Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Red Hat | Red Hat Hardened Images | 2.15.3-0.1.hum1 ~ * | cpe:/a:redhat:hummingbird:1 | |
| Red Hat | Red Hat Enterprise Linux 10 | - | cpe:/o:redhat:enterprise_linux:10 | |
| Red Hat | Red Hat Enterprise Linux 6 | - | cpe:/o:redhat:enterprise_linux:6 | |
| Red Hat | Red Hat Enterprise Linux 7 | - | cpe:/o:redhat:enterprise_linux:7 | |
| Red Hat | Red Hat Enterprise Linux 8 | - | cpe:/o:redhat:enterprise_linux:8 | |
| Red Hat | Red Hat Enterprise Linux 9 | - | cpe:/o:redhat:enterprise_linux:9 | |
| Red Hat | Red Hat JBoss Core Services | - | cpe:/a:redhat:jboss_core_services:1 | |
| Red Hat | Red Hat OpenShift Container Platform 4 | - | cpe:/a:redhat:openshift:4 |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-34003 | 7.8 HIGH | Xorg: xwayland: x.org x server: information exposure and denial of service via out-of-boun |
| CVE-2026-34001 | 7.8 HIGH | Xorg: xwayland: x.org x server: use-after-free vulnerability leads to server crash and pot |
| CVE-2026-33999 | 7.8 HIGH | Xorg: xwayland: x.org x server: denial of service via integer underflow in xkb compatibili |
| CVE-2025-66286 | 4.7 MEDIUM | Webkitgtk: authorization bypass through webpage::send-request signal handler |
| CVE-2026-2708 | 3.7 LOW | Libsoup: libsoup: http request smuggling via duplicate content-length headers |
No comments yet