Filtered by vendor Gitlab
Subscriptions
Total
981 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2021-22188 | 1 Gitlab | 1 Gitlab | 2021-03-10 | 5.3 Medium |
An issue has been discovered in GitLab affecting all versions starting with 13.0. Confidential issue titles in Gitlab were readable by an unauthorised user via branch logs. | ||||
CVE-2021-22183 | 1 Gitlab | 1 Gitlab | 2021-03-10 | 5.4 Medium |
An issue has been discovered in GitLab affecting all versions starting with 11.8. GitLab was vulnerable to a stored XSS in the epics page, which could be exploited with user interactions. | ||||
CVE-2021-22182 | 1 Gitlab | 1 Gitlab | 2021-03-04 | 5.4 Medium |
An issue has been discovered in GitLab affecting all versions starting with 13.7. GitLab was vulnerable to a stored XSS in merge request. | ||||
CVE-2021-22171 | 1 Gitlab | 1 Gitlab | 2021-01-22 | 6.5 Medium |
Insufficient validation of authentication parameters in GitLab Pages for GitLab 11.5+ allows an attacker to steal a victim's API token if they click on a maliciously crafted link | ||||
CVE-2021-22168 | 1 Gitlab | 1 Gitlab | 2021-01-22 | 6.5 Medium |
A regular expression denial of service issue has been discovered in NuGet API affecting all versions of GitLab starting from version 12.8. | ||||
CVE-2021-22167 | 1 Gitlab | 1 Gitlab | 2021-01-22 | 7.5 High |
An issue has been discovered in GitLab affecting all versions starting from 12.1. Incorrect headers in specific project page allows attacker to have a temporary read access to the private repository | ||||
CVE-2021-22166 | 1 Gitlab | 1 Gitlab | 2021-01-21 | 7.5 High |
An attacker could cause a Prometheus denial of service in GitLab 13.7+ by sending an HTTP request with a malformed method | ||||
CVE-2020-26414 | 1 Gitlab | 1 Gitlab | 2021-01-21 | 6.5 Medium |
An issue has been discovered in GitLab affecting all versions starting from 12.4. The regex used for package names is written in a way that makes execution time have quadratic growth based on the length of the malicious input string. | ||||
CVE-2018-19585 | 1 Gitlab | 1 Gitlab | 2020-12-24 | N/A |
GitLab CE/EE versions 8.18 up to 11.x before 11.3.11, 11.4.x before 11.4.8, and 11.5.x before 11.5.1 have CRLF Injection in Project Mirroring when using the Git protocol. | ||||
CVE-2020-13357 | 1 Gitlab | 1 Gitlab | 2020-12-14 | 4.3 Medium |
An issue was discovered in Gitlab CE/EE versions >= 13.1 to <13.4.7, >= 13.5 to <13.5.5, and >= 13.6 to <13.6.2 allowed an unauthorized user to access the user list corresponding to a feature flag in a project. | ||||
CVE-2020-26411 | 1 Gitlab | 1 Gitlab | 2020-12-14 | 4.3 Medium |
A potential DOS vulnerability was discovered in all versions of Gitlab starting from 13.4.x (>=13.4 to <13.4.7, >=13.5 to <13.5.5, and >=13.6 to <13.6.2). Using a specific query name for a project search can cause statement timeouts that can lead to a potential DOS if abused. | ||||
CVE-2020-26413 | 1 Gitlab | 1 Gitlab | 2020-12-14 | 5.3 Medium |
An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.4 before 13.6.2. Information disclosure via GraphQL results in user email being unexpectedly visible. | ||||
CVE-2020-26417 | 1 Gitlab | 1 Gitlab | 2020-12-14 | 5.3 Medium |
Information disclosure via GraphQL in GitLab CE/EE 13.1 and later exposes private group and project membership. This affects versions >=13.6 to <13.6.2, >=13.5 to <13.5.5, and >=13.1 to <13.4.7. | ||||
CVE-2020-26407 | 1 Gitlab | 1 Gitlab | 2020-12-11 | 5.4 Medium |
A XSS vulnerability exists in Gitlab CE/EE from 12.4 before 13.4.7, 13.5 before 13.5.5, and 13.6 before 13.6.2 that allows an attacker to perform cross-site scripting to other users via importing a malicious project | ||||
CVE-2020-26406 | 1 Gitlab | 1 Gitlab | 2020-12-01 | 5.3 Medium |
Certain SAST CiConfiguration information could be viewed by unauthorized users in GitLab EE starting with 13.3. This information was exposed through GraphQL to non-members of public projects with repository visibility restricted as well as guest members on private projects. Affected versions are: >=13.3, <13.3.9,>=13.4, <13.4.5,>=13.5, <13.5.2. | ||||
CVE-2020-13355 | 1 Gitlab | 1 Gitlab | 2020-12-01 | 8.1 High |
An issue has been discovered in GitLab CE/EE affecting all versions starting from 8.14. A path traversal is found in LFS Upload that allows attacker to overwrite certain specific paths on the server. Affected versions are: >=8.14, <13.3.9,>=13.4, <13.4.5,>=13.5, <13.5.2. | ||||
CVE-2020-13356 | 1 Gitlab | 1 Gitlab | 2020-12-01 | 8.2 High |
An issue has been discovered in GitLab CE/EE affecting all versions starting from 8.8.9. A specially crafted request could bypass Multipart protection and read files in certain specific paths on the server. Affected versions are: >=8.8.9, <13.3.9,>=13.4, <13.4.5,>=13.5, <13.5.2. | ||||
CVE-2020-26405 | 1 Gitlab | 1 Gitlab | 2020-12-01 | 7.1 High |
Path traversal vulnerability in package upload functionality in GitLab CE/EE starting from 12.8 allows an attacker to save packages in arbitrary locations. Affected versions are >=12.8, <13.3.9,>=13.4, <13.4.5,>=13.5, <13.5.2. | ||||
CVE-2020-13354 | 1 Gitlab | 1 Gitlab | 2020-11-30 | 4.3 Medium |
A potential DOS vulnerability was discovered in GitLab CE/EE starting with version 12.6. The container registry name check could cause exponential number of backtracks for certain user supplied values resulting in high CPU usage. Affected versions are: >=12.6, <13.3.9. | ||||
CVE-2020-13352 | 1 Gitlab | 1 Gitlab | 2020-11-27 | 5.3 Medium |
Private group info is leaked leaked in GitLab CE/EE version 10.2 and above, when the project is moved from private to public group. Affected versions are: >=10.2, <13.3.9,>=13.4, <13.4.5,>=13.5, <13.5.2. |