[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15249 Download | Alert*

The host is installed with GitLab CE/EE 16.7 before 16.8.6, 16.9.0 before 16.9.4 or 16.10.0 before 16.10.2 and is prone to a stored XSS vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. On successful exploitation, an attacker may perform arbitrary actions on behalf of victims.

The host is installed with GitLab CE/EE 16.9.0 before 16.9.4 or 16.10.0 before 16.10.2 and is prone to a stored XSS vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. On successful exploitation, an attacker may perform arbitrary actions on behalf of victims.

The host is installed with GitLab CE/EE 16.9.0 before 16.9.4 or 16.10.0 before 16.10.2 and is prone to a stored XSS vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. On successful exploitation, an attacker may perform arbitrary actions on behalf of victims.

The host is installed with Atlassian Confluence Server before 7.19.20 or 7.20.0 before 8.5.7 and is prone to a path traversal vulnerability. A flaw is present in the application which fails to properly handle an issue in unspecified vectors. Successful exploitation allows an unauthenticated attacker to exploit an undefinable vulnerability which has high impact to confidentiality, high impact to in ...

The host is installed with VMware Workstation 17.x before 17.5.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle issues in the Host Guest File Sharing (HGFS) functionality. Successful exploitation could allow an attacker with local administrative privileges on a virtual machine may be able to read privileged information ...

The host is installed with VMware Workstation 17.x before 17.5.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle issues in the vbluetooth device. Successful exploitation could allow an attacker local administrative privileges on a virtual machine may be able to read privileged information contained in hypervisor memory f ...

The host is installed with VMware Workstation 17.x before 17.5.2 and is prone to a use-after-free vulnerability. A flaw is present in the application, which fails to properly handle issues in the vbluetooth device. Successful exploitation could allow an attacker with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process run ...

The host is installed with Docker-ce or Docker-ee version 19.03.0 and is prone to a code injection vulnerability. A flaw is present in the application, which fails to handle an issue in GNU C Library (aka glibc). Successful exploitation allows attackers to perform privilege escalation.

The host is installed with Docker-ce or Docker-ee version 19.03.0 and is prone to a code injection vulnerability. A flaw is present in the application, which fails to handle an issue in GNU C Library (aka glibc). Successful exploitation allows attackers to perform privilege escalation.

The host is installed with HP Linux Imaging and Printing 3.x before 3.11.10 and is prone to unspecified vulnerability. A flaw is present in the application, which creates temporary files in an insecure manner. Successful exploitation allows attackers to perform symbolic-link attacks, overwriting arbitrary files in the context of the affected application.


Pages:      Start    5    6    7    8    9    10    11    12    13    14    15    16    17    18    ..   1524

© SecPod Technologies