Логотип exploitDog
bind:CVE-2020-13297
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-13297

Количество 4

Количество 4

ubuntu логотип

CVE-2020-13297

больше 5 лет назад

A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. When 2 factor authentication was enabled for groups, a malicious user could bypass that restriction by sending a specific query to the API endpoint.

CVSS3: 3.8
EPSS: Низкий
nvd логотип

CVE-2020-13297

больше 5 лет назад

A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. When 2 factor authentication was enabled for groups, a malicious user could bypass that restriction by sending a specific query to the API endpoint.

CVSS3: 3.8
EPSS: Низкий
debian логотип

CVE-2020-13297

больше 5 лет назад

A vulnerability was discovered in GitLab versions before 13.1.10, 13.2 ...

CVSS3: 3.8
EPSS: Низкий
github логотип

GHSA-5g3m-ghqj-8gwf

больше 3 лет назад

A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. When 2 factor authentication was enabled for groups, a malicious user could bypass that restriction by sending a specific query to the API endpoint.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2020-13297

A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. When 2 factor authentication was enabled for groups, a malicious user could bypass that restriction by sending a specific query to the API endpoint.

CVSS3: 3.8
0%
Низкий
больше 5 лет назад
nvd логотип
CVE-2020-13297

A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. When 2 factor authentication was enabled for groups, a malicious user could bypass that restriction by sending a specific query to the API endpoint.

CVSS3: 3.8
0%
Низкий
больше 5 лет назад
debian логотип
CVE-2020-13297

A vulnerability was discovered in GitLab versions before 13.1.10, 13.2 ...

CVSS3: 3.8
0%
Низкий
больше 5 лет назад
github логотип
GHSA-5g3m-ghqj-8gwf

A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. When 2 factor authentication was enabled for groups, a malicious user could bypass that restriction by sending a specific query to the API endpoint.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу