Lucene search

K
RedhatQuay

5 matches found

CVE
CVE
added 2022/09/01 9:15 p.m.85 views

CVE-2022-2447

A flaw was found in Keystone. There is a time lag (up to one hour in a default configuration) between when security policy says a token should be revoked from when it is actually revoked. This could allow a remote administrator to secretly maintain access for longer than expected.

6.6CVSS6.4AI score0.00183EPSS
CVE
CVE
added 2023/11/07 8:15 p.m.67 views

CVE-2023-4956

A flaw was found in Quay. Clickjacking is when an attacker uses multiple transparent or opaque layers to trick a user into clicking on a button or link on another page when they intend to click on the top-level page. During the pentest, it has been detected that the config-editor page is vulnerable...

6.5CVSS4.7AI score0.00172EPSS
CVE
CVE
added 2020/01/02 5:15 p.m.65 views

CVE-2019-10205

A flaw was found in the way Red Hat Quay stores robot account tokens in plain text. An attacker able to perform database queries in the Red Hat Quay database could use the tokens to read or write container images stored in the registry.

6.3CVSS6.1AI score0.00109EPSS
CVE
CVE
added 2023/09/15 10:15 a.m.63 views

CVE-2023-4959

A flaw was found in Quay. Cross-site request forgery (CSRF) attacks force a user to perform unwanted actions in an application. During the pentest, it was detected that the config-editor page is vulnerable to CSRF. The config-editor page is used to configure the Quay instance. By coercing the victi...

6.5CVSS6.4AI score0.00104EPSS
CVE
CVE
added 2020/06/22 7:15 p.m.57 views

CVE-2019-3865

A vulnerability was found in quay-2, where a stored XSS vulnerability has been found in the super user function of quay. Attackers are able to use the name field of service key to inject scripts and make it run when admin users try to change the name.

6.1CVSS5.9AI score0.00394EPSS