GitLab has released security updates for Community Edition (CE) and Enterprise Edition (EE) to address eight security flaws, including a critical bug that could allow running Continuous Integration and Continuous Delivery (CI/CD) pipelines on arbitrary branches.
Tracked as CVE-2024-9164, the vulnerability carries a CVSS score of 9.6 out of 10.
"An issue was discovered in GitLab EE
A vulnerability was found in ShopLentor Plugin up to 2.9.8 on WordPress. It has been classified as problematic. Affected is an unknown function of the component FAQ Widget Elementor Template. The manipulation leads to information disclosure.
This vulnerability is traded as CVE-2024-9538. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in Comments Import & Export Plugin up to 2.3.7 on WordPress and classified as critical. This issue affects some unknown processing. The manipulation leads to path traversal.
The identification of this vulnerability is CVE-2024-7514. The attack may be initiated remotely. There is no exploit available.
A vulnerability has been found in Open Cluster Management and classified as problematic. This vulnerability affects unknown code of the component cluster-manager. The manipulation leads to permission issues.
This vulnerability was named CVE-2024-9779. Access to the local network is required for this attack to succeed. There is no exploit available.
A vulnerability, which was classified as problematic, was found in GitHub Enterprise Server up to 3.11.15/3.12.9/3.13.4/3.14.1. This affects an unknown part of the component SAML SSO. The manipulation leads to improper verification of cryptographic signature.
This vulnerability is uniquely identified as CVE-2024-9487. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Snipe-IT up to 7.0.9. Affected by this issue is some unknown functionality. The manipulation of the argument APP_KEY leads to Privilege Escalation.
This vulnerability is handled as CVE-2024-48987. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in Gradio up to 4.x. Affected by this vulnerability is the function async_save_url_to_cache of the file /queue/join of the component Video Component. The manipulation leads to server-side request forgery.
This vulnerability is known as CVE-2024-47167. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in Gradio up to 4.x. Affected is an unknown function. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2024-47872. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in HashiCorp Vault and Vault Enterprise. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to incorrect privilege assignment.
The identification of this vulnerability is CVE-2024-9180. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in jsonpath-plus up to 9.x. It has been declared as critical. This vulnerability affects unknown code. The manipulation leads to code injection.
This vulnerability was named CVE-2024-21534. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Gradio up to 4.43. It has been classified as critical. This affects an unknown part. The manipulation leads to improper authorization.
This vulnerability is uniquely identified as CVE-2024-47084. An attack has to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Gradio up to 4.x and classified as critical. Affected by this issue is some unknown functionality. The manipulation of the argument localhost_aliases leads to improper authorization.
This vulnerability is handled as CVE-2024-47165. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Gradio up to 4.43 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /monitoring. The manipulation leads to incorrect control flow.
This vulnerability is known as CVE-2024-47168. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in Gradio up to 4.x. Affected is an unknown function. The manipulation leads to cleartext transmission of sensitive information.
This vulnerability is traded as CVE-2024-47871. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Gradio up to 4.43. This issue affects some unknown processing of the file /custom_component. The manipulation leads to path traversal.
The identification of this vulnerability is CVE-2024-47166. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in Gradio up to 4.x. This vulnerability affects the function is_in_or_equal. The manipulation leads to path traversal.
This vulnerability was named CVE-2024-47164. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in Gradio up to 4.x. This affects the function update_root_in_config. The manipulation leads to race condition.
This vulnerability is uniquely identified as CVE-2024-47870. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.