Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Drupal | File Access Fix (deprecated) | 0.0.0 ~ 1.2.0 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-3529 | Google Analytics GA4 - Moderately critical - Cross-site Scripting - SA-CONTRIB-2026-024 | |
| CVE-2026-3573 | AI (Artificial Intelligence) - Moderately critical - Information Disclosure - SA-CONTRIB-2 | |
| CVE-2026-3532 | OpenID Connect / OAuth client - Less critical - Access bypass - SA-CONTRIB-2026-027 | |
| CVE-2026-3525 | File Access Fix (deprecated) - Moderately critical - Access bypass - SA-CONTRIB-2026-020 | |
| CVE-2026-3527 | AJAX Dashboard - Critical - Access bypass - SA-CONTRIB-2026-022 | |
| CVE-2026-3530 | OpenID Connect / OAuth client - Moderately critical - Server-side request forgery, Informa | |
| CVE-2026-3531 | OpenID Connect / OAuth client - Moderately critical - Access bypass - SA-CONTRIB-2026-026 | |
| CVE-2026-3528 | Calculation Fields - Moderately critical - Cross-site Scripting - SA-CONTRIB-2026-023 | |
| CVE-2026-4933 | Unpublished Node Permissions - Critical - Access bypass - SA-CONTRIB-2026-029 | |
| CVE-2026-4393 | Automated Logout - Moderately critical - Cross-site request forgery - SA-CONTRIB-2026-030 | |
| CVE-2026-1556 | Information disclosure via file URI overwrite in File (Field) Paths | |
| CVE-2026-0748 | Access bypass in Drupal 7 i18n_node translation UI |
No comments yet