[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

252271

 
 

909

 
 

196835

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 196097 Download | Alert*

The host is installed with GitLab CE/EE 12.6 before 15.2.5, 15.3 before 15.3.4 or 15.4 before 15.4.1 and is prone to a information exposure vulnerability. A flaw is present in the application, which fails to properly handle GitHub integration's access token. Successful exploitation allows a malicious maintainer could exfiltrate a GitHub integration's access token by modifying the integration URL s ...

The host is installed with GitLab CE/EE 1.0 before 15.6.7, 15.7 before 15.7.6 or 15.8 before 15.8.1 and is prone to a cross site request forgery vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to take over a project if an owner or maintainer uploads a file to a malicious project.

The host is installed with GitLab CE/EE 1.0 before 15.6.7, 15.7 before 15.7.6 or 15.8 before 15.8.1 and is prone to a cross site request forgery vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to take over a project if an owner or maintainer uploads a file to a malicious project.

The host is installed with GitLab CE/EE 14.3 before 15.6.7, 15.7 before 15.7.6 or 15.8 before 15.8.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to upload a crafted CI job artifact zip file in a project that uses dynamic child pipelines and make a sidekiq job al ...

The host is installed with GitLab CE/EE 14.3 before 15.6.7, 15.7 before 15.7.6 or 15.8 before 15.8.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to upload a crafted CI job artifact zip file in a project that uses dynamic child pipelines and make a sidekiq job al ...

The host is installed with GitLab CE/EE 15.3 before 15.7.8, 15.8 before 15.8.4 or 15.9 before 15.9.2 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle an issue in the title field of work items. Successful exploitation allows attackers to perform arbitrary actions on behalf of victims at client side.

The host is installed with GitLab CE/EE 15.3 before 15.7.8, 15.8 before 15.8.4 or 15.9 before 15.9.2 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle an issue in the title field of work items. Successful exploitation allows attackers to perform arbitrary actions on behalf of victims at client side.

The host is installed with GitLab CE/EE 15.2 before 15.9.6, 15.10 before 15.10.5, 15.11 before 15.11.1 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows an attacker to map a private email of a GitLab user to their GitLab account on an instance.

The host is installed with GitLab CE/EE 15.2 before 15.9.6, 15.10 before 15.10.5, 15.11 before 15.11.1 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows an attacker to map a private email of a GitLab user to their GitLab account on an instance.


Pages:      Start    11096    11097    11098    11099    11100    11101    11102    11103    11104    11105    11106    11107    11108    11109    ..   19609

© SecPod Technologies