Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC
| CVE-2026-32633 | 9.1 CRITICAL | Glances's Browser API Exposes Reusable Downstream Credentials via `/api/4/serverslist` |
| CVE-2026-32610 | 8.1 HIGH | Glances's Default CORS Configuration Allows Cross-Origin Credential Theft |
| CVE-2026-32609 | 7.5 HIGH | Glances has Incomplete Secrets Redaction: /api/v4/args Endpoint Leaks Password Hash and SN |
| CVE-2026-32608 | 7.0 HIGH | Glances has a Command Injection via Process Names in Action Command Templates |
| CVE-2026-32611 | 7.0 HIGH | Glances has a SQL Injection in DuckDB Export via Unparameterized DDL Statements |
| CVE-2026-32632 | 5.9 MEDIUM | Glances's REST/WebUI Lacks Host Validation and Remains Exposed to DNS Rebinding |
| CVE-2026-32596 | Glances exposes the REST API without authentication |
No comments yet