Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2023-32191 | 9.9 CRITICAL | rke's credentials are stored in the RKE1 Cluster state ConfigMap |
| CVE-2023-22650 | 8.8 HIGH | Rancher does not automatically clean up a user deleted or disabled from the configured Aut |
| CVE-2023-32193 | 8.3 HIGH | Norman API Cross-site Scripting Vulnerability |
| CVE-2023-32192 | 8.3 HIGH | Rancher API Server Cross-site Scripting Vulnerability |
| CVE-2024-22030 | 8.0 HIGH | Rancher agents can be hijacked by taking over the Rancher Server URL |
| CVE-2024-22029 | 7.8 HIGH | tomcat packaging allows for escalation to root from tomcat user |
| CVE-2023-32194 | 7.2 HIGH | Rancher permissions on 'namespaces' in any API group grants 'edit' permissions on namespac |
| CVE-2023-32196 | 6.6 MEDIUM | Rancher's External RoleTemplates can lead to privilege escalation |
| CVE-2024-22032 | 6.5 MEDIUM | Rancher's RKE1 Encryption Config kept in plain-text within cluster AppliedSpec |
| CVE-2024-22033 | 6.3 MEDIUM | obs-service-download_url is vulnerable to argument injection |
| CVE-2023-32189 | 5.9 MEDIUM | Insecure handling SSH key in SUSE Manager when bootstrapping new clients |
| CVE-2024-22034 | 5.5 MEDIUM | Crafted projects can overwrite special files in the .osc config directory |
| CVE-2023-32190 | mlocate's %post script allows RUN_UPDATEDB_AS user to make arbitrary files world readable | |
| CVE-2023-32188 | JWT token compromise can allow malicious actions including Remote Code Execution (RCE) |
No comments yet