<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-05T02:08:48.253340+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b5102d75-6317-4009-80b3-3beaa2f0d098/export</id>
    <title>b5102d75-6317-4009-80b3-3beaa2f0d098</title>
    <updated>2026-05-05T02:08:48.261452+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b5102d75-6317-4009-80b3-3beaa2f0d098", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3854", "type": "seen", "source": "https://bsky.app/profile/sergioiker.bsky.social/post/3mkpvmwybw32q", "content": "3/ \ud83d\udc19 GitHub CVE-2026-3854: One \"git push\" = remote code execution. Millions of repos were exposed. GitHub.com patched in 2 hours, but 88% of self-hosted Enterprise servers still vulnerable.", "creation_timestamp": "2026-04-30T15:13:08.554981Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b5102d75-6317-4009-80b3-3beaa2f0d098/export"/>
    <published>2026-04-30T15:13:08.554981+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2b2d8c15-4797-42f7-a7e0-70322882234c/export</id>
    <title>2b2d8c15-4797-42f7-a7e0-70322882234c</title>
    <updated>2026-05-05T02:08:48.261356+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "2b2d8c15-4797-42f7-a7e0-70322882234c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3854", "type": "seen", "source": "https://bsky.app/profile/sergioiker.bsky.social/post/3mkpvmwybw42q", "content": "3/ \ud83d\udc19 GitHub CVE-2026-3854: One \"git push\" = remote code execution. Millions of repos were exposed. GitHub.com patched in 2 hours, but 88% of self-hosted Enterprise servers still vulnerable.", "creation_timestamp": "2026-04-30T15:13:10.307939Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2b2d8c15-4797-42f7-a7e0-70322882234c/export"/>
    <published>2026-04-30T15:13:10.307939+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/bd910664-e24b-4f94-89c0-a9c022a2081f/export</id>
    <title>bd910664-e24b-4f94-89c0-a9c022a2081f</title>
    <updated>2026-05-05T02:08:48.261259+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "bd910664-e24b-4f94-89c0-a9c022a2081f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3854", "type": "seen", "source": "https://bsky.app/profile/sergioiker.bsky.social/post/3mkpvmwyetu2q", "content": "3/ \ud83d\udc19 GitHub CVE-2026-3854: One \"git push\" = remote code execution. Millions of repos were exposed. GitHub.com patched in 2 hours, but 88% of self-hosted Enterprise servers still vulnerable.", "creation_timestamp": "2026-04-30T15:13:11.991382Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/bd910664-e24b-4f94-89c0-a9c022a2081f/export"/>
    <published>2026-04-30T15:13:11.991382+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9e1496d6-a567-4ad6-9bcb-0f070477cd9c/export</id>
    <title>9e1496d6-a567-4ad6-9bcb-0f070477cd9c</title>
    <updated>2026-05-05T02:08:48.261158+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9e1496d6-a567-4ad6-9bcb-0f070477cd9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-3854", "type": "seen", "source": "https://bsky.app/profile/hexonbot.bsky.social/post/3mkq5d5xf5u22", "content": "GitHub CVE-2026-3854: A single git push could have compromised millions of repos. 88% of enterprise servers still unpatched. https://www.hexon.bot/blog/github-cve-2026-3854-rce-single-git-push #AISecurity #GitHub #CVE", "creation_timestamp": "2026-04-30T17:30:32.849932Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9e1496d6-a567-4ad6-9bcb-0f070477cd9c/export"/>
    <published>2026-04-30T17:30:32.849932+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/dcba21c7-2a6a-45f7-bd09-62eec4b99292/export</id>
    <title>dcba21c7-2a6a-45f7-bd09-62eec4b99292</title>
    <updated>2026-05-05T02:08:48.261054+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "dcba21c7-2a6a-45f7-bd09-62eec4b99292", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3854", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3mkr3im64kw25", "content": "Top 3 CVE for last 7 days:\nCVE-2026-31431: 213 interactions\nCVE-2026-3854: 53 interactions\nCVE-2026-41940: 32 interactions\n\n\nTop 3 CVE for yesterday:\nCVE-2026-31431: 160 interactions\nCVE-2026-41940: 31 interactions\nCVE-2025-31431: 29 interactions\n", "creation_timestamp": "2026-05-01T02:30:27.955239Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/dcba21c7-2a6a-45f7-bd09-62eec4b99292/export"/>
    <published>2026-05-01T02:30:27.955239+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/623cfcbd-5c94-4ba5-b304-d28a2386091e/export</id>
    <title>623cfcbd-5c94-4ba5-b304-d28a2386091e</title>
    <updated>2026-05-05T02:08:48.260947+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "623cfcbd-5c94-4ba5-b304-d28a2386091e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3854", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3mkymuhf3uq2z", "content": "Top 3 CVE for last 7 days:\nCVE-2026-31431: 481 interactions\nCVE-2026-41940: 74 interactions\nCVE-2026-3854: 57 interactions\n\n\nTop 3 CVE for yesterday:\nCVE-2026-31431: 26 interactions\nCVE-2026-41940: 6 interactions\nCVE-2026-5404: 4 interactions\n", "creation_timestamp": "2026-05-04T02:29:57.608241Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/623cfcbd-5c94-4ba5-b304-d28a2386091e/export"/>
    <published>2026-05-04T02:29:57.608241+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d0999c5e-17a7-4827-851c-301b112230d1/export</id>
    <title>d0999c5e-17a7-4827-851c-301b112230d1</title>
    <updated>2026-05-05T02:08:48.260837+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d0999c5e-17a7-4827-851c-301b112230d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3854", "type": "seen", "source": "https://bsky.app/profile/opsmatters.com/post/3mkypwv2eqk2j", "content": "The latest update for #CyCognito includes \"Emerging Threat: (CVE-2026-41940) cPanel &amp;amp; WHM Authentication Bypass via CRLF Injection\" and \"Emerging Threat: (CVE-2026-3854) #GitHub Enterprise Server RCE via Git Push Injection\".\n \n#cybersecurity #AttackSurfaceManagement #EASM https://opsmtrs.com/44Srq0X", "creation_timestamp": "2026-05-04T03:25:00.136591Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d0999c5e-17a7-4827-851c-301b112230d1/export"/>
    <published>2026-05-04T03:25:00.136591+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/69b4cc9e-fd2d-4bb4-a58e-708ea04bbad4/export</id>
    <title>69b4cc9e-fd2d-4bb4-a58e-708ea04bbad4</title>
    <updated>2026-05-05T02:08:48.260639+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "69b4cc9e-fd2d-4bb4-a58e-708ea04bbad4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3854", "type": "seen", "source": "https://t.me/codeby_sec/10084", "content": "\u041e\u0434\u0438\u043d git push \u2014 \u0438 \u043c\u0438\u043b\u043b\u0438\u043e\u043d\u044b \u0447\u0443\u0436\u0438\u0445 \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u0435\u0432 \u0443 \u0442\u0435\u0431\u044f \u0432 \u043a\u0430\u0440\u043c\u0430\u043d\u0435\n\n\u0412 \u043c\u0430\u0440\u0442\u0435 2026 \u0433\u043e\u0434\u0430 \u043a\u043e\u043c\u0430\u043d\u0434\u0430 Wiz Research \u043e\u0442\u043f\u0440\u0430\u0432\u0438\u043b\u0430 \u0440\u0435\u043f\u043e\u0440\u0442 \u0432 GitHub Bug Bounty. \u0427\u0435\u0440\u0435\u0437 40 \u043c\u0438\u043d\u0443\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0434\u0442\u0432\u0435\u0440\u0434\u0438\u043b\u0438, \u0447\u0435\u0440\u0435\u0437 \u0434\u0432\u0430 \u0447\u0430\u0441\u0430 \u043d\u0430 github.com \u0432\u044b\u043a\u0430\u0442\u0438\u043b\u0438 \u043f\u0430\u0442\u0447. \u0421\u043a\u043e\u0440\u043e\u0441\u0442\u044c \u0440\u0435\u0430\u043a\u0446\u0438\u0438 \u0433\u043e\u0432\u043e\u0440\u0438\u0442 \u043e \u043c\u0430\u0441\u0448\u0442\u0430\u0431\u0435 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b: \u043e\u0434\u0438\u043d crafted push option \u0434\u0430\u0432\u0430\u043b RCE \u043d\u0430 \u0431\u044d\u043a\u0435\u043d\u0434-\u0441\u0435\u0440\u0432\u0435\u0440\u0430\u0445 \u0438 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u044b\u043c \u0438 \u043f\u0440\u0438\u0432\u0430\u0442\u043d\u044b\u043c \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u044f\u043c \u0447\u0443\u0436\u0438\u0445 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0439. \u041d\u0430 \u043c\u043e\u043c\u0435\u043d\u0442 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u044f 88% self-hosted GHES-\u0438\u043d\u0441\u0442\u0430\u043d\u0441\u043e\u0432 \u043e\u0441\u0442\u0430\u0432\u0430\u043b\u0438\u0441\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u044b.\n\n\u041d\u043e \u0441\u0430\u043c\u043e\u0435 \u0438\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u043e\u0435 \u0442\u0443\u0442 \u2014 \u043d\u0435 \u0441\u0430\u043c\u0430 \u0434\u044b\u0440\u0430, \u0430 \u0442\u043e, \u043a\u0430\u043a \u0435\u0451 \u043d\u0430\u0448\u043b\u0438.\n\n\ud83d\udd0d \u0410\u0440\u0445\u0438\u0442\u0435\u043a\u0442\u0443\u0440\u0430, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0434\u0432\u0435\u043b\u0430\n\n\u041a\u043e\u0433\u0434\u0430 \u0442\u044b \u0434\u0435\u043b\u0430\u0435\u0448\u044c git push \u043d\u0430 GitHub \u0447\u0435\u0440\u0435\u0437 SSH, \u0437\u0430\u043f\u0440\u043e\u0441 \u043f\u0440\u043e\u0445\u043e\u0434\u0438\u0442 \u0446\u0435\u043f\u043e\u0447\u043a\u0443 \u0438\u0437 \u0447\u0435\u0442\u044b\u0440\u0451\u0445 \u0441\u0435\u0440\u0432\u0438\u0441\u043e\u0432: babeld (git-\u043f\u0440\u043e\u043a\u0441\u0438) \u2192 gitauth (\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u044f) \u2192 gitrpcd (\u0432\u043d\u0443\u0442\u0440\u0435\u043d\u043d\u0438\u0439 RPC) \u2192 pre-receive hook. \u041a\u0430\u0436\u0434\u044b\u0439 \u043d\u0430\u043f\u0438\u0441\u0430\u043d \u043d\u0430 \u0441\u0432\u043e\u0451\u043c \u044f\u0437\u044b\u043a\u0435. \u0418 \u043a\u0430\u0436\u0434\u044b\u0439 \u0431\u0435\u0437\u0443\u0441\u043b\u043e\u0432\u043d\u043e \u0434\u043e\u0432\u0435\u0440\u044f\u0435\u0442 \u043f\u0440\u0435\u0434\u044b\u0434\u0443\u0449\u0435\u043c\u0443.\n\n\u0421\u0432\u044f\u0437\u0443\u044e\u0449\u0435\u0435 \u0437\u0432\u0435\u043d\u043e \u043c\u0435\u0436\u0434\u0443 \u043d\u0438\u043c\u0438 \u2014 \u0437\u0430\u0433\u043e\u043b\u043e\u0432\u043e\u043a X-Stat. \u0424\u043e\u0440\u043c\u0430\u0442 \u043f\u0440\u0438\u043c\u0438\u0442\u0438\u0432\u043d\u044b\u0439: \u043f\u0430\u0440\u044b key=value, \u0440\u0430\u0437\u0434\u0435\u043b\u0451\u043d\u043d\u044b\u0435 \u0442\u043e\u0447\u043a\u043e\u0439 \u0441 \u0437\u0430\u043f\u044f\u0442\u043e\u0439. \u041f\u0430\u0440\u0441\u0438\u043d\u0433 \u2014 \u0442\u0440\u0438\u0432\u0438\u0430\u043b\u044c\u043d\u044b\u0439 split. \u0410 \u0434\u0430\u043b\u044c\u0448\u0435 \u2014 \u0434\u0435\u0442\u0430\u043b\u044c, \u043d\u0430 \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u0432\u0441\u0451 \u0434\u0435\u0440\u0436\u0438\u0442\u0441\u044f: \u0435\u0441\u043b\u0438 \u043a\u043b\u044e\u0447 \u0432\u0441\u0442\u0440\u0435\u0447\u0430\u0435\u0442\u0441\u044f \u0434\u0432\u0430\u0436\u0434\u044b, \u0432\u0442\u043e\u0440\u043e\u0435 \u0437\u043d\u0430\u0447\u0435\u043d\u0438\u0435 \u0442\u0438\u0445\u043e \u043f\u0435\u0440\u0435\u0437\u0430\u043f\u0438\u0441\u044b\u0432\u0430\u0435\u0442 \u043f\u0435\u0440\u0432\u043e\u0435. \u0411\u0435\u0437 \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0436\u0434\u0435\u043d\u0438\u0439, \u0431\u0435\u0437 \u043b\u043e\u0433\u043e\u0432. Last-write-wins.\n\nPush options \u2014 \u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u043d\u0430\u044f \u0444\u0438\u0447\u0430 git-\u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0430 (git push -o ). babeld \u043a\u043e\u0434\u0438\u0440\u0443\u0435\u0442 \u0438\u0445 \u043a\u0430\u043a \u043f\u043e\u043b\u044f \u0432 X-Stat. \u041f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u0438\u0440\u0443\u0435\u0442 \u0437\u043d\u0430\u0447\u0435\u043d\u0438\u0435. \u0422\u043e\u0447\u043a\u0430 \u0441 \u0437\u0430\u043f\u044f\u0442\u043e\u0439 \u043d\u0435 \u044d\u043a\u0440\u0430\u043d\u0438\u0440\u0443\u0435\u0442\u0441\u044f. \u0417\u043d\u0430\u0447\u0438\u0442, \u0447\u0435\u0440\u0435\u0437 push option \u043c\u043e\u0436\u043d\u043e \u0438\u043d\u0436\u0435\u043a\u0442\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 \u043f\u043e\u043b\u044f \u0432 X-Stat, \u043f\u0435\u0440\u0435\u0437\u0430\u043f\u0438\u0441\u044b\u0432\u0430\u044f security-\u043a\u0440\u0438\u0442\u0438\u0447\u043d\u044b\u0435 \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u044b \u2014 \u0438 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c command injection.\n\n\u2699\ufe0f \u041a\u0430\u043a AI \u043f\u043e\u043c\u043e\u0433 \u2014 \u0438 \u0433\u0434\u0435 \u043d\u0435 \u043f\u043e\u043c\u043e\u0433\n\nWiz \u043a\u043e\u043f\u0430\u043b\u0438 GHES \u0438 \u0440\u0430\u043d\u044c\u0448\u0435, \u043d\u043e \u043e\u0431\u044a\u0451\u043c \u0437\u0430\u043a\u0440\u044b\u0442\u044b\u0445 \u0431\u0438\u043d\u0430\u0440\u043d\u0438\u043a\u043e\u0432 \u0434\u0435\u043b\u0430\u043b \u043f\u043e\u043b\u043d\u043e\u0446\u0435\u043d\u043d\u044b\u0439 \u0430\u0443\u0434\u0438\u0442 \u043d\u0435\u0440\u0435\u043d\u0442\u0430\u0431\u0435\u043b\u044c\u043d\u044b\u043c. \u0414\u0435\u0441\u044f\u0442\u043a\u0438 \u0441\u043a\u043e\u043c\u043f\u0438\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u0441\u0435\u0440\u0432\u0438\u0441\u043e\u0432 \u0431\u0435\u0437 \u0438\u0441\u0445\u043e\u0434\u043d\u0438\u043a\u043e\u0432 \u2014 \u0440\u0443\u0447\u043d\u043e\u0439 \u0440\u0435\u0432\u0435\u0440\u0441 \u043a\u0430\u0436\u0434\u043e\u0433\u043e \u0432 IDA Pro \u0437\u0430\u043d\u044f\u043b \u0431\u044b \u043c\u0435\u0441\u044f\u0446\u044b.\n\n\u041f\u0440\u043e\u0440\u044b\u0432 \u0441\u043b\u0443\u0447\u0438\u043b\u0441\u044f \u0431\u043b\u0430\u0433\u043e\u0434\u0430\u0440\u044f IDA MCP \u2014 AI-\u0442\u0443\u043b\u0438\u043d\u0433\u0443 \u0434\u043b\u044f \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0437\u0430\u0446\u0438\u0438 \u0440\u0435\u0432\u0435\u0440\u0441-\u0438\u043d\u0436\u0438\u043d\u0438\u0440\u0438\u043d\u0433\u0430. \u0412\u043e\u0441\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0442\u0438\u043f\u043e\u0432, \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u044f \u0444\u0443\u043d\u043a\u0446\u0438\u0439, \u0440\u0435\u043a\u043e\u043d\u0441\u0442\u0440\u0443\u043a\u0446\u0438\u044f \u0432\u043d\u0443\u0442\u0440\u0435\u043d\u043d\u0438\u0445 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u043e\u0432 \u2014 \u0440\u0443\u0442\u0438\u043d\u0430, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0440\u0430\u043d\u044c\u0448\u0435 \u0437\u0430\u043d\u0438\u043c\u0430\u043b\u0430 \u043d\u0435\u0434\u0435\u043b\u0438 \u043d\u0430 \u043e\u0434\u0438\u043d \u0431\u0438\u043d\u0430\u0440\u043d\u0438\u043a, \u0443\u0441\u043a\u043e\u0440\u0438\u043b\u0430\u0441\u044c \u043d\u0430 \u043f\u043e\u0440\u044f\u0434\u043e\u043a.\n\n\u041d\u043e \u0432\u043e\u0442 \u0447\u0442\u043e \u0432\u0430\u0436\u043d\u043e: AI \u0443\u0441\u043a\u043e\u0440\u0438\u043b \u0440\u0443\u0442\u0438\u043d\u0443, \u0430 \u043d\u0435 \u043d\u0430\u0448\u0451\u043b \u0431\u0430\u0433. \u041f\u043e\u043d\u0438\u043c\u0430\u043d\u0438\u0435, \u0447\u0442\u043e \u0442\u043e\u0447\u043a\u0430 \u0441 \u0437\u0430\u043f\u044f\u0442\u043e\u0439 \u0432 shared-\u0444\u043e\u0440\u043c\u0430\u0442\u0435 \u2014 \u0432\u0435\u043a\u0442\u043e\u0440 \u0438\u043d\u044a\u0435\u043a\u0446\u0438\u0438, \u0447\u0442\u043e last-write-wins \u043f\u0440\u0435\u0432\u0440\u0430\u0449\u0430\u0435\u0442 field injection \u0432 override security-\u043f\u043e\u043b\u0435\u0439, \u0447\u0442\u043e \u043a\u043e\u043d\u043a\u0440\u0435\u0442\u043d\u043e\u0435 \u043f\u043e\u043b\u0435 rails_env \u0443\u043f\u0440\u0430\u0432\u043b\u044f\u0435\u0442 sandbox-\u0440\u0435\u0436\u0438\u043c\u043e\u043c \u2014 \u044d\u0442\u043e \u0447\u0438\u0441\u0442\u044b\u0439 domain expertise. AI \u043d\u0435 \u0432\u044b\u0442\u044f\u043d\u0435\u0442 \u0442\u0430\u043a\u043e\u0435 \u0441\u0430\u043c: \u0435\u043c\u0443 \u043d\u0435 \u0445\u0432\u0430\u0442\u0430\u0435\u0442 \u043a\u043e\u043d\u0442\u0435\u043a\u0441\u0442\u0430 \u00ab\u0430 \u0447\u0442\u043e \u0431\u0443\u0434\u0435\u0442, \u0435\u0441\u043b\u0438 \u043f\u0430\u0440\u0441\u0435\u0440 \u0432\u0441\u0442\u0440\u0435\u0442\u0438\u0442 \u0434\u0432\u0430 \u043e\u0434\u0438\u043d\u0430\u043a\u043e\u0432\u044b\u0445 \u043a\u043b\u044e\u0447\u0430\u00bb.\n\n\ud83c\udfaf \u0414\u043b\u044f \u043f\u0440\u0430\u043a\u0442\u0438\u043a\u0443\u044e\u0449\u0438\u0445 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439: \u0430\u043d\u0430\u043b\u043e\u0433\u0438\u0447\u043d\u044b\u0439 \u043f\u043e\u0434\u0445\u043e\u0434 \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442 \u0441 \u043b\u044e\u0431\u044b\u043c \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u043c, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043f\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u043a\u0430\u043a VM-\u043e\u0431\u0440\u0430\u0437 \u0438\u043b\u0438 \u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440 \u2014 GitLab Omnibus, Bitbucket Server, Jenkins. \u0414\u043b\u044f SaaS-only \u2014 \u0432\u0435\u043a\u0442\u043e\u0440 \u0437\u0430\u043a\u0440\u044b\u0442.\n\n\u041f\u043e\u043b\u043d\u044b\u0439 \u0440\u0430\u0437\u0431\u043e\u0440 \u0446\u0435\u043f\u043e\u0447\u043a\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438, \u0444\u043e\u0440\u043c\u0430\u0442\u0430 X-Stat \u0438 \u043c\u0435\u0442\u043e\u0434\u043e\u043b\u043e\u0433\u0438\u0438 \u0440\u0435\u0432\u0435\u0440\u0441\u0430 \u2014 \u0432 \u0441\u0442\u0430\u0442\u044c\u0435 \u043d\u0430 \u0444\u043e\u0440\u0443\u043c\u0435.\n\nhttps://codeby.net/threads/github-enterprise-rce-cve-2026-3854-ot-reversa-zakrytykh-binarnikov-do-polnoi-komprometatsii-servera.92950/", "creation_timestamp": "2026-05-04T10:23:28.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/69b4cc9e-fd2d-4bb4-a58e-708ea04bbad4/export"/>
    <published>2026-05-04T10:23:28+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b497061e-7542-41f7-8ce9-f5aa1f73102c/export</id>
    <title>b497061e-7542-41f7-8ce9-f5aa1f73102c</title>
    <updated>2026-05-05T02:08:48.260487+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b497061e-7542-41f7-8ce9-f5aa1f73102c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-3854", "type": "seen", "source": "https://bsky.app/profile/devops-daily.com/post/3mkzwsalme32h", "content": "\ud83d\udcdd CVE-2026-3854: A Single git push Owned GitHub\n\nA semicolon in a git push option let any authenticated user run code on GitHub.com's backend and on 88% of self-hosted GitHub Enterprise installs....\n\nRead here: https://devops-daily.com/posts/github-cve-2026-3854-git-push-rce", "creation_timestamp": "2026-05-04T15:00:20.683116Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b497061e-7542-41f7-8ce9-f5aa1f73102c/export"/>
    <published>2026-05-04T15:00:20.683116+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/24e09031-a73f-4f7e-b301-2337f3d147b2/export</id>
    <title>24e09031-a73f-4f7e-b301-2337f3d147b2</title>
    <updated>2026-05-05T02:08:48.259151+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "24e09031-a73f-4f7e-b301-2337f3d147b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-3854", "type": "seen", "source": "https://bsky.app/profile/intel.overresearched.net/post/3ml2nps2yxc2j", "content": "- cPanel CVE-2026-41940 \u2192 'Sorry' ransomware (44k+ IPs) - GitHub RCE CVE-2026-3854 (88% GHES unpatched) \n- APT28 Windows zero-day (KEV) \n- Linux 'Copy Fail' LPE \n- ShinyHunters: Instructure 275M  intel.overresearched.net/2026/05/04/c...  \n\n#Weekly #ThreatIntel #Infosec", "creation_timestamp": "2026-05-04T21:50:34.957948Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/24e09031-a73f-4f7e-b301-2337f3d147b2/export"/>
    <published>2026-05-04T21:50:34.957948+00:00</published>
  </entry>
</feed>
