高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
| # | POC説明 | ソースリンク | Shenlongリンク |
|---|
公開POCは見つかりませんでした。
ログインしてAI POCを生成| CVE-2026-34374 | 9.1 CRITICAL | AVideo has SQL Injection in Live_schedule::keyExists() via Unparameterized Stream Key |
| CVE-2026-34375 | 8.2 HIGH | AVideo Vulnerable to Reflected XSS via Unsanitized plugin Parameter in YPTWallet Stripe Pa |
| CVE-2026-34245 | 6.3 MEDIUM | AVideo's Missing Authorization in Playlist Schedule Creation Allows Cross-User Broadcast H |
| CVE-2026-34247 | 5.4 MEDIUM | AVideo's IDOR in uploadPoster.php Allows Any Authenticated User to Overwrite Scheduled Liv |
| CVE-2026-34362 | 5.4 MEDIUM | AVideo's WebSocket Token Never Expires Due to Commented-Out Timeout Validation in verifyTo |
| CVE-2026-33759 | 5.3 MEDIUM | AVideo: Unauthenticated IDOR in playlistsVideos.json.php Exposes Private Playlist Contents |
| CVE-2026-33763 | 5.3 MEDIUM | AVideo has an Unauthenticated Video Password Brute-Force Vulnerability via Unrate-Limited |
| CVE-2026-33761 | 5.3 MEDIUM | AVideo: Unauthenticated Access to Scheduler Plugin Endpoints Leaks Scheduled Tasks, Email |
| CVE-2026-34364 | 5.3 MEDIUM | AVideo has User Group-Based Category Access Control Bypass via Missing and Broken Group Fi |
| CVE-2026-34368 | 5.3 MEDIUM | AVideo Vulnerable to Wallet Balance Double-Spend via TOCTOU Race Condition in transferBala |
| CVE-2026-34369 | 5.3 MEDIUM | AVIdeo has Video Password Protection Bypass via API Endpoints Returning Full Playback Sour |
| CVE-2026-33766 | AVideo has SSRF Protection Bypass via HTTP Redirect in Image Download Endpoints | |
| CVE-2026-33767 | AVideo has SQL Injection via Partial Prepared Statement — videos_id Concatenated Directly | |
| CVE-2026-33770 | AVideo has SQL Injection in category.php fixCleanTitle() via Unparameterized clean_title a | |
| CVE-2026-33867 | AVideo has Plaintext Video Password Storage |
まだコメントはありません