GitLab GraphQL API user enumeration vulnerability (CVE-2021-4191) allows attackers to obtain valid usernames, potentially leading to targeted attacks
Reporter | Title | Published | Views | Family All 28 |
---|---|---|---|---|
![]() | Exploit for CVE-2021-4191 | 5 Jun 202304:08 | – | githubexploit |
![]() | Exploit for CVE-2021-4191 | 22 Jul 202321:06 | – | githubexploit |
![]() | CVE-2021-4191 | 28 Mar 202218:53 | – | cvelist |
![]() | GitLab GraphQL API User Enumeration | 1 Mar 202214:57 | – | metasploit |
![]() | CVE-2021-4191 | 28 Mar 202219:15 | – | cve |
![]() | GitLab 13.0 < 14.6.5 / 14.7 < 14.7.4 / 14.8 < 14.8.2 (CVE-2021-4191) | 14 Mar 202200:00 | – | nessus |
![]() | FreeBSD : Gitlab -- multiple vulnerabilities (2823048d-9f8f-11ec-8c9c-001b217b3468) | 10 Mar 202200:00 | – | nessus |
![]() | GitLab GraphQL API User Enumeration | 4 Mar 202221:56 | – | nuclei |
![]() | CVE-2021-4191 | 28 Mar 202219:15 | – | debiancve |
![]() | GitLab GraphQL API User Enumeration | 1 Sep 202400:00 | – | packetstorm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo