Ausnahme gefangen: SSL certificate problem: certificate is not yet valid ๐Ÿ“Œ CVE-2022-29468 | WWBN AVideo 11.6 HTTP Request cross-site request forgery (TALOS-2022-1534)

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š CVE-2022-29468 | WWBN AVideo 11.6 HTTP Request cross-site request forgery (TALOS-2022-1534)


๐Ÿ’ก Newskategorie: Sicherheitslรผcken
๐Ÿ”— Quelle: vuldb.com

A vulnerability, which was classified as problematic, has been found in WWBN AVideo 11.6. Affected by this issue is some unknown functionality of the component HTTP Request Handler. The manipulation leads to cross-site request forgery. This vulnerability is handled as CVE-2022-29468. The attack may be launched remotely. There is no exploit available. ...



๐Ÿ“Œ CVE-2023-49589 | WWBN AVideo 15fed957fb HTTP Request userRecoverPass.php password recovery (TALOS-2023-1896)


๐Ÿ“ˆ 66.9 Punkte

๐Ÿ“Œ CVE-2023-49715 | WWBN AVideo 15fed957fb HTTP Request import.json.php unrestricted upload (TALOS-2023-1885)


๐Ÿ“ˆ 66.9 Punkte

๐Ÿ“Œ CVE-2023-47171 | WWBN AVideo 11.6 HTTP Request aVideoEncoder.json.php file inclusion (TALOS-2023-1869)


๐Ÿ“ˆ 66.9 Punkte

๐Ÿ“Œ CVE-2023-47862 | WWBN AVideo 15fed957fb HTTP Request getLanguageFromBrowser file inclusion (TALOS-2023-1886)


๐Ÿ“ˆ 66.9 Punkte

๐Ÿ“Œ CVE-2023-49810 | WWBN AVideo 15fed957fb HTTP Request checkLoginAttempts excessive authentication (TALOS-2023-1898)


๐Ÿ“ˆ 66.9 Punkte

๐Ÿ“Œ CVE-2023-49599 | WWBN AVideo 15fed957fb entropy (TALOS-2023-1900)


๐Ÿ“ˆ 60.51 Punkte

๐Ÿ“Œ Talos II Lit - a reduced cost version of our legenday Talos II mainboard with open firmware


๐Ÿ“ˆ 27.02 Punkte

๐Ÿ“Œ AVideo up to 8.8 information disclosure [CVE-2020-23490]


๐Ÿ“ˆ 23.37 Punkte

๐Ÿ“Œ AVideo Platform up to 10.1 authorization [CVE-2021-21286]


๐Ÿ“ˆ 23.37 Punkte

๐Ÿ“Œ [webapps] AVideo Platform 8.1 - Information Disclosure (User Enumeration)


๐Ÿ“ˆ 22.19 Punkte

๐Ÿ“Œ #0daytoday #AVideo Platform 8.1 - Information Disclosure (User Enumeration) Vulnerability [#0day #Exploit]


๐Ÿ“ˆ 22.19 Punkte

๐Ÿ“Œ AVideo Platform 8.1 User Enumeration


๐Ÿ“ˆ 22.19 Punkte

๐Ÿ“Œ Avideo up to 8.8 import.json.php access control


๐Ÿ“ˆ 22.19 Punkte

๐Ÿ“Œ CVE-2023-27380 | Peplink Surf SOHO HW1 6.3.5 HTTP Request admin.cgi USSD_send os command injection (TALOS-2023-1780)


๐Ÿ“ˆ 21.08 Punkte

๐Ÿ“Œ CVE-2023-35193 | Peplink Surf SOHO HW1 6.3.5 HTTP Request api.cgi os command injection (TALOS-2023-1782)


๐Ÿ“ˆ 21.08 Punkte

๐Ÿ“Œ CVE-2023-34356 | Peplink Surf SOHO HW1 6.3.5 HTTP Request data.cgi xfer_dns os command injection (TALOS-2023-1778)


๐Ÿ“ˆ 21.08 Punkte

๐Ÿ“Œ CVE-2023-28381 | Peplink Surf SOHO HW1 6.3.5 HTTP Request admin.cgi MVPN_trial_init os command injection (TALOS-2023-1779)


๐Ÿ“ˆ 21.08 Punkte

๐Ÿ“Œ CVE-2023-35056 | Yifan YF325 1.0_20221108 Network Request cgi_handler next_page stack-based overflow (TALOS-2023-1761)


๐Ÿ“ˆ 18.43 Punkte

๐Ÿ“Œ CVE-2023-32632 | Yifan YF325 1.0_20221108 Network Request validate.so diag_ping_start access control (TALOS-2023-1767)


๐Ÿ“ˆ 18.43 Punkte

๐Ÿ“Œ CVE-2023-27163 | request-baskets up to 1.2.1 API Request /api/baskets/{name} server-side request forgery


๐Ÿ“ˆ 18.33 Punkte

๐Ÿ“Œ CVE-2024-22205 | benbusby whoogle-search up to 0.8.3 GET Request request.py send location server-side request forgery (GHSL-2023-186)


๐Ÿ“ˆ 18.33 Punkte

๐Ÿ“Œ CVE-2023-45318 | Weston Embedded uC-HTTP 80d4004 heap-based overflow (TALOS-2023-1843)


๐Ÿ“ˆ 17.34 Punkte

๐Ÿ“Œ TinyCheck HTTP GET Request server-side request forgery [CVE-2020-36200]


๐Ÿ“ˆ 17.24 Punkte

๐Ÿ“Œ CVE-2023-4769 | Zoho ManageEngine Desktop Central 9.1.0 HTTP Request /smtpConfig.do server-side request forgery


๐Ÿ“ˆ 17.24 Punkte

๐Ÿ“Œ CVE-2023-44256 | Fortinet FortiAnalyzer/FortiManager up to 7.0.7/7.2.3/7.4.0 HTTP Request server-side request forgery (FG-IR-19-039)


๐Ÿ“ˆ 17.24 Punkte

๐Ÿ“Œ CVE-2023-46729 | getsentry sentry-javascript up to 7.76.x HTTP Request server-side request forgery (GHSA-2rmr-xw8m-22q9)


๐Ÿ“ˆ 17.24 Punkte

๐Ÿ“Œ CVE-2023-7078 | Cloudflare miniflare prior 3.20231030.2 HTTP Request server-side request forgery (GHSA-fwvg-2739-22v7)


๐Ÿ“ˆ 17.24 Punkte

๐Ÿ“Œ CVE-2019-18394 | Ignite Realtime Openfire up to 4.4.2 FaviconServlet.java HTTP GET Request server-side request forgery


๐Ÿ“ˆ 17.24 Punkte

๐Ÿ“Œ CVE-2024-1021 | Rebuild up to 3.5.5 HTTP Request readRawText url server-side request forgery


๐Ÿ“ˆ 17.24 Punkte

๐Ÿ“Œ Jenkins up to 2.120/LTS 2.107.2 ZipExtractionInstaller.java HTTP GET Request Server-Side Request Forgery


๐Ÿ“ˆ 16.06 Punkte

๐Ÿ“Œ Trovebox up to 4.0.0-rc6 HTTP Request Server-Side Request Forgery


๐Ÿ“ˆ 16.06 Punkte

๐Ÿ“Œ Gogs 0.11.53 HTTP GET Request Server-Side Request Forgery


๐Ÿ“ˆ 16.06 Punkte

๐Ÿ“Œ Teltonika TRB2 00.02.04.3 HTTP GET Request server-side request forgery


๐Ÿ“ˆ 16.06 Punkte

๐Ÿ“Œ McAfee MVision Endpoint up to 20.10 HTTP Request server-side request forgery


๐Ÿ“ˆ 16.06 Punkte

๐Ÿ“Œ Atlassian atlassian-gadgets up to 4.2.36/4.3.2.3/4.3.13/4.4.11/5.0.0 HTTP Request MessageBundleWhiteList server-side request forgery


๐Ÿ“ˆ 16.06 Punkte











matomo