Filtered by vendor Gitlab
Subscriptions
Total
1086 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2021-22195 | 1 Gitlab | 1 Gitlab-vscode-extension | 2024-11-21 | 8.6 High |
Client side code execution in gitlab-vscode-extension v3.15.0 and earlier allows attacker to execute code on user system | ||||
CVE-2021-22194 | 1 Gitlab | 1 Gitlab | 2024-11-21 | 5.7 Medium |
In all versions of GitLab, marshalled session keys were being stored in Redis. | ||||
CVE-2021-22193 | 1 Gitlab | 1 Gitlab | 2024-11-21 | 3.5 Low |
An issue has been discovered in GitLab affecting all versions starting with 7.1. A member of a private group was able to validate the use of a specific name for private project. | ||||
CVE-2021-22192 | 1 Gitlab | 1 Gitlab | 2024-11-21 | 9.9 Critical |
An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.2 allowing unauthorized authenticated users to execute arbitrary code on the server. | ||||
CVE-2021-22190 | 1 Gitlab | 1 Gitlab | 2024-11-21 | 8.5 High |
A path traversal vulnerability via the GitLab Workhorse in all versions of GitLab could result in the leakage of a JWT token | ||||
CVE-2021-22189 | 1 Gitlab | 1 Gitlab | 2024-11-21 | 5.9 Medium |
Starting with version 13.7 the Gitlab CE/EE editions were affected by a security issue related to the validation of the certificates for the Fortinet OTP that could result in authentication issues. | ||||
CVE-2021-22188 | 1 Gitlab | 1 Gitlab | 2024-11-21 | 5.3 Medium |
An issue has been discovered in GitLab affecting all versions starting with 13.0. Confidential issue titles in Gitlab were readable by an unauthorised user via branch logs. | ||||
CVE-2021-22187 | 1 Gitlab | 1 Gitlab | 2024-11-21 | 4.3 Medium |
An issue has been discovered in GitLab affecting all versions of Gitlab EE/CE before 13.6.7. A potential resource exhaustion issue that allowed running or pending jobs to continue even after project was deleted. | ||||
CVE-2021-22186 | 1 Gitlab | 1 Gitlab | 2024-11-21 | 4.9 Medium |
An authorization issue in GitLab CE/EE version 9.4 and up allowed a group maintainer to modify group CI/CD variables which should be restricted to group owners | ||||
CVE-2021-22185 | 1 Gitlab | 1 Gitlab | 2024-11-21 | 5.4 Medium |
Insufficient input sanitization in wikis in GitLab version 13.8 and up allows an attacker to exploit a stored cross-site scripting vulnerability via a specially-crafted commit to a wiki | ||||
CVE-2021-22184 | 1 Gitlab | 1 Gitlab | 2024-11-21 | 6.2 Medium |
An information disclosure issue in GitLab starting from version 12.8 allowed a user with access to the server logs to see sensitive information that wasn't properly redacted. | ||||
CVE-2021-22183 | 1 Gitlab | 1 Gitlab | 2024-11-21 | 4.1 Medium |
An issue has been discovered in GitLab affecting all versions starting with 11.8. GitLab was vulnerable to a stored XSS in the epics page, which could be exploited with user interactions. | ||||
CVE-2021-22182 | 1 Gitlab | 1 Gitlab | 2024-11-21 | 3.5 Low |
An issue has been discovered in GitLab affecting all versions starting with 13.7. GitLab was vulnerable to a stored XSS in merge request. | ||||
CVE-2021-22181 | 1 Gitlab | 1 Gitlab | 2024-11-21 | 7.7 High |
A denial of service vulnerability in GitLab CE/EE affecting all versions since 11.8 allows an attacker to create a recursive pipeline relationship and exhaust resources. | ||||
CVE-2021-22180 | 1 Gitlab | 1 Gitlab | 2024-11-21 | 4.3 Medium |
An issue has been discovered in GitLab affecting all versions starting from 13.4. Improper access control allows unauthorized users to access details on analytic pages. | ||||
CVE-2021-22179 | 1 Gitlab | 1 Gitlab | 2024-11-21 | 5.4 Medium |
A vulnerability was discovered in GitLab versions before 12.2. GitLab was vulnerable to a SSRF attack through the Outbound Requests feature. | ||||
CVE-2021-22178 | 1 Gitlab | 1 Gitlab | 2024-11-21 | 5 Medium |
An issue has been discovered in GitLab affecting all versions starting from 13.2. Gitlab was vulnerable to SRRF attack through the Prometheus integration. | ||||
CVE-2021-22177 | 1 Gitlab | 1 Gitlab | 2024-11-21 | 4.3 Medium |
Potential DoS was identified in gitlab-shell in GitLab CE/EE version 12.6.0 or above, which allows an attacker to spike the server resource utilization via gitlab-shell command. | ||||
CVE-2021-22176 | 1 Gitlab | 1 Gitlab | 2024-11-21 | 4.3 Medium |
An issue has been discovered in GitLab affecting all versions starting with 3.0.1. Improper access control allows demoted project members to access details on authored merge requests | ||||
CVE-2021-22175 | 1 Gitlab | 1 Gitlab | 2024-11-21 | 6.8 Medium |
When requests to the internal network for webhooks are enabled, a server-side request forgery vulnerability in GitLab affecting all versions starting from 10.5 was possible to exploit for an unauthenticated attacker even on a GitLab instance where registration is disabled |