CVE-2018-19365

The REST API in Wowza Streaming Engine 4.7.4.01 allows traversal of the directory structure and retrieval of a file via a remote, specifically...

Basic Information

CVE State
PUBLISHED
Reserved Date
November 19, 2018
Published Date
March 18, 2019
Last Updated
August 05, 2024
Vendor
Wowza
Product
Streaming Engine
Description
The REST API in Wowza Streaming Engine 4.7.4.01 allows traversal of the directory structure and retrieval of a file via a remote, specifically crafted HTTP request.
Tags
nuclei_scanner

CVSS Scores

CVSS v3.1

9.1 - CRITICAL

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

CVSS v2.0

6.4

Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P

EPSS Score

Score
81.76% (Percentile: 99.13%) as of 2025-06-14

Exploit Status

Exploited in the Wild
Yes (2025-05-18 00:00:00 UTC) Source

Known Exploited Vulnerability Information

Source Added Date
The Shadowserver (via CIRCL) 2025-05-18 00:00:00 UTC

Scanner Integrations

Timeline

  • CVE ID Reserved

  • CVE Published to Public

  • Detected by Nuclei

  • Added to KEVIntel