Total
5 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2019-11556 | 2 Opensuse, Redhat | 3 Backports Sle, Leap, Pagure | 2022-11-16 | 4.3 MEDIUM | 6.1 MEDIUM |
Pagure before 5.6 allows XSS via the templates/blame.html blame view. | |||||
CVE-2016-1000007 | 1 Redhat | 1 Pagure | 2020-05-14 | 4.3 MEDIUM | 6.1 MEDIUM |
Pagure 2.2.1 XSS in raw file endpoint | |||||
CVE-2016-1000037 | 2 Fedoraproject, Redhat | 3 Fedora, Enterprise Linux, Pagure | 2019-11-08 | 4.3 MEDIUM | 6.1 MEDIUM |
Pagure: XSS possible in file attachment endpoint | |||||
CVE-2017-1002151 | 1 Redhat | 1 Pagure | 2019-10-16 | 5.0 MEDIUM | 7.5 HIGH |
Pagure 3.3.0 and earlier is vulnerable to loss of confidentially due to improper authorization | |||||
CVE-2019-7628 | 1 Redhat | 1 Pagure | 2019-02-21 | 4.3 MEDIUM | 5.9 MEDIUM |
Pagure 5.2 leaks API keys by e-mailing them to users. Few e-mail servers validate TLS certificates, so it is easy for man-in-the-middle attackers to read these e-mails and gain access to Pagure on behalf of other users. This issue is found in the API token expiration reminder cron job in files/api_key_expire_mail.py; disabling that job is also a viable solution. (E-mailing a substring of the API key was an attempted, but rejected, solution.) |