Show filters
34 Total Results
Displaying 21-30 of 34
Sort by:
Attacker Value
Unknown
CVE-2021-28378
Disclosure Date: March 15, 2021 (last updated February 22, 2025)
Gitea 1.12.x and 1.13.x before 1.13.4 allows XSS via certain issue data in some situations.
0
Attacker Value
Unknown
CVE-2021-3382
Disclosure Date: February 05, 2021 (last updated February 22, 2025)
Stack buffer overflow vulnerability in gitea 1.9.0 through 1.13.1 allows remote attackers to cause a denial of service (crash) via vectors related to a file path.
0
Attacker Value
Unknown
CVE-2020-28991
Disclosure Date: November 24, 2020 (last updated November 28, 2024)
Gitea 0.9.99 through 1.12.x before 1.12.6 does not prevent a git protocol path that specifies a TCP port number and also contains newlines (with URL encoding) in ParseRemoteAddr in modules/auth/repo_form.go.
0
Attacker Value
Unknown
CVE-2020-13246
Disclosure Date: May 20, 2020 (last updated February 21, 2025)
An issue was discovered in Gitea through 1.11.5. An attacker can trigger a deadlock by initiating a transfer of a repository's ownership from one organization to another.
0
Attacker Value
Unknown
CVE-2019-1010261
Disclosure Date: July 18, 2019 (last updated November 27, 2024)
Gitea 1.7.0 and earlier is affected by: Cross Site Scripting (XSS). The impact is: Attacker is able to have victim execute arbitrary JS in browser. The component is: go-get URL generation - PR to fix: https://github.com/go-gitea/gitea/pull/5905. The attack vector is: victim must open a specifically crafted URL. The fixed version is: 1.7.1 and later.
0
Attacker Value
Unknown
CVE-2019-1010314
Disclosure Date: July 11, 2019 (last updated November 27, 2024)
Gitea 1.7.2, 1.7.3 is affected by: Cross Site Scripting (XSS). The impact is: execute JavaScript in victim's browser, when the vulnerable repo page is loaded. The component is: repository's description. The attack vector is: victim must navigate to public and affected repo page.
0
Attacker Value
Unknown
CVE-2019-10330
Disclosure Date: May 31, 2019 (last updated October 26, 2023)
Jenkins Gitea Plugin 1.1.1 and earlier did not implement trusted revisions, allowing attackers without commit access to the Git repo to change Jenkinsfiles even if Jenkins is configured to consider them to be untrusted.
0
Attacker Value
Unknown
CVE-2019-11576
Disclosure Date: April 28, 2019 (last updated November 27, 2024)
Gitea before 1.8.0 allows 1FA for user accounts that have completed 2FA enrollment. If a user's credentials are known, then an attacker could send them to the API without requiring the 2FA one-time password.
0
Attacker Value
Unknown
CVE-2019-11228
Disclosure Date: April 15, 2019 (last updated November 27, 2024)
repo/setting.go in Gitea before 1.7.6 and 1.8.x before 1.8-RC3 does not validate the form.MirrorAddress before calling SaveAddress.
0
Attacker Value
Unknown
CVE-2019-11229
Disclosure Date: April 15, 2019 (last updated November 27, 2024)
models/repo_mirror.go in Gitea before 1.7.6 and 1.8.x before 1.8-RC3 mishandles mirror repo URL settings, leading to remote code execution.
0