gitlab-rails-ce-fips-18.2 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the gitlab-rails-ce-fips-18.2 package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
GHSA-3966-f6p6-2qr9

<18.2.8-r4
  • L
Incorrect Permission Assignment for Critical Resource

<18.2.8-r4
  • L
Insufficient Granularity of Access Control

<18.2.8-r4
  • L
GHSA-6mpj-fw9g-9wqm

<18.2.8-r4
  • L
Allocation of Resources Without Limits or Throttling

<18.2.8-r4
  • L
Information Exposure

<18.2.8-r4
  • L
GHSA-fjj2-x466-w3hx

<18.2.8-r4
  • L
GHSA-rcvw-fc36-wjhj

<18.2.8-r4
  • L
Authentication Bypass

<18.2.8-r4
  • L
GHSA-h2vc-rgmf-cp34

<18.2.8-r4
  • L
GHSA-2jwx-73fx-pwrv

<18.2.8-r4
  • L
GHSA-pv96-f897-xcch

<18.2.8-r4
  • L
GHSA-cpx5-2q84-prc5

<18.2.8-r4
  • L
GHSA-x45w-x744-4hj7

<18.2.8-r4
  • L
GHSA-j8j9-23cp-fr5v

<18.2.8-r4
  • M
Cross-site Scripting (XSS)

<18.2.8-r4
  • L
GHSA-p9w7-rqj5-fjh5

<18.2.8-r4
  • M
Cross-site Scripting (XSS)

<18.2.8-r4
  • L
GHSA-xgjv-46p6-hwgv

<18.2.8-r4
  • L
Improper Encoding or Escaping of Output

<18.2.8-r4
  • M
Information Exposure Through Log Files

<18.2.8-r4
  • L
GHSA-w2j6-r4xj-rjcj

<18.2.8-r4
  • L
Exposure of Private Information ('Privacy Violation')

<18.2.8-r4
  • L
Allocation of Resources Without Limits or Throttling

<18.2.8-r4
  • M
Missing Authorization

<18.2.8-r4
  • L
Allocation of Resources Without Limits or Throttling

<18.2.8-r4
  • L
GHSA-mp63-3qcj-f8c7

<18.2.8-r4
  • L
Allocation of Resources Without Limits or Throttling

<18.2.8-r4
  • L
Allocation of Resources Without Limits or Throttling

<18.2.8-r4
  • L
Improper Encoding or Escaping of Output

<18.2.8-r4
  • L
GHSA-m766-xfqm-qm37

<18.2.8-r4
  • L
GHSA-39m5-rg2v-54h9

<18.2.8-r4
  • L
Allocation of Resources Without Limits or Throttling

<18.2.8-r4
  • L
GHSA-w2m4-xx67-836j

<18.2.8-r4
  • L
GHSA-3cq3-cj5m-hm72

<18.2.8-r4
  • L
Allocation of Resources Without Limits or Throttling

<18.2.8-r4
  • L
Allocation of Resources Without Limits or Throttling

<18.2.8-r4
  • L
Cross-site Scripting (XSS)

<18.2.8-r4
  • L
Information Exposure

<18.2.8-r4
  • L
Allocation of Resources Without Limits or Throttling

<18.2.8-r4
  • L
GHSA-mfcp-rjv7-385m

<18.2.8-r4
  • L
GHSA-p9cp-qq4c-2wr5

<18.2.8-r4
  • L
GHSA-rh5v-9jwc-7736

<18.2.8-r4
  • L
GHSA-c3cp-7jp9-c872

<18.2.8-r4
  • L
GHSA-rrqh-93c8-j966

<18.2.8-r2
  • L
Resource Exhaustion

<18.2.8-r2
  • H
Incorrect Execution-Assigned Permissions

<18.2.8-r4
  • L
GHSA-pwhc-rpq9-4c8w

<18.2.8-r4
  • L
GHSA-m6hq-p25p-ffr2

<18.2.8-r4
  • L
Reachable Assertion

<18.2.8-r4
  • M
Memory Leak

<18.2.8-r4
  • L
GHSA-56w8-48fp-6mgv

<18.2.8-r4
  • L
GHSA-rm4r-vwvw-vj67

<18.2.8-r2
  • L
GHSA-7hhv-h469-wc4q

<18.2.8-r2
  • L
GHSA-9mv9-gw4x-7xw4

<18.2.8-r2
  • M
Uncontrolled Memory Allocation

<18.2.8-r2
  • M
Information Exposure

<18.2.8-r2
  • M
Incorrect Authorization

<18.2.8-r2