CVE-2023-6802
- EPSS 0.03%
- Veröffentlicht 21.12.2023 21:15:14
- Zuletzt bearbeitet 21.11.2024 08:44:35
An insertion of sensitive information into the log file in the audit log in GitHub Enterprise Server was identified that could allow an attacker to gain access to the management console. To exploit this, an attacker would need access to the log files...
CVE-2023-6746
- EPSS 0.18%
- Veröffentlicht 21.12.2023 21:15:14
- Zuletzt bearbeitet 16.12.2024 19:07:48
An insertion of sensitive information into log file vulnerability was identified in the log files for a GitHub Enterprise Server back-end service that could permit an `adversary in the middle attack` when combined with other phishing techniques. To e...
- EPSS 0.09%
- Veröffentlicht 21.12.2023 21:15:14
- Zuletzt bearbeitet 21.11.2024 08:44:22
A race condition in GitHub Enterprise Server allowed an existing admin to maintain permissions on transferred repositories by making a GraphQL mutation to alter repository permissions during the transfer. This vulnerability affected GitHub Enterprise...
CVE-2023-51380
- EPSS 0.17%
- Veröffentlicht 21.12.2023 21:15:13
- Zuletzt bearbeitet 16.12.2024 19:07:20
An incorrect authorization vulnerability was identified in GitHub Enterprise Server that allowed issue comments to be read with an improperly scoped token. This vulnerability affected all versions of GitHub Enterprise Server since 3.7 and was fixed i...
CVE-2023-51379
- EPSS 0.14%
- Veröffentlicht 21.12.2023 21:15:13
- Zuletzt bearbeitet 16.12.2024 19:07:10
An incorrect authorization vulnerability was identified in GitHub Enterprise Server that allowed issue comments to be updated with an improperly scoped token. This vulnerability did not allow unauthorized access to any repository content as it also r...
- EPSS 0.15%
- Veröffentlicht 21.12.2023 21:15:09
- Zuletzt bearbeitet 21.11.2024 08:28:58
A race condition in GitHub Enterprise Server was identified that could allow an attacker administrator access. To exploit this, an organization needs to be converted from a user. This vulnerability affected all versions of GitHub Enterprise Server si...
CVE-2023-46648
- EPSS 1.03%
- Veröffentlicht 21.12.2023 21:15:09
- Zuletzt bearbeitet 21.11.2024 08:28:58
An insufficient entropy vulnerability was identified in GitHub Enterprise Server (GHES) that allowed an attacker to brute force a user invitation to the GHES Management Console. To exploit this vulnerability, an attacker would need knowledge that a u...
CVE-2023-46647
- EPSS 0.5%
- Veröffentlicht 21.12.2023 21:15:08
- Zuletzt bearbeitet 21.11.2024 08:28:58
Improper privilege management in all versions of GitHub Enterprise Server allows users with authorized access to the management console with an editor role to escalate their privileges by making requests to the endpoint used for bootstrapping the ins...
CVE-2023-46646
- EPSS 0.29%
- Veröffentlicht 21.12.2023 21:15:08
- Zuletzt bearbeitet 16.12.2024 19:07:42
Improper access control in all versions of GitHub Enterprise Server allows unauthorized users to view private repository names via the "Get a check run" API endpoint. This vulnerability did not allow unauthorized access to any repository content besi...
CVE-2023-46645
- EPSS 0.53%
- Veröffentlicht 21.12.2023 21:15:08
- Zuletzt bearbeitet 21.11.2024 08:28:57
A path traversal vulnerability was identified in GitHub Enterprise Server that allowed arbitrary file reading when building a GitHub Pages site. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site ...