2018-10-17-5: Improper Access Control
In some conditions, content moderation fails to check a users access to use certain transitions, leading to an access bypass.
References
Detect and mitigate 2018-10-17-5 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →