CVE-2022-23739
- EPSS 0.3%
- Published 17.01.2023 19:15:11
- Last modified 08.04.2025 21:15:44
An incorrect authorization vulnerability was identified in GitHub Enterprise Server, allowing for escalation of privileges in GraphQL API requests from GitHub Apps. This vulnerability allowed an app installed on an organization to gain access to and ...
CVE-2022-46258
- EPSS 0.07%
- Published 09.01.2023 17:15:10
- Last modified 09.04.2025 14:15:25
An incorrect authorization vulnerability was identified in GitHub Enterprise Server that allowed a repository-scoped token with read/write access to modify Action Workflow files without a Workflow scope. The Create or Update file contents API should ...
CVE-2022-23741
- EPSS 0.17%
- Published 14.12.2022 19:15:10
- Last modified 22.04.2025 16:15:21
An incorrect authorization vulnerability was identified in GitHub Enterprise Server that allowed a scoped user-to-server token to escalate to full admin/owner privileges. An attacker would require an account with admin access to install a malicious G...
CVE-2022-46256
- EPSS 4.01%
- Published 14.12.2022 18:15:23
- Last modified 22.04.2025 16:15:40
A path traversal vulnerability was identified in GitHub Enterprise Server that allowed remote code execution when building a GitHub Pages site. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site o...
CVE-2022-46255
- EPSS 4.52%
- Published 14.12.2022 18:15:23
- Last modified 22.04.2025 16:15:40
An improper limitation of a pathname to a restricted directory vulnerability was identified in GitHub Enterprise Server that enabled remote code execution. A check was added within Pages to ensure the working directory is clean before unpacking new c...
CVE-2022-23737
- EPSS 0.05%
- Published 01.12.2022 21:15:19
- Last modified 24.04.2025 15:15:43
An improper privilege management vulnerability was identified in GitHub Enterprise Server that allowed users with improper privileges to create or delete pages via the API. To exploit this vulnerability, an attacker would need to be added to an organ...
CVE-2022-23740
- EPSS 0.85%
- Published 23.11.2022 18:15:11
- Last modified 28.04.2025 15:15:44
CRITICAL: An improper neutralization of argument delimiters in a command vulnerability was identified in GitHub Enterprise Server that enabled remote code execution. To exploit this vulnerability, an attacker would need permission to create and build...
CVE-2022-23738
- EPSS 0.33%
- Published 01.11.2022 18:15:10
- Last modified 06.05.2025 15:15:57
An improper cache key vulnerability was identified in GitHub Enterprise Server that allowed an unauthorized actor to access private repository files through a public repository. To exploit this, an actor would need to already be authorized on the Git...
CVE-2022-23734
- EPSS 6.51%
- Published 19.10.2022 14:15:09
- Last modified 09.05.2025 15:15:50
A deserialization of untrusted data vulnerability was identified in GitHub Enterprise Server that could potentially lead to remote code execution on the SVNBridge. To exploit this vulnerability, an attacker would need to gain access via a server-side...
CVE-2022-23733
- EPSS 0.27%
- Published 02.08.2022 16:15:10
- Last modified 21.11.2024 06:49:12
A stored XSS vulnerability was identified in GitHub Enterprise Server that allowed the injection of arbitrary attributes. This injection was blocked by Github's Content Security Policy (CSP). This vulnerability affected all versions of GitHub Enterpr...