Filtered by vendor Redhat Subscriptions
Filtered by product Pagure Subscriptions
Total 5 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2017-1002151 1 Redhat 1 Pagure 2024-09-17 7.5 High
Pagure 3.3.0 and earlier is vulnerable to loss of confidentially due to improper authorization
CVE-2016-1000007 1 Redhat 1 Pagure 2024-08-06 6.1 Medium
Pagure 2.2.1 XSS in raw file endpoint
CVE-2016-1000037 2 Fedoraproject, Redhat 3 Fedora, Enterprise Linux, Pagure 2024-08-06 6.1 Medium
Pagure: XSS possible in file attachment endpoint
CVE-2019-11556 2 Opensuse, Redhat 3 Backports Sle, Leap, Pagure 2024-08-04 6.1 Medium
Pagure before 5.6 allows XSS via the templates/blame.html blame view.
CVE-2019-7628 1 Redhat 1 Pagure 2024-08-04 N/A
Pagure 5.2 leaks API keys by e-mailing them to users. Few e-mail servers validate TLS certificates, so it is easy for man-in-the-middle attackers to read these e-mails and gain access to Pagure on behalf of other users. This issue is found in the API token expiration reminder cron job in files/api_key_expire_mail.py; disabling that job is also a viable solution. (E-mailing a substring of the API key was an attempted, but rejected, solution.)