Show filters
65 Total Results
Displaying 31-40 of 65
Sort by:
Attacker Value
Unknown

CVE-2019-25084

Disclosure Date: December 25, 2022 (last updated October 08, 2023)
A vulnerability, which was classified as problematic, has been found in Hide Files on GitHub up to 2.x. This issue affects the function addEventListener of the file extension/options.js. The manipulation leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 3.0.0 is able to address this issue. The name of the patch is 9de0c57df81db1178e0e79431d462f6d9842742e. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216767.
Attacker Value
Unknown

CVE-2022-39326

Disclosure Date: October 25, 2022 (last updated December 22, 2024)
kartverket/github-workflows are shared reusable workflows for GitHub Actions. Prior to version 2.7.5, all users of the `run-terraform` reusable workflow from the kartverket/github-workflows repo are affected by a code injection vulnerability. A malicious actor could potentially send a PR with a malicious payload leading to execution of arbitrary JavaScript code in the context of the workflow. Users should upgrade to at least version 2.7.5 to resolve the issue. As a workaround, review any pull requests from external users for malicious payloads before allowing them to trigger a build.
Attacker Value
Unknown

CVE-2022-36885

Disclosure Date: July 27, 2022 (last updated October 25, 2023)
Jenkins GitHub Plugin 1.34.4 and earlier uses a non-constant time comparison function when checking whether the provided and computed webhook signatures are equal, allowing attackers to use statistical methods to obtain a valid webhook signature.
Attacker Value
Unknown

CVE-2022-29220

Disclosure Date: May 31, 2022 (last updated October 07, 2023)
github-action-merge-dependabot is an action that automatically approves and merges dependabot pull requests (PRs). Prior to version 3.2.0, github-action-merge-dependabot does not check if a commit created by dependabot is verified with the proper GPG key. There is just a check if the actor is set to `dependabot[bot]` to determine if the PR is a legit PR. Theoretically, an owner of a seemingly valid and legit action in the pipeline can check if the PR is created by dependabot and if their own action has enough permissions to modify the PR in the pipeline. If so, they can modify the PR by adding a second seemingly valid and legit commit to the PR, as they can set arbitrarily the username and email in for commits in git. Because the bot only checks if the actor is valid, it would pass the malicious changes through and merge the PR automatically, without getting noticed by project maintainers. It would probably not be possible to determine where the malicious commit came from, as it would…
Attacker Value
Unknown

CVE-2021-33961

Disclosure Date: March 22, 2022 (last updated February 23, 2025)
A Cross Site Scripting (XSS) vulnerabililty exists in enhanced-github v5.0.11 via the file name parameter.
Attacker Value
Unknown

CVE-2020-23986

Disclosure Date: January 06, 2022 (last updated February 23, 2025)
Github Read Me Stats commit 3c7220e4f7144f6cb068fd433c774f6db47ccb95 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the function renderError.
Attacker Value
Unknown

CVE-2021-44684

Disclosure Date: December 07, 2021 (last updated February 23, 2025)
naholyr github-todos 3.1.0 is vulnerable to command injection. The range argument for the _hook subcommand is concatenated without any validation, and is directly used by the exec function.
Attacker Value
Unknown

CVE-2021-34364

Disclosure Date: June 09, 2021 (last updated February 22, 2025)
The Refined GitHub browser extension before 21.6.8 might allow XSS via a link in a document. NOTE: github.com sends Content-Security-Policy headers to, in general, address XSS and other concerns.
Attacker Value
Unknown

CVE-2021-28470

Disclosure Date: April 13, 2021 (last updated November 28, 2024)
Visual Studio Code GitHub Pull Requests and Issues Extension Remote Code Execution Vulnerability
0
Attacker Value
Unknown

CVE-2020-10519

Disclosure Date: March 03, 2021 (last updated February 22, 2025)
A remote code execution vulnerability was identified in GitHub Enterprise Server that could be exploited when building a GitHub Pages site. User-controlled configuration of the underlying parsers used by GitHub Pages were not sufficiently restricted and made it possible to execute commands on the GitHub Enterprise Server instance. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This vulnerability affected all versions of GitHub Enterprise Server prior to 2.22.7 and was fixed in 2.22.7, 2.21.15, and 2.20.24. The underlying issues contributing to this vulnerability were identified through the GitHub Security Bug Bounty program.