Page 19 of 865 results (0.006 seconds)

CVSS: 6.1EPSS: 0%CPEs: 6EXPL: 1

An issue has been discovered in GitLab affecting all versions starting from 4.1 before 16.1.5, all versions starting from 16.2 before 16.2.5, all versions starting from 16.3 before 16.3.1 where it was possible to create a URL that would redirect to a different project. Se ha descubierto un problema en GitLab que afecta a todas las versiones a partir de 4.1 y antes de 16.1.5, todas las versiones a partir de 16.2 y antes de 16.2.5, todas las versiones a partir de 16.3 y antes de 16.3.1, donde es posible crear una URL que podría redireccionar a un proyecto diferente. • https://gitlab.com/gitlab-org/gitlab/-/issues/395437 https://hackerone.com/reports/1889230 • CWE-138: Improper Neutralization of Special Elements CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 2

An issue has been discovered in GitLab affecting all versions before 16.2.0. Committing directories containing LF character results in 500 errors when viewing the commit. • https://gitlab.com/gitlab-org/gitlab/-/issues/406817 https://hackerone.com/reports/1937213 • CWE-138: Improper Neutralization of Special Elements CWE-1287: Improper Validation of Specified Type of Input •

CVSS: 6.5EPSS: 0%CPEs: 3EXPL: 0

An issue has been discovered in GitLab EE affecting all versions starting from 14.1 before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. It was possible for EE-licensed users to link any security policy project by its ID to projects or groups the user has access to, potentially revealing the security projects's configured security policies. • https://gitlab.com/gitlab-org/gitlab/-/issues/416647 • CWE-201: Insertion of Sensitive Information Into Sent Data CWE-284: Improper Access Control •

CVSS: 8.2EPSS: 0%CPEs: 3EXPL: 2

An issue has been discovered in GitLab EE affecting all versions starting from 13.12 before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. It was possible for an attacker to run pipeline jobs as an arbitrary user via scheduled security scan policies. • https://gitlab.com/gitlab-org/gitlab/-/issues/417594 https://hackerone.com/reports/2057633 • CWE-286: Incorrect User Management CWE-862: Missing Authorization •

CVSS: 4.3EPSS: 0%CPEs: 6EXPL: 1

An issue has been discovered in GitLab CE/EE affecting all versions starting before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2, which leads to developers being able to create pipeline schedules on protected branches even if they don't have access to merge • https://gitlab.com/gitlab-org/gitlab/-/issues/407166 https://hackerone.com/reports/1936572 • CWE-262: Not Using Password Aging CWE-284: Improper Access Control •