Lucene search

K
GithubEnterprise Server

11 matches found

CVE
CVE
added 2025/01/21 7:15 p.m.2275 views

CVE-2025-23369

An improper verification of cryptographic signature vulnerability was identified in GitHub Enterprise Server that allowed signature spoofing for unauthorized internal users. Instances not utilizing SAML single sign-on or where the attacker is not already an existing user were not impacted. This vul...

7.6CVSS6.4AI score0.07906EPSS
CVE
CVE
added 2025/04/17 11:15 p.m.482 views

CVE-2025-3509

A Remote Code Execution (RCE) vulnerability was identified in GitHub Enterprise Server that allowed attackers to execute arbitrary code by exploiting the pre-receive hook functionality, potentially leading to privilege escalation and system compromise. The vulnerability involves using dynamically a...

7.1CVSS7.9AI score0.00416EPSS
CVE
CVE
added 2023/12/21 9:15 p.m.63 views

CVE-2023-6847

An improper authentication vulnerability was identified in GitHub Enterprise Server that allowed a bypass of Private Mode by using a specially crafted API request. To exploit this vulnerability, an attacker would need network access to the Enterprise Server appliance configured in Private Mode. Thi...

7.5CVSS7.6AI score0.00091EPSS
CVE
CVE
added 2022/12/14 7:15 p.m.52 views

CVE-2022-23741

An incorrect authorization vulnerability was identified in GitHub Enterprise Server that allowed a scoped user-to-server token to escalate to full admin/owner privileges. An attacker would require an account with admin access to install a malicious GitHub App. This vulnerability was fixed in versio...

7.2CVSS7AI score0.00066EPSS
CVE
CVE
added 2023/04/07 7:15 p.m.49 views

CVE-2023-23761

An improper authentication vulnerability was identified in GitHub Enterprise Server that allowed an unauthorized actor to modify other users' secret gists by authenticating through an SSH certificate authority. To do so, a user had to know the secret gist's URL. This vulnerability affected all vers...

7.7CVSS5.6AI score0.00053EPSS
CVE
CVE
added 2024/07/16 10:15 p.m.44 views

CVE-2024-5795

A Denial of Service vulnerability was identified in GitHub Enterprise Server that allowed an attacker to cause unbounded resource exhaustion by sending a large payload to the Git server. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.14 and was fixed in version 3.13...

7.7CVSS6.8AI score0.00344EPSS
CVE
CVE
added 2023/12/21 9:15 p.m.43 views

CVE-2023-6802

An insertion of sensitive information into the log file in the audit log in GitHub Enterprise Server was identified that could allow an attacker to gain access to the management console. To exploit this, an attacker would need access to the log files for the GitHub Enterprise Server appliance, a ba...

7.2CVSS6.7AI score0.0003EPSS
CVE
CVE
added 2025/01/29 7:15 p.m.39 views

CVE-2024-10001

A Code Injection vulnerability was identified in GitHub Enterprise Server that allowed attackers to inject malicious code into the query selector via the identity property in the message handling function. This enabled the exfiltration of sensitive data by manipulating the DOM, including authentica...

7.1CVSS7.2AI score0.00312EPSS
CVE
CVE
added 2023/07/27 9:15 p.m.38 views

CVE-2023-23764

An incorrect comparison vulnerability was identified in GitHub Enterprise Server that allowed commit smuggling by displaying an incorrect diff within the GitHub pull request UI. To do so, an attacker would need write access to the repository. This vulnerability affected GitHub Enterprise Server ver...

7.1CVSS5.8AI score0.00061EPSS
CVE
CVE
added 2023/12/21 9:15 p.m.34 views

CVE-2023-46649

A race condition in GitHub Enterprise Server was identified that could allow an attacker administrator access. To exploit this, an organization needs to be converted from a user. This vulnerability affected all versions of GitHub Enterprise Server since 3.7 and was fixed in version 3.7.19, 3.8.12, ...

7CVSS6.3AI score0.00058EPSS
CVE
CVE
added 2024/02/14 8:15 p.m.23 views

CVE-2024-1482

An incorrect authorization vulnerability was identified in GitHub Enterprise Server that allowed an attacker to create new branches in public repositories and run arbitrary GitHub Actions workflows with permissions from the GITHUB_TOKEN. To exploit this vulnerability, an attacker would need access ...

7.1CVSS6.9AI score0.00082EPSS