Filtered by vendor Gitlab
Subscriptions
Total
1086 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2020-7967 | 1 Gitlab | 1 Gitlab | 2024-11-21 | 4.3 Medium |
GitLab EE 8.0 through 12.7.2 has Insecure Permissions (issue 1 of 2). | ||||
CVE-2020-7966 | 1 Gitlab | 1 Gitlab | 2024-11-21 | 7.5 High |
GitLab EE 11.11 and later through 12.7.2 allows Directory Traversal. | ||||
CVE-2020-6833 | 1 Gitlab | 1 Gitlab | 2024-11-21 | 7.5 High |
An issue was discovered in GitLab EE 11.3 and later. A GitLab Workhorse bypass could lead to package and file disclosure via request smuggling. | ||||
CVE-2020-6832 | 1 Gitlab | 1 Gitlab | 2024-11-21 | 5.3 Medium |
An issue was discovered in GitLab Enterprise Edition (EE) 8.9.0 through 12.6.1. Using the project import feature, it was possible for someone to obtain issues from private projects. | ||||
CVE-2020-5197 | 1 Gitlab | 1 Gitlab | 2024-11-21 | 4.3 Medium |
An issue was discovered in GitLab Community Edition (CE) and Enterprise Edition (EE) 5.1 through 12.6.1. It has Incorrect Access Control. | ||||
CVE-2020-26417 | 1 Gitlab | 1 Gitlab | 2024-11-21 | 5.3 Medium |
Information disclosure via GraphQL in GitLab CE/EE 13.1 and later exposes private group and project membership. This affects versions >=13.6 to <13.6.2, >=13.5 to <13.5.5, and >=13.1 to <13.4.7. | ||||
CVE-2020-26416 | 1 Gitlab | 1 Gitlab | 2024-11-21 | 4 Medium |
Information disclosure in Advanced Search component of GitLab EE starting from 8.4 results in exposure of search terms via Rails logs. This affects versions >=8.4 to <13.4.7, >=13.5 to <13.5.5, and >=13.6 to <13.6.2. | ||||
CVE-2020-26415 | 1 Gitlab | 1 Gitlab | 2024-11-21 | 4.3 Medium |
Information about the starred projects for private user profiles was exposed via the GraphQL API starting from 12.2 via the REST API. This affects GitLab >=12.2 to <13.4.7, >=13.5 to <13.5.5, and >=13.6 to <13.6.2. | ||||
CVE-2020-26414 | 1 Gitlab | 1 Gitlab | 2024-11-21 | 4.3 Medium |
An issue has been discovered in GitLab affecting all versions starting from 12.4. The regex used for package names is written in a way that makes execution time have quadratic growth based on the length of the malicious input string. | ||||
CVE-2020-26413 | 1 Gitlab | 1 Gitlab | 2024-11-21 | 5.3 Medium |
An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.4 before 13.6.2. Information disclosure via GraphQL results in user email being unexpectedly visible. | ||||
CVE-2020-26412 | 1 Gitlab | 1 Gitlab | 2024-11-21 | 3.1 Low |
Removed group members were able to use the To-Do functionality to retrieve updated information on confidential epics starting in GitLab EE 13.2 before 13.6.2. | ||||
CVE-2020-26411 | 1 Gitlab | 1 Gitlab | 2024-11-21 | 4.3 Medium |
A potential DOS vulnerability was discovered in all versions of Gitlab starting from 13.4.x (>=13.4 to <13.4.7, >=13.5 to <13.5.5, and >=13.6 to <13.6.2). Using a specific query name for a project search can cause statement timeouts that can lead to a potential DOS if abused. | ||||
CVE-2020-26409 | 1 Gitlab | 1 Gitlab | 2024-11-21 | 4.3 Medium |
A DOS vulnerability exists in Gitlab CE/EE >=10.3, <13.4.7,>=13.5, <13.5.5,>=13.6, <13.6.2 that allows an attacker to trigger uncontrolled resource by bypassing input validation in markdown fields. | ||||
CVE-2020-26408 | 1 Gitlab | 1 Gitlab | 2024-11-21 | 5.3 Medium |
A limited information disclosure vulnerability exists in Gitlab CE/EE from >= 12.2 to <13.4.7, >=13.5 to <13.5.5, and >=13.6 to <13.6.2 that allows an attacker to view limited information in user's private profile | ||||
CVE-2020-26407 | 1 Gitlab | 1 Gitlab | 2024-11-21 | 5.5 Medium |
A XSS vulnerability exists in Gitlab CE/EE from 12.4 before 13.4.7, 13.5 before 13.5.5, and 13.6 before 13.6.2 that allows an attacker to perform cross-site scripting to other users via importing a malicious project | ||||
CVE-2020-26406 | 1 Gitlab | 1 Gitlab | 2024-11-21 | 5.3 Medium |
Certain SAST CiConfiguration information could be viewed by unauthorized users in GitLab EE starting with 13.3. This information was exposed through GraphQL to non-members of public projects with repository visibility restricted as well as guest members on private projects. Affected versions are: >=13.3, <13.3.9,>=13.4, <13.4.5,>=13.5, <13.5.2. | ||||
CVE-2020-26405 | 1 Gitlab | 1 Gitlab | 2024-11-21 | 7.1 High |
Path traversal vulnerability in package upload functionality in GitLab CE/EE starting from 12.8 allows an attacker to save packages in arbitrary locations. Affected versions are >=12.8, <13.3.9,>=13.4, <13.4.5,>=13.5, <13.5.2. | ||||
CVE-2020-15525 | 1 Gitlab | 1 Gitlab | 2024-11-21 | 5.3 Medium |
GitLab EE 11.3 through 13.1.2 has Incorrect Access Control because of the Maven package upload endpoint. | ||||
CVE-2020-14155 | 7 Apple, Gitlab, Netapp and 4 more | 22 Macos, Gitlab, Active Iq Unified Manager and 19 more | 2024-11-21 | 5.3 Medium |
libpcre in PCRE before 8.44 allows an integer overflow via a large number after a (?C substring. | ||||
CVE-2020-13359 | 1 Gitlab | 1 Gitlab | 2024-11-21 | 7.6 High |
The Terraform API in GitLab CE/EE 12.10+ exposed the object storage signed URL on the delete operation allowing a malicious project maintainer to overwrite the Terraform state, bypassing audit and other business controls. Affected versions are >=12.10, <13.3.9,>=13.4, <13.4.5,>=13.5, <13.5.2. |