Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Apache Software Foundation | Apache Tomcat | 11.0.0-M23 ~ 11.0.0-M26 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2024-52317 - Apache Tomcat HTTP/2 Data Leakage Vulnerability | https://github.com/TAM-K592/CVE-2024-52317 | POC Details |
No public POC found.
Login to generate AI POC| CVE-2024-52318 | Apache Tomcat: Incorrect JSP tag recycling leads to XSS | |
| CVE-2024-52316 | Apache Tomcat: Authentication bypass when using Jakarta Authentication API | |
| CVE-2024-41151 | Apache HertzBeat: RCE by notice template injection vulnerability | |
| CVE-2024-45791 | Apache HertzBeat: Exposure sensitive token via http GET method with query string | |
| CVE-2024-45505 | Apache HertzBeat: Exists Native Deser RCE and file writing vulnerabilities | |
| CVE-2024-47208 | Apache OFBiz: URLs allowing remote use of Groovy expressions, leading to RCE | |
| CVE-2024-48962 | Apache OFBiz: Bypass SameSite restrictions with target redirection using URL parameters (S |
No comments yet