Page 5 of 246 results (0.008 seconds)

CVSS: 4.0EPSS: 0%CPEs: 3EXPL: 1

An issue was discovered in GitLab CE/EE affecting all versions starting from 16.5 prior to 17.1.7, starting from 17.2 prior to 17.2.5, and starting from 17.3 prior to 17.3.2, where dependency proxy credentials are retained in graphql Logs. • https://gitlab.com/gitlab-org/gitlab/-/issues/460289 https://hackerone.com/reports/2477062 • CWE-532: Insertion of Sensitive Information into Log File •

CVSS: 9.9EPSS: 0%CPEs: 3EXPL: 1

An issue was discovered in GitLab CE/EE affecting all versions starting from 8.14 prior to 17.1.7, starting from 17.2 prior to 17.2.5, and starting from 17.3 prior to 17.3.2, which allows an attacker to trigger a pipeline as an arbitrary user under certain circumstances. • https://gitlab.com/gitlab-org/gitlab/-/issues/471923 https://hackerone.com/reports/2595495 • CWE-290: Authentication Bypass by Spoofing •

CVSS: 6.7EPSS: 0%CPEs: 3EXPL: 1

An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.7 prior to 17.1.7, from 17.2 prior to 17.2.5, and from 17.3 prior to 17.3.2. It may have been possible for an attacker with a victim's CI_JOB_TOKEN to obtain a GitLab session token belonging to the victim. • https://gitlab.com/gitlab-org/gitlab/-/issues/471954 https://hackerone.com/reports/2595495 • CWE-270: Privilege Context Switching Error •

CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 1

A privilege escalation issue has been discovered in GitLab EE affecting all versions starting from 16.6 prior to 17.1.7, from 17.2 prior to 17.2.5, and from 17.3 prior to 17.3.2. A user assigned the Admin Group Member custom role could have escalated their privileges to include other custom roles. • https://gitlab.com/gitlab-org/gitlab/-/issues/462665 https://hackerone.com/reports/2478469 • CWE-267: Privilege Defined With Unsafe Actions •

CVSS: 6.4EPSS: 0%CPEs: 3EXPL: 0

An issue has been discovered in GitLab EE/CE affecting all versions from 16.9.7 prior to 17.1.7, 17.2 prior to 17.2.5, and 17.3 prior to 17.3.2. An improper input validation error allows attacker to squat on accounts via linking arbitrary unclaimed provider identities when JWT authentication is configured. • https://gitlab.com/gitlab-org/gitlab/-/issues/464062 • CWE-642: External Control of Critical State Data •