[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 11040 Download | Alert*

The host is installed with GitLab EE 13.11 prior to 14.9.5, 14.10 prior to 14.10.4, or 15.0 prior to 15.0.1 and is prone to a stored cross-site scripting vulnerability. A flaw is present in the application, which fails to handle specially crafted Jira Issues. Successful exploitation allows an attacker to execute arbitrary JavaScript code in GitLab on a victim's behalf.

The host is installed with GitLab CE/EE 15.0 before 15.0.1 and is prone to an cross-Site scripting vulnerability. A flaw is present in the application, which fails to validate the input used in quick actions. Successful exploitation allows attackers to exploit XSS.

The host is installed with GitLab CE/EE 15.0 before 15.0.1 and is prone to an cross-Site scripting vulnerability. A flaw is present in the application, which fails to validate the input used in quick actions. Successful exploitation allows attackers to exploit XSS.

The host is installed with GitLab CE/EE 11.3.4 before 15.1.5, 15.2 before 15.2.3 or 15.3 before 15.3.1 and is prone to a remote command execution vulnerability. A flaw is present in the application, which fails to properly validate the input within the Import from GitHub API endpoint. Successful exploitation allows an authenticated remote attacker to pass specially crafted data to the application ...

The host is installed with GitLab CE/EE 11.3.4 before 15.1.5, 15.2 before 15.2.3 or 15.3 before 15.3.1 and is prone to a remote command execution vulnerability. A flaw is present in the application, which fails to properly validate the input within the Import from GitHub API endpoint. Successful exploitation allows an authenticated remote attacker to pass specially crafted data to the application ...

The host is installed with GitLab EE 14.5 before 14.10.5, 15.0 before 15.0.4 or 15.1 before 15.1.1 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle issues in GitLab EE's external issue tracker. Successful exploitation could allows an attacker to perform cross-site scripting when a victim clicks on a maliciously crafted ZenTa ...

The host is installed with GitLab CE/EE 14.4 before 14.10.5, 15.0 before 15.0.4 or 15.1 before 15.1.1 and is prone to a stored cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle issues in unspecified vectors. Successful exploitation could allows an attacker to execute arbitrary JavaScript code in GitLab on a victim's behalf.

The host is installed with GitLab CE/EE 13.4 before 14.10.5, 15.0 before 15.0.4 or 15.1 before 15.1.1 and is prone to a multi-factor authentication security vulnerability. A flaw is present in the application, which fails to properly handle issues in unspecified vectors. On Successful exploitation, GitLab reveals if a user has enabled two-factor authentication on their account in the HTML source, ...

The host is installed with GitLab EE 12.0 before 14.10.5, 15.0 before 15.0.4 or 15.1 before 15.1.1 and is prone to an information exposure vulnerability. A flaw is present in the application, which fails to properly handle issues in unspecified vectors. Successful exploitation could allows an attacker with the appropriate access tokens to obtain CI variables in a group with using IP-based access r ...

The host is installed with GitLab CE/EE 12.4 before 14.10.5, 15.0 before 15.0.4 or 15.1 before 15.1.1 and is prone to an incorrect default permissions vulnerability. A flaw is present in the application, which fails to properly handle issues in unspecified vectors. On successful exploitation, GitLab was leaking Conan packages names due to incorrect permissions verification.


Pages:      Start    658    659    660    661    662    663    664    665    666    667    668    669    670    671    ..   1103

© SecPod Technologies