Discussion
Loading...

#Tag

Log in
  • About
  • Code of conduct
  • Privacy
  • Users
  • Instances
  • About Bonfire
Trending Bot boosted
Alexandre Dulaunoy
Alexandre Dulaunoy
@adulau@infosec.exchange  ·  activity timestamp 4 days ago

Full disclosure in computer security still exists and is complementary to other disclosure models. The evolution of vulnerability disclosure is not linear from full disclosure to responsible disclosure to coordinated disclosure. These models coexist and all need to be taken into account.

You can’t just say “the legal framework will solve it” or “just do coordinated disclosure.” Vendors, researchers, and users are not all rational actors playing the same game.

Vulnerability disclosure is more complex than that, and if you actually want to address the issue, you can’t just say “it doesn’t exist.”

#cve #gcve #vulnerabilitymanagement #cybersecurity #fulldisclosure #vulnerability

  • Copy link
  • Flag this post
  • Block
Alexandre Dulaunoy
Alexandre Dulaunoy
@adulau@infosec.exchange  ·  activity timestamp 4 days ago

Full disclosure in computer security still exists and is complementary to other disclosure models. The evolution of vulnerability disclosure is not linear from full disclosure to responsible disclosure to coordinated disclosure. These models coexist and all need to be taken into account.

You can’t just say “the legal framework will solve it” or “just do coordinated disclosure.” Vendors, researchers, and users are not all rational actors playing the same game.

Vulnerability disclosure is more complex than that, and if you actually want to address the issue, you can’t just say “it doesn’t exist.”

#cve #gcve #vulnerabilitymanagement #cybersecurity #fulldisclosure #vulnerability

  • Copy link
  • Flag this post
  • Block
Trending Bot boosted
Alexandre Dulaunoy
Alexandre Dulaunoy
@adulau@infosec.exchange  ·  activity timestamp 3 weeks ago

The last 5 days have been a bit wild for the GCVE.eu initiative.

What started as steady work suddenly picked up real momentum:

  • The public GCVE.eu database instance - https://db.gcve.eu/ - caught the attention of the media, sparking discussions well beyond our usual circles

  • We published updates to the GCVE KEV Assertion Standard Format (BCP-07), refining how known-exploited information can be asserted and shared

  • Vulnerability-Lookup 2.21.0 was released, bringing improvements aligned with the GCVE ecosystem

  • We received a lot of valuable feedback especially on the specs, the tooling, and the overall direction

  • New GNAs joined the GCVE directory, and new contributors stepped in to help shape both the specifications and the software

Seeing this level of engagement, critique, and contribution in such a short time is incredibly motivating. It reinforces why an open, decentralized, and collaborative approach to vulnerability identification and sharing matters.

Huge thanks to everyone who tested, commented, challenged assumptions, wrote code, improved text, or simply helped spread the word. This is very much a community effort and it’s only getting started. 💙

#GCVE #OpenSource #VulnerabilityManagement #CyberSecurity #Standards #Community

Don't hesitate to follow us at GCVE-EU - @gcve

@circl

GCVE BCP - https://gcve.eu/bcp/
GCVE DB - https://db.gcve.eu/recent
Vulnerability-Lookup - https://github.com/vulnerability-lookup/vulnerability-lookup

GitHub

GitHub - vulnerability-lookup/vulnerability-lookup: Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streamlines the management of Coordinated Vulnerability Disclosure (CVD).

Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streamlines the management of Coordinated Vulnerability Disclosure ...

Vulnerability-Lookup

Vulnerability-Lookup - Fast vulnerability lookup correlation from different sources.

GCVE.eu - Best Current Practice (BCP)

What is a GCVE.eu Best Current Practice (BCP)? A Best Current Practice (BCP) in the context of the GCVE.eu project is a community-driven guideline that documents recommended procedures, configurations, or operational principles to support the secure, reliable, and consistent implementation of GCVE-related infrastructure, tools, and services. While GCVE defines a decentralized vulnerability enumeration system, BCPs ensure alignment and interoperability across participants including GCVE Numbering Authorities (GNAs), users, automation systems, and data consumers.
  • Copy link
  • Flag this post
  • Block
Alexandre Dulaunoy
Alexandre Dulaunoy
@adulau@infosec.exchange  ·  activity timestamp 3 weeks ago

The last 5 days have been a bit wild for the GCVE.eu initiative.

What started as steady work suddenly picked up real momentum:

  • The public GCVE.eu database instance - https://db.gcve.eu/ - caught the attention of the media, sparking discussions well beyond our usual circles

  • We published updates to the GCVE KEV Assertion Standard Format (BCP-07), refining how known-exploited information can be asserted and shared

  • Vulnerability-Lookup 2.21.0 was released, bringing improvements aligned with the GCVE ecosystem

  • We received a lot of valuable feedback especially on the specs, the tooling, and the overall direction

  • New GNAs joined the GCVE directory, and new contributors stepped in to help shape both the specifications and the software

Seeing this level of engagement, critique, and contribution in such a short time is incredibly motivating. It reinforces why an open, decentralized, and collaborative approach to vulnerability identification and sharing matters.

Huge thanks to everyone who tested, commented, challenged assumptions, wrote code, improved text, or simply helped spread the word. This is very much a community effort and it’s only getting started. 💙

#GCVE #OpenSource #VulnerabilityManagement #CyberSecurity #Standards #Community

Don't hesitate to follow us at GCVE-EU - @gcve

@circl

GCVE BCP - https://gcve.eu/bcp/
GCVE DB - https://db.gcve.eu/recent
Vulnerability-Lookup - https://github.com/vulnerability-lookup/vulnerability-lookup

GitHub

GitHub - vulnerability-lookup/vulnerability-lookup: Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streamlines the management of Coordinated Vulnerability Disclosure (CVD).

Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streamlines the management of Coordinated Vulnerability Disclosure ...

Vulnerability-Lookup

Vulnerability-Lookup - Fast vulnerability lookup correlation from different sources.

GCVE.eu - Best Current Practice (BCP)

What is a GCVE.eu Best Current Practice (BCP)? A Best Current Practice (BCP) in the context of the GCVE.eu project is a community-driven guideline that documents recommended procedures, configurations, or operational principles to support the secure, reliable, and consistent implementation of GCVE-related infrastructure, tools, and services. While GCVE defines a decentralized vulnerability enumeration system, BCPs ensure alignment and interoperability across participants including GCVE Numbering Authorities (GNAs), users, automation systems, and data consumers.
  • Copy link
  • Flag this post
  • Block
Sascha Foerster :bonndigital: boosted
gcve.eu
gcve.eu
@gcve@social.circl.lu  ·  activity timestamp last month

Luxembourg, 2026/01/07 - The GCVE initiative is proud to announce the public launch of db.gcve.eu , a new open and freely accessible vulnerability advisory database. The platform aggregates and correlates vulnerability information from more than 25 public sources, including GCVE GNA (Numbering Authority) sources and other established vulnerability databases.

🔗 For more details - https://gcve.eu/2026/01/07/gcve-db-announce/
🔗 https://db.gcve.eu/

#cve #gcve #cybersecurity #vulnerabilitymanagement #vulnerability

The project is co-funded by CIRCL and the European Union (ECCC) under the FETTA project, supporting the development of open, resilient, and strengthen EU Cyber Threat Intelligence.

The db.gcve.eu platform is hosted and operated by CIRCL in its own datacenter located in the Grand-Duchy of Luxembourg (Europe). This ensures full control over the infrastructure, data, and operations. By combining open-source software, open data, and European-controlled infrastructure, GCVE and CIRCL contribute to strengthening digital sovereignty, strategic autonomy, and trust in vulnerability information sharing.

While the infrastructure relies on a global hardware supply chain and therefore includes non-EU manufactured equipment, the platform is fully operated, administered, and governed from within Europe by CIRCL.
The project is co-funded by CIRCL and the European Union (ECCC) under the FETTA project, supporting the development of open, resilient, and strengthen EU Cyber Threat Intelligence. The db.gcve.eu platform is hosted and operated by CIRCL in its own datacenter located in the Grand-Duchy of Luxembourg (Europe). This ensures full control over the infrastructure, data, and operations. By combining open-source software, open data, and European-controlled infrastructure, GCVE and CIRCL contribute to strengthening digital sovereignty, strategic autonomy, and trust in vulnerability information sharing. While the infrastructure relies on a global hardware supply chain and therefore includes non-EU manufactured equipment, the platform is fully operated, administered, and governed from within Europe by CIRCL.
The project is co-funded by CIRCL and the European Union (ECCC) under the FETTA project, supporting the development of open, resilient, and strengthen EU Cyber Threat Intelligence. The db.gcve.eu platform is hosted and operated by CIRCL in its own datacenter located in the Grand-Duchy of Luxembourg (Europe). This ensures full control over the infrastructure, data, and operations. By combining open-source software, open data, and European-controlled infrastructure, GCVE and CIRCL contribute to strengthening digital sovereignty, strategic autonomy, and trust in vulnerability information sharing. While the infrastructure relies on a global hardware supply chain and therefore includes non-EU manufactured equipment, the platform is fully operated, administered, and governed from within Europe by CIRCL.

GCVE Announces the Launch of db.gcve.eu: A New Open Public Vulnerability Advisory Database

Luxembourg, 2026/01/07 - The GCVE initiative is proud to announce the public launch of db.gcve.eu, a new open and freely accessible vulnerability advisory database. The platform aggregates and correlates vulnerability information from more than 25 public sources, including GCVE GNA (Numbering Authority) sources and other established vulnerability databases. The goal of db.gcve.eu is to provide the community with a single, unified, and openly accessible reference point for vulnerability intelligence, enabling defenders, researchers, CSIRTs, vendors, and open-source projects to more easily track, correlate, and analyze security advisories across ecosystems.
  • Copy link
  • Flag this post
  • Block
gcve.eu
gcve.eu
@gcve@social.circl.lu  ·  activity timestamp last month

Luxembourg, 2026/01/07 - The GCVE initiative is proud to announce the public launch of db.gcve.eu , a new open and freely accessible vulnerability advisory database. The platform aggregates and correlates vulnerability information from more than 25 public sources, including GCVE GNA (Numbering Authority) sources and other established vulnerability databases.

🔗 For more details - https://gcve.eu/2026/01/07/gcve-db-announce/
🔗 https://db.gcve.eu/

#cve #gcve #cybersecurity #vulnerabilitymanagement #vulnerability

The project is co-funded by CIRCL and the European Union (ECCC) under the FETTA project, supporting the development of open, resilient, and strengthen EU Cyber Threat Intelligence.

The db.gcve.eu platform is hosted and operated by CIRCL in its own datacenter located in the Grand-Duchy of Luxembourg (Europe). This ensures full control over the infrastructure, data, and operations. By combining open-source software, open data, and European-controlled infrastructure, GCVE and CIRCL contribute to strengthening digital sovereignty, strategic autonomy, and trust in vulnerability information sharing.

While the infrastructure relies on a global hardware supply chain and therefore includes non-EU manufactured equipment, the platform is fully operated, administered, and governed from within Europe by CIRCL.
The project is co-funded by CIRCL and the European Union (ECCC) under the FETTA project, supporting the development of open, resilient, and strengthen EU Cyber Threat Intelligence. The db.gcve.eu platform is hosted and operated by CIRCL in its own datacenter located in the Grand-Duchy of Luxembourg (Europe). This ensures full control over the infrastructure, data, and operations. By combining open-source software, open data, and European-controlled infrastructure, GCVE and CIRCL contribute to strengthening digital sovereignty, strategic autonomy, and trust in vulnerability information sharing. While the infrastructure relies on a global hardware supply chain and therefore includes non-EU manufactured equipment, the platform is fully operated, administered, and governed from within Europe by CIRCL.
The project is co-funded by CIRCL and the European Union (ECCC) under the FETTA project, supporting the development of open, resilient, and strengthen EU Cyber Threat Intelligence. The db.gcve.eu platform is hosted and operated by CIRCL in its own datacenter located in the Grand-Duchy of Luxembourg (Europe). This ensures full control over the infrastructure, data, and operations. By combining open-source software, open data, and European-controlled infrastructure, GCVE and CIRCL contribute to strengthening digital sovereignty, strategic autonomy, and trust in vulnerability information sharing. While the infrastructure relies on a global hardware supply chain and therefore includes non-EU manufactured equipment, the platform is fully operated, administered, and governed from within Europe by CIRCL.

GCVE Announces the Launch of db.gcve.eu: A New Open Public Vulnerability Advisory Database

Luxembourg, 2026/01/07 - The GCVE initiative is proud to announce the public launch of db.gcve.eu, a new open and freely accessible vulnerability advisory database. The platform aggregates and correlates vulnerability information from more than 25 public sources, including GCVE GNA (Numbering Authority) sources and other established vulnerability databases. The goal of db.gcve.eu is to provide the community with a single, unified, and openly accessible reference point for vulnerability intelligence, enabling defenders, researchers, CSIRTs, vendors, and open-source projects to more easily track, correlate, and analyze security advisories across ecosystems.
  • Copy link
  • Flag this post
  • Block
Sovereign Tech Agency
Sovereign Tech Agency
@sovtechfund@mastodon.social  ·  activity timestamp 2 months ago

Before you know it, it’ll be time for EU Open Source Week and #FOSDEM in Brussels!

We’re planning on being at many events that week (more details soon). A few to put in your calendar now:

a) 28 Jan 2026: The 1st #GVIP Summit on #vulnerabilitymanagement, existing & future systems, from the new #EUVD to the #CVE program and other platforms. Registration: https://www.gvip-project.org/

b) 31 Jan 2026: Funding the FOSS Ecosystem Devroom
https://fosdem.org/2026/schedule/track/funding-the-foss-ecosystem/

Looking forward to seeing you there!

FOSDEM 2026 - Funding the FOSS Ecosystem

  • Copy link
  • Flag this post
  • Block
pvergain (framapiaf) boosted
CVE Program
CVE Program
@CVE_Program@mastodon.social  ·  activity timestamp 3 months ago

Django Software Foundation is now a CVE Numbering Authority (CNA) assigning CVE IDs for only supported and end-of-life Django versions available at https://www.djangoproject.com/download/ and projects listed at https://github.com/django (such as Django, channels, and daphne), excluding distributions maintained by third-party redistributors.

cve.org/Media/News/item/news/2025/10/28/Django-Added-as-CNA

#CVE #CNA #Vulnerability #VulnerabilityManagement #Cybersecurity

Sorry, no caption provided by author
Sorry, no caption provided by author
Sorry, no caption provided by author
  • Copy link
  • Flag this post
  • Block
CVE Program
CVE Program
@CVE_Program@mastodon.social  ·  activity timestamp 3 months ago

Django Software Foundation is now a CVE Numbering Authority (CNA) assigning CVE IDs for only supported and end-of-life Django versions available at https://www.djangoproject.com/download/ and projects listed at https://github.com/django (such as Django, channels, and daphne), excluding distributions maintained by third-party redistributors.

cve.org/Media/News/item/news/2025/10/28/Django-Added-as-CNA

#CVE #CNA #Vulnerability #VulnerabilityManagement #Cybersecurity

Sorry, no caption provided by author
Sorry, no caption provided by author
Sorry, no caption provided by author
  • Copy link
  • Flag this post
  • Block

bonfire.cafe

A space for Bonfire maintainers and contributors to communicate

bonfire.cafe: About · Code of conduct · Privacy · Users · Instances
Bonfire social · 1.0.2-alpha.23 no JS en
Automatic federation enabled
Log in
  • Explore
  • About
  • Members
  • Code of Conduct