Lucene search

K

Github Security Vulnerabilities

cve
cve

CVE-2012-2055

GitHub Enterprise before 20120304 does not properly restrict the use of a hash to provide values for a model's attributes, which allows remote attackers to set the public_key[user_id] value via a modified URL for the public-key update form, related to a "mass assignment" vulnerability.

7.5CVSS

7.5AI Score

0.003EPSS

2012-04-05 02:55 PM
25
cve
cve

CVE-2017-18365

The Management Console in GitHub Enterprise 2.8.x before 2.8.7 has a deserialization issue that allows unauthenticated remote attackers to execute arbitrary code. This occurs because the enterprise session secret is always the same, and can be found in the product's source code. By sending a crafte...

9.8CVSS

9.8AI Score

0.011EPSS

2019-03-28 06:29 AM
26
cve
cve

CVE-2018-1000183

A exposure of sensitive information vulnerability exists in Jenkins GitHub Plugin 1.29.0 and older in GitHubServerConfig.java that allows attackers with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing cr...

6.5CVSS

6.2AI Score

0.001EPSS

2022-10-03 04:21 PM
27
cve
cve

CVE-2018-1000184

A server-side request forgery vulnerability exists in Jenkins GitHub Plugin 1.29.0 and older in GitHubPluginConfig.java that allows attackers with Overall/Read access to cause Jenkins to send a GET request to a specified URL.

5.4CVSS

5.3AI Score

0.001EPSS

2022-10-03 04:21 PM
23
cve
cve

CVE-2018-1000600

A exposure of sensitive information vulnerability exists in Jenkins GitHub Plugin 1.29.1 and earlier in GitHubTokenCredentialsCreator.java that allows attackers to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jen...

8.8CVSS

8.4AI Score

0.943EPSS

2022-10-03 04:21 PM
31
2
cve
cve

CVE-2019-25084

A vulnerability, which was classified as problematic, has been found in Hide Files on GitHub up to 2.x. This issue affects the function addEventListener of the file extension/options.js. The manipulation leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 3.0.0...

6.1CVSS

6AI Score

0.001EPSS

2022-12-25 06:15 PM
23
cve
cve

CVE-2020-10516

An improper access control vulnerability was identified in the GitHub Enterprise Server API that allowed an organization member to escalate permissions and gain access to unauthorized repositories within an organization. This vulnerability affected all versions of GitHub Enterprise Server prior to ...

9.8CVSS

9.4AI Score

0.002EPSS

2020-06-03 02:15 PM
19
cve
cve

CVE-2020-10517

An improper access control vulnerability was identified in GitHub Enterprise Server that allowed authenticated users of the instance to determine the names of unauthorized private repositories given their numerical IDs. This vulnerability did not allow unauthorized access to any repository content ...

4.3CVSS

4.5AI Score

0.001EPSS

2020-08-27 10:15 PM
28
cve
cve

CVE-2020-10518

A remote code execution vulnerability was identified in GitHub Enterprise Server that could be exploited when building a GitHub Pages site. User-controlled configuration of the underlying parsers used by GitHub Pages were not sufficiently restricted and made it possible to execute commands on the G...

8.8CVSS

9AI Score

0.003EPSS

2020-08-27 10:15 PM
39
cve
cve

CVE-2020-10519

A remote code execution vulnerability was identified in GitHub Enterprise Server that could be exploited when building a GitHub Pages site. User-controlled configuration of the underlying parsers used by GitHub Pages were not sufficiently restricted and made it possible to execute commands on the G...

8.8CVSS

9AI Score

0.007EPSS

2021-03-03 04:15 AM
48
cve
cve

CVE-2021-22861

An improper access control vulnerability was identified in GitHub Enterprise Server that allowed authenticated users of the instance to gain write access to unauthorized repositories via specifically crafted pull requests and REST API requests. An attacker would need to be able to fork the targeted...

6.5CVSS

6.5AI Score

0.002EPSS

2021-03-03 04:15 AM
43
cve
cve

CVE-2021-22862

An improper access control vulnerability was identified in GitHub Enterprise Server that allowed an authenticated user with the ability to fork a repository to disclose Actions secrets for the parent repository of the fork. This vulnerability existed due to a flaw that allowed the base reference of...

6.5CVSS

6.3AI Score

0.001EPSS

2021-03-03 04:15 AM
44
5
cve
cve

CVE-2021-22863

An improper access control vulnerability was identified in the GitHub Enterprise Server GraphQL API that allowed authenticated users of the instance to modify the maintainer collaboration permission of a pull request without proper authorization. By exploiting this vulnerability, an attacker would ...

8.1CVSS

8AI Score

0.002EPSS

2021-03-03 04:15 AM
44
4
cve
cve

CVE-2021-37700

@github/paste-markdown is an npm package for pasting markdown objects. A self Cross-Site Scripting vulnerability exists in the @github/paste-markdown before version 0.3.4. If the clipboard data contains the string <table>, a div is dynamically created, and the clipboard content is copied into its i...

6.5CVSS

6.1AI Score

0.001EPSS

2021-08-12 09:15 PM
39
cve
cve

CVE-2022-24722

VIewComponent is a framework for building view components in Ruby on Rails. Versions prior to 2.31.2 and 2.49.1 contain a cross-site scripting vulnerability that has the potential to impact anyone using translations with the view_component gem. Data received via user input and passed as an interpol...

8.1CVSS

6.1AI Score

0.001EPSS

2022-03-02 11:15 PM
77
cve
cve

CVE-2022-31026

Trilogy is a client library for MySQL. When authenticating, a malicious server could return a specially crafted authentication packet, causing the client to read and return up to 12 bytes of data from an uninitialized variable in stack memory. Users of the trilogy gem should upgrade to version 2.1....

7.5CVSS

7.4AI Score

0.001EPSS

2022-06-09 01:15 PM
65
6
cve
cve

CVE-2022-36885

Jenkins GitHub Plugin 1.34.4 and earlier uses a non-constant time comparison function when checking whether the provided and computed webhook signatures are equal, allowing attackers to use statistical methods to obtain a valid webhook signature.

5.3CVSS

5.3AI Score

0.001EPSS

2022-07-27 03:15 PM
87
5
cve
cve

CVE-2023-46650

Jenkins GitHub Plugin 1.37.3 and earlier does not escape the GitHub project URL on the build page when showing changes, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

5.4CVSS

5.3AI Score

0.001EPSS

2023-10-25 06:17 PM
26