Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Apache Software Foundation | Apache Pinot | 0 ~ 1.3 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | This vulnerability allows remote attackers to bypass authentication on affected installations of Apache Pinot. Authentication is not required to exploit this vulnerability.The specific flaw exists within the AuthenticationFilter class. The issue results from insufficient neutralization of special characters in a URI. An attacker can leverage this vulnerability to bypass authentication on the system. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-56325.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2025-30676 | Apache OFBiz: Stored XSS Vulnerability | |
| CVE-2025-30177 | Apache Camel: Camel-Undertow Message Header Injection via Improper Filtering | |
| CVE-2025-29868 | Apache Answer: Using externally referenced images can leak user privacy. | |
| CVE-2025-30065 | Apache Parquet Java: Arbitrary code execution in the parquet-avro module when reading an A | |
| CVE-2025-27427 | Apache ActiveMQ Artemis: Address routing-type can be updated by user without the createAdd |
No comments yet