VYPR

apk package

chainguard/gitlab-rails-ce-assets-fips-18.7

pkg:apk/chainguard/gitlab-rails-ce-assets-fips-18.7

Vulnerabilities (27)

  • CVE-2026-0595Feb 11, 2026
    affected < 18.7.4-r0fixed 18.7.4-r0

    GitLab has remediated an issue in GitLab CE/EE affecting all versions from 13.9 before 18.6.6, 18.7 before 18.7.4, and 18.8 before 18.8.4 that, under certain conditions could have allowed an authenticated user to add unauthorized email addresses to victim accounts through HTML in

  • CVE-2026-1282Feb 11, 2026
    affected < 18.7.4-r0fixed 18.7.4-r0

    GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.6 before 18.6.6, 18.7 before 18.7.4, and 18.8 before 18.8.4 that could have allowed an authenticated user to inject malicious content into project labels titles.

  • CVE-2026-1456Feb 11, 2026
    affected < 18.7.4-r0fixed 18.7.4-r0

    GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.7 before 18.7.4, and 18.8 before 18.8.4 that could have allowed an unauthenticated user to cause denial of service through CPU exhaustion by submitting specially crafted markdown files that trigger expo

  • CVE-2026-1458Feb 11, 2026
    affected < 18.7.4-r0fixed 18.7.4-r0

    GitLab has remediated an issue in GitLab CE/EE affecting all versions from 8.0 before 18.6.6, 18.7 before 18.7.4, and 18.8 before 18.8.4 that, under certain conditions could have allowed an unauthenticated user to cause denial of service by uploading malicious files.

  • CVE-2025-68121CriFeb 5, 2026
    affected < 18.7.4-r0fixed 18.7.4-r0

    During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and

  • CVE-2026-0775HigJan 23, 2026
    affected < 18.7.3-r0fixed 18.7.3-r0

    npm cli Incorrect Permission Assignment Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of npm cli. An attacker must first obtain the ability to execute low-privileged code on the target system i

  • CVE-2026-24001Jan 22, 2026
    affected < 0fixed 0

    jsdiff is a JavaScript text differencing implementation. Prior to versions 8.0.3, 5.2.2, 4.0.4, and 3.5.1, attempting to parse a patch whose filename headers contain the line break characters `\r`, `\u2028`, or `\u2029` can cause the `parsePatch` method to enter an infinite loop.

  • CVE-2025-68696HigDec 23, 2025
    affected < 18.7.0-r0fixed 18.7.0-r0

    httparty is an API tool. In versions 0.23.2 and prior, httparty is vulnerable to SSRF. This issue can pose a risk of leaking API keys, and it can also allow third parties to issue requests to internal servers. This issue has been patched via commit 0529bcd.

  • CVE-2024-8796Sep 17, 2024
    affected < 18.7.0-r0fixed 18.7.0-r0

    Under the default configuration, Devise-Two-Factor versions >= 2.2.0 & < 6.0.0 generate TOTP shared secrets that are 120 bits instead of the 128-bit minimum defined by RFC 4226. Using a shared secret shorter than the minimum to generate a multi-factor authentication code could ma

  • CVE-2024-36361MedMay 24, 2024
    affected < 0fixed 0

    Pug through 3.0.2 allows JavaScript code execution if an application accepts untrusted input for the name option of the compileClient, compileFileClient, or compileClientWithDependenciesTracked function. NOTE: these functions are for compiling Pug templates into JavaScript, and t

  • CVE-2024-29034Mar 24, 2024
    affected < 18.7.0-r0fixed 18.7.0-r0

    CarrierWave is a solution for file uploads for Rails, Sinatra and other Ruby web frameworks. The vulnerability CVE-2023-49090 wasn't fully addressed. This vulnerability is caused by the fact that when uploading to object storage, including Amazon S3, it is possible to set a Conte

  • CVE-2023-49090Nov 29, 2023
    affected < 18.7.0-r0fixed 18.7.0-r0

    CarrierWave is a solution for file uploads for Rails, Sinatra and other Ruby web frameworks. CarrierWave has a Content-Type allowlist bypass vulnerability, possibly leading to XSS. The validation in `allowlisted_content_type?` determines Content-Type permissions by performing a p

  • CVE-2021-23383May 4, 2021
    affected < 0fixed 0

    The package handlebars before 4.7.7 are vulnerable to Prototype Pollution when selecting certain compiling options to compile templates coming from an untrusted source.

  • CVE-2021-23369Apr 12, 2021
    affected < 0fixed 0

    The package handlebars before 4.7.7 are vulnerable to Remote Code Execution (RCE) when selecting certain compiling options to compile templates coming from an untrusted source.

  • CVE-2021-21353Mar 3, 2021
    affected < 0fixed 0

    Pug is an npm package which is a high-performance template engine. In pug before version 3.0.1, if a remote attacker was able to control the `pretty` option of the pug compiler, e.g. if you spread a user provided object such as the query parameters of a request into the pug temp

  • CVE-2020-7788Dec 11, 2020
    affected < 0fixed 0

    This affects the package ini before 1.3.6. If an attacker submits a malicious INI file to an application that parses it with ini.parse, they will pollute the prototype on the application. This can be exploited further depending on the context.

  • CVE-2019-20920Sep 30, 2020
    affected < 0fixed 0

    Handlebars before 3.0.8 and 4.x before 4.5.3 is vulnerable to Arbitrary Code Execution. The lookup helper fails to properly validate templates, allowing attackers to submit templates that execute arbitrary JavaScript. This can be used to run arbitrary code on a server processing

  • CVE-2020-7712Aug 30, 2020
    affected < 0fixed 0

    This affects the package json before 10.0.0. It is possible to inject arbritary commands using the parseLookup function.

  • CVE-2020-15095Jul 7, 2020
    affected < 0fixed 0

    Versions of the npm CLI prior to 6.14.6 are vulnerable to an information exposure vulnerability through log files. The CLI supports URLs like "://[[:]@][:][:][/]". The password value is not redacted and is printed to stdout and also

  • CVE-2019-19919Dec 20, 2019
    affected < 0fixed 0

    Versions of handlebars prior to 4.3.0 are vulnerable to Prototype Pollution leading to Remote Code Execution. Templates may alter an Object's __proto__ and __defineGetter__ properties, which may allow an attacker to execute arbitrary code through crafted payloads.

Page 1 of 2