Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2023-32191 | 9.9 CRITICAL | rke's credentials are stored in the RKE1 Cluster state ConfigMap |
| CVE-2023-22650 | 8.8 HIGH | Rancher does not automatically clean up a user deleted or disabled from the configured Aut |
| CVE-2023-22649 | 8.4 HIGH | Rancher 'Audit Log' leaks sensitive information |
| CVE-2023-32193 | 8.3 HIGH | Norman API Cross-site Scripting Vulnerability |
| CVE-2023-32192 | 8.3 HIGH | Rancher API Server Cross-site Scripting Vulnerability |
| CVE-2024-22030 | 8.0 HIGH | Rancher agents can be hijacked by taking over the Rancher Server URL |
| CVE-2024-22029 | 7.8 HIGH | tomcat packaging allows for escalation to root from tomcat user |
| CVE-2023-32194 | 7.2 HIGH | Rancher permissions on 'namespaces' in any API group grants 'edit' permissions on namespac |
| CVE-2023-32196 | 6.6 MEDIUM | Rancher's External RoleTemplates can lead to privilege escalation |
| CVE-2024-22033 | 6.3 MEDIUM | obs-service-download_url is vulnerable to argument injection |
| CVE-2023-32189 | 5.9 MEDIUM | Insecure handling SSH key in SUSE Manager when bootstrapping new clients |
| CVE-2024-22034 | 5.5 MEDIUM | Crafted projects can overwrite special files in the .osc config directory |
| CVE-2023-32190 | mlocate's %post script allows RUN_UPDATEDB_AS user to make arbitrary files world readable | |
| CVE-2023-32188 | JWT token compromise can allow malicious actions including Remote Code Execution (RCE) |
No comments yet