Количество 5 501
Количество 5 501
GHSA-m77g-m5w2-j2f3
GitLab 9.5.9 through 12.9 is vulnerable to stored XSS in an admin notification feature.
GHSA-m766-xfqm-qm37
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 13.1 before 18.4.6, 18.5 before 18.5.4, and 18.6 before 18.6.2 that could have allowed an authenticated user to bypass WebAuthn two-factor authentication by manipulating the session state under certain conditions.
GHSA-m6pw-2x85-c738
In all versions of GitLab CE/EE since version 11.11, an instance that has the setting to disable Repo by URL import enabled is bypassed by an attacker making a crafted API call.
GHSA-m6m2-gm49-gp5r
GitLab 12.6 through 12.9 is vulnerable to a privilege escalation that allows an external user to create a personal snippet through the API.
GHSA-m668-xfwp-34x6
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 8.0 before 18.6.6, 18.7 before 18.7.4, and 18.8 before 18.8.4 that, under certain conditions could have allowed an unauthenticated user to cause denial of service by uploading malicious files.
GHSA-m62r-8f87-wrg8
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 9.3 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 that under certain conditions could have allowed an authenticated user to cause a denial of service due to improper handling of webhook response data.
GHSA-m5gx-r8rq-3635
An information disclosure exists in < 12.3.2, < 12.2.6, and < 12.1.12 for GitLab Community Edition (CE) and Enterprise Edition (EE). The path of a private project, that used to be public, would be disclosed in the unsubscribe email link of issues and merge requests.
GHSA-m4hq-98c3-4xmx
A vulnerability was discovered in GitLab CE and EE affecting all versions starting 16.0 prior to 16.2.8, 16.3 prior to 16.3.5, and 16.4 prior to 16.4.1. An authenticated attacker could perform arbitrary pipeline execution under the context of another user.
GHSA-m48m-pq7g-rfh9
A potential DOS vulnerability was discovered in GitLab CE/EE starting with version 13.7. The stripping of EXIF data from certain images resulted in high CPU usage.
GHSA-m393-h7jj-5g9w
GitLab 12.2.3 contains a security vulnerability that allows a user to affect the availability of the service through a Denial of Service attack in Issue Comments.
GHSA-m37q-w59j-4vr4
An issue has been discovered in GitLab CE/EE affecting versions 13.0 to 14.6.5, 14.7 to 14.7.4, and 14.8 to 14.8.2. Private GitLab instances with restricted sign-ups may be vulnerable to user enumeration to unauthenticated users through the GraphQL API.
GHSA-m2g4-fcc3-wp4v
An issue has been discovered in GitLab affecting versions starting with 13.5 up to 13.9.7. Improper permission check could allow the change of timestamp for issue creation or update.
GHSA-m25p-vj7m-w42v
An information disclosure exists in < 12.3.2, < 12.2.6, and < 12.1.12 for GitLab Community Edition (CE) and Enterprise Edition (EE) where the assignee(s) of a confidential issue in a private project would be disclosed to a guest via milestones.
GHSA-m24j-g9jw-ggjj
GitLab Enterprise Edition (EE) 10.8 and later through 12.5 has Incorrect Access Control.
GHSA-jxx7-c7v6-wh2p
GitLab has remediated an issue in GitLab EE affecting all versions from 18.4 before 18.5.5, 18.6 before 18.6.3, and 18.7 before 18.7.1 that could have allowed an authenticated user to access and utilize AI model settings from unauthorized namespaces by manipulating namespace identifiers in API requests.
GHSA-jx85-pcwq-c9wc
An issue has been discovered in GitLab affecting all versions of Gitlab EE/CE before 12.6.7. A potential resource exhaustion issue that allowed running or pending jobs to continue even after project was deleted.
GHSA-jwfx-6cm3-63qg
An issue was discovered in GitLab Community and Enterprise Edition before 12.4. It has Incorrect Access Control.
GHSA-jvc7-79q4-7754
In all versions of GitLab CE/EE since version 8.12, an authenticated low-privileged malicious user may create a project with unlimited repository size by modifying values in a project export.
GHSA-jrrv-jm33-8jrv
Improper authorization in the vulnerability report feature in GitLab EE affecting all versions since 13.1 allowed a reporter to access vulnerability data
GHSA-jrjm-wgrh-4c93
An issue was discovered in GitLab Community and Enterprise Edition 8.17 through 12.4 in the Search feature provided by Elasticsearch integration.. It has Insecure Permissions (issue 1 of 4).
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
GHSA-m77g-m5w2-j2f3 GitLab 9.5.9 through 12.9 is vulnerable to stored XSS in an admin notification feature. | 0% Низкий | почти 4 года назад | ||
GHSA-m766-xfqm-qm37 GitLab has remediated an issue in GitLab CE/EE affecting all versions from 13.1 before 18.4.6, 18.5 before 18.5.4, and 18.6 before 18.6.2 that could have allowed an authenticated user to bypass WebAuthn two-factor authentication by manipulating the session state under certain conditions. | CVSS3: 6.8 | 0% Низкий | 4 месяца назад | |
GHSA-m6pw-2x85-c738 In all versions of GitLab CE/EE since version 11.11, an instance that has the setting to disable Repo by URL import enabled is bypassed by an attacker making a crafted API call. | 0% Низкий | почти 4 года назад | ||
GHSA-m6m2-gm49-gp5r GitLab 12.6 through 12.9 is vulnerable to a privilege escalation that allows an external user to create a personal snippet through the API. | 0% Низкий | почти 4 года назад | ||
GHSA-m668-xfwp-34x6 GitLab has remediated an issue in GitLab CE/EE affecting all versions from 8.0 before 18.6.6, 18.7 before 18.7.4, and 18.8 before 18.8.4 that, under certain conditions could have allowed an unauthenticated user to cause denial of service by uploading malicious files. | CVSS3: 6.5 | 0% Низкий | около 2 месяцев назад | |
GHSA-m62r-8f87-wrg8 GitLab has remediated an issue in GitLab CE/EE affecting all versions from 9.3 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 that under certain conditions could have allowed an authenticated user to cause a denial of service due to improper handling of webhook response data. | CVSS3: 6.5 | 0% Низкий | 17 дней назад | |
GHSA-m5gx-r8rq-3635 An information disclosure exists in < 12.3.2, < 12.2.6, and < 12.1.12 for GitLab Community Edition (CE) and Enterprise Edition (EE). The path of a private project, that used to be public, would be disclosed in the unsubscribe email link of issues and merge requests. | 0% Низкий | почти 4 года назад | ||
GHSA-m4hq-98c3-4xmx A vulnerability was discovered in GitLab CE and EE affecting all versions starting 16.0 prior to 16.2.8, 16.3 prior to 16.3.5, and 16.4 prior to 16.4.1. An authenticated attacker could perform arbitrary pipeline execution under the context of another user. | CVSS3: 8.2 | 0% Низкий | больше 2 лет назад | |
GHSA-m48m-pq7g-rfh9 A potential DOS vulnerability was discovered in GitLab CE/EE starting with version 13.7. The stripping of EXIF data from certain images resulted in high CPU usage. | 0% Низкий | почти 4 года назад | ||
GHSA-m393-h7jj-5g9w GitLab 12.2.3 contains a security vulnerability that allows a user to affect the availability of the service through a Denial of Service attack in Issue Comments. | CVSS3: 6.5 | 0% Низкий | почти 4 года назад | |
GHSA-m37q-w59j-4vr4 An issue has been discovered in GitLab CE/EE affecting versions 13.0 to 14.6.5, 14.7 to 14.7.4, and 14.8 to 14.8.2. Private GitLab instances with restricted sign-ups may be vulnerable to user enumeration to unauthenticated users through the GraphQL API. | CVSS3: 5.3 | 92% Критический | почти 4 года назад | |
GHSA-m2g4-fcc3-wp4v An issue has been discovered in GitLab affecting versions starting with 13.5 up to 13.9.7. Improper permission check could allow the change of timestamp for issue creation or update. | CVSS3: 4.3 | 0% Низкий | почти 4 года назад | |
GHSA-m25p-vj7m-w42v An information disclosure exists in < 12.3.2, < 12.2.6, and < 12.1.12 for GitLab Community Edition (CE) and Enterprise Edition (EE) where the assignee(s) of a confidential issue in a private project would be disclosed to a guest via milestones. | 0% Низкий | почти 4 года назад | ||
GHSA-m24j-g9jw-ggjj GitLab Enterprise Edition (EE) 10.8 and later through 12.5 has Incorrect Access Control. | 0% Низкий | почти 4 года назад | ||
GHSA-jxx7-c7v6-wh2p GitLab has remediated an issue in GitLab EE affecting all versions from 18.4 before 18.5.5, 18.6 before 18.6.3, and 18.7 before 18.7.1 that could have allowed an authenticated user to access and utilize AI model settings from unauthorized namespaces by manipulating namespace identifiers in API requests. | CVSS3: 7.1 | 0% Низкий | 3 месяца назад | |
GHSA-jx85-pcwq-c9wc An issue has been discovered in GitLab affecting all versions of Gitlab EE/CE before 12.6.7. A potential resource exhaustion issue that allowed running or pending jobs to continue even after project was deleted. | CVSS3: 4.3 | 0% Низкий | почти 4 года назад | |
GHSA-jwfx-6cm3-63qg An issue was discovered in GitLab Community and Enterprise Edition before 12.4. It has Incorrect Access Control. | 0% Низкий | почти 4 года назад | ||
GHSA-jvc7-79q4-7754 In all versions of GitLab CE/EE since version 8.12, an authenticated low-privileged malicious user may create a project with unlimited repository size by modifying values in a project export. | 0% Низкий | почти 4 года назад | ||
GHSA-jrrv-jm33-8jrv Improper authorization in the vulnerability report feature in GitLab EE affecting all versions since 13.1 allowed a reporter to access vulnerability data | CVSS3: 6.5 | 0% Низкий | почти 4 года назад | |
GHSA-jrjm-wgrh-4c93 An issue was discovered in GitLab Community and Enterprise Edition 8.17 through 12.4 in the Search feature provided by Elasticsearch integration.. It has Insecure Permissions (issue 1 of 4). | 0% Низкий | почти 4 года назад |
Уязвимостей на страницу