Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2022-43757 | 9.9 CRITICAL | Rancher: Exposure of sensitive fields |
| CVE-2022-31254 | 7.8 HIGH | rmt-server-pubcloud allows to escalate from user _rmt to root |
| CVE-2022-31249 | 7.5 HIGH | [RANCHER] OS command injection in Rancher and Fleet |
| CVE-2022-21953 | 7.4 HIGH | Authenticated user can gain unauthorized shell pod and kubectl access in the local cluster |
| CVE-2022-43759 | 7.2 HIGH | Rancher: Privilege escalation via promoted roles |
| CVE-2022-43755 | 7.1 HIGH | Rancher: Non-random authentication token |
| CVE-2023-22643 | 6.3 MEDIUM | libzypp-plugin-appdata: potential arbitrary code execution via shell injection due to `os. |
| CVE-2022-43756 | 5.9 MEDIUM | Rancher/Wrangler: Denial of service when processing Git credentials |
No comments yet