[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 10984 Download | Alert*

The host is installed with Google Chrome before 101.0.4951.41 and is prone to an inappropriate implementation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with GitLab EE 11.10 prior to 14.9.5, 14.10 prior to 14.10.4, or 15.0 prior to 15.0.1 and is prone to an account take over vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation allows any owner of a Premium group to invite arbitrary users through their username and email, then change those users email addresses via ...

The host is installed with GitLab EE 11.10 prior to 14.9.5, 14.10 prior to 14.10.4, or 15.0 prior to 15.0.1 and is prone to an account take over vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation allows any owner of a Premium group to invite arbitrary users through their username and email, then change those users email addresses via ...

The host is installed with GitLab EE 13.11 prior to 14.9.5, 14.10 prior to 14.10.4, or 15.0 prior to 15.0.1 and is prone to a stored cross-site scripting vulnerability. A flaw is present in the application, which fails to handle specially crafted Jira Issues. Successful exploitation allows an attacker to execute arbitrary JavaScript code in GitLab on a victim's behalf.

The host is installed with GitLab EE 13.11 prior to 14.9.5, 14.10 prior to 14.10.4, or 15.0 prior to 15.0.1 and is prone to a stored cross-site scripting vulnerability. A flaw is present in the application, which fails to handle specially crafted Jira Issues. Successful exploitation allows an attacker to execute arbitrary JavaScript code in GitLab on a victim's behalf.

The host is installed with GitLab CE/EE 15.0 before 15.0.1 and is prone to an cross-Site scripting vulnerability. A flaw is present in the application, which fails to validate the input used in quick actions. Successful exploitation allows attackers to exploit XSS.

The host is installed with GitLab CE/EE 15.0 before 15.0.1 and is prone to an cross-Site scripting vulnerability. A flaw is present in the application, which fails to validate the input used in quick actions. Successful exploitation allows attackers to exploit XSS.

The host is installed with GitLab CE/EE 11.3.4 before 15.1.5, 15.2 before 15.2.3 or 15.3 before 15.3.1 and is prone to a remote command execution vulnerability. A flaw is present in the application, which fails to properly validate the input within the Import from GitHub API endpoint. Successful exploitation allows an authenticated remote attacker to pass specially crafted data to the application ...

The host is installed with GitLab CE/EE 11.3.4 before 15.1.5, 15.2 before 15.2.3 or 15.3 before 15.3.1 and is prone to a remote command execution vulnerability. A flaw is present in the application, which fails to properly validate the input within the Import from GitHub API endpoint. Successful exploitation allows an authenticated remote attacker to pass specially crafted data to the application ...

The host is installed with GitLab EE 14.5 before 14.10.5, 15.0 before 15.0.4 or 15.1 before 15.1.1 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle issues in GitLab EE's external issue tracker. Successful exploitation could allows an attacker to perform cross-site scripting when a victim clicks on a maliciously crafted ZenTa ...


Pages:      Start    649    650    651    652    653    654    655    656    657    658    659    660    661    662    ..   1098

© SecPod Technologies