A hardcoded password was set for accounts registered using an OmniAuth provider (e.g. OAuth, LDAP, SAML) in GitLab CE/EE versions 14.7 prior to 14.7.7, 14.8 prior to 14.8.5, and 14.9 prior to 14.9.2 allowing attackers to potentially take over accounts
CVE Infomation | Exploits or more Infomation |
---|---|
mitre | EXPLOIT DATABASE |
NVD | 0day.today |
vulmon.com | github |
CVE Details | |
JVN ENG JPN | |
Reconshell |
Software Tag:
List of frequently cited URLs
User | URL | Info Source | Date |
---|---|---|---|
VulmonFeeds | https://alerts.vulmon.com/?utm_source=twitter&utm_medium=so... | Source VulmonFeeds 1640817809998376960 | 2023/03/29 |
List of frequently cited URLs
URL | Num of Times Referred to |
---|---|
cvetrends.com | 54 |
twinybots.ch | 33 |
thehackernews.com | 10 |
opsmtrs.com | 9 |
securityaffairs.co | 5 |
www.bleepingcomputer.com | 5 |
ift.tt | 4 |
twitter.com | 4 |
securityonline.info | 4 |
about.gitlab.com | 3 |
User | URL | Info Source |
---|---|---|
VulmonFeeds | alerts.vulmon.com | Show Tweet |
Name | URL |
---|---|
Greenwolf/CVE-2022-1162 | https://github.com/Greenwolf/CVE-2022-1162 |
Name | URL |
---|---|
Greenwolf/CVE-2022-1162 | github.com |