Github

Enterprise Server

90 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.58%
  • Veröffentlicht 13.02.2024 19:15:09
  • Zuletzt bearbeitet 21.11.2024 08:50:24

A command injection vulnerability was identified in GitHub Enterprise Server that allowed an attacker with an editor role in the Management Console to gain admin SSH access to the appliance when setting up an HTTP proxy. Exploitation of this vulnerab...

  • EPSS 0.47%
  • Veröffentlicht 13.02.2024 19:15:09
  • Zuletzt bearbeitet 24.03.2025 20:15:17

A command injection vulnerability was identified in GitHub Enterprise Server that allowed an attacker with an editor role in the Management Console to gain admin SSH access to the appliance via the actions-console docker container while setting a ser...

  • EPSS 0.3%
  • Veröffentlicht 13.02.2024 19:15:09
  • Zuletzt bearbeitet 21.11.2024 08:50:23

A command injection vulnerability was identified in GitHub Enterprise Server that allowed an attacker with an editor role in the Management Console to gain admin SSH access to the appliance via the `syslog-ng` configuration file. Exploitation of this...

  • EPSS 0.1%
  • Veröffentlicht 13.02.2024 19:15:09
  • Zuletzt bearbeitet 21.11.2024 08:49:45

Cross-site Scripting in the tag name pattern field in the tag protections UI in GitHub Enterprise Server allows a malicious website that requires user interaction and social engineering to make changes to a user account via CSP bypass with created CS...

  • EPSS 0.46%
  • Veröffentlicht 13.02.2024 19:15:08
  • Zuletzt bearbeitet 21.11.2024 08:49:45

A path traversal vulnerability was identified in GitHub Enterprise Server that allowed an attacker to gain unauthorized read permission to files by deploying arbitrary symbolic links to a GitHub Pages site with a specially crafted artifact tarball. T...

  • EPSS 77.44%
  • Veröffentlicht 16.01.2024 19:15:08
  • Zuletzt bearbeitet 21.11.2024 08:46:45

An attacker with access to a Management Console user account with the editor role could escalate privileges through a command injection vulnerability in the Management Console. This vulnerability affected all versions of GitHub Enterprise Server and ...

  • EPSS 74.2%
  • Veröffentlicht 16.01.2024 19:15:08
  • Zuletzt bearbeitet 21.11.2024 08:46:03

An unsafe reflection vulnerability was identified in GitHub Enterprise Server that could lead to reflection injection. This vulnerability could lead to the execution of user-controlled methods and remote code execution. To exploit this bug, an actor ...

  • EPSS 0.16%
  • Veröffentlicht 21.12.2023 21:15:15
  • Zuletzt bearbeitet 21.11.2024 08:44:40

An improper authentication vulnerability was identified in GitHub Enterprise Server that allowed a bypass of Private Mode by using a specially crafted API request. To exploit this vulnerability, an attacker would need network access to the Enterprise...

  • EPSS 0.08%
  • Veröffentlicht 21.12.2023 21:15:15
  • Zuletzt bearbeitet 21.11.2024 08:44:35

Improper privilege management allowed arbitrary workflows to be committed and run using an improperly scoped PAT. To exploit this, a workflow must have already existed in the target repo. This vulnerability affected all versions of GitHub Enterprise ...

  • EPSS 0.1%
  • Veröffentlicht 21.12.2023 21:15:14
  • Zuletzt bearbeitet 21.11.2024 08:44:35

A race condition in GitHub Enterprise Server allows an outside collaborator to be added while a repository is being transferred. This vulnerability affected all versions of GitHub Enterprise Server since 3.8 and was fixed in version 3.8.12, 3.9.7, 3....