Lucene search

K

84 matches found

CVE
CVE
added 2024/05/20 10:15 p.m.8601 views

CVE-2024-4985

An authentication bypass vulnerability was present in the GitHub Enterprise Server (GHES) when utilizing SAML single sign-on authentication with the optional encrypted assertions feature. This vulnerability allowed an attacker to forge a SAML response to provision and/or gain access to a user with ...

10CVSS7AI score0.0032EPSS
CVE
CVE
added 2025/01/21 7:15 p.m.2275 views

CVE-2025-23369

An improper verification of cryptographic signature vulnerability was identified in GitHub Enterprise Server that allowed signature spoofing for unauthorized internal users. Instances not utilizing SAML single sign-on or where the attacker is not already an existing user were not impacted. This vul...

7.6CVSS6.4AI score0.07906EPSS
CVE
CVE
added 2025/04/17 11:15 p.m.482 views

CVE-2025-3509

A Remote Code Execution (RCE) vulnerability was identified in GitHub Enterprise Server that allowed attackers to execute arbitrary code by exploiting the pre-receive hook functionality, potentially leading to privilege escalation and system compromise. The vulnerability involves using dynamically a...

7.1CVSS7.9AI score0.00416EPSS
CVE
CVE
added 2024/10/10 10:15 p.m.355 views

CVE-2024-9487

An improper verification of cryptographic signature vulnerability was identified in GitHub Enterprise Server that allowed SAML SSO authentication to be bypassed resulting in unauthorized provisioning of users and access to the instance. Exploitation required the encrypted assertions feature to be e...

9.5CVSS9.4AI score0.3891EPSS
CVE
CVE
added 2022/04/05 12:15 a.m.112 views

CVE-2022-23732

A path traversal vulnerability was identified in GitHub Enterprise Server management console that allowed the bypass of CSRF protections. This could potentially lead to privilege escalation. To exploit this vulnerability, an attacker would need to target a user that was actively logged into the man...

8.8CVSS8.7AI score0.00556EPSS
CVE
CVE
added 2022/08/02 4:15 p.m.93 views

CVE-2022-23733

A stored XSS vulnerability was identified in GitHub Enterprise Server that allowed the injection of arbitrary attributes. This injection was blocked by Github's Content Security Policy (CSP). This vulnerability affected all versions of GitHub Enterprise Server prior to 3.6 and was fixed in versions...

5.4CVSS5.4AI score0.00124EPSS
CVE
CVE
added 2022/02/18 12:15 a.m.87 views

CVE-2021-41599

A remote code execution vulnerability was identified in GitHub Enterprise Server that could be exploited when building a GitHub Pages site. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This vulnera...

8.8CVSS8.9AI score0.02496EPSS
CVE
CVE
added 2024/02/13 7:15 p.m.87 views

CVE-2024-1354

A command injection vulnerability was identified in GitHub Enterprise Server that allowed an attacker with an editor role in the Management Console to gain admin SSH access to the appliance via the syslog-ng configuration file. Exploitation of this vulnerability required access to the GitHub Enterp...

8CVSS8.1AI score0.00303EPSS
CVE
CVE
added 2024/04/19 5:15 p.m.84 views

CVE-2024-2440

A race condition in GitHub Enterprise Server allowed an existing admin to maintain permissions on a detached repository by making a GraphQL mutation to alter repository permissions while the repository is detached. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.13 a...

5.5CVSS6.6AI score0.00122EPSS
CVE
CVE
added 2024/02/13 7:15 p.m.77 views

CVE-2024-1359

A command injection vulnerability was identified in GitHub Enterprise Server that allowed an attacker with an editor role in the Management Console to gain admin SSH access to the appliance when setting up an HTTP proxy. Exploitation of this vulnerability required access to the GitHub Enterprise Se...

9.1CVSS9.4AI score0.00584EPSS
CVE
CVE
added 2024/02/13 7:15 p.m.76 views

CVE-2024-1082

A path traversal vulnerability was identified in GitHub Enterprise Server that allowed an attacker to gain unauthorized read permission to files by deploying arbitrary symbolic links to a GitHub Pages site with a specially crafted artifact tarball. To exploit this vulnerability, an attacker would n...

6.5CVSS6.3AI score0.00461EPSS
CVE
CVE
added 2024/02/13 7:15 p.m.76 views

CVE-2024-1372

A command injection vulnerability was identified in GitHub Enterprise Server that allowed an attacker with an editor role in the Management Console to gain admin SSH access to the appliance when configuring SAML settings. Exploitation of this vulnerability required access to the GitHub Enterprise S...

9.1CVSS9.4AI score0.00486EPSS
CVE
CVE
added 2022/11/01 6:15 p.m.75 views

CVE-2022-23738

An improper cache key vulnerability was identified in GitHub Enterprise Server that allowed an unauthorized actor to access private repository files through a public repository. To exploit this, an actor would need to already be authorized on the GitHub Enterprise Server instance, be able to create...

5.7CVSS5.4AI score0.0007EPSS
CVE
CVE
added 2021/05/14 9:15 p.m.74 views

CVE-2021-22866

A UI misrepresentation vulnerability was identified in GitHub Enterprise Server that allowed more permissions to be granted during a GitHub App's user-authorization web flow than was displayed to the user during approval. To exploit this vulnerability, an attacker would need to create a GitHub App ...

8.8CVSS8.8AI score0.00203EPSS
CVE
CVE
added 2024/02/13 7:15 p.m.74 views

CVE-2024-1355

A command injection vulnerability was identified in GitHub Enterprise Server that allowed an attacker with an editor role in the Management Console to gain admin SSH access to the appliance via the actions-console docker container while setting a service URL. Exploitation of this vulnerability requ...

9.1CVSS9.4AI score0.00486EPSS
CVE
CVE
added 2024/02/13 7:15 p.m.72 views

CVE-2024-1369

A command injection vulnerability was identified in GitHub Enterprise Server that allowed an attacker with an editor role in the Management Console to gain admin SSH access to the appliance when setting the username and password for collectd configurations. Exploitation of this vulnerability requir...

9.1CVSS9.5AI score0.00584EPSS
CVE
CVE
added 2024/02/13 7:15 p.m.72 views

CVE-2024-1378

A command injection vulnerability was identified in GitHub Enterprise Server that allowed an attacker with an editor role in the Management Console to gain admin SSH access to the appliance via nomad templates when configuring SMTP options. Exploitation of this vulnerability required access to the ...

9.1CVSS9.4AI score0.01134EPSS
CVE
CVE
added 2023/01/17 7:15 p.m.71 views

CVE-2022-23739

An incorrect authorization vulnerability was identified in GitHub Enterprise Server, allowing for escalation of privileges in GraphQL API requests from GitHub Apps. This vulnerability allowed an app installed on an organization to gain access to and modify most organization-level resources that are...

9.8CVSS9.9AI score0.00242EPSS
CVE
CVE
added 2024/02/13 7:15 p.m.71 views

CVE-2024-1374

A command injection vulnerability was identified in GitHub Enterprise Server that allowed an attacker with an editor role in the Management Console to gain admin SSH access to the appliance via nomad templates when configuring audit log forwarding. Exploitation of this vulnerability required access...

9.1CVSS9.4AI score0.02798EPSS
CVE
CVE
added 2023/12/21 9:15 p.m.67 views

CVE-2023-46646

Improper access control in all versions of GitHub Enterprise Server allows unauthorized users to view private repository names via the "Get a check run" API endpoint. This vulnerability did not allow unauthorized access to any repository content besides the name. This vulnerability affected GitHub ...

5.3CVSS5.2AI score0.00286EPSS
CVE
CVE
added 2024/03/20 11:15 p.m.65 views

CVE-2024-2469

An attacker with an Administrator role in GitHub Enterprise Server could gain SSH root access via remote code execution. This vulnerability affected GitHub Enterprise Server version 3.8.0 and above and was fixed in version 3.8.17, 3.9.12, 3.10.9, 3.11.7 and 3.12.1. This vulnerability was reported v...

8CVSS8.2AI score0.00633EPSS
CVE
CVE
added 2023/12/21 9:15 p.m.64 views

CVE-2023-6690

A race condition in GitHub Enterprise Server allowed an existing admin to maintain permissions on transferred repositories by making a GraphQL mutation to alter repository permissions during the transfer. This vulnerability affected GitHub Enterprise Server version 3.8.0 and above and was fixed in ...

3.9CVSS4AI score0.00088EPSS
CVE
CVE
added 2023/12/21 9:15 p.m.63 views

CVE-2023-6847

An improper authentication vulnerability was identified in GitHub Enterprise Server that allowed a bypass of Private Mode by using a specially crafted API request. To exploit this vulnerability, an attacker would need network access to the Enterprise Server appliance configured in Private Mode. Thi...

7.5CVSS7.6AI score0.00119EPSS
CVE
CVE
added 2023/03/07 5:15 p.m.62 views

CVE-2022-46257

An information disclosure vulnerability was identified in GitHub Enterprise Server that allowed private repositories to be added to a GitHub Actions runner group via the API by a user who did not have access to those repositories, resulting in the repository names being shown in the UI. To exploit ...

4.3CVSS4.2AI score0.00051EPSS
CVE
CVE
added 2024/04/19 3:15 p.m.60 views

CVE-2024-3470

An Improper Privilege Management vulnerability was identified in GitHub Enterprise Server that allowed an attacker to use a deploy key pertaining to an organization to bypass an organization ruleset. An attacker would require access to a valid deploy key for a repository in the organization as well...

5.9CVSS6.8AI score0.0004EPSS
CVE
CVE
added 2022/10/19 2:15 p.m.59 views

CVE-2022-23734

A deserialization of untrusted data vulnerability was identified in GitHub Enterprise Server that could potentially lead to remote code execution on the SVNBridge. To exploit this vulnerability, an attacker would need to gain access via a server-side request forgery (SSRF) that would let an attacke...

8.8CVSS9.2AI score0.01231EPSS
CVE
CVE
added 2024/03/20 11:15 p.m.59 views

CVE-2024-2443

A command injection vulnerability was identified in GitHub Enterprise Server that allowed an attacker with an editor role in the Management Console to gain admin SSH access to the appliance when configuring GeoJSON settings. Exploitation of this vulnerability required access to the GitHub Enterpris...

9.1CVSS9.6AI score0.00263EPSS
CVE
CVE
added 2024/03/21 12:15 a.m.59 views

CVE-2024-2748

A Cross Site Request Forgery vulnerability was identified in GitHub Enterprise Server that allowed an attacker to execute unauthorized actions on behalf of an unsuspecting user. A mitigating factor is that user interaction is required. This vulnerability affected GitHub Enterprise Server 3.12.0 and...

4.3CVSS4.8AI score0.00328EPSS
CVE
CVE
added 2022/12/14 6:15 p.m.58 views

CVE-2022-46256

A path traversal vulnerability was identified in GitHub Enterprise Server that allowed remote code execution when building a GitHub Pages site. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the instance. This vulnerability was fixed in v...

8.8CVSS8.9AI score0.03887EPSS
CVE
CVE
added 2024/11/07 10:15 p.m.58 views

CVE-2024-8810

A GitHub App installed in organizations could upgrade some permissions from read to write access without approval from an organization administrator. An attacker would require an account with administrator access to install a malicious GitHub App. This vulnerability affected all versions of GitHub ...

8.7CVSS6.3AI score0.00116EPSS
CVE
CVE
added 2025/04/17 11:15 p.m.58 views

CVE-2025-3124

A missing authorization vulnerability was identified in GitHub Enterprise Server that allowed a user to see the names of private repositories that they wouldn't otherwise have access to in the Security Overview in GitHub Advanced Security. The Security Overview was required to be filtered only usin...

5.3CVSS6.2AI score0.00058EPSS
CVE
CVE
added 2021/03/23 10:15 p.m.57 views

CVE-2021-22864

A remote code execution vulnerability was identified in GitHub Enterprise Server that could be exploited when building a GitHub Pages site. User-controlled configuration options used by GitHub Pages were not sufficiently restricted and made it possible to override environment variables leading to c...

8.8CVSS8.9AI score0.02496EPSS
CVE
CVE
added 2021/07/14 9:15 p.m.57 views

CVE-2021-22867

A path traversal vulnerability was identified in GitHub Enterprise Server that could be exploited when building a GitHub Pages site. User-controlled configuration options used by GitHub Pages were not sufficiently restricted and made it possible to read files on the GitHub Enterprise Server instanc...

6.5CVSS5.1AI score0.00457EPSS
CVE
CVE
added 2024/04/19 3:15 p.m.57 views

CVE-2024-3684

A server side request forgery vulnerability was identified in GitHub Enterprise Server that allowed an attacker with an editor role in the Management Console to gain admin access to the appliance when configuring the Artifacts & Logs and Migrations Storage. Exploitation of this vulnerability requir...

8CVSS6.9AI score0.00526EPSS
CVE
CVE
added 2023/03/02 9:15 p.m.55 views

CVE-2023-22381

A code injection vulnerability was identified in GitHub Enterprise Server that allowed setting arbitrary environment variables from a single environment variable value in GitHub Actions when using a Windows based runner. To exploit this vulnerability, an attacker would need existing permission to c...

8.8CVSS6.6AI score0.00111EPSS
CVE
CVE
added 2024/08/20 8:15 p.m.54 views

CVE-2024-6800

An XML signature wrapping vulnerability was present in GitHub Enterprise Server (GHES) when using SAML authentication with specific identity providers utilizing publicly exposed signed federation metadata XML. This vulnerability allowed an attacker with direct network access to GitHub Enterprise Se...

9.8CVSS6.7AI score0.00549EPSS
CVE
CVE
added 2024/07/16 10:15 p.m.53 views

CVE-2024-5815

A Cross-Site Request Forgery vulnerability in GitHub Enterprise Server allowed write operations on a victim-owned repository by exploiting incorrect request types. A mitigating factor is that the attacker would have to be a trusted GitHub Enterprise Server user, and the victim would have to visit a...

6.8CVSS6.5AI score0.00059EPSS
CVE
CVE
added 2022/12/01 9:15 p.m.52 views

CVE-2022-23737

An improper privilege management vulnerability was identified in GitHub Enterprise Server that allowed users with improper privileges to create or delete pages via the API. To exploit this vulnerability, an attacker would need to be added to an organization's repo with write permissions. This vulne...

6.5CVSS6.4AI score0.0004EPSS
CVE
CVE
added 2022/12/14 7:15 p.m.52 views

CVE-2022-23741

An incorrect authorization vulnerability was identified in GitHub Enterprise Server that allowed a scoped user-to-server token to escalate to full admin/owner privileges. An attacker would require an account with admin access to install a malicious GitHub App. This vulnerability was fixed in versio...

7.2CVSS7AI score0.00144EPSS
CVE
CVE
added 2023/01/09 5:15 p.m.51 views

CVE-2022-46258

An incorrect authorization vulnerability was identified in GitHub Enterprise Server that allowed a repository-scoped token with read/write access to modify Action Workflow files without a Workflow scope. The Create or Update file contents API should enforce workflow scope. This vulnerability affect...

6.5CVSS6.2AI score0.00052EPSS
CVE
CVE
added 2024/01/16 7:15 p.m.51 views

CVE-2024-0200

An unsafe reflection vulnerability was identified in GitHub Enterprise Server that could lead to reflection injection. This vulnerability could lead to the execution of user-controlled methods and remote code execution. To exploit this bug, an actor would need to be logged into an account on the GH...

9.8CVSS8AI score0.74855EPSS
CVE
CVE
added 2023/02/16 9:15 p.m.50 views

CVE-2023-22380

A path traversal vulnerability was identified in GitHub Enterprise Server that allowed arbitrary file reading when building a GitHub Pages site. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This vu...

6.5CVSS6.3AI score0.00098EPSS
CVE
CVE
added 2023/04/07 7:15 p.m.49 views

CVE-2023-23761

An improper authentication vulnerability was identified in GitHub Enterprise Server that allowed an unauthorized actor to modify other users' secret gists by authenticating through an SSH certificate authority. To do so, a user had to know the secret gist's URL. This vulnerability affected all vers...

7.7CVSS5.6AI score0.00072EPSS
CVE
CVE
added 2021/04/02 6:15 p.m.48 views

CVE-2021-22865

An improper access control vulnerability was identified in GitHub Enterprise Server that allowed access tokens generated from a GitHub App's web authentication flow to read private repository metadata via the REST API without having been granted the appropriate permissions. To exploit this vulnerab...

6.5CVSS6.5AI score0.00226EPSS
CVE
CVE
added 2022/01/25 8:15 p.m.48 views

CVE-2021-41598

A UI misrepresentation vulnerability was identified in GitHub Enterprise Server that allowed more permissions to be granted during a GitHub App's user-authorization web flow than was displayed to the user during approval. To exploit this vulnerability, an attacker would need to create a GitHub App ...

8.8CVSS8.8AI score0.00272EPSS
CVE
CVE
added 2024/04/19 3:15 p.m.47 views

CVE-2024-3646

A command injection vulnerability was identified in GitHub Enterprise Server that allowed an attacker with an editor role in the Management Console to gain admin SSH access to the instance when configuring the chat integration. Exploitation of this vulnerability required access to the GitHub Enterp...

8CVSS7.4AI score0.00468EPSS
CVE
CVE
added 2024/09/23 9:15 p.m.47 views

CVE-2024-8263

An improper privilege management vulnerability allowed arbitrary workflows to be committed using an improperly scoped PAT through the use of nested tags. This vulnerability affected all versions of GitHub Enterprise Server and was fixed in version 3.10.17, 3.11.15, 3.12.9, 3.13.4, and 3.14.1. This ...

6.2CVSS7.1AI score0.00137EPSS
CVE
CVE
added 2024/02/13 7:15 p.m.46 views

CVE-2024-1084

Cross-site Scripting in the tag name pattern field in the tag protections UI in GitHub Enterprise Server allows a malicious website that requires user interaction and social engineering to make changes to a user account via CSP bypass with created CSRF tokens. This vulnerability affected all versio...

6.5CVSS6.3AI score0.00096EPSS
CVE
CVE
added 2024/08/20 8:15 p.m.45 views

CVE-2024-7711

An Incorrect Authorization vulnerability was identified in GitHub Enterprise Server, allowing an attacker to update the title, assignees, and labels of any issue inside a public repository. This was only exploitable inside a public repository. This vulnerability affected GitHub Enterprise Server ve...

5.3CVSS7AI score0.00124EPSS
CVE
CVE
added 2024/10/11 6:15 p.m.45 views

CVE-2024-9539

An information disclosure vulnerability was identified in GitHub Enterprise Server via attacker uploaded asset URL allowing the attacker to retrieve metadata information of a user who clicks on the URL and further exploit it to create a convincing phishing page. This required the attacker to upload...

5.7CVSS6.6AI score0.00074EPSS
Total number of security vulnerabilities84