The host is installed with GitLab CE/EE 16.7 before 16.8.6, 16.9.0 before 16.9.4 or 16.10.0 before 16.10.2 and is prone to a stored XSS vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. On successful exploitation, an attacker may perform arbitrary actions on behalf of victims.
The host is installed with GitLab CE/EE 16.9.0 before 16.9.4 or 16.10.0 before 16.10.2 and is prone to a stored XSS vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. On successful exploitation, an attacker may perform arbitrary actions on behalf of victims.
The host is installed with GitLab CE/EE 16.9.0 before 16.9.4 or 16.10.0 before 16.10.2 and is prone to a stored XSS vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. On successful exploitation, an attacker may perform arbitrary actions on behalf of victims.
The host is installed with Atlassian Confluence Server before 7.19.20 or 7.20.0 before 8.5.7 and is prone to a path traversal vulnerability. A flaw is present in the application which fails to properly handle an issue in unspecified vectors. Successful exploitation allows an unauthenticated attacker to exploit an undefinable vulnerability which has high impact to confidentiality, high impact to in ...
The host is installed with VMware Workstation 17.x before 17.5.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle issues in the Host Guest File Sharing (HGFS) functionality. Successful exploitation could allow an attacker with local administrative privileges on a virtual machine may be able to read privileged information ...
The host is installed with VMware Workstation 17.x before 17.5.2 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle issues in the vbluetooth device. Successful exploitation could allow an attacker local administrative privileges on a virtual machine may be able to read privileged information contained in hypervisor memory f ...
The host is installed with VMware Workstation 17.x before 17.5.2 and is prone to a use-after-free vulnerability. A flaw is present in the application, which fails to properly handle issues in the vbluetooth device. Successful exploitation could allow an attacker with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process run ...
The host is installed with Docker-ce or Docker-ee version 19.03.0 and is prone to a code injection vulnerability. A flaw is present in the application, which fails to handle an issue in GNU C Library (aka glibc). Successful exploitation allows attackers to perform privilege escalation.
The host is installed with Docker-ce or Docker-ee version 19.03.0 and is prone to a code injection vulnerability. A flaw is present in the application, which fails to handle an issue in GNU C Library (aka glibc). Successful exploitation allows attackers to perform privilege escalation.
The host is installed with HP Linux Imaging and Printing 3.x before 3.11.10 and is prone to unspecified vulnerability. A flaw is present in the application, which creates temporary files in an insecure manner. Successful exploitation allows attackers to perform symbolic-link attacks, overwriting arbitrary files in the context of the affected application.