Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-27849 | An authorization/sensitive information disclosure vulnerability was identified in GitHub Enterprise Server that allowed a fork to retain read access to an upstream repository after its visibility was changed to private. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.10.0 and was fixed in versions 3.9.4, 3.8.9, 3.7.16 and 3.6.18. This vulnerability was reported via the GitHub Bug Bounty program. |
Tue, 01 Oct 2024 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_P
Published:
Updated: 2024-10-01T14:23:19.054Z
Reserved: 2023-01-17T20:40:37.553Z
Link: CVE-2023-23763
Updated: 2024-08-02T10:42:25.864Z
Status : Modified
Published: 2023-09-01T15:15:07.620
Modified: 2024-11-21T07:46:47.180
Link: CVE-2023-23763
No data.
OpenCVE Enrichment
No data.
EUVD