A vulnerability marked as critical has been reported in WWBN AVideo up to 26.0. This vulnerability affects unknown code of the file clones.json.php. This manipulation causes os command injection.
This vulnerability is handled as CVE-2026-33478. The attack can be initiated remotely. There is not any exploit available.
To fix this issue, it is recommended to deploy a patch.
A vulnerability labeled as problematic has been found in Pixarra Blob Studio 2.17. This affects an unknown part. The manipulation results in improper validation of specified index, position, or offset in input.
This vulnerability is known as CVE-2019-25625. Attacking locally is a requirement. Furthermore, an exploit is available.
A vulnerability identified as critical has been detected in WWBN AVideo up to 26.0. Affected by this issue is the function LiveTransmitionHistory::getLatest/LiveTransmition::keyExists of the file plugin/Live/on_publish.php. The manipulation of the argument Name leads to sql injection.
This vulnerability is traded as CVE-2026-33485. It is possible to initiate the attack remotely. There is no exploit available.
It is suggested to install a patch to address this issue.
A vulnerability categorized as critical has been discovered in WWBN AVideo up to 26.0. Affected by this vulnerability is the function eval of the file saveSort.json.php of the component Session Cookie Handler. Executing a manipulation of the argument sections can lead to code injection.
This vulnerability appears as CVE-2026-33479. The attack may be performed from remote. There is no available exploit.
Applying a patch is advised to resolve this issue.
A vulnerability was found in Pixarra Liquid Studio 2.17. It has been rated as problematic. Affected is an unknown function of the component Keyboard Interface. Performing a manipulation results in unchecked input for loop condition.
This vulnerability is reported as CVE-2019-25624. The attack requires a local approach. Moreover, an exploit is present.
A vulnerability was found in WWBN AVideo up to 26.0. It has been declared as critical. This impacts the function isValidURLOrPath of the file /objects/aVideoEncoder.json.php of the component Endpoint. Such manipulation of the argument chunkFile leads to file inclusion.
This vulnerability is documented as CVE-2026-33354. The attack can be executed remotely. There is not any exploit available.
It is best practice to apply a patch to resolve this issue.
A vulnerability was found in WWBN AVideo up to 26.0. It has been classified as critical. This affects the function isSSRFSafeURL of the file plugin/LiveLinks/proxy.php of the component IPv6 Address Handler. This manipulation causes server-side request forgery.
This vulnerability is registered as CVE-2026-33480. Remote exploitation of the attack is possible. No exploit is available.
Applying a patch is the recommended action to fix this issue.
A vulnerability was found in WWBN AVideo up to 26.0 and classified as critical. The impacted element is the function sanitizeFFmpegCommand of the file plugin/API/standAlone/functions.php. The manipulation results in os command injection.
This vulnerability is cataloged as CVE-2026-33482. The attack may be launched remotely. There is no exploit available.
It is advisable to implement a patch to correct this issue.
A vulnerability has been found in WWBN AVideo up to 26.0 and classified as problematic. The affected element is an unknown function of the file aVideoEncoderChunk.json.php. The manipulation leads to allocation of resources.
This vulnerability is listed as CVE-2026-33483. The attack may be initiated remotely. There is no available exploit.
To fix this issue, it is recommended to deploy a patch.
Resecurity tracks Iran-linked Nasir Security targeting Middle East energy firms amid ongoing regional cyber and military threats. Resecurity (USA) is tracking a relatively new cybercriminal group called Nasir Security, presumably associated with Iran, that is targeting energy organizations in the Middle East. The energy sector is one of the most impacted areas because of the […]
A vulnerability, which was classified as problematic, was found in Pixarra Luminance Studio 2.17. Impacted is an unknown function of the component Keyboard Interface. Executing a manipulation can lead to improper restriction of names for files and other resources.
This vulnerability is tracked as CVE-2019-25623. The attack is restricted to local execution. Moreover, an exploit is present.
A vulnerability, which was classified as problematic, has been found in Pixarra Paint Studio 2.17. This issue affects some unknown processing. Performing a manipulation results in improper validation of specified index, position, or offset in input.
This vulnerability is identified as CVE-2019-25622. The attack is only possible with local access. Additionally, an exploit exists.
A vulnerability classified as problematic was found in Pixarra Pixel Studio 2.17. This vulnerability affects unknown code of the component Keyboard Interface. Such manipulation leads to reliance on untrusted inputs in a security decision.
This vulnerability is referenced as CVE-2019-25621. The attack can only be performed from a local environment. Furthermore, an exploit is available.
A vulnerability classified as problematic has been found in Pixarra Tree Studio 2.17. This affects an unknown part of the component Keyboard Interface. This manipulation causes improper handling of inconsistent special elements.
The identification of this vulnerability is CVE-2019-25620. The attack can only be executed locally. Furthermore, there is an exploit available.
A vulnerability described as problematic has been identified in Fastify up to 5.8.2. Affected by this issue is the function request.protocol/request.host. The manipulation of the argument X-Forwarded-Proto/X-Forwarded-Host results in use of less trusted source.
This vulnerability was named CVE-2026-3635. The attack needs to be approached within the local network. There is no available exploit.
Upgrading the affected component is recommended.
A vulnerability marked as problematic has been reported in antchfx xpath. Affected by this vulnerability is an unknown functionality of the component Boolean XPath Expression Handler. The manipulation leads to infinite loop.
This vulnerability is uniquely identified as CVE-2026-4645. The attack is possible to be carried out remotely. No exploit exists.
Applying a patch is the recommended action to fix this issue.