Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-27851 | An incorrect comparison vulnerability was identified in GitHub Enterprise Server that allowed commit smuggling by displaying an incorrect diff in a re-opened Pull Request. To exploit this vulnerability, an attacker would need write access to the repository. This vulnerability was reported via the GitHub Bug Bounty Program https://bounty.github.com/ . |
Fri, 27 Sep 2024 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_P
Published:
Updated: 2024-09-27T14:22:23.490Z
Reserved: 2023-01-17T20:40:37.555Z
Link: CVE-2023-23765
Updated: 2024-08-02T10:42:26.237Z
Status : Modified
Published: 2023-08-30T23:15:08.447
Modified: 2024-11-21T07:46:47.437
Link: CVE-2023-23765
No data.
OpenCVE Enrichment
No data.
EUVD