Show filters
29 Total Results
Displaying 11-20 of 29
Sort by:
Attacker Value
Unknown
CVE-2020-10735
Disclosure Date: September 09, 2022 (last updated December 22, 2024)
A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int("text"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not affected). The highest threat from this vulnerability is to system availability.
0
Attacker Value
Unknown
CVE-2022-2447
Disclosure Date: September 01, 2022 (last updated October 08, 2023)
A flaw was found in Keystone. There is a time lag (up to one hour in a default configuration) between when security policy says a token should be revoked from when it is actually revoked. This could allow a remote administrator to secretly maintain access for longer than expected.
0
Attacker Value
Unknown
CVE-2022-1227
Disclosure Date: April 29, 2022 (last updated October 07, 2023)
A privilege escalation flaw was found in Podman. This flaw allows an attacker to publish a malicious image to a public registry. Once this image is downloaded by a potential victim, the vulnerability is triggered after a user runs the 'podman top' command. This action gives the attacker access to the host filesystem, leading to information disclosure or denial of service.
0
Attacker Value
Unknown
CVE-2021-3762
Disclosure Date: March 03, 2022 (last updated October 07, 2023)
A directory traversal vulnerability was found in the ClairCore engine of Clair. An attacker can exploit this by supplying a crafted container image which, when scanned by Clair, allows for arbitrary file write on the filesystem, potentially allowing for remote code execution.
0
Attacker Value
Unknown
CVE-2020-27832
Disclosure Date: May 27, 2021 (last updated February 22, 2025)
A flaw was found in Red Hat Quay, where it has a persistent Cross-site Scripting (XSS) vulnerability when displaying a repository's notification. This flaw allows an attacker to trick a user into performing a malicious action to impersonate the target user. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
0
Attacker Value
Unknown
CVE-2020-27831
Disclosure Date: May 27, 2021 (last updated February 22, 2025)
A flaw was found in Red Hat Quay, where it does not properly protect the authorization token when authorizing email addresses for repository email notifications. This flaw allows an attacker to add email addresses they do not own to repository notifications.
0
Attacker Value
Unknown
CVE-2019-3867
Disclosure Date: March 18, 2021 (last updated February 22, 2025)
A vulnerability was found in the Quay web application. Sessions in the Quay web application never expire. An attacker, able to gain access to a session, could use it to control or delete a user's container repository. Red Hat Quay 2 and 3 are vulnerable to this issue.
0
Attacker Value
Unknown
CVE-2020-14313
Disclosure Date: August 11, 2020 (last updated November 28, 2024)
An information disclosure vulnerability was found in Red Hat Quay in versions before 3.3.1. This flaw allows an attacker who can create a build trigger in a repository, to disclose the names of robot accounts and the existence of private repositories within any namespace.
0
Attacker Value
Unknown
CVE-2019-3865
Disclosure Date: June 22, 2020 (last updated February 21, 2025)
A vulnerability was found in quay-2, where a stored XSS vulnerability has been found in the super user function of quay. Attackers are able to use the name field of service key to inject scripts and make it run when admin users try to change the name.
0
Attacker Value
Unknown
CVE-2019-3864
Disclosure Date: January 21, 2020 (last updated February 21, 2025)
A vulnerability was discovered in all quay-2 versions before quay-3.0.0, in the Quay web GUI where POST requests include a specific parameter which is used as a CSRF token. The token is not refreshed for every request or when a user logged out and in again. An attacker could use a leaked token to gain access to the system using the user's account.
0