sigmoid.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A social space for people researching, working with, or just interested in AI!

Server stats:

583
active users

#ghes

0 posts0 participants0 posts today
Martin Todorov<p>I just published "Why Bitbucket Never Caught Up With GitHub: A Comprehensive Analysis".</p><p>You can check my friend link here: <br><a href="https://medium.com/@carlspring/why-bitbucket-never-caught-up-with-github-a-comprehensive-analysis-a09616cc48e9?sk=8829b3c881c4e05a9aa5d59e172954d7" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">medium.com/@carlspring/why-bit</span><span class="invisible">bucket-never-caught-up-with-github-a-comprehensive-analysis-a09616cc48e9?sk=8829b3c881c4e05a9aa5d59e172954d7</span></a></p><p><a href="https://mastodon.social/tags/github" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>github</span></a> <a href="https://mastodon.social/tags/bitbucket" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bitbucket</span></a> <a href="https://mastodon.social/tags/devops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>devops</span></a> <a href="https://mastodon.social/tags/devsecops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>devsecops</span></a> <a href="https://mastodon.social/tags/stash" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>stash</span></a> <a href="https://mastodon.social/tags/ghes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ghes</span></a></p>
Sam Stepanyan :verified: 🐘<p><a href="https://infosec.exchange/tags/GitHib" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GitHib</span></a>: If you are running an on-prem GitHub Enterprise Server <a href="https://infosec.exchange/tags/GHES" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GHES</span></a> you need to update it urgently as <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> CVE-2024-6800 could be exploited to bypass authentication &amp; gain admin privileges:<br>👇<br><a href="https://www.bleepingcomputer.com/news/security/github-enterprise-server-vulnerable-to-critical-auth-bypass-flaw/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/github-enterprise-server-vulnerable-to-critical-auth-bypass-flaw/</span></a><br><a href="https://www.bleepingcomputer.com/news/security/github-enterprise-server-vulnerable-to-critical-auth-bypass-flaw/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/github-enterprise-server-vulnerable-to-critical-auth-bypass-flaw/</span></a></p>
Kevin Sullivan<p>🚨 Critical vulnerability (CVE-2024-6800) found in GitHub Enterprise Server versions. Attackers could bypass authentication and gain admin privileges. GitHub has released patches for affected versions. Over 36,500 GHES instances exposed online, mostly in the US. Update ASAP to versions 3.13.3, 3.12.8, 3.11.14, or 3.10.16 for security.</p><p><a href="https://techhub.social/tags/GitHubSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GitHubSecurity</span></a> <a href="https://techhub.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://techhub.social/tags/SoftwareUpdate" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SoftwareUpdate</span></a> <a href="https://techhub.social/tags/GHES" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GHES</span></a></p><p>Bleeping Computers: <a href="https://www.bleepingcomputer.com/news/security/github-enterprise-server-vulnerable-to-critical-auth-bypass-flaw/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/github-enterprise-server-vulnerable-to-critical-auth-bypass-flaw/</span></a></p>
Esther Schindler<p>GitHub Issues Patch for Critical Exploit in Enterprise Server</p><p>The vulnerability affects all <a href="https://hachyderm.io/tags/GHES" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GHES</span></a> versions before 3.13.0 and achieves the highest possible CVSS score of 10. Instances with SAML SSO authentication are at risk. <a href="https://hachyderm.io/tags/GitHub" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GitHub</span></a> <br><a href="https://securityboulevard.com/2024/05/github-issues-patch-for-critical-exploit-in-enterprise-server/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityboulevard.com/2024/05/</span><span class="invisible">github-issues-patch-for-critical-exploit-in-enterprise-server/</span></a></p>