Page 21 of 216 results (0.012 seconds)

CVSS: 4.3EPSS: 0%CPEs: 6EXPL: 1

An issue has been discovered in GitLab affecting all versions starting from 15.2 before 16.1.5, all versions starting from 16.2 before 16.2.5, all versions starting from 16.3 before 16.3.1. A namespace-level banned user can access the API. Se ha descubierto un problema en GitLab que afecta a todas las versiones a partir de la 15.2 antes de la 16.1.5, todas las versiones a partir de la 16.2 antes de la 16.2.5 y todas las versiones a partir de la 16.3 antes de la 16.3.1. Un usuario baneado a nivel de espacio de nombres puede acceder a la API. • https://gitlab.com/gitlab-org/gitlab/-/issues/398587 https://hackerone.com/reports/1911908 • CWE-262: Not Using Password Aging CWE-284: Improper Access Control •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 2

An issue has been discovered in GitLab affecting all versions before 16.2.0. Committing directories containing LF character results in 500 errors when viewing the commit. • https://gitlab.com/gitlab-org/gitlab/-/issues/406817 https://hackerone.com/reports/1937213 • CWE-138: Improper Neutralization of Special Elements CWE-1287: Improper Validation of Specified Type of Input •

CVSS: 6.5EPSS: 0%CPEs: 3EXPL: 0

An issue has been discovered in GitLab EE affecting all versions starting from 14.1 before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. It was possible for EE-licensed users to link any security policy project by its ID to projects or groups the user has access to, potentially revealing the security projects's configured security policies. • https://gitlab.com/gitlab-org/gitlab/-/issues/416647 • CWE-201: Insertion of Sensitive Information Into Sent Data CWE-284: Improper Access Control •

CVSS: 8.2EPSS: 0%CPEs: 3EXPL: 2

An issue has been discovered in GitLab EE affecting all versions starting from 13.12 before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. It was possible for an attacker to run pipeline jobs as an arbitrary user via scheduled security scan policies. • https://gitlab.com/gitlab-org/gitlab/-/issues/417594 https://hackerone.com/reports/2057633 • CWE-286: Incorrect User Management CWE-862: Missing Authorization •

CVSS: 4.3EPSS: 0%CPEs: 6EXPL: 1

An issue has been discovered in GitLab CE/EE affecting all versions starting before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2, which leads to developers being able to create pipeline schedules on protected branches even if they don't have access to merge • https://gitlab.com/gitlab-org/gitlab/-/issues/407166 https://hackerone.com/reports/1936572 • CWE-262: Not Using Password Aging CWE-284: Improper Access Control •