CVE-2022-23739
- EPSS 0.3%
- Veröffentlicht 17.01.2023 19:15:11
- Zuletzt bearbeitet 08.04.2025 21:15:44
An incorrect authorization vulnerability was identified in GitHub Enterprise Server, allowing for escalation of privileges in GraphQL API requests from GitHub Apps. This vulnerability allowed an app installed on an organization to gain access to and ...
CVE-2022-46258
- EPSS 0.07%
- Veröffentlicht 09.01.2023 17:15:10
- Zuletzt bearbeitet 09.04.2025 14:15:25
An incorrect authorization vulnerability was identified in GitHub Enterprise Server that allowed a repository-scoped token with read/write access to modify Action Workflow files without a Workflow scope. The Create or Update file contents API should ...
CVE-2022-23741
- EPSS 0.17%
- Veröffentlicht 14.12.2022 19:15:10
- Zuletzt bearbeitet 22.04.2025 16:15:21
An incorrect authorization vulnerability was identified in GitHub Enterprise Server that allowed a scoped user-to-server token to escalate to full admin/owner privileges. An attacker would require an account with admin access to install a malicious G...
CVE-2022-46256
- EPSS 4.01%
- Veröffentlicht 14.12.2022 18:15:23
- Zuletzt bearbeitet 22.04.2025 16:15:40
A path traversal vulnerability was identified in GitHub Enterprise Server that allowed remote code execution when building a GitHub Pages site. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site o...
CVE-2022-46255
- EPSS 4.52%
- Veröffentlicht 14.12.2022 18:15:23
- Zuletzt bearbeitet 22.04.2025 16:15:40
An improper limitation of a pathname to a restricted directory vulnerability was identified in GitHub Enterprise Server that enabled remote code execution. A check was added within Pages to ensure the working directory is clean before unpacking new c...
CVE-2022-23737
- EPSS 0.05%
- Veröffentlicht 01.12.2022 21:15:19
- Zuletzt bearbeitet 24.04.2025 15:15:43
An improper privilege management vulnerability was identified in GitHub Enterprise Server that allowed users with improper privileges to create or delete pages via the API. To exploit this vulnerability, an attacker would need to be added to an organ...
CVE-2022-23740
- EPSS 0.85%
- Veröffentlicht 23.11.2022 18:15:11
- Zuletzt bearbeitet 28.04.2025 15:15:44
CRITICAL: An improper neutralization of argument delimiters in a command vulnerability was identified in GitHub Enterprise Server that enabled remote code execution. To exploit this vulnerability, an attacker would need permission to create and build...
CVE-2022-23738
- EPSS 0.33%
- Veröffentlicht 01.11.2022 18:15:10
- Zuletzt bearbeitet 06.05.2025 15:15:57
An improper cache key vulnerability was identified in GitHub Enterprise Server that allowed an unauthorized actor to access private repository files through a public repository. To exploit this, an actor would need to already be authorized on the Git...
CVE-2022-23734
- EPSS 6.51%
- Veröffentlicht 19.10.2022 14:15:09
- Zuletzt bearbeitet 09.05.2025 15:15:50
A deserialization of untrusted data vulnerability was identified in GitHub Enterprise Server that could potentially lead to remote code execution on the SVNBridge. To exploit this vulnerability, an attacker would need to gain access via a server-side...
CVE-2022-23733
- EPSS 0.27%
- Veröffentlicht 02.08.2022 16:15:10
- Zuletzt bearbeitet 21.11.2024 06:49:12
A stored XSS vulnerability was identified in GitHub Enterprise Server that allowed the injection of arbitrary attributes. This injection was blocked by Github's Content Security Policy (CSP). This vulnerability affected all versions of GitHub Enterpr...