Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-32589 | 7.4 HIGH | Mirror-registry: quay: insecure direct object reference in blobupload |
| CVE-2026-32590 | 7.1 HIGH | Mirror-registry: remote code execution using pickle deserialization |
| CVE-2026-2377 | 6.5 MEDIUM | Mirror-registry: quay: quay: server-side request forgery via log export functionality |
| CVE-2025-57851 | 6.4 MEDIUM | Mce: privilege escalation via excessive /etc/passwd permissions |
| CVE-2025-57854 | 6.4 MEDIUM | Osus-operator: privilege escalation via excessive /etc/passwd permissions |
| CVE-2025-57853 | 6.4 MEDIUM | Web-terminal: privilege escalation via excessive /etc/passwd permissions |
| CVE-2025-58713 | 6.4 MEDIUM | Rhpam: privilege escalation via excessive /etc/passwd permissions |
| CVE-2025-14243 | 5.3 MEDIUM | Mirror-registry: openshift mirror registry: user enumeration via authentication error mess |
| CVE-2026-32591 | 5.2 MEDIUM | Mirror-registry: quay: server-side request forgery in proxy cache upstream registry config |
No comments yet