Reports in github program: S.No Title Bounty 1 SAML Signature verification bypass allows logging into any user (with specific conditions) $25000.0 2 Github Apps can use Scoped-User-To-Server Tokens to Obtain Full Access to User's Projects in Project V2 GraphQL api $20000.0 3 CSRF protection bypass in GitHub Enterprise management console $10000.0 4 Authentication bypass on gist.github.com through SSH Certificates $10000.0 5 Management Console Editor Privilege Escalation to Root SSH Access in GitHub Enterprise Server via RCE in syslog-ng $10000.0 6 Management Console Editor Privilege Escalation to Root SSH Access in GitHub Enterprise Server via nomad template injection $10000.0 7 Privilege Escalation to Root SSH Access via Pre-Receive Hook Environment in GitHub Enterprise Server $10000.0 8 Management Console Editor Privilege Escalation to Root SSH Access in GitHub Enterprise Server via nomad template injection and audit-forward $10000.0 9 Management Console Editor Privilege Escalation to Root SSH Access in GitHub Enterprise Server via RCE in actions-console $10000.0 10 Management Console Editor Privilege Escalation to Root SSH Access in GitHub Enterprise Server via RCE in collectd $10000.0 11 Management Console Editor Privilege Escalation to Root SSH Access in GitHub Enterprise Server via RCE in ghe-update-check $10000.0 12 Delimiter injection in GitHub Actions core.exportVariable $4617.0 13 Command injection in GitHub Actions ContainerStepHost $4000.0 14 DoS via markdown API from unauthenticated user $4000.0 15 Smuggling content in PR with refs/replace in GitHub $4000.0 16 Git Reference Ambiguity in GitHub - Commit Smuggling, Account Takeover, and Remote Code Execution $4000.0 17 Rogue collaborators and ambiguous branch names in GitHub $4000.0 18 View Repo and Title of Any Private Check Run $4000.0 19 RC Between GitHub's Repo Transfer REST API and updateTeamsRepository GraphQL Mutation Results in Covert and Persistent Admin Access Retention $4000.0 20 Persistent Unauthorized Administrative Access on All Organization Repositories via RC in User Conversion to Organization $4000.0 21 Bypassing Collaborator Restrictions: Retaining Admin Access Post-Repository Transfer $4000.0 22 View private repository NWO of deploy key via internal LFS API $4000.0 23 GitHub Apps can access suspended installations via scoped user-to-server tokens $4000.0 24 Access body and title of Internal Repo Issues in Projects $4000.0 25 RC Between GitHub's Repo Update REST API and updateTeamsRepository GraphQL Mutation Results in Covert and Persistent Admin Access Retention $4000.0 26 [Git Gud] GitHub.com Svnbridge memcached deserialization vulnerability chain leading to Remote Code Execution $0.0 27 Managing Pages $0.0 28 Github app Privilege Escalation to Administrator/Owner of the Organization $0.0 29 Improper handling of null bytes in GitHub Actions Runner allows an attacker to set arbitrary environment variables $0.0 30 [PATs] Token with Read-Only permissions on Issues able to modify issue comments using content write permission $0.0 31 [PATs] Ability to leak comments from issues without ANY "Issues" repo permissions by utilizing "Pull Request" permissions $0.0 32 GHES Management console EoP (editor to site admin) $0.0 33 Invite tokens have Insufficient entropy in GHES Management Console $0.0 34 Self XSS in Tag name pattern field ///settings/tag_protection/new $0.0 35 Source Code and data exfiltration via Github Copilot $0.0