Redhat

Quay

33 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.15%
  • Veröffentlicht 25.04.2024 18:15:09
  • Zuletzt bearbeitet 30.07.2025 14:41:38

A flaw was found when using mirror-registry to install Quay. It uses a default secret, which is stored in plain-text format in one of the configuration template files. This issue may lead to all instances of Quay deployed using mirror-registry to hav...

  • EPSS 0.23%
  • Veröffentlicht 07.11.2023 20:15:08
  • Zuletzt bearbeitet 21.11.2024 08:36:20

A flaw was found in Quay. Clickjacking is when an attacker uses multiple transparent or opaque layers to trick a user into clicking on a button or link on another page when they intend to click on the top-level page. During the pentest, it has been d...

Warnung Medienbericht Exploit
  • EPSS 94.4%
  • Veröffentlicht 10.10.2023 14:15:10
  • Zuletzt bearbeitet 12.05.2026 15:10:32

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.

  • EPSS 0.1%
  • Veröffentlicht 15.09.2023 10:15:07
  • Zuletzt bearbeitet 21.11.2024 08:36:20

A flaw was found in Quay. Cross-site request forgery (CSRF) attacks force a user to perform unwanted actions in an application. During the pentest, it was detected that the config-editor page is vulnerable to CSRF. The config-editor page is used to c...

  • EPSS 0.46%
  • Veröffentlicht 24.07.2023 16:15:12
  • Zuletzt bearbeitet 21.11.2024 08:17:09

A flaw was found in the Quay registry. While the image labels created through Quay undergo validation both in the UI and backend by applying a regex (validation.py), the same validation is not performed when the label comes from an image. This flaw ...

  • EPSS 0.38%
  • Veröffentlicht 09.09.2022 14:15:08
  • Zuletzt bearbeitet 03.11.2025 22:15:46

A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int("text"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes()...

Exploit
  • EPSS 0.47%
  • Veröffentlicht 01.09.2022 21:15:09
  • Zuletzt bearbeitet 21.11.2024 07:01:00

A flaw was found in Keystone. There is a time lag (up to one hour in a default configuration) between when security policy says a token should be revoked from when it is actually revoked. This could allow a remote administrator to secretly maintain a...

Exploit
  • EPSS 33.72%
  • Veröffentlicht 29.04.2022 16:15:08
  • Zuletzt bearbeitet 21.11.2024 06:40:17

A privilege escalation flaw was found in Podman. This flaw allows an attacker to publish a malicious image to a public registry. Once this image is downloaded by a potential victim, the vulnerability is triggered after a user runs the 'podman top' co...

Exploit
  • EPSS 8.66%
  • Veröffentlicht 03.03.2022 22:15:08
  • Zuletzt bearbeitet 21.11.2024 06:22:21

A directory traversal vulnerability was found in the ClairCore engine of Clair. An attacker can exploit this by supplying a crafted container image which, when scanned by Clair, allows for arbitrary file write on the filesystem, potentially allowing ...

  • EPSS 0.45%
  • Veröffentlicht 27.05.2021 14:15:07
  • Zuletzt bearbeitet 21.11.2024 05:21:53

A flaw was found in Red Hat Quay, where it has a persistent Cross-site Scripting (XSS) vulnerability when displaying a repository's notification. This flaw allows an attacker to trick a user into performing a malicious action to impersonate the targe...