DELTA 505958 0 44855
SVN /Z. ; !a ;9i @@U PmUx^K0r
.PF(`&lWpK4GAh~?Im4;'[+RJVQucnxt:%/nAe&SR!\Z5=B Nݞ`oF[8΅³=,@/<-E9>B.>JW}5/2:G)A" : C 9a w?C = A vid="da459dbc-5586-11e9-abd69.0
DoS potential for regex in CI/CD refs
Related branches visible in issues for guests
Persistent XSS at merge request resolve conflicts
Improper authorization cont C = Cx^N0):TLV ظNIޞCBbK,l5j/=!Hŕo~k] ;zaIz+6p4IDv~GIJxZ{- ȾHbI弄J33آȓVrl(FcxPR&y /)(ڷƮƶZY-?758poURc̐* z U>V vr = x-d224-11e8-9623-a4badb2f4699">
libsshlibssh 0.6 0.7.6 0.8 0.8.4gladiac reports: libssh versions 0.6 and above have an authentication bypass vulnerability in the server code. By presenting the server an SSH2_MSG_USERAUTH_SUCCESS message in place of the SSH2_MSG_USERAUTH_REQUEST message which the serve ] q9 w, = [>
Markdown DoS
Information Disclosure Prometheus Metrics
CSRF in System Hooks
Persistent XSS Pipeline Tooltip
Persistent XSS in Br zC = Cx^N03<_ #k˄i;lЭjH*)=)`a>XeKPhm O Uȃ0.+7 0M͕zG[{ -Ղ $CY.!=QvBZT:Hh(2aGoXl;X@Ȭ(_-SL6 Н -* ! 65 ~?+
http://tomcat.apache.org/security-7.html CVE-2018-1304 CVE-2018-1305 2018-02-23 2018-02-23