Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Apache Software Foundation | Apache InLong | 1.4.0 ~ 1.6.0 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2023-31062 | Apache InLong: Privilege escalation vulnerability for InLong | |
| CVE-2023-31064 | Apache InLong: Insecurity direct object references cancelling applications | |
| CVE-2023-31065 | Apache InLong: Insufficient Session Expiration in InLong | |
| CVE-2023-31066 | Apache InLong: Insecure direct object references for inlong sources | |
| CVE-2023-31098 | Apache InLong: Weak Password Implementation in InLong | |
| CVE-2023-31101 | Apache InLong: Users who joined later can see the data of deleted users | |
| CVE-2023-31206 | Apache InLong: Attackers can change the immutable name and type of nodes | |
| CVE-2023-31453 | Apache InLong: IDOR make users can delete others' subscription | |
| CVE-2023-31454 | Apache InLong: IDOR make users can bind any cluster | |
| CVE-2023-31058 | Apache InLong: JDBC URL bypassing by adding blanks | |
| CVE-2023-28709 | Apache Tomcat: Fix for CVE-2023-24998 is incomplete |
No comments yet