Show filters
3,830 Total Results
Displaying 81-90 of 3,830
Sort by:
Attacker Value
Unknown
CVE-2023-32194
Disclosure Date: October 16, 2024 (last updated October 17, 2024)
A vulnerability has been identified when granting a create or * global role for a resource type of "namespaces"; no matter the API group, the subject will receive *
permissions for core namespaces. This can lead to someone being capable
of accessing, creating, updating, or deleting a namespace in the
project.
0
Attacker Value
Unknown
CVE-2023-32193
Disclosure Date: October 16, 2024 (last updated October 17, 2024)
A vulnerability has been identified in which unauthenticated cross-site
scripting (XSS) in Norman's public API endpoint can be exploited. This
can lead to an attacker exploiting the vulnerability to trigger
JavaScript code and execute commands remotely.
0
Attacker Value
Unknown
CVE-2023-32192
Disclosure Date: October 16, 2024 (last updated October 17, 2024)
A vulnerability has been identified in which unauthenticated cross-site
scripting (XSS) in the API Server's public API endpoint can be
exploited, allowing an attacker to execute arbitrary JavaScript code in the victim browser
0
Attacker Value
Unknown
CVE-2023-32191
Disclosure Date: October 16, 2024 (last updated October 17, 2024)
When RKE provisions a cluster, it stores the cluster state in a configmap called `full-cluster-state` inside the `kube-system` namespace of the cluster itself. The information available in there allows non-admin users to escalate to admin.
0
Attacker Value
Unknown
CVE-2023-32190
Disclosure Date: October 16, 2024 (last updated October 17, 2024)
mlocate's %post script allows RUN_UPDATEDB_AS user to make arbitrary files world readable by abusing insecure file operations that run with root privileges.
0
Attacker Value
Unknown
CVE-2023-32188
Disclosure Date: October 16, 2024 (last updated October 16, 2024)
A user can reverse engineer the JWT token (JSON Web Token) used in authentication for Manager and API access, forging a valid NeuVector Token to perform malicious activity in NeuVector. This can lead to an RCE.
0
Attacker Value
Unknown
CVE-2023-22650
Disclosure Date: October 16, 2024 (last updated October 16, 2024)
A vulnerability has been identified in which Rancher does not automatically clean up a user which has been deleted from the configured authentication provider (AP). This characteristic also applies to disabled or revoked users, Rancher will not reflect these modifications which may leave the user’s tokens still usable.
0
Attacker Value
Unknown
CVE-2023-22649
Disclosure Date: October 16, 2024 (last updated October 31, 2024)
A vulnerability has been identified which may lead to sensitive data being leaked into Rancher's audit logs. [Rancher Audit Logging](https://ranchermanager.docs.rancher.com/how-to-guides/advanced-user-guides/enable-api-audit-log) is an opt-in feature, only deployments that have it enabled and have [AUDIT_LEVEL](https://ranchermanager.docs.rancher.com/how-to-guides/advanced-user-guides/enable-api-audit-log#audit-log-levels) set to `1 or above` are impacted by this issue.
0
Attacker Value
Unknown
CVE-2024-23301
Disclosure Date: January 12, 2024 (last updated January 23, 2024)
Relax-and-Recover (aka ReaR) through 2.7 creates a world-readable initrd when using GRUB_RESCUE=y. This allows local attackers to gain access to system secrets otherwise only readable by root.
0
Attacker Value
Unknown
CVE-2020-10676
Disclosure Date: December 12, 2023 (last updated December 15, 2023)
In Rancher 2.x before 2.6.13 and 2.7.x before 2.7.4, an incorrectly applied authorization check allows users who have certain access to a namespace to move that namespace to a different project.
0