<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: More Than 5,000 GitLab Instances Still Vulnerable to Password Reset Issue in Threats</title>
    <link>https://community.isc2.org/t5/Threats/More-Than-5-000-GitLab-Instances-Still-Vulnerable-to-Password/m-p/66727#M1060</link>
    <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/797288093"&gt;@Early_Adopter&lt;/a&gt;&amp;nbsp;Thank you for contributing your thoughts.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 30 Jan 2024 00:59:13 GMT</pubDate>
    <dc:creator>Kyaw_Myo_Oo</dc:creator>
    <dc:date>2024-01-30T00:59:13Z</dc:date>
    <item>
      <title>More Than 5,000 GitLab Instances Still Vulnerable to Password Reset Issue</title>
      <link>https://community.isc2.org/t5/Threats/More-Than-5-000-GitLab-Instances-Still-Vulnerable-to-Password/m-p/66645#M1054</link>
      <description>&lt;P&gt;Dear all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;A critical vulnerability in GitLab disclosed earlier this month allows account takeovers without user interaction. GitLab released Critical Security Release: 16.7.2, 16.6.4, 16.5.6 for GitLab Community Edition (CE) and Enterprise Edition (EE) to address the vulnerability and four others. As of Tuesday, January 23, more than 5,300 GitLab instances remain unpatched, according to data from the Shadowserver Foundation.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://www.bleepingcomputer.com/news/security/over-5-300-gitlab-servers-exposed-to-zero-click-account-takeover-attacks/?is=2e17210a000df3b23714ee0b7fabf90d53a139a7fd871f741a8f77fe7ad94a1a" target="_blank"&gt;https://www.bleepingcomputer.com/news/security/over-5-300-gitlab-servers-exposed-to-zero-click-account-takeover-attacks/?is=2e17210a000df3b23714ee0b7fabf90d53a139a7fd871f741a8f77fe7ad94a1a&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 27 Jan 2024 14:11:53 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/More-Than-5-000-GitLab-Instances-Still-Vulnerable-to-Password/m-p/66645#M1054</guid>
      <dc:creator>Kyaw_Myo_Oo</dc:creator>
      <dc:date>2024-01-27T14:11:53Z</dc:date>
    </item>
    <item>
      <title>Re: More Than 5,000 GitLab Instances Still Vulnerable to Password Reset Issue</title>
      <link>https://community.isc2.org/t5/Threats/More-Than-5-000-GitLab-Instances-Still-Vulnerable-to-Password/m-p/66659#M1055</link>
      <description>You know I think this isn’t lazy to patch, it’s just a bunch of really smart administrators outsourcing the awful chore of password management…</description>
      <pubDate>Sat, 27 Jan 2024 22:36:16 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/More-Than-5-000-GitLab-Instances-Still-Vulnerable-to-Password/m-p/66659#M1055</guid>
      <dc:creator>Early_Adopter</dc:creator>
      <dc:date>2024-01-27T22:36:16Z</dc:date>
    </item>
    <item>
      <title>Re: More Than 5,000 GitLab Instances Still Vulnerable to Password Reset Issue</title>
      <link>https://community.isc2.org/t5/Threats/More-Than-5-000-GitLab-Instances-Still-Vulnerable-to-Password/m-p/66727#M1060</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/797288093"&gt;@Early_Adopter&lt;/a&gt;&amp;nbsp;Thank you for contributing your thoughts.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jan 2024 00:59:13 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/More-Than-5-000-GitLab-Instances-Still-Vulnerable-to-Password/m-p/66727#M1060</guid>
      <dc:creator>Kyaw_Myo_Oo</dc:creator>
      <dc:date>2024-01-30T00:59:13Z</dc:date>
    </item>
  </channel>
</rss>

