[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256610

 
 

909

 
 

199263

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 198378 Download | Alert*

The host is installed with VMware Workstation 17.x before 17.0.1 and is prone to an arbitrary file deletion vulnerability. A flaw is present in the application, which fails to properly handle an unspecified vector. Successful exploitation allows an attacker with local user privileges on the victim's machine may exploit this vulnerability to delete arbitrary files from the file system of the machin ...

The host is installed with GitLab CE/EE 10.0 before 12.9.8, 12.10 before 12.10.7 or 13.0 before 13.0.1 and is prone an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a user with the role of developer. Successful exploitation allows an attacker to use the import project feature to leak CI/CD variables.

The host is installed with GitLab CE/EE 10.0 before 12.9.8, 12.10 before 12.10.7 or 13.0 before 13.0.1 and is prone an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle a user with the role of developer. Successful exploitation allows an attacker to use the import project feature to leak CI/CD variables.

The host is installed with GitLab EE 14.2 before 15.9.6, 15.10 before 15.10.5, 15.11 before 15.11.1 and is prone to a cross-site request forgery vulnerability. A flaw is present in the application, which fails to properly handle a maliciously crafted URL. Successful exploitation allows attackers to obtain access tokens granted for 3rd party Group SAML SSO logins.

The host is installed with GitLab EE 14.2 before 15.9.6, 15.10 before 15.10.5, 15.11 before 15.11.1 and is prone to a cross-site request forgery vulnerability. A flaw is present in the application, which fails to properly handle a maliciously crafted URL. Successful exploitation allows attackers to obtain access tokens granted for 3rd party Group SAML SSO logins.

The host is installed with GitLab CE/EE 13.7 before 15.11.10, 16.0 before 16.0.6 or 16.1 before 16.1.1 and is prone to an improper access control. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to leak the email address of a user who created a service desk issue.

The host is installed with GitLab CE/EE 13.7 before 15.11.0, 16.0 before 16.0.6 or 16.1 before 16.1.1 and is prone to an improper access control. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow remote attackers to leak the email address of a user who created a service desk issue.

The host is installed with GitLab CE/EE 5.1 before 15.9.6, 15.10 before 15.10.5, 15.11 before 15.11.1 and is prone to a cross-site request forgery vulnerability. A flaw is present in the application, which fails to properly handle specific circumstances. Successful exploitation allows attackers to render as HTML, when viewing an XML file in a repository in "raw" mode.

The host is installed with GitLab CE/EE 5.1 before 15.9.6, 15.10 before 15.10.5, 15.11 before 15.11.1 and is prone to a cross-site request forgery vulnerability. A flaw is present in the application, which fails to properly handle specific circumstances. Successful exploitation allows attackers to render as HTML, when viewing an XML file in a repository in "raw" mode.

The host is installed with Avast Antivirus before 22.11 or AVG Antivirus before 22.11 and is prone to a time-of-check/time-of-use (TOCTOU) vulnerability. A flaw exists in the application. which fails to properly handle the restore process. Successful exploitation allows attackers to create arbitrary file.


Pages:      Start    10411    10412    10413    10414    10415    10416    10417    10418    10419    10420    10421    10422    10423    10424    ..   19837

© SecPod Technologies