Direct Vulnerabilities

Known vulnerabilities in the wwbn/avideo package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Cross-site Request Forgery (CSRF)

>=0.0.0
  • H
Directory Traversal

>=0.0.0
  • M
Cross-site Scripting (XSS)

>=0.0.0
  • M
Cross-site Request Forgery (CSRF)

>=0.0.0
  • M
Guessable CAPTCHA

>=0.0.0
  • H
Server-side Request Forgery (SSRF)

>=0.0.0
  • H
Permissive Cross-domain Policy with Untrusted Domains

>=0.0.0
  • H
Origin Validation Error

>=0.0.0
  • H
Cross-site Request Forgery (CSRF)

>=0.0.0
  • H
Directory Traversal

>=0.0.0
  • M
Active Debug Code

>=0.0.0
  • H
Cross-site Request Forgery (CSRF)

>=0.0.0
  • C
Arbitrary Code Injection

>=0.0.0
  • H
Authorization Bypass Through User-Controlled Key

>=0.0.0
  • H
Directory Traversal

<29.0
  • H
Server-side Request Forgery (SSRF)

<29.0
  • M
Cross-site Scripting (XSS)

<29.0
  • H
Server-side Request Forgery (SSRF)

<29.0
  • H
Insufficient Verification of Data Authenticity

<29.0
  • M
Missing Authorization

<29.0
  • M
Missing Authentication for Critical Function

<29.0
  • M
Information Exposure

<29.0
  • M
Information Exposure

<29.0
  • M
Missing Authorization

<29.0
  • M
Cross-site Request Forgery (CSRF)

<29.0
  • M
Cross-site Scripting (XSS)

<29.0
  • H
Server-side Request Forgery (SSRF)

<29.0
  • M
Access Control Bypass

<29.0
  • M
Improper Authorization

<29.0
  • M
Cross-site Scripting (XSS)

<29.0
  • H
Missing Authentication for Critical Function

<29.0
  • M
Missing Authentication for Critical Function

<29.0
  • H
Missing Authorization

<29.0
  • H
Cross-site Request Forgery (CSRF)

<29.0
  • M
Cross-site Scripting (XSS)

<29.0
  • H
Cross-site Request Forgery (CSRF)

<29.0
  • H
Missing Authorization

<29.0
  • M
Cross-site Scripting (XSS)

<29.0
  • H
Cross-site Request Forgery (CSRF)

<29.0
  • H
Cross-site Scripting (XSS)

<29.0
  • M
Missing Authorization

<29.0
  • M
Incorrect Authorization

<29.0
  • M
Race Condition

<29.0
  • M
Insufficient Session Expiration

<29.0
  • M
Missing Authorization

<29.0
  • M
Missing Authorization

<29.0
  • H
Missing Authorization

<29.0
  • C
Cleartext Storage of Sensitive Information

<29.0
  • M
Missing Authorization

<29.0
  • H
SQL Injection

<29.0
  • M
Missing Authorization

<29.0
  • M
Brute Force

<29.0
  • M
Server-side Request Forgery (SSRF)

<29.0
  • M
Authorization Bypass Through User-Controlled Key

<29.0
  • H
SQL Injection

<29.0
  • H
Arbitrary File Upload

<29.0
  • H
SQL Injection

<29.0
  • H
Missing Authentication for Critical Function

<29.0
  • H
Server-side Request Forgery (SSRF)

<29.0
  • M
Cross-site Scripting (XSS)

<29.0
  • M
Server-side Request Forgery (SSRF)

<29.0
  • H
Directory Traversal

<29.0
  • M
Missing Authorization

<29.0
  • M
Use of Less Trusted Source

<29.0
  • M
Information Exposure

<29.0
  • H
Arbitrary File Upload

<29.0
  • H
Cross-site Request Forgery (CSRF)

<29.0
  • H
Command Injection

<29.0
  • H
Incorrect Authorization

<29.0
  • M
SQL Injection

<29.0
  • C
Access Control Bypass

<29.0
  • H
PHP Remote File Inclusion

<29.0
  • H
Use of a Broken or Risky Cryptographic Algorithm

<29.0
  • H
Cross-site Request Forgery (CSRF)

<29.0
  • H
Arbitrary Code Injection

<29.0
  • C
Server-side Request Forgery (SSRF)

<29.0
  • C
Server-side Request Forgery (SSRF)

<29.0
  • C
Inadequate Encryption Strength

<29.0
  • C
Command Injection

<29.0
  • H
Directory Traversal

<29.0
  • H
Session Fixation

<29.0
  • C
SQL Injection

<29.0
  • M
Missing Authorization

<29.0
  • H
Allocation of Resources Without Limits or Throttling

<29.0
  • M
Cross-site Scripting (XSS)

<29.0
  • C
Server-side Request Forgery (SSRF)

<29.0
  • M
External Control of File Name or Path

<29.0
  • H
SQL Injection

<29.0
  • M
Authorization Bypass Through User-Controlled Key

<29.0
  • L
Open Redirect

<26.0
  • H
Cross-site Scripting (XSS)

<26.0
  • M
Server-side Request Forgery (SSRF)

<26.0
  • M
Directory Traversal

<26.0
  • H
Directory Traversal

<26.0
  • H
Missing Authentication for Critical Function

<26.0
  • H
Directory Traversal

<26.0
  • M
Cross-site Scripting (XSS)

<29.0
  • H
Command Injection

<26.0
  • H
Server-side Request Forgery (SSRF)

<26.0
  • M
Cross-site Scripting (XSS)

<26.0
  • H
Permissive Cross-domain Policy with Untrusted Domains

<26.0
  • C
Missing Authentication for Critical Function

<26.0
  • H
Server-side Request Forgery (SSRF)

<26.0
  • M
Information Exposure

<26.0
  • M
Missing Authorization

<25.0
  • C
SQL Injection

<24.0
  • H
Arbitrary File Upload

<24.0
  • H
Server-side Request Forgery (SSRF)

<22.0.0
  • M
Cross-site Scripting (XSS)

<21.0
  • C
Improper Control of Generation of Code ('Code Injection')

>=12.4, <14.3
  • M
Improper Authentication

<14.3
  • H
Insufficient Entropy

<14.3
  • H
Improper Restriction of Excessive Authentication Attempts

<14.3
  • H
Arbitrary Command Injection

>=12.3, <14.3
  • H
Cross-site Scripting (XSS)

<12.4
  • C
Remote Code Execution (RCE)

<12.4
  • M
Cross-site Scripting (XSS)

<12.4
  • C
Command Injection

<12.4
  • H
Improper Privilege Management

<8.9
  • M
Open Redirect

<12.4
  • M
Cross-site Scripting (XSS)

<12.4