Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Apache Software Foundation | Apache Tomcat | 11.0.16 ~ 11.0.18 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-34500 | Apache Tomcat: OCSP checks sometimes soft-fail with FFM even when soft-fail is disabled | |
| CVE-2026-34487 | Apache Tomcat: Cloud membership for clustering component exposed the Kubernetes bearer tok | |
| CVE-2026-34486 | Apache Tomcat: Fix for CVE-2026-29146 allowed bypass of EncryptInterceptor | |
| CVE-2026-34483 | Apache Tomcat: Incomplete escaping of JSON access logs | |
| CVE-2026-32990 | Apache Tomcat: Fix for CVE-2025-66614 is incomplete | |
| CVE-2026-29146 | Apache Tomcat: EncryptInterceptor vulnerable to padding oracle attack by default | |
| CVE-2026-29145 | Apache Tomcat, Apache Tomcat Native: OCSP checks sometimes soft-fail even when soft-fail i | |
| CVE-2026-25854 | Apache Tomcat: Occasionally open redirect | |
| CVE-2026-24880 | Apache Tomcat: Request smuggling via invalid chunk extension | |
| CVE-2026-40046 | Apache ActiveMQ, Apache ActiveMQ All, Apache ActiveMQ MQTT: Missing fix for CVE-2025-66168 | |
| CVE-2026-33005 | Apache OpenMeetings: Insufficient checks in FileWebService | |
| CVE-2026-33266 | Apache OpenMeetings: Hardcoded Remember-Me Cookie Encryption Key and Salt | |
| CVE-2026-34020 | Apache OpenMeetings: Login Credentials Passed via GET Query Parameters | |
| CVE-2025-57735 | Apache Airflow: Airflow Logout Not Invalidating JWT | |
| CVE-2025-62188 | Apache DolphinScheduler: Users can access sensitive information through the actuator endpo | |
| CVE-2026-34538 | Apache Airflow: Authorization bypass in DagRun wait endpoint (XCom exposure) |
No comments yet