diff options
author | Matthias Fechner <mfechner@FreeBSD.org> | 2020-07-02 19:21:57 +0000 |
---|---|---|
committer | Matthias Fechner <mfechner@FreeBSD.org> | 2020-07-02 19:21:57 +0000 |
commit | c97bf9210c3f0bd8538291a2124a4898c3aa677c (patch) | |
tree | bea0bb4016c924e5deab76b1232a2f380c51ea66 /security | |
parent | 8f9a946c7a47bf2f96283727f55cc25d70a4ca9c (diff) | |
download | freebsd-ports-c97bf9210c3f0bd8538291a2124a4898c3aa677c.zip |
Document gitlab vulnerabilities.
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 48 |
1 files changed, 48 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 7abf43c8f97e..476420aed9e8 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,54 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="0a305431-bc98-11ea-a051-001b217b3468"> + <topic>Gitlab -- Multiple Vulnerabilities</topic> + <affects> + <package> + <name>gitlab-ce</name> + <range><ge>13.1.0</ge><lt>13.1.2</lt></range> + <range><ge>13.0.0</ge><lt>13.0.8</lt></range> + <range><ge>0</ge><lt>12.10.13</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Gitlab reports:</p> + <blockquote cite="https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/"> + <p>Missing Permission Check on Time Tracking</p> + <p>Cross-Site Scripting in PyPi Files API</p> + <p>Insecure Authorization Check on Private Project Security Dashboard</p> + <p>Cross-Site Scripting in References</p> + <p>Cross-Site Scripting in Group Names</p> + <p>Cross-Site Scripting in Blob Viewer</p> + <p>Cross-Site Scripting in Error Tracking</p> + <p>Insecure Authorisation Check on Creation and Deletion of Deploy Tokens</p> + <p>User Name Format Restiction Bypass</p> + <p>Denial of Service in Issue Comments</p> + <p>Cross-Site Scripting in Wiki Pages</p> + <p>Private Merge Request Updates Leaked via Todos</p> + <p>Private User Activity Leaked via API</p> + <p>Cross-Site Scripting in Bitbucket Import Feature</p> + <p>Github Project Restriction Bypass</p> + <p>Update PCRE Dependency</p> + <p>Update Kaminari Gem</p> + <p>Cross-Site Scripting in User Profile</p> + <p>Update Xterm.js</p> + </blockquote> + </body> + </description> + <references> + <url>https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/</url> + <cvename>CVE-2020-14155</cvename> + <cvename>CVE-2020-11082</cvename> + <cvename>CVE-2019-0542</cvename> + </references> + <dates> + <discovery>2020-07-01</discovery> + <entry>2020-07-02</entry> + </dates> + </vuln> + <vuln vid="fce7a6e7-bc5d-11ea-b38d-f0def1d0c3ea"> <topic>coturn -- information leakage</topic> <affects> |