Show filters
1,139 Total Results
Displaying 1-10 of 1,139
Sort by:
Attacker Value
Very High

CVE-2023-7028

Disclosure Date: January 12, 2024 (last updated September 04, 2024)
An issue has been discovered in GitLab CE/EE affecting all versions from 16.1 prior to 16.1.6, 16.2 prior to 16.2.9, 16.3 prior to 16.3.7, 16.4 prior to 16.4.5, 16.5 prior to 16.5.6, 16.6 prior to 16.6.4, and 16.7 prior to 16.7.2 in which user account password reset emails could be delivered to an unverified email address.
Attacker Value
High

CVE-2020-10535

Disclosure Date: March 12, 2020 (last updated November 27, 2024)
GitLab 12.8.x before 12.8.6, when sign-up is enabled, allows remote attackers to bypass email domain restrictions within the two-day grace period for an unconfirmed email address.
Attacker Value
Very High

CVE-2021-22205

Disclosure Date: April 23, 2021 (last updated November 28, 2024)
An issue has been discovered in GitLab CE/EE affecting all versions starting from 11.9. GitLab was not properly validating image files that were passed to a file parser which resulted in a remote command execution.
Attacker Value
Very High

CVE-2023-5009

Disclosure Date: September 19, 2023 (last updated October 08, 2023)
An issue has been discovered in GitLab EE affecting all versions starting from 13.12 before 16.2.7, all versions starting from 16.3 before 16.3.4. It was possible for an attacker to run pipeline jobs as an arbitrary user via scheduled security scan policies. This was a bypass of [CVE-2023-3932](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3932) showing additional impact.
Attacker Value
Very High

CVE-2020-10977

Disclosure Date: April 08, 2020 (last updated November 27, 2024)
GitLab EE/CE 8.5 to 12.9 is vulnerable to a an path traversal when moving an issue between projects.
Attacker Value
High

CVE-2022-2992

Disclosure Date: October 17, 2022 (last updated December 22, 2024)
A vulnerability in GitLab CE/EE affecting all versions from 11.10 prior to 15.1.6, 15.2 to 15.2.4, 15.3 to 15.3.2 allows an authenticated user to achieve remote code execution via the Import from GitHub API endpoint.
Attacker Value
Unknown

CVE-2024-0402

Disclosure Date: January 26, 2024 (last updated February 01, 2024)
An issue has been discovered in GitLab CE/EE affecting all versions from 16.0 prior to 16.6.6, 16.7 prior to 16.7.4, and 16.8 prior to 16.8.1 which allows an authenticated user to write files to arbitrary locations on the GitLab server while creating a workspace.
Attacker Value
Unknown

CVE-2022-0735

Disclosure Date: March 28, 2022 (last updated October 07, 2023)
An issue has been discovered in GitLab CE/EE affecting all versions starting from 12.10 before 14.6.5, all versions starting from 14.7 before 14.7.4, all versions starting from 14.8 before 14.8.2. An unauthorised user was able to steal runner registration tokens through an information disclosure vulnerability using quick actions commands.
Attacker Value
Unknown

CVE-2021-22214

Disclosure Date: June 08, 2021 (last updated November 28, 2024)
When requests to the internal network for webhooks are enabled, a server-side request forgery vulnerability in GitLab CE/EE affecting all versions starting from 10.5 was possible to exploit for an unauthenticated attacker even on a GitLab instance where registration is limited
Attacker Value
Moderate

CVE-2020-10086

Disclosure Date: March 13, 2020 (last updated November 27, 2024)
GitLab 10.4 through 12.8.1 allows Directory Traversal. A particular endpoint was vulnerable to a directory traversal vulnerability, leading to arbitrary file read.