[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15134 Download | Alert*

The host is installed with GitLab CE/EE before 15.9.6, 15.10 before 15.10.5, 15.11 before 15.11.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle the main branch of a repository. Successful exploitation allows an attacker to create repositories with malicious code, victims who clone or download these repositories will ...

The host is installed with GitLab CE/EE before 15.9.6, 15.10 before 15.10.5, 15.11 before 15.11.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle the main branch of a repository. Successful exploitation allows an attacker to create repositories with malicious code, victims who clone or download these repositories will ...

The host is installed with GitLab CE/EE 15.2 before 16.0.8, 16.1 before 16.1.3, or 16.2 before 16.2.2 and is prone to a regular expression denial of service vulnerability. A flaw is present in the application, which fails to properly handle the crafted payloads used to search Harbor Registry. Successful exploitation could allow attackers to cause regular expression denial of service.

The host is installed with GitLab CE/EE 15.2 before 16.0.8, 16.1 before 16.1.3, or 16.2 before 16.2.2 and is prone to a regular expression denial of service vulnerability. A flaw is present in the application, which fails to properly handle the crafted payloads used to search Harbor Registry. Successful exploitation could allow attackers to cause regular expression denial of service.

The host is installed with GitLab CE/EE 14.0 before 15.6.7, 15.7 before 15.7.6 or 15.8 before 15.8.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to trigger a DoS attack by uploading a malicious Helm chart.

The host is installed with GitLab CE/EE 14.0 before 15.6.7, 15.7 before 15.7.6 or 15.8 before 15.8.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to trigger a DoS attack by uploading a malicious Helm chart.

The host is installed with GitLab CE/EE 13.11 before 15.8.5, 15.9 before 15.9.4, 15.10 before 15.10.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle the exposure of resource to wrong sphere. Successful exploitation allows for an attacker to cause a user role, who is a project member demoted previously, to read project u ...

The host is installed with GitLab CE/EE 13.11 before 15.8.5, 15.9 before 15.9.4, 15.10 before 15.10.1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle the exposure of resource to wrong sphere. Successful exploitation allows for an attacker to cause a user role, who is a project member demoted previously, to read project u ...

The host is installed with GitLab CE/EE 15.7 before 15.8.5, 15.8 before 15.9.4, 15.9 before 15.10.1 and is prone to an open redirect vulnerability. A flaw is present in the application, which fails to properly handle an open redirects issue. Successful exploitation allows for an attacker to frame arbitrary content on any page allowing user controlled markdown.

The host is installed with GitLab CE/EE 15.7 before 15.8.5, 15.8 before 15.9.4, 15.9 before 15.10.1 and is prone to an open redirect vulnerability. A flaw is present in the application, which fails to properly handle an open redirects issue. Successful exploitation allows for an attacker to frame arbitrary content on any page allowing user controlled markdown.


Pages:      Start    929    930    931    932    933    934    935    936    937    938    939    940    941    942    ..   1513

© SecPod Technologies