Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| GitHub | Enterprise Server | 3.7.0 ~ 3.7.18 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2023-46648 | 8.3 HIGH | Insufficient Entropy in GitHub Enterprise Server Management Console Invitation Token |
| CVE-2023-6746 | 8.1 HIGH | Sensitive Information in Log File in GitHub Enterprise Server |
| CVE-2023-46647 | 8.0 HIGH | Improper Privilege Management in GitHub Enterprise Server management console leads to priv |
| CVE-2023-6847 | 7.5 HIGH | Improper Authentication in GitHub Enterprise Server leading to Authentication Bypass for P |
| CVE-2023-6802 | 7.2 HIGH | Sensitive Information in Log File in GitHub Enterprise Server |
| CVE-2023-46645 | 6.8 MEDIUM | Path traversal in GitHub Enterprise Server leading to arbitrary file reading when building |
| CVE-2023-6804 | 6.5 MEDIUM | Improper Privilege Management allows for arbitrary workflows to be run |
| CVE-2023-6803 | 5.8 MEDIUM | Race Condition allows Unauthorized Outside Collaborator |
| CVE-2023-46646 | 5.3 MEDIUM | GitHub Enterprise Server 安全漏洞 |
| CVE-2023-51379 | 4.9 MEDIUM | Incorrect Authorization for Issue Comments in GitHub Enterprise Server |
| CVE-2023-6690 | 3.9 LOW | GitHub Enterprise Server 安全漏洞 |
| CVE-2023-51380 | 2.7 LOW | Incorrect Authorization allows Read Access to Issue Comments in GitHub Enterprise Server |
No comments yet