Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Apache Software Foundation | Apache Storm Client | 0 ~ 2.8.7 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-41409 | 9.8 CRITICAL | Apache MINA: CWE-502 Deserialization of Untrusted Data |
| CVE-2026-41635 | 9.8 CRITICAL | Apache MINA: AbstractIoBuffer.resolveClass() null-clazz Branch Skips acceptMatchers Filter |
| CVE-2026-40557 | Apache Storm Prometheus Reporter: Disabling TLS verification for Prometheus Reporter also | |
| CVE-2026-27172 | Apache Camel: Unsafe Java deserialization in camel-consul ConsulRegistry allows arbitrary | |
| CVE-2026-33453 | Apache Camel: CoAP URI Query Parameter to Exchange Header Injection in camel-coap Allows S | |
| CVE-2026-33454 | Apache Camel: Inbound Header Filter Missing in MailHeaderFilterStrategy Allows Remote Code | |
| CVE-2026-40022 | Apache Camel Platform HTTP Main: Authentication Bypass on Non-Root Context Paths in camel | |
| CVE-2026-40858 | Apache Camel: Camel-Infinispan: Unsafe Deserialization in Remote Aggregation Repository | |
| CVE-2026-40453 | Apache Camel JMS, Apache Camel CoAP, Apache Camel Google PubSub: Incomplete fix for CVE-20 | |
| CVE-2026-40860 | Apache Camel: Unsafe Deserialization of JMS ObjectMessage in camel-jms, camel-sjms, camel- | |
| CVE-2026-40048 | Apache Camel PQC: Unsafe Deserialization from FileBasedKeyLifecycleManager | |
| CVE-2026-40473 | Apache Camel Mina: Unsafe Deserialization in MinaConverter.toObjectInput() via TCP/UDP |
No comments yet