
We found results for “”
CVE-2023-47862
Good to know:

Date: January 10, 2024
A local file inclusion vulnerability exists in the getLanguageFromBrowser functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary code execution. An attacker can send a series of HTTP requests to trigger this vulnerability.
Language: PHP
Severity Score
Severity Score
Weakness Type (CWE)
External Control of File Name or Path
CWE-73Top Fix

Upgrade Version
Upgrade to version wwbn/avideo - dev-julzxcapz-yp2;wwbn/avideo - dev-dependabot/composer/stripe/stripe-php-10.12.1;wwbn/avideo - dev-dependabot/npm_and_yarn/videojs-contrib-ads-7.3.1;wwbn/avideo - dev-dependabot/composer/aws/aws-sdk-php-3.261.4;wwbn/avideo - dev-akhilleusuggo-patch-5;wwbn/avideo - dev-julzxcapz-wwbn-index-new;wwbn/avideo - dev-dependabot/npm_and_yarn/js-cookie-3.0.5;wwbn/avideo - 14.3
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | HIGH |
Integrity (I): | HIGH |
Availability (A): | HIGH |