Количество 4
Количество 4
CVE-2024-3623
A flaw was found when using mirror-registry to install Quay. It uses a default database secret key, which is stored in plain-text format in one of the configuration template files. This issue may lead to all instances of Quay deployed using mirror-registry to have the same database secret key. This flaw allows a malicious actor to access sensitive information from Quay's database.
CVE-2024-3623
A flaw was found when using mirror-registry to install Quay. It uses a default database secret key, which is stored in plain-text format in one of the configuration template files. This issue may lead to all instances of Quay deployed using mirror-registry to have the same database secret key. This flaw allows a malicious actor to access sensitive information from Quay's database.
GHSA-frqc-23qh-4rq8
A flaw was found when using mirror-registry to install Quay. It uses a default database secret key, which is stored in plain-text format in one of the configuration template files. This issue may lead to all instances of Quay deployed using mirror-registry to have the same database secret key. This flaw allows a malicious actor to access sensitive information from Quay's database.
BDU:2024-03903
Уязвимость программного средства создания локальных копий удаленного реестра образов контейнеров Mirror registry for Red Hat OpenShift, связанная с незашифрованным хранением критичной информации, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2024-3623 A flaw was found when using mirror-registry to install Quay. It uses a default database secret key, which is stored in plain-text format in one of the configuration template files. This issue may lead to all instances of Quay deployed using mirror-registry to have the same database secret key. This flaw allows a malicious actor to access sensitive information from Quay's database. | CVSS3: 8.1 | 0% Низкий | почти 2 года назад | |
CVE-2024-3623 A flaw was found when using mirror-registry to install Quay. It uses a default database secret key, which is stored in plain-text format in one of the configuration template files. This issue may lead to all instances of Quay deployed using mirror-registry to have the same database secret key. This flaw allows a malicious actor to access sensitive information from Quay's database. | CVSS3: 6.5 | 0% Низкий | почти 2 года назад | |
GHSA-frqc-23qh-4rq8 A flaw was found when using mirror-registry to install Quay. It uses a default database secret key, which is stored in plain-text format in one of the configuration template files. This issue may lead to all instances of Quay deployed using mirror-registry to have the same database secret key. This flaw allows a malicious actor to access sensitive information from Quay's database. | CVSS3: 8.1 | 0% Низкий | почти 2 года назад | |
BDU:2024-03903 Уязвимость программного средства создания локальных копий удаленного реестра образов контейнеров Mirror registry for Red Hat OpenShift, связанная с незашифрованным хранением критичной информации, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации | CVSS3: 8.1 | 0% Низкий | почти 2 года назад |
Уязвимостей на страницу