Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Glances < 4.5.2 contains an information disclosure vulnerability caused by the web server running without authentication by default, letting remote attackers access sensitive system information including credentials, exploit requires no special privileges. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2026/CVE-2026-32596.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2026-32633 | 9.1 CRITICAL | Glances's Browser API Exposes Reusable Downstream Credentials via `/api/4/serverslist` |
| CVE-2026-32610 | 8.1 HIGH | Glances's Default CORS Configuration Allows Cross-Origin Credential Theft |
| CVE-2026-32634 | 8.1 HIGH | Glances Central Browser Autodiscovery Leaks Reusable Credentials to Zeroconf-Spoofed Serve |
| CVE-2026-32609 | 7.5 HIGH | Glances has Incomplete Secrets Redaction: /api/v4/args Endpoint Leaks Password Hash and SN |
| CVE-2026-32608 | 7.0 HIGH | Glances has a Command Injection via Process Names in Action Command Templates |
| CVE-2026-32611 | 7.0 HIGH | Glances has a SQL Injection in DuckDB Export via Unparameterized DDL Statements |
| CVE-2026-32632 | 5.9 MEDIUM | Glances's REST/WebUI Lacks Host Validation and Remains Exposed to DNS Rebinding |
No comments yet