gitlab-rails-ce-fips-18.3 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the gitlab-rails-ce-fips-18.3 package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
GHSA-3966-f6p6-2qr9

<18.3.6-r2
  • L
Incorrect Permission Assignment for Critical Resource

<18.3.6-r2
  • L
Authentication Bypass

<18.3.6-r2
  • L
GHSA-p9cp-qq4c-2wr5

<18.3.6-r2
  • L
Allocation of Resources Without Limits or Throttling

<18.3.6-r2
  • L
Insufficient Granularity of Access Control

<18.3.6-r2
  • L
GHSA-m766-xfqm-qm37

<18.3.6-r2
  • L
GHSA-fjj2-x466-w3hx

<18.3.6-r2
  • L
GHSA-2jwx-73fx-pwrv

<18.3.6-r2
  • L
Cross-site Scripting (XSS)

<18.3.6-r2
  • L
Allocation of Resources Without Limits or Throttling

<18.3.6-r2
  • L
Authentication Bypass

<18.3.6-r2
  • L
Improper Encoding or Escaping of Output

<18.3.6-r2
  • L
GHSA-rh5v-9jwc-7736

<18.3.6-r2
  • L
GHSA-w2j6-r4xj-rjcj

<18.3.6-r2
  • M
Cross-site Scripting (XSS)

<18.3.6-r2
  • L
Exposure of Private Information ('Privacy Violation')

<18.3.6-r2
  • L
Information Exposure

<18.3.6-r2
  • L
GHSA-6mpj-fw9g-9wqm

<18.3.6-r2
  • L
GHSA-39m5-rg2v-54h9

<18.3.6-r2
  • L
GHSA-3cq3-cj5m-hm72

<18.3.6-r2
  • M
Information Exposure Through Log Files

<18.3.6-r2
  • L
GHSA-cpx5-2q84-prc5

<18.3.6-r2
  • L
GHSA-p9w7-rqj5-fjh5

<18.3.6-r2
  • L
Allocation of Resources Without Limits or Throttling

<18.3.6-r2
  • L
Allocation of Resources Without Limits or Throttling

<18.3.6-r2
  • L
Allocation of Resources Without Limits or Throttling

<18.3.6-r2
  • L
Improper Encoding or Escaping of Output

<18.3.6-r2
  • L
Allocation of Resources Without Limits or Throttling

<18.3.6-r2
  • L
GHSA-j8j9-23cp-fr5v

<18.3.6-r2
  • L
GHSA-c3cp-7jp9-c872

<18.3.6-r2
  • L
GHSA-h2vc-rgmf-cp34

<18.3.6-r2
  • L
GHSA-mp63-3qcj-f8c7

<18.3.6-r2
  • L
GHSA-2v4g-65gf-w58f

<18.3.6-r2
  • L
GHSA-625h-95r8-8xpm

<18.3.6-r0
  • L
Resource Exhaustion

<18.3.6-r0
  • L
Resource Exhaustion

<18.3.6-r0
  • L
Resource Exhaustion

<18.3.6-r0
  • L
Resource Exhaustion

<18.3.6-r0
  • L
GHSA-wpv5-97wm-hp9c

<18.3.6-r0
  • L
Resource Exhaustion

<18.3.5-r3
  • L
GHSA-w9pc-fmgc-vxvw

<18.3.6-r0
  • L
GHSA-6xw4-3v39-52mm

<18.3.6-r0
  • L
GHSA-rrqh-93c8-j966

<18.3.5-r3
  • L
Resource Exhaustion

<18.3.6-r0
  • L
GHSA-r657-rxjc-j557

<18.3.6-r0
  • L
GHSA-p543-xpfm-54cp

<18.3.6-r0
  • M
Information Exposure

<18.3.6-r0
  • L
Reachable Assertion

<18.3.6-r2
  • L
GHSA-56w8-48fp-6mgv

<18.3.6-r2
  • L
GHSA-5mh9-3jwc-rp59

<18.3.6-r1
  • L
Improper Certificate Validation

<18.3.6-r1
  • L
GHSA-7c64-f9jr-v9h2

<18.3.6-r1
  • L
Improper Certificate Validation

<18.3.6-r1
  • L
GHSA-pwhc-rpq9-4c8w

<18.3.5-r3
  • M
Memory Leak

<18.3.5-r3
  • H
Incorrect Execution-Assigned Permissions

<18.3.5-r3
  • L
GHSA-m6hq-p25p-ffr2

<18.3.5-r3
  • L
GHSA-c2f4-jgmc-q2r5

<18.3.2-r1
  • M
Resource Exhaustion

<18.3.2-r1