{"uuid": "66366075-fc37-497b-96a5-e78d8ef813fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-52282", "type": "seen", "source": "https://t.me/cvedetector/22729", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-52282 - SUSE Rancher Sensitive Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-52282 \nPublished : April 11, 2025, 11:15 a.m. | 18\u00a0minutes ago \nDescription : A Exposure of Sensitive Information to an Unauthorized Actor vulnerability in SUSE rancher allowing any users with GET  \n access to the Rancher Manager Apps Catalog to read any sensitive information that are   \ncontained within the Apps\u2019 values. Additionally, the same information   \nleaks into auditing logs when the audit level is set to equal or above   \n2.  \n  \nThis issue affects rancher: from 2.8.0 before 2.8.10, from 2.9.0 before 2.9.4. \nSeverity: 6.2 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-11T13:56:35.000000Z"}