Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| h2oai | h2oai/h2o-3 | unspecified ~ latest | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | An attacker is able to read any file on the server hosting the H2O dashboard without any authentication. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-6038.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2023-6013 | H2O Local File Include | |
| CVE-2023-6016 | H2O Remote Code Execution via POJO Model Import | |
| CVE-2023-6017 | H2O S3 Bucket Takeover |
No comments yet