Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Red Hat | JBoss Core Services for RHEL 8 | 0:1.3.20-3.el8jbcs ~ * | cpe:/a:redhat:jboss_core_services:1::el8 | |
| Red Hat | JBoss Core Services on RHEL 7 | 0:1.3.20-3.el7jbcs ~ * | cpe:/a:redhat:jboss_core_services:1::el8 | |
| Red Hat | Red Hat Enterprise Linux 9 | 0:1.3.20-1.el9_4 ~ * | cpe:/a:redhat:enterprise_linux:9::appstream | |
| Red Hat | Text-Only JBCS | - | cpe:/a:redhat:jboss_core_services:1 | |
| Red Hat | Red Hat JBoss Core Services | - | cpe:/a:redhat:jboss_core_services:1 |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Welcome to the Metasploit Exploits Repository, your go-to resource for a comprehensive collection of cutting-edge exploits designed for penetration testing and ethical hacking. Developed and maintained by Mohamed Mounir Boudjema, this repository is crafted with a deep understanding of the evolving landscape of cybersecurity. | https://github.com/DedSec-47/Metasploit-Exploits-CVE-2023-6710 | POC Details |
| 2 | Explore the depths of CVE-2023-6710 with our comprehensive Proof of Concept (PoC). This CVE, identified as a potential security vulnerability, has been meticulously examined to demonstrate its impact and provide a hands-on understanding of the associated risks. | https://github.com/DedSec-47/CVE-2023-6710 | POC Details |
No public POC found.
Login to generate AI POC| CVE-2023-5379 | 7.5 HIGH | Undertow: ajp request closes connection exceeding maxrequestsize |
| CVE-2023-5764 | 7.1 HIGH | Ansible: template injection |
| CVE-2023-4958 | 6.1 MEDIUM | Stackrox: missing http security headers allows for clickjacking in web ui |
No comments yet