Filtered by vendor Gitlab
Subscriptions
Total
1068 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2021-22251 | 1 Gitlab | 1 Gitlab | 2024-08-03 | 4.3 Medium |
Improper validation of invited users' email address in GitLab EE affecting all versions since 12.2 allowed projects to add members with email address domain that should be blocked by group settings | ||||
CVE-2021-22170 | 1 Gitlab | 1 Gitlab | 2024-08-03 | 6.2 Medium |
Assuming a database breach, nonce reuse issues in GitLab 11.6+ allows an attacker to decrypt some of the database's encrypted content | ||||
CVE-2021-22194 | 1 Gitlab | 1 Gitlab | 2024-08-03 | 5.7 Medium |
In all versions of GitLab, marshalled session keys were being stored in Redis. | ||||
CVE-2021-22169 | 1 Gitlab | 1 Gitlab | 2024-08-03 | 4.3 Medium |
An issue was identified in GitLab EE 13.4 or later which leaked internal IP address via error messages. | ||||
CVE-2021-22220 | 1 Gitlab | 1 Gitlab | 2024-08-03 | 6.1 Medium |
An issue has been discovered in GitLab affecting all versions starting with 13.10. GitLab was vulnerable to a stored XSS in blob viewer of notebooks. | ||||
CVE-2021-22236 | 1 Gitlab | 1 Gitlab | 2024-08-03 | 5.5 Medium |
Due to improper handling of OAuth client IDs, new subscriptions generated OAuth tokens on an incorrect OAuth client application. This vulnerability is present in GitLab CE/EE since version 14.1. | ||||
CVE-2021-22184 | 1 Gitlab | 1 Gitlab | 2024-08-03 | 6.2 Medium |
An information disclosure issue in GitLab starting from version 12.8 allowed a user with access to the server logs to see sensitive information that wasn't properly redacted. | ||||
CVE-2021-22181 | 1 Gitlab | 1 Gitlab | 2024-08-03 | 7.7 High |
A denial of service vulnerability in GitLab CE/EE affecting all versions since 11.8 allows an attacker to create a recursive pipeline relationship and exhaust resources. | ||||
CVE-2021-22177 | 1 Gitlab | 1 Gitlab | 2024-08-03 | 4.3 Medium |
Potential DoS was identified in gitlab-shell in GitLab CE/EE version 12.6.0 or above, which allows an attacker to spike the server resource utilization via gitlab-shell command. | ||||
CVE-2021-22226 | 1 Gitlab | 1 Gitlab | 2024-08-03 | 6.5 Medium |
Under certain conditions, some users were able to push to protected branches that were restricted to deploy keys in GitLab CE/EE since version 13.9 | ||||
CVE-2021-22178 | 1 Gitlab | 1 Gitlab | 2024-08-03 | 5 Medium |
An issue has been discovered in GitLab affecting all versions starting from 13.2. Gitlab was vulnerable to SRRF attack through the Prometheus integration. | ||||
CVE-2021-22210 | 1 Gitlab | 1 Gitlab | 2024-08-03 | 5.3 Medium |
An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.2. When querying the repository branches through API, GitLab was ignoring a query parameter and returning a considerable amount of results. | ||||
CVE-2021-22186 | 1 Gitlab | 1 Gitlab | 2024-08-03 | 4.9 Medium |
An authorization issue in GitLab CE/EE version 9.4 and up allowed a group maintainer to modify group CI/CD variables which should be restricted to group owners | ||||
CVE-2021-22229 | 1 Gitlab | 1 Gitlab | 2024-08-03 | 5.9 Medium |
An issue has been discovered in GitLab CE/EE affecting all versions starting with 12.8. Under a special condition it was possible to access data of an internal repository through project fork done by a project member. | ||||
CVE-2021-22219 | 1 Gitlab | 1 Gitlab | 2024-08-03 | 4.4 Medium |
All versions of GitLab CE/EE starting from 9.5 before 13.10.5, all versions starting from 13.11 before 13.11.5, and all versions starting from 13.12 before 13.12.2 allow a high privilege user to obtain sensitive information from log files because the sensitive information was not correctly registered for log masking. | ||||
CVE-2021-22179 | 1 Gitlab | 1 Gitlab | 2024-08-03 | 5.4 Medium |
A vulnerability was discovered in GitLab versions before 12.2. GitLab was vulnerable to a SSRF attack through the Outbound Requests feature. | ||||
CVE-2021-22218 | 1 Gitlab | 1 Gitlab | 2024-08-03 | 2.6 Low |
All versions of GitLab CE/EE starting from 12.8 before 13.10.5, all versions starting from 13.11 before 13.11.5, and all versions starting from 13.12 before 13.12.2 were affected by an issue in the handling of x509 certificates that could be used to spoof author of signed commits. | ||||
CVE-2021-22217 | 1 Gitlab | 1 Gitlab | 2024-08-03 | 6.5 Medium |
A denial of service vulnerability in all versions of GitLab CE/EE before 13.12.2, 13.11.5 or 13.10.5 allows an attacker to cause uncontrolled resource consumption with a specially crafted issue or merge request | ||||
CVE-2021-22180 | 1 Gitlab | 1 Gitlab | 2024-08-03 | 4.3 Medium |
An issue has been discovered in GitLab affecting all versions starting from 13.4. Improper access control allows unauthorized users to access details on analytic pages. | ||||
CVE-2021-22225 | 1 Gitlab | 1 Gitlab | 2024-08-03 | 4.7 Medium |
Insufficient input sanitization in markdown in GitLab version 13.11 and up allows an attacker to exploit a stored cross-site scripting vulnerability via a specially-crafted markdown |