Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | KubeView through 0.1.31 is susceptible to information disclosure. An attacker can obtain control of a Kubernetes cluster because api/scrape/kube-system does not require authentication and retrieves certificate files that can be used for authentication as kube-admin. An attacker can thereby possibly obtain sensitive information, modify data, and/or execute unauthorized operations. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2022/CVE-2022-45933.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2022-43705 | Botan 信任管理问题漏洞 | |
| CVE-2022-45914 | Electronic Shelf Label 安全漏洞 | |
| CVE-2022-45919 | Linux kernel 资源管理错误漏洞 | |
| CVE-2022-45930 | OpenDaylight SQL注入漏洞 | |
| CVE-2022-45931 | OpenDaylight SQL注入漏洞 | |
| CVE-2022-45932 | OpenDaylight SQL注入漏洞 | |
| CVE-2022-45934 | Linux kernel 输入验证错误漏洞 |
No comments yet