Red Hat Quay 2.0.0

CPE Details

Red Hat Quay 2.0.0
2.0.0
2020-06-26
13h08 +00:00
2020-06-26
13h08 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:redhat:quay:2.0.0:*:*:*:*:*:*:*

Informations

Vendor

redhat

Product

quay

Version

2.0.0

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2019-3867 2021-03-18 17h04 +00:00 A vulnerability was found in the Quay web application. Sessions in the Quay web application never expire. An attacker, able to gain access to a session, could use it to control or delete a user's container repository. Red Hat Quay 2 and 3 are vulnerable to this issue.
4.1
Moyen
CVE-2020-14313 2020-08-11 11h42 +00:00 An information disclosure vulnerability was found in Red Hat Quay in versions before 3.3.1. This flaw allows an attacker who can create a build trigger in a repository, to disclose the names of robot accounts and the existence of private repositories within any namespace.
4.3
Moyen
CVE-2019-3865 2020-06-22 15h51 +00:00 A vulnerability was found in quay-2, where a stored XSS vulnerability has been found in the super user function of quay. Attackers are able to use the name field of service key to inject scripts and make it run when admin users try to change the name.
6.1
Moyen
CVE-2019-3864 2020-01-21 14h44 +00:00 A vulnerability was discovered in all quay-2 versions before quay-3.0.0, in the Quay web GUI where POST requests include a specific parameter which is used as a CSRF token. The token is not refreshed for every request or when a user logged out and in again. An attacker could use a leaked token to gain access to the system using the user's account.
8.8
Haute