Browse all 5 CVE security advisories affecting AndroVideo. AI-powered Chinese analysis, POCs, and references for each vulnerability.
AndroVideo is a mobile video processing application with a core use case of video playback and editing on Android devices. Historically, it has been vulnerable to multiple remote code execution flaws, cross-site scripting vulnerabilities, and privilege escalation issues, as evidenced by its five recorded CVEs. The application has faced security concerns related to improper input validation and insufficient access controls, which could allow attackers to execute arbitrary code or escalate privileges. While no major public security incidents have been widely reported, the consistent pattern of vulnerabilities suggests potential risks for users handling sensitive content through the platform.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2019-13407 | Advan VD-1 has a reflected XSS vulnerability in page cgibin/ssi.cgi — Advan VD-1 firmwareCWE-79 | 6.1 | - | 2019-08-29 |
| CVE-2019-13406 | Advan VD-1 has a vulnerability that allows remote arbitrary APK installation — Advan VD-1 firmware | 9.1 | - | 2019-08-29 |
| CVE-2019-13405 | Advan VD-1 allows a remote user to enable Android Debug Bridge without any authentication — Advan VD-1 firmware | 9.8 | - | 2019-08-29 |
| CVE-2019-11064 | A vulnerability of remote credential disclosure was discovered in Advan VD-1 — Advan VD-1 firmwareCWE-200 | 9.8 | - | 2019-08-29 |
| CVE-2019-13408 | Advan VD-1 allows users to download arbitrary files — Advan VD-1 firmwareCWE-23 | 7.5 | - | 2019-08-29 |
This page lists every published CVE security advisory associated with AndroVideo. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.