Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-32633 | 9.1 CRITICAL | Glances's Browser API Exposes Reusable Downstream Credentials via `/api/4/serverslist` |
| CVE-2026-32610 | 8.1 HIGH | Glances's Default CORS Configuration Allows Cross-Origin Credential Theft |
| CVE-2026-32634 | 8.1 HIGH | Glances Central Browser Autodiscovery Leaks Reusable Credentials to Zeroconf-Spoofed Serve |
| CVE-2026-32609 | 7.5 HIGH | Glances has Incomplete Secrets Redaction: /api/v4/args Endpoint Leaks Password Hash and SN |
| CVE-2026-32611 | 7.0 HIGH | Glances has a SQL Injection in DuckDB Export via Unparameterized DDL Statements |
| CVE-2026-32632 | 5.9 MEDIUM | Glances's REST/WebUI Lacks Host Validation and Remains Exposed to DNS Rebinding |
| CVE-2026-32596 | Glances exposes the REST API without authentication |
No comments yet