Filtered by vendor Redhat
Subscriptions
Filtered by product Pagure
Subscriptions
Total
5 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2017-1002151 | 1 Redhat | 1 Pagure | 2024-09-17 | 7.5 High |
Pagure 3.3.0 and earlier is vulnerable to loss of confidentially due to improper authorization | ||||
CVE-2016-1000007 | 1 Redhat | 1 Pagure | 2024-08-06 | 6.1 Medium |
Pagure 2.2.1 XSS in raw file endpoint | ||||
CVE-2016-1000037 | 2 Fedoraproject, Redhat | 3 Fedora, Enterprise Linux, Pagure | 2024-08-06 | 6.1 Medium |
Pagure: XSS possible in file attachment endpoint | ||||
CVE-2019-11556 | 2 Opensuse, Redhat | 3 Backports Sle, Leap, Pagure | 2024-08-04 | 6.1 Medium |
Pagure before 5.6 allows XSS via the templates/blame.html blame view. | ||||
CVE-2019-7628 | 1 Redhat | 1 Pagure | 2024-08-04 | N/A |
Pagure 5.2 leaks API keys by e-mailing them to users. Few e-mail servers validate TLS certificates, so it is easy for man-in-the-middle attackers to read these e-mails and gain access to Pagure on behalf of other users. This issue is found in the API token expiration reminder cron job in files/api_key_expire_mail.py; disabling that job is also a viable solution. (E-mailing a substring of the API key was an attempted, but rejected, solution.) |
Page 1 of 1.