Page 78 of 458 results (0.012 seconds)

CVSS: 5.4EPSS: 0%CPEs: 3EXPL: 0

A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. When 2 factor authentication was enabled for groups, a malicious user could bypass that restriction by sending a specific query to the API endpoint. Se detectó una vulnerabilidad en GitLab versiones anteriores a 13.1.10, 13.2.8 y 13.3.4. Cuando era habilitada la autenticación de 2 factores para grupos, un usuario malicioso podría omitir esa restricción mediante el envío de una consulta específica hacia el endpoint de la API • https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13297.json https://gitlab.com/gitlab-org/gitlab/-/issues/32215 https://hackerone.com/reports/691592 •

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 0

A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. Same 2 factor Authentication secret code was generated which resulted an attacker to maintain access under certain conditions. Se detectó una vulnerabilidad en GitLab versiones anteriores a 13.1.10, 13.2.8 y 13.3.4. El mismo código secreto de autenticación de 2 factores era generado, lo que resultaba en que un atacante mantuviera el acceso bajo determinadas condiciones • https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13304.json https://gitlab.com/gitlab-org/gitlab/-/issues/27686 https://hackerone.com/reports/511260 • CWE-330: Use of Insufficiently Random Values •

CVSS: 7.3EPSS: 0%CPEs: 8EXPL: 0

A vulnerability was discovered in GitLab versions before 13.0.12, 13.1.10, 13.2.8 and 13.3.4. GitLabs EKS integration was vulnerable to a cross-account assume role attack. Se detectó una vulnerabilidad en GitLab versiones anteriores a 13.0.12, 13.1.10, 13.2.8 y 13.3.4. La integración EKS de GitLab era vulnerable a un ataque de tipo cross-account assume role • https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13318.json https://gitlab.com/gitlab-org/gitlab/-/issues/228915 •

CVSS: 6.4EPSS: 0%CPEs: 6EXPL: 0

For GitLab before 13.0.12, 13.1.6, 13.2.3 user controlled git configuration settings can be modified to result in Server Side Request Forgery. Para GitLab versiones anteriores a 13.0.12, 13.1.6, 13.2.3, los ajustes de configuración de git controlados por el usuario pueden ser modificados para resultar en un ataque de tipo Server Side Request Forgery • https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13286.json https://gitlab.com/gitlab-org/gitlab/-/issues/215212 https://hackerone.com/reports/855276 • CWE-918: Server-Side Request Forgery (SSRF) •

CVSS: 6.5EPSS: 0%CPEs: 6EXPL: 0

For GitLab before 13.0.12, 13.1.6, 13.2.3 a denial of service exists in the project import feature Para GitLab versiones anteriores a 13.0.12, 13.1.6, 13.2.3, se presenta una denegación de servicio en la funcionalidad project import • https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13281.json https://gitlab.com/gitlab-org/gitlab/-/issues/31564 https://hackerone.com/reports/687730 • CWE-400: Uncontrolled Resource Consumption •