Anchors
| Anchor text | Ref. domains ▾ | Top DR | Ref. pages | Links to target | Dofollow links |
|---|---|---|---|---|---|
| https://advisories.gitlab.com/pkg/gem/activejob/OSVDB-112347 | 2 | — | 0 | 2 | 2 100% |
| Easy!Appointments Improper Restriction of Excessive Authentication AttemptsHome on GitLab Advisory Database / 11moAn issue in Alex Tselegidis EasyAppointments v.1.5.0 allows a remote attacker to escalate privileges via the index.php file. | 1 | — | 0 | 1 | 1 100% |
| snowflake-connector-python vulnerable to insecure deserialization of the OCSP response cacheHome on GitLab Advisory Database / 12moCVE-2025-24794: snowflake-connector-python vulnerable to insecure deserialization of the OCSP response cache Snowflake released version 3.13.1 of the Snowflake Connector for Python, which fixes this issue. | 1 | — | 0 | 1 | 1 100% |
| here | 1 | — | 0 | 1 | 1 100% |
| 。 advisories.gitlab | 1 | — | 0 | 1 | 1 100% |
| org.xwiki.platform:xwiki-platform-security-requiredrights-default required rights analysis doesn't consider TextAreas with default content typeHome on GitLab Advisory Database / 9moWhen editing a page, XWiki warns since version 15.9 when there is content on the page like a script macro that would gain more rights due to the editing. This analysis doesn't consider certain kinds of properties, allowing a user to put malicious scripts in there that will be executed after a user with script, admin, or | 1 | — | 0 | 1 | 1 100% |
| Gitlab Advisory Database (GAD) | 1 | — | 0 | 1 | 0 0% |
| mavo DOM Clobbering vulnerabilityHome on GitLab Advisory Database / 11moA DOM Clobbering vulnerability in mavo v0.3.2 allows attackers to execute arbitrary code via supplying a crafted HTML element. | 1 | — | 0 | 1 | 1 100% |
| Vendor Advisory | 1 | — | 0 | 1 | 1 100% |
| `gh attestation verify` returns incorrect exit code during verification if no attestations are presentHome on GitLab Advisory Database / 11moA bug in GitHub's Artifact Attestation CLI tool, gh attestation verify, may return an incorrect zero exit status when no matching attestations are found for the specified –predicate-type or the default https://slsa.dev/provenance/v1 if not specified. This issue only arises if an artifact has an attestation with a predicate type different from the one provided in | 1 | — | 0 | 2 | 2 100% |
| https://advisories.gitlab.com/pkg/golang/github.com/containerd/containerd/v2/CVE-2025-64329/ | 1 | — | 0 | 1 | 1 100% |
| CVE-2024-56520 | 1 | — | 0 | 1 | 1 100% |
| Linkerd resource exhaustion vulnerabilityHome on GitLab Advisory Database / 9moIn Buoyant Edge releases before edge-25.2.1 and Enterprise for Linkerd releases 2.16.* before 2.16.5, 2.17.* before 2.17.2, and 2.18.* before 2.18.0, resource exhaustion can occur for Linkerd proxy metrics. | 1 | — | 0 | 1 | 1 100% |
| EVE Freely Allocates Buffer on The Stack With Data From SocketHome on GitLab Advisory Database / 2dVTPM server listens on port 8877, exposing limited TPM functionality. The server reads 4 bytes as a uint32 size header, then allocates that amount on the stack for incoming data. This allows Denial of Service attacks against the vTPM service. An workload (a container or VM) running on EVE-OS can use this to generate a DOS against the vTPM service. | 1 | — | 0 | 1 | 1 100% |
| https://advisories.gitlab.com | 1 | — | 0 | 1 | 0 0% |
| Gitlab | 1 | — | 0 | 1 | 1 100% |
| https://advisories.gitlab.com/pkg/gem/activejob/GHSA-mpwp-4h2m-765c | 1 | — | 0 | 1 | 1 100% |
| https://advisories.gitlab.com/pkg/gem/rollout-ui/CVE-2023-25309 | 1 | — | 0 | 1 | 1 100% |
| GitLab Advisory (GMS-2025-498) | 1 | — | 0 | 1 | 0 0% |
| BentoML Denial of Service (DoS) via Multipart BoundaryHome on GitLab Advisory Database / 10moBentoML version v1.3.4post1 is vulnerable to a Denial of Service (DoS) attack. The vulnerability can be exploited by appending characters, such as dashes (-), to the end of a multipart boundary in an HTTP request. This causes the server to continuously process each character, leading to excessive resource consumption and rendering the service unavailable. The issue is unauthenticated and does not require any user in | 1 | — | 0 | 1 | 1 100% |
| GitLab Advisory Database | 1 | — | 0 | 1 | 0 0% |
| GitLab advisory database | 1 | — | 0 | 1 | 1 100% |
| Terraform WinDNS Provider improperly sanitizes input variables in `windns_record`Home on GitLab Advisory Database / 9moImpact: A security issue has been found in terraform-provider-windns before version 1.0.5. The windns_record resource did not santize the input variables. This can lead to authenticated command injection in the underlyding powershell command prompt. Patches: | 1 | — | 0 | 1 | 1 100% |
| https://advisories.gitlab.com/pkg/gem/activerecord-jdbc-adapter/OSVDB-2013-02-25 | 1 | — | 0 | 1 | 1 100% |
| https://advisories.gitlab.com/pkg/gem/activerecord-jdbc-adapter/GHSA-5qw5-wf2q-f538 | 1 | — | 0 | 1 | 1 100% |
| https://advisories.gitlab.com/pkg/composer/mdanter/ecc/CVE-2024-33851/ | 1 | — | 0 | 1 | 1 100% |
| CVE-2024-5138: snapd snapctl auth bypassHome on GitLab Advisory Database / 12moA snap with prior permissions to create a mount entry on the host, such as firefox, normally uses the permission from one of the per-snap hook programs. A unprivileged users cannot normally trigger that behaviour by using snap run –shell firefox followed by snapctl mount, since snapd validates the requesting user identity (root or non-root). The issue allows unprivileged users to bypass that check by crafting a malicious comman | 1 | — | 0 | 1 | 1 100% |
| useragent Regular Expression Denial of Service vulnerabilityHome on GitLab Advisory Database / 15moUseragent is a user agent parser for Node.js. All versions as of time of publication contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). | 1 | — | 0 | 1 | 1 100% |
Frequently Asked Questions
What anchor texts are used to link to advisories.gitlab.com?
This page shows all anchor texts found in backlinks pointing to advisories.gitlab.com, sorted by the number of referring domains using each anchor. Anchor texts range from branded terms (like the domain name itself) to keyword-rich phrases that describe the linked content. The distribution of anchor texts reveals how other websites perceive and describe advisories.gitlab.com.
What is anchor text?
Anchor text is the visible, clickable text in a hyperlink. Search engines use anchor text as a signal to understand what the linked page is about. For example, if many sites link to a page using the anchor text "best running shoes," search engines infer that the page is relevant to that topic. Anchor text appears in several forms: exact-match (contains target keywords), branded (uses the company or domain name), generic (like "click here"), and naked URLs.
Why is anchor text analysis important for SEO?
Anchor text analysis helps identify potential SEO risks and opportunities. A natural backlink profile has diverse anchor texts including branded terms, generic phrases, and topic-relevant keywords. Over-optimization, where too many backlinks use the same exact-match keyword anchor, can trigger search engine penalties. Conversely, understanding which anchors drive the most authority (measured by referring domain count and DR) helps prioritize link building efforts.
How many unique anchor texts does advisories.gitlab.com have?
The anchor text report for advisories.gitlab.com displays all distinct anchor texts grouped by their hash. Each row shows how many unique referring domains use that anchor, the total number of links, and the dofollow percentage. A high number of unique anchors generally indicates a healthy, natural backlink profile with diverse link sources.