The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Weak Password Recovery Mechanism for Forgotten Password vulnerabilities in an interactive lesson.
Start learningUpgrade Debian:unstable
gitlab
to version 15.10.8+ds1-2 or higher.
Note: Versions mentioned in the description apply only to the upstream gitlab
package and not the gitlab
package as distributed by Debian
.
See How to fix?
for Debian:unstable
relevant fixed versions and status.
In all versions of GitLab CE/EE, an attacker with physical access to a user’s machine may brute force the user’s password via the change password function. There is a rate limit in place, but the attack may still be conducted by stealing the session id from the physical compromise of the account and splitting the attack over several IP addresses and passing in the compromised session value from these various locations.