#VulnerabilityDisclosure

Phillemon CEH | CTHwardenshield
2025-04-30

🚨 Critical RCE vulnerability puts thousands of GeoServer instances at risk.
If exploited, attackers can execute arbitrary code remotely—jeopardizing sensitive geospatial data and infrastructure.
Stay informed. Stay protected.

đź”— wardenshield.com/critical-remo

Open Vulnerability Reportovr@infosec.exchange
2025-04-27

@sergedroz @gcve Hello, thank you for your question.

Both OVR and GCVE share the same goal: strengthening global vulnerability coordination.

However, from what I understand, GCVE is still based on individual instances that could fail without true redundancy.
Additionally, GCVE is maybe not really neutral due to its structure and affiliations.

OVR is developing a fully decentralized and resilient concept — not just for vulnerabilities, but also preparing for SBOM integration and considering upcoming legal requirements (e.g., cybersecurity regulations).

Our vision is an open, neutral, and community-based ecosystem that can survive political risks, technical outages, and grow sustainably with the global community.

Further information will follow in the next few days.

#CyberSecurity #VulnerabilityDisclosure #Decentralization #SBOM #OpenStandards #OVRFoundation #Resilience #DigitalSecurity
#CVE #OVR #GCVE #security #it #community

Open Vulnerability Reportovr@infosec.exchange
2025-04-23

🛡️ Something special is coming soon.

The OVR Foundation is launching its website shortly.

We’re building an open, decentralized standard for vulnerability reporting — because global security should never rely on one country or institution.

Stay tuned and follow. A more resilient future starts here.

#CyberSecurity #OpenStandards #DecentralizedWeb #OVR #FOSS #VulnerabilityDisclosure #InfoSec #Fediverse #CVE #Mitre #Vulnerability #decentralized

PPC Landppcland
2024-12-24

Cloudflare launches free Security.txt generator to boost website security: New tool simplifies vulnerability disclosure process, aligning with industry standards for enhanced web security practices. ppc.land/cloudflare-launches-f

2024-11-13

Killing Filecoin nodes - By Simone Monica
In January, we identified and reported a vulnerability in the Lot... blog.trailofbits.com/2024/11/1 #vulnerabilitydisclosure #blockchain

:donor: [Sylvie]$ :blinking_cursor:lancercryptid@infosec.town
2024-07-09

Use a #Linksys Velop Pro 6E or Velop Pro 7 mesh router? Your Wi-Fi credentials have been sent plaintext to US Amazon servers for at least 7 months.

stackdiary.com/linksys-velop-routers-send-wi-fi-passwords-in-plaintext-to-us-servers/

#networking #vulnerabilitydisclosure

Alexandre Dulaunoyadulau@infosec.exchange
2024-06-14

We are still at the stage where the ISO standards body sells the document behind a paywall, and it cannot be redistributed.

#paywall #standard #infosec #vulnerability #vulnerabilitydisclosure #cvd #iso #ietf

ISO/IEC 30111:2019 Information technology — Security techniques — Vulnerability handling processes

Maybe it's time to use IETF to publish such standard and not ISO.

ISO/IEC 30111:2019 Information technology — Security techniques — Vulnerability handling processes behind a paywall...
2024-03-08

Out of the kernel, into the tokens - By Max Ammann and Emilio LĂłpez
Our application security team leaves no stone untur... blog.trailofbits.com/2024/03/0 #vulnerabilitydisclosure #applicationsecurity #linux

2024-02-20

Breaking the shared key in threshold signature schemes - By Fredrik Dahlgren
Today we are disclosing a denial-of-service vulnerability that affect... blog.trailofbits.com/2024/02/2 #vulnerabilitydisclosure #cryptography

CWE ProgramCWE_Program
2024-01-22

NEW CWE PODCAST —
Listen to Przemyslaw Roguski of talk @ how Red Hat uses , especially the View; why mapping to CWE root cause weaknesses is important in ; CWE in the ; & so much more!

youtu.be/T73dfE2iLyw?si=MobvPs

Listen to the CWE Podcast -- "Red Hat's CWE Journey" -- on our YouTube Channel
2024-01-16

LeftoverLocals: Listening to LLM responses through leaked GPU local memory - By Tyler Sorensen and Heidy Khlaaf
We are disclosing LeftoverLocals: a vulnerabili... blog.trailofbits.com/2024/01/1 #vulnerabilitydisclosure #machinelearning

2023-12-29

Billion times emptiness - By Max Ammann
Behind Ethereum’s powerful blockchain technology lies a lesser-known... blog.trailofbits.com/2023/12/2 #vulnerabilitydisclosure #blockchain

Alexandre Dulaunoyadulau@infosec.exchange
2023-11-30

I’m still surprised by some projects who complain about the burden to deal with security vulnerability disclosure. If a project used by many orgs has zero vulnerability documented and especially didn’t publish anything about security disclosure. There is maybe something to be fixed.

#cvd #cve #vulnerability #vulnerabilitydisclosure

2023-11-28

Confused by the wave of new EU cybersecurity regulations impacting the telecom sector?

Can't distinguish the obligations of the NIS2 Directive from those of NIS1? The Cyber Resilience Act (CRA) from the Critical Entity Resilience Act (CER)? And whatever happened to the European Electronic Communications Code (EECC)?

Telecom operators in the EU have to comply with all of these but the NIS2 Directive is the central one now. It ushers in by far the most substantial changes in telco cybersecurity strategy and day to day cybersecurity operations. Read more in this new HardenStance White Paper:
hardenstance.com/wp-content/up

#nis2directive #incidentreporting #vulnerabilitydisclosure #threatintelligence

2023-11-09

Flaws in the vulnerability disclosure process of open-source projects could be exploited by attackers to harvest the information needed to launch attacks.

The risk arises from “half-day” and “0.75-day” vulnerabilities.

helpnetsecurity.com/2023/11/09

#OpenSource #VulnerabilityDisclosure #Cybersecurity

Open-source software
2023-10-31

50 leading lights of the cybersecurity community recently wrote an open letter to the EU cautioning against the potential risk arising with Article 11 of the new Cyber Resilience Act relating to vulnerability disclosure requirements.

youtu.be/gQqX59xN1lo

In this 25 minute interview, I spoke to one of them, Bugcrowd's Founder and CTO, Casey Ellis, about what these industry leaders are worried about and the change they're lobbying for.

#vulnerability #vulnerabilitydisclosure #vulnerability_management #CyberResilienceAct
@bugcrowd@twtr.plus
@Bugcrowd

youtu.be/gQqX59xN1lo

Congratulations Þorsteinn K. Ingólfsson on defending your #Master's this week, very well done 🙌 . It's great to know you are contemplating continuing to do research.

Special thanks to the co-advisers and the committee members for their insights, feedback and questions Thomas Welsh, Helmut Neukirchen, Matthias Book, and Theodor Gislason.

Thesis: The state of cybersecurity vulnerability reporting in Iceland.

Háskóli Íslands (the University of Iceland).

#háskóliíslands #researchers #graduateschool #cybersecurity #infosec #VulnerabilityDisclosure
#research #academia #bugbounty

2023-05-16

Interesting research by David Bozzini, an antropologist at the University of Fribourg, Switzerland, about the history of vulnerability disclosure, from first (ethical) hacker to modern bug bounty programs:

"My research focuses on the defense mechanism of vulnerability disclosure, which has become immensely valuable to the digital tech industry and beyond. This paper addresses the history of vulnerability disclosure and the emergence of the defensive market that has developed alongside the offensive market In fact, the defensive market for vulnerability information is a recent model of vulnerability disclosure organized in the form of bug bounties programs. Bug bounties are initiatives managed by companies or organizations looking for information on their own vulnerabilities through which they pay individuals—ethical hackers—to uncover bugs in their systems and, in turn, improve the security of their products and services. In this paper, I analyze the historical processes that have transformed models of vulnerability disclosure over the years and have given rise to a defensive market that has monetized disclosure, turned ethical hacking into labor, and made information on vulnerabilities a commodity."

hal.science/hal-04068476

#vulnerabilitydisclosure #bugbounty #history #research #markets

2023-03-02

Hall of Fame fĂĽr Scherheitsforschende

"Vorbilder
Danksagungen an diejenigen, die Sicherheitslücken melden, sind insbesondere in großen US-amerikanischen Konzernen wie Google und Microsoft längst gang und gäbe. Aber auch das BSI und die Bundeswehr haben bereits eigene Webseiten mit Danksagungen; im Bereich der Medien ist das allerdings bislang eher unüblich."

#VulnerabilityDisclosure #VDP #VDPBw #Schwachstellenmanagement

heise.de/news/In-eigener-Sache

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst