Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-26061 | Fleet's unbounded request body read allows remote Denial of Service | |
| CVE-2026-26060 | Fleet: Password reset tokens remain valid after password change for 24 hours | |
| CVE-2026-34386 | Fleet vulnerable to SQL injection in MDM bootstrap package by authenticated team or globa | |
| CVE-2026-34385 | Fleet's Apple MDM profile delivery has second-order SQL injection that can compromise the | |
| CVE-2026-34387 | Fleet vulnerable to OS command injection via crafted software package metadata in uninstal | |
| CVE-2026-34388 | Fleet vulnerable to Denial of Service via unhandled gRPC log type in launcher endpoint | |
| CVE-2026-34391 | Fleet Vulnerable to Windows MDM cross-device command disclosure | |
| CVE-2026-34389 | Fleet's user account creation via invite does not enforce invited email address |
No comments yet