Github

Enterprise Server

93 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Veröffentlicht 07.03.2023 17:15:12
  • Zuletzt bearbeitet 21.11.2024 07:30:17

An information disclosure vulnerability was identified in GitHub Enterprise Server that allowed private repositories to be added to a GitHub Actions runner group via the API by a user who did not have access to those repositories, resulting in the re...

  • EPSS 0.15%
  • Veröffentlicht 02.03.2023 21:15:10
  • Zuletzt bearbeitet 21.11.2024 07:44:40

A code injection vulnerability was identified in GitHub Enterprise Server that allowed setting arbitrary environment variables from a single environment variable value in GitHub Actions when using a Windows based runner. To exploit this vulnerability...

  • EPSS 0.14%
  • Veröffentlicht 16.02.2023 21:15:14
  • Zuletzt bearbeitet 19.03.2025 16:15:17

A path traversal vulnerability was identified in GitHub Enterprise Server that allowed arbitrary file reading when building a GitHub Pages site. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site ...

  • EPSS 0.3%
  • Veröffentlicht 17.01.2023 19:15:11
  • Zuletzt bearbeitet 08.04.2025 21:15:44

An incorrect authorization vulnerability was identified in GitHub Enterprise Server, allowing for escalation of privileges in GraphQL API requests from GitHub Apps. This vulnerability allowed an app installed on an organization to gain access to and ...

  • EPSS 0.07%
  • Veröffentlicht 09.01.2023 17:15:10
  • Zuletzt bearbeitet 09.04.2025 14:15:25

An incorrect authorization vulnerability was identified in GitHub Enterprise Server that allowed a repository-scoped token with read/write access to modify Action Workflow files without a Workflow scope. The Create or Update file contents API should ...

  • EPSS 0.87%
  • Veröffentlicht 14.12.2022 19:15:10
  • Zuletzt bearbeitet 22.04.2025 16:15:21

An incorrect authorization vulnerability was identified in GitHub Enterprise Server that allowed a scoped user-to-server token to escalate to full admin/owner privileges. An attacker would require an account with admin access to install a malicious G...

  • EPSS 8.55%
  • Veröffentlicht 14.12.2022 18:15:23
  • Zuletzt bearbeitet 22.04.2025 16:15:40

A path traversal vulnerability was identified in GitHub Enterprise Server that allowed remote code execution when building a GitHub Pages site. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site o...

  • EPSS 8.17%
  • Veröffentlicht 14.12.2022 18:15:23
  • Zuletzt bearbeitet 22.04.2025 16:15:40

An improper limitation of a pathname to a restricted directory vulnerability was identified in GitHub Enterprise Server that enabled remote code execution. A check was added within Pages to ensure the working directory is clean before unpacking new c...

  • EPSS 0.22%
  • Veröffentlicht 01.12.2022 21:15:19
  • Zuletzt bearbeitet 24.04.2025 15:15:43

An improper privilege management vulnerability was identified in GitHub Enterprise Server that allowed users with improper privileges to create or delete pages via the API. To exploit this vulnerability, an attacker would need to be added to an organ...

  • EPSS 3.02%
  • Veröffentlicht 23.11.2022 18:15:11
  • Zuletzt bearbeitet 28.04.2025 15:15:44

CRITICAL: An improper neutralization of argument delimiters in a command vulnerability was identified in GitHub Enterprise Server that enabled remote code execution. To exploit this vulnerability, an attacker would need permission to create and build...