Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-33039 | 8.6 HIGH | AVideo vulnerable to unauthenticated SSRF via HTTP redirect bypass in LiveLinks proxy |
| CVE-2026-33038 | 8.1 HIGH | AVideo affected by unauthenticated application takeover via exposed web installer on unini |
| CVE-2026-33037 | 8.1 HIGH | WWBN AVideo has predictable default admin credentials in official Docker deployment path |
| CVE-2026-33043 | 8.1 HIGH | AVideo affected by Session Hijacking via Unauthenticated Session ID Disclosure with Permis |
| CVE-2026-33237 | 5.5 MEDIUM | AVideo has SSRF in Scheduler Plugin via callbackURL Missing `isSSRFSafeURL()` Validation |
| CVE-2026-33041 | 5.3 MEDIUM | AVideo has an Unauthenticated Password Hash Oracle via encryptPass.json.php |
| CVE-2026-33025 | AVideo-Encoder is Vulnerable to Authenticated SQL Injection via ORDER BY Clause | |
| CVE-2026-33035 | Unauthenticated Reflected XSS via innerHTML in AVideo | |
| CVE-2026-33024 | AVideo-Encoder has Unauthenticated Blind Server-Side Request Forgery via Public Thumbnail |
No comments yet