Lucene search

K
GithubEnterprise Server

13 matches found

CVE
CVE
added 2023/12/21 9:15 p.m.69 views

CVE-2023-46646

Improper access control in all versions of GitHub Enterprise Server allows unauthorized users to view private repository names via the "Get a check run" API endpoint. This vulnerability did not allow unauthorized access to any repository content besides the name. This vulnerability affected GitHub ...

5.3CVSS5.2AI score0.00286EPSS
CVE
CVE
added 2023/12/21 9:15 p.m.65 views

CVE-2023-6690

A race condition in GitHub Enterprise Server allowed an existing admin to maintain permissions on transferred repositories by making a GraphQL mutation to alter repository permissions during the transfer. This vulnerability affected GitHub Enterprise Server version 3.8.0 and above and was fixed in ...

3.9CVSS4AI score0.00088EPSS
CVE
CVE
added 2023/12/21 9:15 p.m.64 views

CVE-2023-6847

An improper authentication vulnerability was identified in GitHub Enterprise Server that allowed a bypass of Private Mode by using a specially crafted API request. To exploit this vulnerability, an attacker would need network access to the Enterprise Server appliance configured in Private Mode. Thi...

7.5CVSS7.6AI score0.00119EPSS
CVE
CVE
added 2023/12/21 9:15 p.m.44 views

CVE-2023-51380

An incorrect authorization vulnerability was identified in GitHub Enterprise Server that allowed issue comments to be read with an improperly scoped token. This vulnerability affected all versions of GitHub Enterprise Server since 3.7 and was fixed in version 3.7.19, 3.8.12, 3.9.7, 3.10.4, and 3.11...

4.3CVSS4.2AI score0.0017EPSS
CVE
CVE
added 2023/12/21 9:15 p.m.44 views

CVE-2023-6802

An insertion of sensitive information into the log file in the audit log in GitHub Enterprise Server was identified that could allow an attacker to gain access to the management console. To exploit this, an attacker would need access to the log files for the GitHub Enterprise Server appliance, a ba...

7.2CVSS6.7AI score0.0003EPSS
CVE
CVE
added 2023/12/21 9:15 p.m.40 views

CVE-2023-51379

An incorrect authorization vulnerability was identified in GitHub Enterprise Server that allowed issue comments to be updated with an improperly scoped token. This vulnerability did not allow unauthorized access to any repository content as it also required contents:write and issues:read permission...

4.9CVSS5AI score0.00138EPSS
CVE
CVE
added 2023/12/21 9:15 p.m.40 views

CVE-2023-6746

An insertion of sensitive information into log file vulnerability was identified in the log files for a GitHub Enterprise Server back-end service that could permit an adversary in the middle attack when combined with other phishing techniques. To exploit this, an attacker would need access to the l...

8.1CVSS5.4AI score0.00181EPSS
CVE
CVE
added 2023/12/21 9:15 p.m.37 views

CVE-2023-46645

A path traversal vulnerability was identified in GitHub Enterprise Server that allowed arbitrary file reading when building a GitHub Pages site. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This vu...

6.8CVSS5.4AI score0.00531EPSS
CVE
CVE
added 2023/12/21 9:15 p.m.35 views

CVE-2023-46647

Improper privilege management in all versions of GitHub Enterprise Server allows users with authorized access to the management console with an editor role to escalate their privileges by making requests to the endpoint used for bootstrapping the instance. This vulnerability affected GitHub Enterpr...

8.8CVSS8.6AI score0.005EPSS
CVE
CVE
added 2023/12/21 9:15 p.m.35 views

CVE-2023-46649

A race condition in GitHub Enterprise Server was identified that could allow an attacker administrator access. To exploit this, an organization needs to be converted from a user. This vulnerability affected all versions of GitHub Enterprise Server since 3.7 and was fixed in version 3.7.19, 3.8.12, ...

7CVSS6.3AI score0.00147EPSS
CVE
CVE
added 2023/12/21 9:15 p.m.33 views

CVE-2023-6803

A race condition in GitHub Enterprise Server allows an outside collaborator to be added while a repository is being transferred. This vulnerability affected all versions of GitHub Enterprise Server since 3.8 and was fixed in version 3.8.12, 3.9.7, 3.10.4, and 3.11.1.

5.8CVSS4.4AI score0.00095EPSS
CVE
CVE
added 2023/12/21 9:15 p.m.30 views

CVE-2023-6804

Improper privilege management allowed arbitrary workflows to be committed and run using an improperly scoped PAT. To exploit this, a workflow must have already existed in the target repo. This vulnerability affected all versions of GitHub Enterprise Server since 3.8 and was fixed in version 3.8.12,...

6.5CVSS5.9AI score0.00077EPSS
CVE
CVE
added 2023/12/21 9:15 p.m.27 views

CVE-2023-46648

An insufficient entropy vulnerability was identified in GitHub Enterprise Server (GHES) that allowed an attacker to brute force a user invitation to the GHES Management Console. To exploit this vulnerability, an attacker would need knowledge that a user invitation was pending. This vulnerability af...

8.3CVSS7.6AI score0.01027EPSS