cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2022-3248,https://securityvulnerability.io/vulnerability/CVE-2022-3248,"Openshift api admission checks does not enforce ""custom-host"" permissions","A flaw was found in OpenShift API, as admission checks do not enforce ""custom-host"" permissions. This issue could allow an attacker to violate the boundaries, as permissions will not be applied.",Red Hat,"Kubernetes,Red Hat Advanced Cluster Management For Kubernetes 2,Red Hat Ansible Automation Platform 1.2,Red Hat Ansible Tower 3,Red Hat Openshift Container Platform 3.11,Red Hat Openshift Container Platform 4",4.4,MEDIUM,0.0006900000153109431,false,,false,false,false,,,false,false,,2023-10-05T13:28:27.973Z,0 CVE-2020-10782,https://securityvulnerability.io/vulnerability/CVE-2020-10782,Sensitive Information Exposure in Ansible by Red Hat,"A vulnerability in Ansible version 3.7.0 allows for the exposure of sensitive information, such as tokens and secrets, due to improperly set world-readable permissions in the rsyslog configuration file. This flaw poses a risk to confidentiality as unintended access to sensitive data may occur. Users are encouraged to update to Ansible version 3.7.1, where this issue has been addressed.",Red Hat,Ansible Tower,6.5,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2020-06-18T12:49:07.000Z,0 CVE-2016-7070,https://securityvulnerability.io/vulnerability/CVE-2016-7070,,"A privilege escalation flaw was found in the Ansible Tower. When Tower before 3.0.3 deploys a PostgreSQL database, it incorrectly configures the trust level of postgres user. An attacker could use this vulnerability to gain admin level access to the database.",Red Hat,Ansible Tower,8,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2018-09-11T13:00:00.000Z,0 CVE-2017-7528,https://securityvulnerability.io/vulnerability/CVE-2017-7528,,Ansible Tower as shipped with Red Hat CloudForms Management Engine 5 is vulnerable to CRLF Injection. It was found that X-Forwarded-For header allows internal servers to deploy other systems (using callback).,Red Hat,Ansible Tower,5.2,MEDIUM,0.000590000010561198,false,,false,false,false,,,false,false,,2018-08-22T16:00:00.000Z,0 CVE-2018-10884,https://securityvulnerability.io/vulnerability/CVE-2018-10884,,Ansible Tower before versions 3.1.8 and 3.2.6 is vulnerable to cross-site request forgery (CSRF) in awx/api/authentication.py. An attacker could exploit this by tricking already authenticated users into visiting a malicious site and hijacking the authtoken cookie.,Red Hat,Ansible-tower,8.8,HIGH,0.0009800000116229057,false,,false,false,false,,,false,false,,2018-08-22T14:00:00.000Z,0 CVE-2017-12148,https://securityvulnerability.io/vulnerability/CVE-2017-12148,,"A flaw was found in Ansible Tower's interface before 3.1.5 and 3.2.0 with SCM repositories. If a Tower project (SCM repository) definition does not have the 'delete before update' flag set, an attacker with commit access to the upstream playbook source repository could create a Trojan playbook that, when executed by Tower, modifies the checked out SCM repository to add git hooks. These git hooks could, in turn, cause arbitrary command and code execution as the user Tower runs as.",Red Hat,Ansible Tower,8.4,HIGH,0.0008999999845400453,false,,false,false,false,,,false,false,,2018-07-27T16:00:00.000Z,0 CVE-2018-1104,https://securityvulnerability.io/vulnerability/CVE-2018-1104,,Ansible Tower through version 3.2.3 has a vulnerability that allows users only with access to define variables for a job template to execute arbitrary code on the Tower server.,Red Hat,Ansible Tower,8.8,HIGH,0.003389999968931079,false,,false,false,false,,,false,false,,2018-05-02T19:29:00.000Z,0 CVE-2018-1101,https://securityvulnerability.io/vulnerability/CVE-2018-1101,,"Ansible Tower before version 3.2.4 has a flaw in the management of system and organization administrators that allows for privilege escalation. System administrators that are members of organizations can have their passwords reset by organization administrators, allowing organization administrators access to the entire system.",Red Hat,Ansible Tower,7.2,HIGH,0.0024500000290572643,false,,false,false,false,,,false,false,,2018-05-02T18:29:00.000Z,0