Vulnerabilities (CVE)

Filtered by vendor Wwbn Subscribe
Filtered by product Avideo
Total 46 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-32778 1 Wwbn 1 Avideo 2024-02-28 N/A 7.5 HIGH
An information disclosure vulnerability exists in the cookie functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. The session cookie and the pass cookie miss the HttpOnly flag, making them accessible via JavaScript. The session cookie also misses the secure flag, which allows the session cookie to be leaked over non-HTTPS connections. This could allow an attacker to steal the session cookie via crafted HTTP requests.This vulnerability is for the pass cookie, which contains the hashed password and can be leaked via JavaScript.
CVE-2022-27463 1 Wwbn 1 Avideo 2024-02-28 5.8 MEDIUM 6.1 MEDIUM
Open redirect vulnerability in objects/login.json.php in WWBN AVideo through 11.6, allows attackers to arbitrarily redirect users from a crafted url to the login page.
CVE-2022-27462 1 Wwbn 1 Avideo 2024-02-28 4.3 MEDIUM 6.1 MEDIUM
Cross Site Scripting (XSS) vulnerability in objects/function.php in function getDeviceID in WWBN AVideo through 11.6, via the yptDevice parameter to view/include/head.php.
CVE-2020-23490 1 Wwbn 1 Avideo 2024-02-28 5.0 MEDIUM 7.5 HIGH
There was a local file disclosure vulnerability in AVideo < 8.9 via the proxy streaming. An unauthenticated attacker can exploit this issue to read an arbitrary file on the server. Which could leak database credentials or other sensitive information such as /etc/passwd file.
CVE-2020-23489 1 Wwbn 1 Avideo 2024-02-28 6.5 MEDIUM 8.8 HIGH
The import.json.php file before 8.9 for Avideo is vulnerable to a File Deletion vulnerability. This allows the deletion of configuration.php, which leads to certain privilege checks not being in place, and therefore a user can escalate privileges to admin.
CVE-2021-21286 1 Wwbn 1 Avideo 2024-02-28 6.5 MEDIUM 8.8 HIGH
AVideo Platform is an open-source Audio and Video platform. It is similar to a self-hosted YouTube. In AVideo Platform before version 10.2 there is an authorization bypass vulnerability which enables an ordinary user to get admin control. This is fixed in version 10.2. All queries now remove the pass hash and the recoverPass hash.