Visualização normal

Ontem — 8 de Maio de 2026Stream principal
  • ✇cybersecurity
  • Remote Code Execution in GitHub.com and GitHub Enterprise Server (CVE-2026-3854) /u/Spiritual-Matters
    Wiz PoC. No publicly known exploits. Claimed they used AI to discover it. >any authenticated user could execute arbitrary commands on GitHub's backend servers with a single git pushcommand - using nothing but a standard git client. >GitHub Enterprise Server customers should upgrade immediately - at the time of this writing, our data indicates that 88% of instances are still vulnerable. https://www.wiz.io/blog/github-rce-vulnerability-cve-2026-3854 submitted by /u/Spiritual-Matters
     

Remote Code Execution in GitHub.com and GitHub Enterprise Server (CVE-2026-3854)

8 de Maio de 2026, 09:53

Wiz PoC. No publicly known exploits. Claimed they used AI to discover it.

>any authenticated user could execute arbitrary commands on GitHub's backend servers with a single git pushcommand - using nothing but a standard git client.

>GitHub Enterprise Server customers should upgrade immediately - at the time of this writing, our data indicates that 88% of instances are still vulnerable.

https://www.wiz.io/blog/github-rce-vulnerability-cve-2026-3854

submitted by /u/Spiritual-Matters
[link] [comments]
❌
❌