix for CVE-2023-30854, which affects WWBN AVideo up to version 12.3. This issue is patched in commit 1df4af01f80d56ff2c4c43b89d0bac151e7fb6e3.
0
Attacker Value
Unknown
CVE-2023-30860
Disclosure Date: May 08, 2023 (last updated February 24, 2025)
WWBN AVideo is an open source video platform. In AVideo prior to version 12.4, a normal user can make a Meeting Schedule where the user can invite another user in that Meeting, but it does not properly sanitize the malicious characters when creating a Meeting Room. This allows attacker to insert malicious scripts. Since any USER including the ADMIN can see the meeting room that was created by the attacker this can lead to cookie hijacking and takeover of any accounts. Version 12.4 contains a patch for this issue.
0
Attacker Value
Unknown
CVE-2023-30854
Disclosure Date: April 28, 2023 (last updated February 24, 2025)
AVideo is an open source video platform. Prior to version 12.4, an OS Command Injection vulnerability in an authenticated endpoint `/plugin/CloneSite/cloneClient.json.php` allows attackers to achieve Remote Code Execution. This issue is fixed in version 12.4.
0
Attacker Value
Unknown
CVE-2023-25314
Disclosure Date: April 25, 2023 (last updated February 24, 2025)
Cross Site Scripting (XSS) vulnerability in World Wide Broadcast Network AVideo before 12.4, allows attackers to gain sensitive information via the success parameter to /user.
0
Attacker Value
Unknown
CVE-2023-25313
Disclosure Date: April 25, 2023 (last updated February 24, 2025)
OS injection vulnerability in World Wide Broadcast Network AVideo version before 12.4, allows attackers to execute arbitrary code via the video link field to the Embed a video link feature.
0