Ausnahme gefangen: SSL certificate problem: certificate is not yet valid ๐Ÿ“Œ CVE-2022-30690 | WWBN AVideo 11.6 HTTP Request cross site scripting (TALOS-2022-1539)

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š CVE-2022-30690 | WWBN AVideo 11.6 HTTP Request cross site scripting (TALOS-2022-1539)


๐Ÿ’ก Newskategorie: Sicherheitslรผcken
๐Ÿ”— Quelle: vuldb.com

A vulnerability, which was classified as problematic, was found in WWBN AVideo 11.6. This affects an unknown part of the component HTTP Request Handler. The manipulation leads to cross site scripting. This vulnerability is uniquely identified as CVE-2022-30690. It is possible to initiate the attack remotely. There is no exploit available. ...



๐Ÿ“Œ CVE-2023-48728 | WWBN AVideo 11.6 HTTP Request functiongetOpenGraph cross site scripting (TALOS-2023-1883)


๐Ÿ“ˆ 77.2 Punkte

๐Ÿ“Œ CVE-2023-48730 | WWBN AVideo 15fed957fb HTTP Request navbarMenuAndLogo.php cross site scripting (TALOS-2023-1882)


๐Ÿ“ˆ 77.2 Punkte

๐Ÿ“Œ CVE-2023-47861 | WWBN AVideo 11.6 HTTP Request channelBody.php cross site scripting (TALOS-2023-1884)


๐Ÿ“ˆ 77.2 Punkte

๐Ÿ“Œ CVE-2023-49589 | WWBN AVideo 15fed957fb HTTP Request userRecoverPass.php password recovery (TALOS-2023-1896)


๐Ÿ“ˆ 68.21 Punkte

๐Ÿ“Œ CVE-2023-49715 | WWBN AVideo 15fed957fb HTTP Request import.json.php unrestricted upload (TALOS-2023-1885)


๐Ÿ“ˆ 68.21 Punkte

๐Ÿ“Œ CVE-2023-47171 | WWBN AVideo 11.6 HTTP Request aVideoEncoder.json.php file inclusion (TALOS-2023-1869)


๐Ÿ“ˆ 68.21 Punkte

๐Ÿ“Œ CVE-2023-47862 | WWBN AVideo 15fed957fb HTTP Request getLanguageFromBrowser file inclusion (TALOS-2023-1886)


๐Ÿ“ˆ 68.21 Punkte

๐Ÿ“Œ CVE-2023-49810 | WWBN AVideo 15fed957fb HTTP Request checkLoginAttempts excessive authentication (TALOS-2023-1898)


๐Ÿ“ˆ 68.21 Punkte

๐Ÿ“Œ CVE-2023-49599 | WWBN AVideo 15fed957fb entropy (TALOS-2023-1900)


๐Ÿ“ˆ 60.56 Punkte

๐Ÿ“Œ [webapps] AVideo Platform 8.1 - Cross Site Request Forgery (Password Reset)


๐Ÿ“ˆ 32.95 Punkte

๐Ÿ“Œ #0daytoday #AVideo Platform 8.1 - Cross Site Request Forgery (Password Reset) Vulnerability [#0day #Exploit]


๐Ÿ“ˆ 32.95 Punkte

๐Ÿ“Œ AVideo Platform 8.1 Cross Site Request Forgery


๐Ÿ“ˆ 32.95 Punkte

๐Ÿ“Œ CVE-2023-30860 | World Wide Broadcast Network AVideo prior 12.4 Schedule Meet topic cross site scripting (GHSA-xr9h-p2rc-rpqm)


๐Ÿ“ˆ 32.37 Punkte

๐Ÿ“Œ CVE-2023-34354 | Peplink Surf SOHO HW1 6.3.5 HTTP Request upload_brand.cgi cross site scripting (TALOS-2023-1781)


๐Ÿ“ˆ 31.34 Punkte

๐Ÿ“Œ Talos II Lit - a reduced cost version of our legenday Talos II mainboard with open firmware


๐Ÿ“ˆ 27.05 Punkte

๐Ÿ“Œ AVideo up to 8.8 information disclosure [CVE-2020-23490]


๐Ÿ“ˆ 23.39 Punkte

๐Ÿ“Œ AVideo Platform up to 10.1 authorization [CVE-2021-21286]


๐Ÿ“ˆ 23.39 Punkte

๐Ÿ“Œ CVE-2023-27380 | Peplink Surf SOHO HW1 6.3.5 HTTP Request admin.cgi USSD_send os command injection (TALOS-2023-1780)


๐Ÿ“ˆ 22.36 Punkte

๐Ÿ“Œ CVE-2023-35193 | Peplink Surf SOHO HW1 6.3.5 HTTP Request api.cgi os command injection (TALOS-2023-1782)


๐Ÿ“ˆ 22.36 Punkte

๐Ÿ“Œ CVE-2023-34356 | Peplink Surf SOHO HW1 6.3.5 HTTP Request data.cgi xfer_dns os command injection (TALOS-2023-1778)


๐Ÿ“ˆ 22.36 Punkte

๐Ÿ“Œ CVE-2023-28381 | Peplink Surf SOHO HW1 6.3.5 HTTP Request admin.cgi MVPN_trial_init os command injection (TALOS-2023-1779)


๐Ÿ“ˆ 22.36 Punkte

๐Ÿ“Œ [webapps] AVideo Platform 8.1 - Information Disclosure (User Enumeration)


๐Ÿ“ˆ 22.2 Punkte

๐Ÿ“Œ #0daytoday #AVideo Platform 8.1 - Information Disclosure (User Enumeration) Vulnerability [#0day #Exploit]


๐Ÿ“ˆ 22.2 Punkte

๐Ÿ“Œ AVideo Platform 8.1 User Enumeration


๐Ÿ“ˆ 22.2 Punkte

๐Ÿ“Œ Avideo up to 8.8 import.json.php access control


๐Ÿ“ˆ 22.2 Punkte

๐Ÿ“Œ Crony Cronjob Manager 0.4.4 Cross Site Request Forgery / Cross Site Scripting


๐Ÿ“ˆ 19.73 Punkte

๐Ÿ“Œ Quick CMS 6.1 Cross Site Request Forgery / Cross Site Scripting


๐Ÿ“ˆ 19.73 Punkte

๐Ÿ“Œ PivotX CMS 2.3.10 Cross Site Request Forgery / Cross Site Scripting


๐Ÿ“ˆ 19.73 Punkte

๐Ÿ“Œ Mihalism Multi Host 5.0.3 Cross Site Request Forgery / Cross Site Scripting


๐Ÿ“ˆ 19.73 Punkte

๐Ÿ“Œ Manage Engine OPutils 8.0 Cross Site Request Forgery / Cross Site Scripting


๐Ÿ“ˆ 19.73 Punkte

๐Ÿ“Œ Umbraco SSRF / Cross Site Request Forgery / Cross Site Scripting


๐Ÿ“ˆ 19.73 Punkte

๐Ÿ“Œ SamenBlog Weblog Service Cross Site Request Forgery / Cross Site Scripting


๐Ÿ“ˆ 19.73 Punkte

๐Ÿ“Œ RozBlog Weblog Service Cross Site Request Forgery / Cross Site Scripting


๐Ÿ“ˆ 19.73 Punkte

๐Ÿ“Œ WordPress CP Polls 1.0.8 Cross Site Request Forgery / Cross Site Scripting


๐Ÿ“ˆ 19.73 Punkte

๐Ÿ“Œ WordPress Project Theme 2.0.95 Cross Site Request Forgery / Cross Site Scripting


๐Ÿ“ˆ 19.73 Punkte











matomo