5.3

CVSS3.1

CVE-2026-33685 - AVideo Allows Unauthenticated Access to AD_Server reports.json.php that Exposes Ad Campaign Analyti…

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `plugin/AD_Server/reports.json.php` endpoint performs no authentication or authorization checks, allowing any unauthenticated attacker to extract ad campaign analytics data including video titles, user channel n…

📅 Published: March 23, 2026, 6:42 p.m. 🔄 Last Modified: March 25, 2026, 8:37 p.m.

9

CVSS4.0

CVE-2026-0898 - An arbitrary file-write vulnerability in Pega Browser Extension (PBE) affects Pega Robot Studio dev…

An arbitrary file-write vulnerability in Pega Browser Extension (PBE) affects Pega Robot Studio developers who are automating Google Chrome and Microsoft Edge using either version 22.1 or R25. This vulnerability does not affect Robot Runtime users. A bad actor could create a website that includes m…

📅 Published: March 23, 2026, 6:41 p.m. 🔄 Last Modified: March 25, 2026, 8:37 p.m.

5.4

CVSS3.1

CVE-2026-33683 - AVideo vulnerable to Stored XSS via html_entity_decode() Reversing xss_esc() Sanitization in Channe…

WWBN AVideo is an open source video platform. In versions up to and including 26.0, a sanitization order-of-operations flaw in the user profile "about" field allows any registered user to inject arbitrary JavaScript that executes when other users visit their channel page. The `xss_esc()` function e…

📅 Published: March 23, 2026, 6:41 p.m. 🔄 Last Modified: March 25, 2026, 8:37 p.m.

7.2

CVSS3.1

CVE-2026-33681 - AVideo has Path Traversal in pluginRunDatabaseScript.json.php Enables Arbitrary SQL File Execution …

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `objects/pluginRunDatabaseScript.json.php` endpoint accepts a `name` parameter via POST and passes it to `Plugin::getDatabaseFileName()` without any path traversal sanitization. This allows an authenticated admi…

📅 Published: March 23, 2026, 6:39 p.m. 🔄 Last Modified: March 25, 2026, 8:37 p.m.

8.1

CVSS3.1

CVE-2026-33651 - AVideo has a Blind SQL Injection in Live Schedule Reminder via Unsanitized live_schedule_id in Sche…

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `remindMe.json.php` endpoint passes `$_REQUEST['live_schedule_id']` through multiple functions without sanitization until it reaches `Scheduler_commands::getAllActiveOrToRepeat()`, which directly concatenates it…

📅 Published: March 23, 2026, 6:38 p.m. 🔄 Last Modified: March 25, 2026, 8:37 p.m.

4.8

CVSS4.0

CVE-2026-4595 - code-projects Exam Form Submission update_s6.php cross site scripting

A vulnerability was determined in code-projects Exam Form Submission 1.0. This vulnerability affects unknown code of the file /admin/update_s6.php. Executing a manipulation of the argument sname can lead to cross site scripting. The attack can be launched remotely. The exploit has been publicly dis…

📅 Published: March 23, 2026, 6:37 p.m. 🔄 Last Modified: March 24, 2026, 10:33 a.m.

7.1

CVSS4.0

CVE-2025-15606 - Denial of Service (DoS) in HTTPD Input Handling on TP-Link TD-W8961N

A Denial-of-Service (DoS) vulnerability in the httpd component of TP-Link's TD-W8961N v4.0 due to improper input sanitization, allows crafted requests to trigger a processing error that causes the httpd service to crash. Successful exploitation may allow the attacker to cause service interruption,…

📅 Published: March 23, 2026, 6:36 p.m. 🔄 Last Modified: March 25, 2026, 8:37 p.m.

8.7

CVSS4.0

CVE-2026-25075 - strongSwan 4.5.0 < 6.0.5 EAP-TTLS AVP Parsing Integer Underflow

strongSwan versions 4.5.0 prior to 6.0.5 contain an integer underflow vulnerability in the EAP-TTLS AVP parser that allows unauthenticated remote attackers to cause a denial of service by sending crafted AVP data with invalid length fields during IKEv2 authentication. Attackers can exploit the fail…

📅 Published: March 23, 2026, 6:33 p.m. 🔄 Last Modified: March 25, 2026, 8:37 p.m.

7.6

CVSS3.1

CVE-2026-33650 - AVideo's Video Moderator Privilege Escalation via Ownership Transfer Enables Arbitrary Video Deleti…

WWBN AVideo is an open source video platform. In versions up to and including 26.0, a user with the "Videos Moderator" permission can escalate privileges to perform full video management operations — including ownership transfer and deletion of any video — despite the permission being documented as…

📅 Published: March 23, 2026, 6:28 p.m. 🔄 Last Modified: March 25, 2026, 8:37 p.m.

8.1

CVSS3.1

CVE-2026-33649 - AVideo's GET-Based CSRF in setPermission.json.php Enables Privilege Escalation via Arbitrary Permis…

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `plugin/Permissions/setPermission.json.php` endpoint accepts GET parameters for a state-changing operation that modifies user group permissions. The endpoint has no CSRF token validation, and the application exp…

📅 Published: March 23, 2026, 6:26 p.m. 🔄 Last Modified: March 25, 2026, 8:37 p.m.
Total resulsts: 340775
Page 130 of 34,078
« previous page » next page
Filters