Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-32202 | A flaw was found when using mirror-registry to install Quay. It uses a default database secret key, which is stored in plain-text format in one of the configuration template files. This issue may lead to all instances of Quay deployed using mirror-registry to have the same database secret key. This flaw allows a malicious actor to access sensitive information from Quay's database. |
Wed, 21 Jan 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Wed, 30 Jul 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:redhat:mirror_registry:-:*:*:*:*:*:*:* |
Tue, 24 Sep 2024 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2026-01-21T13:03:17.136Z
Reserved: 2024-04-10T18:03:02.203Z
Link: CVE-2024-3623
Updated: 2024-08-01T20:20:00.562Z
Status : Modified
Published: 2024-04-25T18:15:09.980
Modified: 2026-01-21T14:16:05.060
Link: CVE-2024-3623
OpenCVE Enrichment
No data.
EUVD