GitLab, the popular web-based DevOps lifecycle platform, is urging its users to
apply a newly released security patch after discovering a high-severity path
traversal vulnerability.

The flaw, tagged as CVE-2023-2825
[https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2825], holds maximum
severity status (CVSS score of 10.0) due to its potential impact. It affects
version 16.0.0 of both the GitLab Community Edition (CE) and the Enterprise
Edition (EE).

A cybersecurity researcher called ‘pw

Oh hi there 👋
It’s nice to meet you.

Sign up to receive awesome content in your inbox, every month.

We don’t spam! Read our privacy policy for more info.

Oh hi there 👋
It’s nice to meet you.

Sign up to receive awesome content in your inbox, every month.

We don’t spam! Read our privacy policy for more info.

By rooter