Show filters
3,830 Total Results
Displaying 81-90 of 3,830
Sort by:
Attacker Value
Unknown

CVE-2023-32194

Disclosure Date: October 16, 2024 (last updated October 17, 2024)
A vulnerability has been identified when granting a create or * global role for a resource type of "namespaces"; no matter the API group, the subject will receive * permissions for core namespaces. This can lead to someone being capable of accessing, creating, updating, or deleting a namespace in the project.
0
Attacker Value
Unknown

CVE-2023-32193

Disclosure Date: October 16, 2024 (last updated October 17, 2024)
A vulnerability has been identified in which unauthenticated cross-site scripting (XSS) in Norman's public API endpoint can be exploited. This can lead to an attacker exploiting the vulnerability to trigger JavaScript code and execute commands remotely.
0
Attacker Value
Unknown

CVE-2023-32192

Disclosure Date: October 16, 2024 (last updated October 17, 2024)
A vulnerability has been identified in which unauthenticated cross-site scripting (XSS) in the API Server's public API endpoint can be exploited, allowing an attacker to execute arbitrary JavaScript code in the victim browser
0
Attacker Value
Unknown

CVE-2023-32191

Disclosure Date: October 16, 2024 (last updated October 17, 2024)
When RKE provisions a cluster, it stores the cluster state in a configmap called `full-cluster-state` inside the `kube-system` namespace of the cluster itself. The information available in there allows non-admin users to escalate to admin.
0
Attacker Value
Unknown

CVE-2023-32190

Disclosure Date: October 16, 2024 (last updated October 17, 2024)
mlocate's %post script allows RUN_UPDATEDB_AS user to make arbitrary files world readable by abusing insecure file operations that run with root privileges.
0
Attacker Value
Unknown

CVE-2023-32188

Disclosure Date: October 16, 2024 (last updated October 16, 2024)
A user can reverse engineer the JWT token (JSON Web Token) used in authentication for Manager and API access, forging a valid NeuVector Token to perform malicious activity in NeuVector. This can lead to an RCE.
0
Attacker Value
Unknown

CVE-2023-22650

Disclosure Date: October 16, 2024 (last updated October 16, 2024)
A vulnerability has been identified in which Rancher does not automatically clean up a user which has been deleted from the configured authentication provider (AP). This characteristic also applies to disabled or revoked users, Rancher will not reflect these modifications which may leave the user’s tokens still usable.
0
Attacker Value
Unknown

CVE-2023-22649

Disclosure Date: October 16, 2024 (last updated October 31, 2024)
A vulnerability has been identified which may lead to sensitive data being leaked into Rancher's audit logs. [Rancher Audit Logging](https://ranchermanager.docs.rancher.com/how-to-guides/advanced-user-guides/enable-api-audit-log) is an opt-in feature, only deployments that have it enabled and have [AUDIT_LEVEL](https://ranchermanager.docs.rancher.com/how-to-guides/advanced-user-guides/enable-api-audit-log#audit-log-levels) set to `1 or above` are impacted by this issue.
Attacker Value
Unknown

CVE-2024-23301

Disclosure Date: January 12, 2024 (last updated January 23, 2024)
Relax-and-Recover (aka ReaR) through 2.7 creates a world-readable initrd when using GRUB_RESCUE=y. This allows local attackers to gain access to system secrets otherwise only readable by root.
Attacker Value
Unknown

CVE-2020-10676

Disclosure Date: December 12, 2023 (last updated December 15, 2023)
In Rancher 2.x before 2.6.13 and 2.7.x before 2.7.4, an incorrectly applied authorization check allows users who have certain access to a namespace to move that namespace to a different project.