Lucene search

K
GithubEnterprise Server3.9.0

21 matches found

CVE
CVE
added 2024/02/13 7:15 p.m.88 views

CVE-2024-1354

A command injection vulnerability was identified in GitHub Enterprise Server that allowed an attacker with an editor role in the Management Console to gain admin SSH access to the appliance via the syslog-ng configuration file. Exploitation of this vulnerability required access to the GitHub Enterp...

8CVSS8.1AI score0.00303EPSS
CVE
CVE
added 2024/02/13 7:15 p.m.79 views

CVE-2024-1359

A command injection vulnerability was identified in GitHub Enterprise Server that allowed an attacker with an editor role in the Management Console to gain admin SSH access to the appliance when setting up an HTTP proxy. Exploitation of this vulnerability required access to the GitHub Enterprise Se...

9.1CVSS9.4AI score0.00584EPSS
CVE
CVE
added 2024/02/13 7:15 p.m.77 views

CVE-2024-1082

A path traversal vulnerability was identified in GitHub Enterprise Server that allowed an attacker to gain unauthorized read permission to files by deploying arbitrary symbolic links to a GitHub Pages site with a specially crafted artifact tarball. To exploit this vulnerability, an attacker would n...

6.5CVSS6.3AI score0.00461EPSS
CVE
CVE
added 2024/02/13 7:15 p.m.77 views

CVE-2024-1372

A command injection vulnerability was identified in GitHub Enterprise Server that allowed an attacker with an editor role in the Management Console to gain admin SSH access to the appliance when configuring SAML settings. Exploitation of this vulnerability required access to the GitHub Enterprise S...

9.1CVSS9.4AI score0.00486EPSS
CVE
CVE
added 2024/02/13 7:15 p.m.76 views

CVE-2024-1355

A command injection vulnerability was identified in GitHub Enterprise Server that allowed an attacker with an editor role in the Management Console to gain admin SSH access to the appliance via the actions-console docker container while setting a service URL. Exploitation of this vulnerability requ...

9.1CVSS9.4AI score0.00468EPSS
CVE
CVE
added 2024/02/13 7:15 p.m.73 views

CVE-2024-1369

A command injection vulnerability was identified in GitHub Enterprise Server that allowed an attacker with an editor role in the Management Console to gain admin SSH access to the appliance when setting the username and password for collectd configurations. Exploitation of this vulnerability requir...

9.1CVSS9.5AI score0.00584EPSS
CVE
CVE
added 2024/02/13 7:15 p.m.73 views

CVE-2024-1374

A command injection vulnerability was identified in GitHub Enterprise Server that allowed an attacker with an editor role in the Management Console to gain admin SSH access to the appliance via nomad templates when configuring audit log forwarding. Exploitation of this vulnerability required access...

9.1CVSS9.4AI score0.02798EPSS
CVE
CVE
added 2024/02/13 7:15 p.m.73 views

CVE-2024-1378

A command injection vulnerability was identified in GitHub Enterprise Server that allowed an attacker with an editor role in the Management Console to gain admin SSH access to the appliance via nomad templates when configuring SMTP options. Exploitation of this vulnerability required access to the ...

9.1CVSS9.4AI score0.01134EPSS
CVE
CVE
added 2024/03/20 11:15 p.m.67 views

CVE-2024-2469

An attacker with an Administrator role in GitHub Enterprise Server could gain SSH root access via remote code execution. This vulnerability affected GitHub Enterprise Server version 3.8.0 and above and was fixed in version 3.8.17, 3.9.12, 3.10.9, 3.11.7 and 3.12.1. This vulnerability was reported v...

8CVSS8.2AI score0.00899EPSS
CVE
CVE
added 2024/03/20 11:15 p.m.61 views

CVE-2024-2443

A command injection vulnerability was identified in GitHub Enterprise Server that allowed an attacker with an editor role in the Management Console to gain admin SSH access to the appliance when configuring GeoJSON settings. Exploitation of this vulnerability required access to the GitHub Enterpris...

9.1CVSS9.6AI score0.00266EPSS
CVE
CVE
added 2024/01/16 7:15 p.m.58 views

CVE-2024-0200

An unsafe reflection vulnerability was identified in GitHub Enterprise Server that could lead to reflection injection. This vulnerability could lead to the execution of user-controlled methods and remote code execution. To exploit this bug, an actor would need to be logged into an account on the GH...

9.8CVSS8AI score0.77774EPSS
CVE
CVE
added 2024/07/16 10:15 p.m.54 views

CVE-2024-5815

A Cross-Site Request Forgery vulnerability in GitHub Enterprise Server allowed write operations on a victim-owned repository by exploiting incorrect request types. A mitigating factor is that the attacker would have to be a trusted GitHub Enterprise Server user, and the victim would have to visit a...

6.8CVSS6.5AI score0.00164EPSS
CVE
CVE
added 2024/01/16 7:15 p.m.47 views

CVE-2024-0507

An attacker with access to a Management Console user account with the editor role could escalate privileges through a command injection vulnerability in the Management Console. This vulnerability affected all versions of GitHub Enterprise Server and was fixed in versions 3.11.3, 3.10.5, 3.9.8, and ...

8.8CVSS7.7AI score0.77442EPSS
CVE
CVE
added 2024/02/13 7:15 p.m.47 views

CVE-2024-1084

Cross-site Scripting in the tag name pattern field in the tag protections UI in GitHub Enterprise Server allows a malicious website that requires user interaction and social engineering to make changes to a user account via CSP bypass with created CSRF tokens. This vulnerability affected all versio...

6.5CVSS6.3AI score0.00096EPSS
CVE
CVE
added 2024/07/16 10:15 p.m.45 views

CVE-2024-5795

A Denial of Service vulnerability was identified in GitHub Enterprise Server that allowed an attacker to cause unbounded resource exhaustion by sending a large payload to the Git server. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.14 and was fixed in version 3.13...

7.7CVSS6.8AI score0.00299EPSS
CVE
CVE
added 2024/07/16 10:15 p.m.45 views

CVE-2024-6336

A Security Misconfiguration vulnerability in GitHub Enterprise Server allowed sensitive information disclosure to unauthorized users in GitHub Enterprise Server by exploiting organization ruleset feature. This attack required an organization member to explicitly change the visibility of a dependent...

6.9CVSS5.1AI score0.00283EPSS
CVE
CVE
added 2024/07/16 10:15 p.m.45 views

CVE-2024-6395

An exposure of sensitive information vulnerability in GitHub Enterprise Server would allow an attacker to enumerate the names of private repositories that utilize deploy keys. This vulnerability did not allow unauthorized access to any repository content besides the name. This vulnerability affecte...

6.3CVSS5.1AI score0.00449EPSS
CVE
CVE
added 2024/07/16 10:15 p.m.43 views

CVE-2024-5566

An improper privilege management vulnerability allowed users to migrate private repositories without having appropriate scopes defined on the related Personal Access Token. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.14 and was fixed in version 3.13.1, 3.12.6, 3....

6.5CVSS5.8AI score0.00198EPSS
CVE
CVE
added 2024/07/16 10:15 p.m.43 views

CVE-2024-5816

An Incorrect Authorization vulnerability was identified in GitHub Enterprise Server that allowed a suspended GitHub App to retain access to the repository via a scoped user access token. This was only exploitable in public repositories while private repositories were not impacted. This vulnerabilit...

6.9CVSS5.1AI score0.00846EPSS
CVE
CVE
added 2024/07/16 10:15 p.m.40 views

CVE-2024-5817

An Incorrect Authorization vulnerability was identified in GitHub Enterprise Server that allowed read access to issue content via GitHub Projects. This was only exploitable in internal repositories and required the attacker to have access to the corresponding project board. This vulnerability affec...

6.5CVSS6.3AI score0.00295EPSS
CVE
CVE
added 2024/03/21 2:51 a.m.23 views

CVE-2024-1908

An Improper Privilege Management vulnerability was identified in GitHub Enterprise Server that allowed an attacker to use the Enterprise Actions GitHub Connect download token to fetch private repository data. An attacker would require an account on the server instance with non-default settings for ...

6.5CVSS6.3AI score0.0016EPSS