CVE-2023-46647
- EPSS 0.5%
- Veröffentlicht 21.12.2023 21:15:08
- Zuletzt bearbeitet 21.11.2024 08:28:58
Improper privilege management in all versions of GitHub Enterprise Server allows users with authorized access to the management console with an editor role to escalate their privileges by making requests to the endpoint used for bootstrapping the ins...
CVE-2023-46646
- EPSS 0.29%
- Veröffentlicht 21.12.2023 21:15:08
- Zuletzt bearbeitet 16.12.2024 19:07:42
Improper access control in all versions of GitHub Enterprise Server allows unauthorized users to view private repository names via the "Get a check run" API endpoint. This vulnerability did not allow unauthorized access to any repository content besi...
CVE-2023-46645
- EPSS 0.53%
- Veröffentlicht 21.12.2023 21:15:08
- Zuletzt bearbeitet 21.11.2024 08:28:57
A path traversal vulnerability was identified in GitHub Enterprise Server that allowed arbitrary file reading when building a GitHub Pages site. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site ...
CVE-2023-23766
- EPSS 0.11%
- Veröffentlicht 22.09.2023 15:15:10
- Zuletzt bearbeitet 21.11.2024 07:46:47
An incorrect comparison vulnerability was identified in GitHub Enterprise Server that allowed commit smuggling by displaying an incorrect diff in a re-opened Pull Request. To do so, an attacker would need write access to the repository. This vulnerab...
CVE-2023-23763
- EPSS 0.11%
- Veröffentlicht 01.09.2023 15:15:07
- Zuletzt bearbeitet 21.11.2024 07:46:47
An authorization/sensitive information disclosure vulnerability was identified in GitHub Enterprise Server that allowed a fork to retain read access to an upstream repository after its visibility was changed to private. This vulnerability affected al...
CVE-2023-23765
- EPSS 0.08%
- Veröffentlicht 30.08.2023 23:15:08
- Zuletzt bearbeitet 21.11.2024 07:46:47
An incorrect comparison vulnerability was identified in GitHub Enterprise Server that allowed commit smuggling by displaying an incorrect diff in a re-opened Pull Request. To exploit this vulnerability, an attacker would need write access to the repo...
CVE-2023-23764
- EPSS 0.15%
- Veröffentlicht 27.07.2023 21:15:10
- Zuletzt bearbeitet 21.11.2024 07:46:47
An incorrect comparison vulnerability was identified in GitHub Enterprise Server that allowed commit smuggling by displaying an incorrect diff within the GitHub pull request UI. To do so, an attacker would need write access to the repository. This vu...
CVE-2023-23762
- EPSS 0.13%
- Veröffentlicht 07.04.2023 19:15:07
- Zuletzt bearbeitet 21.11.2024 07:46:47
An incorrect comparison vulnerability was identified in GitHub Enterprise Server that allowed commit smuggling by displaying an incorrect diff. To do so, an attacker would need write access to the repository and be able to correctly guess the target ...
CVE-2023-23761
- EPSS 0.07%
- Veröffentlicht 07.04.2023 19:15:06
- Zuletzt bearbeitet 21.11.2024 07:46:46
An improper authentication vulnerability was identified in GitHub Enterprise Server that allowed an unauthorized actor to modify other users' secret gists by authenticating through an SSH certificate authority. To do so, a user had to know the secret...
CVE-2023-23760
- EPSS 0.6%
- Veröffentlicht 08.03.2023 19:15:10
- Zuletzt bearbeitet 21.11.2024 07:46:46
A path traversal vulnerability was identified in GitHub Enterprise Server that allowed remote code execution when building a GitHub Pages site. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site o...