Логотип exploitDog
bind:CVE-2024-5746
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-5746

Количество 3

Количество 3

nvd логотип

CVE-2024-5746

больше 1 года назад

A Server-Side Request Forgery vulnerability was identified in GitHub Enterprise Server that allowed an attacker with the Site Administrator role to gain arbitrary code execution capability on the GitHub Enterprise Server instance. Exploitation required authenticated access to GitHub Enterprise Server as a user with the Site Administrator role. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.13 and was fixed in versions 3.12.5, 3.11.11, 3.10.13, and 3.9.16. This vulnerability was reported via the GitHub Bug Bounty program.

CVSS3: 7.6
EPSS: Низкий
github логотип

GHSA-fpjq-wfvr-wx93

больше 1 года назад

A Server-Side Request Forgery vulnerability was identified in GitHub Enterprise Server that allowed an attacker with the Site Administrator role to gain arbitrary code execution capability on the GitHub Enterprise Server instance. Exploitation required authenticated access to GitHub Enterprise Server as a user with the Site Administrator role. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.13 and was fixed in versions 3.12.5, 3.11.11, 3.10.13, and 3.9.16. This vulnerability was reported via the GitHub Bug Bounty program.

CVSS3: 7.6
EPSS: Низкий
fstec логотип

BDU:2024-04835

больше 1 года назад

Уязвимость корпоративной версии платформы GitHub Enterprise Server, связанная с недостаточной проверкой поступающих запросов, позволяющая нарушителю выполнить произвольный код

CVSS3: 7.6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-5746

A Server-Side Request Forgery vulnerability was identified in GitHub Enterprise Server that allowed an attacker with the Site Administrator role to gain arbitrary code execution capability on the GitHub Enterprise Server instance. Exploitation required authenticated access to GitHub Enterprise Server as a user with the Site Administrator role. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.13 and was fixed in versions 3.12.5, 3.11.11, 3.10.13, and 3.9.16. This vulnerability was reported via the GitHub Bug Bounty program.

CVSS3: 7.6
0%
Низкий
больше 1 года назад
github логотип
GHSA-fpjq-wfvr-wx93

A Server-Side Request Forgery vulnerability was identified in GitHub Enterprise Server that allowed an attacker with the Site Administrator role to gain arbitrary code execution capability on the GitHub Enterprise Server instance. Exploitation required authenticated access to GitHub Enterprise Server as a user with the Site Administrator role. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.13 and was fixed in versions 3.12.5, 3.11.11, 3.10.13, and 3.9.16. This vulnerability was reported via the GitHub Bug Bounty program.

CVSS3: 7.6
0%
Низкий
больше 1 года назад
fstec логотип
BDU:2024-04835

Уязвимость корпоративной версии платформы GitHub Enterprise Server, связанная с недостаточной проверкой поступающих запросов, позволяющая нарушителю выполнить произвольный код

CVSS3: 7.6
0%
Низкий
больше 1 года назад

Уязвимостей на страницу