[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

252212

 
 

909

 
 

196748

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15178 Download | Alert*

The host is installed with GitLab EE 11.10 prior to 14.9.5, 14.10 prior to 14.10.4, or 15.0 prior to 15.0.1 and is prone to an account take over vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation allows any owner of a Premium group to invite arbitrary users through their username and email, then change those users email addresses via ...

The host is installed with GitLab EE 11.10 prior to 14.9.5, 14.10 prior to 14.10.4, or 15.0 prior to 15.0.1 and is prone to an account take over vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation allows any owner of a Premium group to invite arbitrary users through their username and email, then change those users email addresses via ...

The host is installed with GitLab EE 13.11 prior to 14.9.5, 14.10 prior to 14.10.4, or 15.0 prior to 15.0.1 and is prone to a stored cross-site scripting vulnerability. A flaw is present in the application, which fails to handle specially crafted Jira Issues. Successful exploitation allows an attacker to execute arbitrary JavaScript code in GitLab on a victim's behalf.

The host is installed with GitLab EE 13.11 prior to 14.9.5, 14.10 prior to 14.10.4, or 15.0 prior to 15.0.1 and is prone to a stored cross-site scripting vulnerability. A flaw is present in the application, which fails to handle specially crafted Jira Issues. Successful exploitation allows an attacker to execute arbitrary JavaScript code in GitLab on a victim's behalf.

The host is installed with GitLab CE/EE 15.0 before 15.0.1 and is prone to an cross-Site scripting vulnerability. A flaw is present in the application, which fails to validate the input used in quick actions. Successful exploitation allows attackers to exploit XSS.

The host is installed with GitLab CE/EE 15.0 before 15.0.1 and is prone to an cross-Site scripting vulnerability. A flaw is present in the application, which fails to validate the input used in quick actions. Successful exploitation allows attackers to exploit XSS.

The host is installed with GitLab CE/EE 11.3.4 before 15.1.5, 15.2 before 15.2.3 or 15.3 before 15.3.1 and is prone to a remote command execution vulnerability. A flaw is present in the application, which fails to properly validate the input within the Import from GitHub API endpoint. Successful exploitation allows an authenticated remote attacker to pass specially crafted data to the application ...

The host is installed with GitLab CE/EE 11.3.4 before 15.1.5, 15.2 before 15.2.3 or 15.3 before 15.3.1 and is prone to a remote command execution vulnerability. A flaw is present in the application, which fails to properly validate the input within the Import from GitHub API endpoint. Successful exploitation allows an authenticated remote attacker to pass specially crafted data to the application ...

The host is installed with GitLab EE 14.5 before 14.10.5, 15.0 before 15.0.4 or 15.1 before 15.1.1 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle issues in GitLab EE's external issue tracker. Successful exploitation could allows an attacker to perform cross-site scripting when a victim clicks on a maliciously crafted ZenTa ...

The host is installed with GitLab CE/EE 14.4 before 14.10.5, 15.0 before 15.0.4 or 15.1 before 15.1.1 and is prone to a stored cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle issues in unspecified vectors. Successful exploitation could allows an attacker to execute arbitrary JavaScript code in GitLab on a victim's behalf.


Pages:      Start    993    994    995    996    997    998    999    1000    1001    1002    1003    1004    1005    1006    ..   1517

© SecPod Technologies