Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Apache Software Foundation | Apache Ozone | 1.0 ~ 1.0 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2021-41532 | Unauthenticated access to Ozone Recon HTTP endpoints | |
| CVE-2021-39236 | Owners of the S3 tokens are not validated | |
| CVE-2021-39235 | Access mode of block tokens are not enforced | |
| CVE-2021-39234 | Raw block data can be read bypassing ACL/authorization | |
| CVE-2021-39233 | Container-related datanode operations can be called without authorization | |
| CVE-2021-39232 | Missing admin check for SCM related admin commands | |
| CVE-2021-36372 | Original block tokens are persisted and can be retrieved |
No comments yet