Количество 5 332
Количество 5 332
GHSA-p7jp-3g8m-8m7m
A security issue allowed achieving Denial of Service attacks through memory exhaustion by uploading malicious artifacts in all previous GitLab versions through 13.0.1
GHSA-p7gw-xwgf-7w7c
GitLab has remediated an issue in GitLab EE affecting all versions from 18.5 before 18.5.5, 18.6 before 18.6.3, and 18.7 before 18.7.1 that could have allowed an authenticated user to modify instance-wide AI feature provider settings by exploiting missing authorization checks in GraphQL mutations.
GHSA-p79f-679r-6p3w
An issue was discovered in GitLab Community and Enterprise Edition before 11.6.10, 11.7.x before 11.7.6, and 11.8.x before 11.8.1. It has Incorrect Access Control.
GHSA-p6pm-7qxv-f8f3
Improper access control in GitLab CE/EE affecting all versions starting from 10.7 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2, allows an attacker in possession of a deploy token to access a project's disabled wiki.
GHSA-p66q-2x4m-xxx9
An issue was discovered in GitLab Community and Enterprise Edition before 11.1.7, 11.2.x before 11.2.4, and 11.3.x before 11.3.1. There is Cross Site Request Forgery (CSRF) in the Slack integration for issuing slash commands.
GHSA-p5m4-rr7j-g8gx
An issue was discovered in GitLab Community and Enterprise Edition before 11.2.7, 11.3.x before 11.3.8, and 11.4.x before 11.4.3. It has XSS.
GHSA-p5fq-m9jh-pjrv
An issue has been discovered in GitLab EE affecting all versions starting from 12.0 before 15.10.5, all versions starting from 15.11 before 15.11.1. A malicious group member may continue to commit to projects even from a restricted IP address.
GHSA-p598-8v9q-qjhx
In all versions of GitLab starting from 13.7, marshalled session keys were being stored in Redis.
GHSA-p58m-cp94-fm4f
An authorization issue was discovered in GitLab EE < 12.1.2, < 12.0.4, and < 11.11.6 allowing the merge request approval rules to be overridden without appropriate permissions.
GHSA-p4rh-pv9g-cw9x
Kubernetes cluster token disclosure in GitLab CE/EE 10.3 and later through 13.0.1 allows other group maintainers to view Kubernetes cluster token
GHSA-p4cp-frqx-5q69
Improper access control in GitLab CE/EE versions 10.7 prior to 14.7.7, 10.8 prior to 14.8.5, and 10.9 prior to 14.9.2 allows a malicious actor to obtain details of the latest commit in a private project via Merge Requests under certain circumstances
GHSA-p46f-r59p-v4jf
An improper access control vulnerability exists in Gitlab <v12.3.2, <v12.2.6, <v12.1.12 which would allow a blocked user would be able to use GIT clone and pull if he had obtained a CI/CD token before.
GHSA-p3jh-342h-w8hj
Under specialized conditions, GitLab may allow a user with an impersonation token to perform Git actions even if impersonation is disabled. This vulnerability is present in GitLab CE/EE versions before 13.12.9, 14.0.7, 14.1.2
GHSA-p39m-p32x-h8jq
GitLab 12.2.2 and below contains a security vulnerability that allows a guest user in a private project to see the merge request ID associated to an issue via the activity timeline.
GHSA-p38j-fpm5-5w57
An improper access control issue in GitLab CE/EE affecting all versions starting before 15.1.6, all versions from 15.2 before 15.2.4, all versions from 15.3 before 15.3.2 allows disclosure of pipeline status to unauthorized users.
GHSA-p32w-wm8h-w433
An information disclosure issue in GitLab CE/EE affecting all versions prior to 16.2.8, 16.3 prior to 16.3.5, and 16.4 prior to 16.4.1 allows an attacker to extract non-protected CI/CD variables by tricking a user to visit a fork with a malicious CI/CD configuration.
GHSA-p27q-qvwx-7mg5
An issue has been discovered in GitLab CE/EE affecting all versions from 16 before 17.3.7, 17.4 before 17.4.4, and 17.5 before 17.5.2. The vulnerability could allow an attacker to inject malicious JavaScript code in Analytics Dashboards through a specially crafted URL.
GHSA-p25q-vv7x-89px
GitLab Enterprise Edition (EE) 6.7 and later through 12.5 allows SSRF.
GHSA-p246-m8pm-4pjp
GitLab CE/EE since version 9.5 allows a high privilege user to obtain sensitive information from log files because the sensitive information was not correctly registered for log masking.
GHSA-mxm2-2266-373h
Improper access control in GitLab CE/EE version 10.5 and above allowed subgroup members with inherited access to a project from a parent group to still have access even after the subgroup is transferred
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
GHSA-p7jp-3g8m-8m7m A security issue allowed achieving Denial of Service attacks through memory exhaustion by uploading malicious artifacts in all previous GitLab versions through 13.0.1 | 0% Низкий | больше 3 лет назад | ||
GHSA-p7gw-xwgf-7w7c GitLab has remediated an issue in GitLab EE affecting all versions from 18.5 before 18.5.5, 18.6 before 18.6.3, and 18.7 before 18.7.1 that could have allowed an authenticated user to modify instance-wide AI feature provider settings by exploiting missing authorization checks in GraphQL mutations. | CVSS3: 6.5 | 0% Низкий | 27 дней назад | |
GHSA-p79f-679r-6p3w An issue was discovered in GitLab Community and Enterprise Edition before 11.6.10, 11.7.x before 11.7.6, and 11.8.x before 11.8.1. It has Incorrect Access Control. | CVSS3: 5.3 | 0% Низкий | больше 3 лет назад | |
GHSA-p6pm-7qxv-f8f3 Improper access control in GitLab CE/EE affecting all versions starting from 10.7 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2, allows an attacker in possession of a deploy token to access a project's disabled wiki. | 0% Низкий | около 4 лет назад | ||
GHSA-p66q-2x4m-xxx9 An issue was discovered in GitLab Community and Enterprise Edition before 11.1.7, 11.2.x before 11.2.4, and 11.3.x before 11.3.1. There is Cross Site Request Forgery (CSRF) in the Slack integration for issuing slash commands. | CVSS3: 8.8 | 0% Низкий | почти 3 года назад | |
GHSA-p5m4-rr7j-g8gx An issue was discovered in GitLab Community and Enterprise Edition before 11.2.7, 11.3.x before 11.3.8, and 11.4.x before 11.4.3. It has XSS. | CVSS3: 6.1 | 0% Низкий | больше 3 лет назад | |
GHSA-p5fq-m9jh-pjrv An issue has been discovered in GitLab EE affecting all versions starting from 12.0 before 15.10.5, all versions starting from 15.11 before 15.11.1. A malicious group member may continue to commit to projects even from a restricted IP address. | CVSS3: 6.5 | 1% Низкий | больше 2 лет назад | |
GHSA-p598-8v9q-qjhx In all versions of GitLab starting from 13.7, marshalled session keys were being stored in Redis. | 0% Низкий | больше 3 лет назад | ||
GHSA-p58m-cp94-fm4f An authorization issue was discovered in GitLab EE < 12.1.2, < 12.0.4, and < 11.11.6 allowing the merge request approval rules to be overridden without appropriate permissions. | CVSS3: 6.5 | 0% Низкий | больше 3 лет назад | |
GHSA-p4rh-pv9g-cw9x Kubernetes cluster token disclosure in GitLab CE/EE 10.3 and later through 13.0.1 allows other group maintainers to view Kubernetes cluster token | 0% Низкий | больше 3 лет назад | ||
GHSA-p4cp-frqx-5q69 Improper access control in GitLab CE/EE versions 10.7 prior to 14.7.7, 10.8 prior to 14.8.5, and 10.9 prior to 14.9.2 allows a malicious actor to obtain details of the latest commit in a private project via Merge Requests under certain circumstances | CVSS3: 4.3 | 0% Низкий | почти 4 года назад | |
GHSA-p46f-r59p-v4jf An improper access control vulnerability exists in Gitlab <v12.3.2, <v12.2.6, <v12.1.12 which would allow a blocked user would be able to use GIT clone and pull if he had obtained a CI/CD token before. | CVSS3: 8.8 | 0% Низкий | больше 3 лет назад | |
GHSA-p3jh-342h-w8hj Under specialized conditions, GitLab may allow a user with an impersonation token to perform Git actions even if impersonation is disabled. This vulnerability is present in GitLab CE/EE versions before 13.12.9, 14.0.7, 14.1.2 | 0% Низкий | больше 3 лет назад | ||
GHSA-p39m-p32x-h8jq GitLab 12.2.2 and below contains a security vulnerability that allows a guest user in a private project to see the merge request ID associated to an issue via the activity timeline. | CVSS3: 4.3 | 1% Низкий | больше 3 лет назад | |
GHSA-p38j-fpm5-5w57 An improper access control issue in GitLab CE/EE affecting all versions starting before 15.1.6, all versions from 15.2 before 15.2.4, all versions from 15.3 before 15.3.2 allows disclosure of pipeline status to unauthorized users. | CVSS3: 4.3 | 0% Низкий | больше 3 лет назад | |
GHSA-p32w-wm8h-w433 An information disclosure issue in GitLab CE/EE affecting all versions prior to 16.2.8, 16.3 prior to 16.3.5, and 16.4 prior to 16.4.1 allows an attacker to extract non-protected CI/CD variables by tricking a user to visit a fork with a malicious CI/CD configuration. | CVSS3: 4.3 | 0% Низкий | больше 2 лет назад | |
GHSA-p27q-qvwx-7mg5 An issue has been discovered in GitLab CE/EE affecting all versions from 16 before 17.3.7, 17.4 before 17.4.4, and 17.5 before 17.5.2. The vulnerability could allow an attacker to inject malicious JavaScript code in Analytics Dashboards through a specially crafted URL. | CVSS3: 6.1 | 3% Низкий | около 1 года назад | |
GHSA-p25q-vv7x-89px GitLab Enterprise Edition (EE) 6.7 and later through 12.5 allows SSRF. | 0% Низкий | больше 3 лет назад | ||
GHSA-p246-m8pm-4pjp GitLab CE/EE since version 9.5 allows a high privilege user to obtain sensitive information from log files because the sensitive information was not correctly registered for log masking. | CVSS3: 4.9 | 0% Низкий | больше 3 лет назад | |
GHSA-mxm2-2266-373h Improper access control in GitLab CE/EE version 10.5 and above allowed subgroup members with inherited access to a project from a parent group to still have access even after the subgroup is transferred | 0% Низкий | больше 3 лет назад |
Уязвимостей на страницу