Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Red Hat | mirror registry for Red Hat OpenShift | - | cpe:/a:redhat:mirror_registry:1 | |
| Red Hat | mirror registry for Red Hat OpenShift 2 | - | cpe:/a:redhat:mirror_registry:2 | |
| Red Hat | Red Hat Quay 3 | - | cpe:/a:redhat:quay:3 | |
| Red Hat | Red Hat Quay 3 | - | cpe:/a:redhat:quay:3 |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-3099 | 5.8 MEDIUM | Libsoup: libsoup: authentication bypass via digest authentication replay attack |
| CVE-2026-3234 | 4.3 MEDIUM | Mod_proxy_cluster: mod_proxy_cluster: response body corruption via crlf injection |
| CVE-2026-2366 | 3.1 LOW | Keycloak: keycloak: information disclosure via authorization bypass in admin api |
No comments yet