Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux 10 | - | cpe:/o:redhat:enterprise_linux:10 | |
| Red Hat | Red Hat Enterprise Linux 9 | - | cpe:/o:redhat:enterprise_linux:9 | |
| Red Hat | Red Hat JBoss Core Services | - | cpe:/a:redhat:jboss_core_services:1 | |
| Red Hat | Red Hat JBoss Core Services | - | cpe:/a:redhat:jboss_core_services:1 |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-3099 | 5.8 MEDIUM | Libsoup: libsoup: authentication bypass via digest authentication replay attack |
| CVE-2026-2376 | 4.9 MEDIUM | Mirror-registry: quay: quay: server-side request forgery via open redirect vulnerability i |
| CVE-2026-2366 | 3.1 LOW | Keycloak: keycloak: information disclosure via authorization bypass in admin api |
No comments yet