Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-43884 | 7.7 HIGH | WWBN AVideo: SSRF Protection Bypass via HTTP Redirect and DNS Rebinding in isSSRFSafeURL() |
| CVE-2026-43873 | 7.5 HIGH | WWBN AVideo: Unauthenticated Disclosure of CloneSite `myKey` via Error Echo in `cloneClien |
| CVE-2026-43874 | 7.2 HIGH | WWBN AVideo: Incomplete Fix for YPTSocket autoEvalCodeOnHTML Strip: Unauthenticated Cross- |
| CVE-2026-43875 | 6.8 MEDIUM | WWBN AVideo: Password Hash Leaked in MobileManager OAuth Redirect URL Enables Account Take |
| CVE-2026-43878 | 6.1 MEDIUM | WWBN AVideo: Reflected XSS in plugin/Meet/iframe.php via Unescaped `user`/`pass` Parameter |
| CVE-2026-43879 | 5.4 MEDIUM | WWBN AVideo: Blind SSRF in YPTWallet Donation Webhook via Missing isSSRFSafeURL() Check an |
| CVE-2026-43877 | 5.4 MEDIUM | WWBN AVideo: CSRF in userSavePhoto.php Allows Cross-Origin Overwrite of Any Logged-in User |
| CVE-2026-43881 | 5.3 MEDIUM | WWBN AVideo: Unauthenticated User Enumeration in `objects/users.json.php` via `isCompany` |
| CVE-2026-43880 | 5.3 MEDIUM | WWBN AVideo: Unauthenticated Arbitrary Email Sending via sendEmail.json.php Allows Phishin |
| CVE-2026-43882 | 4.3 MEDIUM | WWBN AVideo: Unauthenticated CRLF/ICS Injection in Scheduler downloadICS.php Allows Calend |
| CVE-2026-43883 | 4.2 MEDIUM | WWBN AVideo: IDOR in PayPalYPT agreementCancel.json.php Allows Any Authenticated User to C |
| CVE-2026-43885 | WWBN AVideo: Exposure of Sensitive Information to an Unauthorized Actor and Missing Author |
No comments yet