Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Red Hat | Red Hat build of Keycloak 26.4 | 26.4.9-1 ~ * | cpe:/a:redhat:build_keycloak:26.4::el9 | |
| Red Hat | Red Hat build of Keycloak 26.4 | 26.4-11 ~ * | cpe:/a:redhat:build_keycloak:26.4::el9 | |
| Red Hat | Red Hat build of Keycloak 26.4 | 26.4-10 ~ * | cpe:/a:redhat:build_keycloak:26.4::el9 | |
| Red Hat | Red Hat build of Keycloak 26.4.9 | - | cpe:/a:redhat:build_keycloak:26.4::el9 | |
| Red Hat | Red Hat JBoss Enterprise Application Platform 8 | - | cpe:/a:redhat:jboss_enterprise_application_platform:8 | |
| Red Hat | Red Hat JBoss Enterprise Application Platform Expansion Pack | - | cpe:/a:redhat:jbosseapxp | |
| Red Hat | Red Hat Single Sign-On 7 | - | cpe:/a:redhat:red_hat_single_sign_on:7 |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-0980 | 8.3 HIGH | Rubyipmi: red hat satellite: remote code execution in rubyipmi via malicious bmc username |
| CVE-2025-9909 | 6.7 MEDIUM | Aap-gateway: improper path validation in gateway allows credential exfiltration |
| CVE-2025-9908 | 6.7 MEDIUM | Event-driven-ansible: sensitive internal headers disclosure in aap eda event streams |
| CVE-2025-9907 | 6.7 MEDIUM | Event-driven-ansible: event stream test mode exposes sensitive headers in aap eda |
No comments yet