Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux 8 | 0:8.0p1-26.el8_10 ~ * | cpe:/a:redhat:enterprise_linux:8::appstream | |
| Red Hat | Red Hat Enterprise Linux 8 | 0:8.0p1-26.el8_10 ~ * | cpe:/a:redhat:enterprise_linux:8::appstream | |
| Red Hat | Red Hat Enterprise Linux 9 | 0:8.7p1-45.el9 ~ * | cpe:/o:redhat:enterprise_linux:9::baseos | |
| Red Hat | Red Hat Enterprise Linux 9 | 0:8.7p1-45.el9 ~ * | cpe:/o:redhat:enterprise_linux:9::baseos | |
| Red Hat | Red Hat Enterprise Linux 9.4 Extended Update Support | 0:8.7p1-38.el9_4.5 ~ * | cpe:/o:redhat:rhel_eus:9.4::baseos | |
| Red Hat | Red Hat Discovery 1.14 | sha256:f33991d766b618a128fb99fbe4f9b61c5004f7c6aa73b2b38e28d59e56c64d63 ~ * | cpe:/a:redhat:discovery:1.14::el9 | |
| Red Hat | Red Hat Enterprise Linux 10 | - | cpe:/o:redhat:enterprise_linux:10 | |
| Red Hat | Red Hat Enterprise Linux 6 | - | cpe:/o:redhat:enterprise_linux:6 | |
| Red Hat | Red Hat Enterprise Linux 7 | - | cpe:/o:redhat:enterprise_linux:7 | |
| Red Hat | Red Hat OpenShift Container Platform 4 | - | cpe:/a:redhat:openshift:4 |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | MitM attack allowing a malicious interloper to impersonate a legitimate server when a client attempts to connect to it | https://github.com/rxerium/CVE-2025-26465 | POC Details |
| 2 | Patch Manual para a correção das CVE-2025-26465-e-CVE-2025-26466, para sistemas sem update do OpenSSH | https://github.com/dolutech/patch-manual-CVE-2025-26465-e-CVE-2025-26466 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet