8.7

CVSS4.0

CVE-2026-25075 - strongSwan 4.5.0 < 6.0.5 EAP-TTLS AVP Parsing Integer Underflow

strongSwan versions 4.5.0 prior to 6.0.5 contain an integer underflow vulnerability in the EAP-TTLS AVP parser that allows unauthenticated remote attackers to cause a denial of service by sending crafted AVP data with invalid length fields during IKEv2 authentication. Attackers can exploit the fail…

📅 Published: March 23, 2026, 6:33 p.m. 🔄 Last Modified: May 4, 2026, 6:10 p.m.

7.6

CVSS3.1

CVE-2026-33650 - AVideo's Video Moderator Privilege Escalation via Ownership Transfer Enables Arbitrary Video Deleti…

WWBN AVideo is an open source video platform. In versions up to and including 26.0, a user with the "Videos Moderator" permission can escalate privileges to perform full video management operations — including ownership transfer and deletion of any video — despite the permission being documented as…

📅 Published: March 23, 2026, 6:28 p.m. 🔄 Last Modified: March 25, 2026, 8:37 p.m.

8.1

CVSS3.1

CVE-2026-33649 - AVideo's GET-Based CSRF in setPermission.json.php Enables Privilege Escalation via Arbitrary Permis…

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `plugin/Permissions/setPermission.json.php` endpoint accepts GET parameters for a state-changing operation that modifies user group permissions. The endpoint has no CSRF token validation, and the application exp…

📅 Published: March 23, 2026, 6:26 p.m. 🔄 Last Modified: March 25, 2026, 8:37 p.m.

8.8

CVSS3.1

CVE-2026-33648 - AVideo Vulnerable to OS Command Injection via Unsanitized `users_id` and `liveTransmitionHistory_id…

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the restreamer endpoint constructs a log file path by embedding user-controlled `users_id` and `liveTransmitionHistory_id` values from the JSON request body without any sanitization. This log file path is then conca…

📅 Published: March 23, 2026, 6:25 p.m. 🔄 Last Modified: March 25, 2026, 8:37 p.m.

8.8

CVSS3.1

CVE-2026-33647 - AVideo Vulnerable to Remote Code Execution via MIME/Extension Mismatch in ImageGallery File Upload

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `ImageGallery::saveFile()` method validates uploaded file content using `finfo` MIME type detection but derives the saved filename extension from the user-supplied original filename without an allowlist check. A…

📅 Published: March 23, 2026, 6:23 p.m. 🔄 Last Modified: March 25, 2026, 8:37 p.m.

8.6

CVSS3.1

CVE-2026-33513 - AVideo has an Unauthenticated Local File Inclusion in API locale (RCE possible with writable PHP)

WWBN AVideo is an open source video platform. In versions up to and including 26.0, an unauthenticated API endpoint (`APIName=locale`) concatenates user input into an `include` path with no canonicalization or whitelist. Path traversal is accepted, so arbitrary PHP files under the web root can be i…

📅 Published: March 23, 2026, 6:21 p.m. 🔄 Last Modified: March 25, 2026, 9:27 p.m.

7.5

CVSS3.1

CVE-2026-33512 - AVideo has an unauthenticated decrypt oracle leaking any ciphertext

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the API plugin exposes a `decryptString` action without any authentication. Anyone can submit ciphertext and receive plaintext. Ciphertext is issued publicly (e.g., `view/url2Embed.json.php`), so any user can recove…

📅 Published: March 23, 2026, 6:17 p.m. 🔄 Last Modified: March 25, 2026, 9:27 p.m.

8.5

CVSS4.0

CVE-2025-15605 - Hardcoded Cryptographic Key in Configuration Encryption Mechanism on TP-Link Archer NX200, NX210, N…

A hardcoded cryptographic key within the configuration mechanism on TP-Link Archer NX200, NX210, NX500 and NX600 enables decryption and re-encryption of device configuration data. An authenticated attacker may decrypt configuration files, modify them, and re-encrypt them, affecting the confidential…

📅 Published: March 23, 2026, 6:02 p.m. 🔄 Last Modified: April 2, 2026, 7:59 a.m.

8.5

CVSS4.0

CVE-2025-15519 - Command Injection in Modem Management CLI on TP-Link Archer NX200, NX210, NX500 and NX600

Improper input handling in a modem-management administrative CLI command on TP-Link Archer NX200, NX210, NX500 and NX600 allows crafted input to be executed as part of an operating system command. An authenticated attacker with administrative privileges may execute arbitrary commands on the operati…

📅 Published: March 23, 2026, 6:01 p.m. 🔄 Last Modified: April 2, 2026, 7:59 a.m.

8.5

CVSS4.0

CVE-2025-15518 - Command Injection in Wireless Control CLI on TP-Link Archer NX200, NX210, NX500 and NX600

Improper input handling in a wireless-control administrative CLI command on TP-Link Archer NX200, NX210, NX500 and NX600 allows crafted input to be executed as part of an operating system command. An authenticated attacker with administrative privileges may execute arbitrary commands on the operati…

📅 Published: March 23, 2026, 6:01 p.m. 🔄 Last Modified: April 2, 2026, 7:59 a.m.
Total resulsts: 349182
Page 968 of 34,919
« previous page » next page
Filters