Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-22815 | AIOHTTP: Uncapped memory usage possible through aiohttp allowing unlimited trailer headers | |
| CVE-2026-34513 | AIOHTTP: Denial of Service (DoS) via Unbounded DNS Cache in TCPConnector | |
| CVE-2026-34520 | AIOHTTP: C parser (llhttp) accepts null bytes and control characters in response header va | |
| CVE-2026-34516 | AIOHTTP: Multipart Header Size Bypass | |
| CVE-2026-34514 | AIOHTTP: CRLF injection in multipart part content type header construction | |
| CVE-2026-34525 | AIOHTTP: Duplicate Host header accepted | |
| CVE-2026-34519 | AIOHTTP: HTTP response splitting via \r in reason phrase | |
| CVE-2026-34518 | AIOHTTP: Cookie and Proxy-Authorization headers leaked on cross-origin redirect | |
| CVE-2026-34515 | AIOHTTP: UNC SSRF/NTLMv2 Credential Theft/Local File Read in static resource handler on Wi |
No comments yet