All of the videos from “CVE/FIRST VulnCon 2025” are now available on YouTube!
https://www.youtube.com/playlist?list=PLWfD9RQVdJ6cm3kSvz-Sk87CawSzn5Ep0
#CVE #FIRST #VulnerabilityManagement #Vulnerability #Cybersecurity #InformationSecurity
All of the videos from “CVE/FIRST VulnCon 2025” are now available on YouTube!
https://www.youtube.com/playlist?list=PLWfD9RQVdJ6cm3kSvz-Sk87CawSzn5Ep0
#CVE #FIRST #VulnerabilityManagement #Vulnerability #Cybersecurity #InformationSecurity
The VLAI Severity model is accessible via API. Here is a simple example from a recent Ivanti vulnerability description from their vulnerability webpage.
The VLAI Security model for vulnerabilities is accessible via vulnerability-lookup and the public instance operated by CIRCL.
So, if you have a vulnerability description, you can quickly assess it to get a general idea of its severity.
curl -X 'POST' \
'https://vulnerability.circl.lu/api/vlai/severity-classification' \
-H 'accept: application/json' \
-H 'Content-Type: application/json' \
-d '{ "description": "Ivanti has released updates for Ivanti Neurons for ITSM (on-prem only) which addresses one critical severity vulnerability. Depending on system configuration, successful exploitation could allow an unauthenticated remote attacker to gain administrative access to the system. We are not aware of any customers being exploited by these vulnerabilities at the time of disclosure. We have included an environmental score to provide customers with additional context on the adjusted risk of this vulnerability with typical use cases. Customers who have followed Ivanti guidance on securing the IIS website and restricted access to a limited number of IP addresses and domain names have a reduced risk to their environment. Customers who have users log into the solution from outside their company network also have a reduced risk to their environment if they ensure that the solution is configured with a DMZ." }'
and the result
{
"severity": "Critical",
"confidence": 0.9256
}
#cve #ivanti #vulnerability #vulnerabilitymanagement #vulnerabilities
For more details: https://www.vulnerability-lookup.org/2025/05/22/vulnerability-lookup-2-10-0/#ai-powered-enrichment-using-our-in-house-ai-models
Significant progress has been made on the BCP-3 document, as well as on the implementation to enable synchronization and distributed publication of vulnerabilities.
The 2.10.0 release of vulnerability-lookup.org already includes the GCVE directory, and the next version will support BCP-3 as the reference implementation.
Thanks to @circl @cedric @adulau @misp @iglocska and many GNA for the contributions and constructive feedback.
Harborist is now a CVE Numbering Authority (CNA) assigning CVE IDs for all projects listed under https://www.npmjs.com/~ljharb
https://cve.org/Media/News/item/news/2025/05/28/Harborist-Added-as-CNA
#cve #cna #vulnerability #vulnerabilitymanagement #cybersecurity #opensource
#OT #Advisory VDE-2025-044
Weidmueller: Industrial ethernet switches are affected by multiple vulnerabilities
#CVE CVE-2025-41651, CVE-2025-41652, CVE-2025-41649, CVE-2025-41650, CVE-2025-41653
https://certvde.com/en/advisories/VDE-2025-044
#CSAF https://weidmueller.csaf-tp.certvde.com/.well-known/csaf/white/2025/vde-2025-044.json
CVE-2024-4367 (PDF.js) is gaining traction in some exploitation-focused Telegram channels...
https://vulnerability.circl.lu/cve/CVE-2024-4367
seen via @ail_project
1,110 CVE Records + severity scores when available in CISA’s Vulnerability Summary bulletin for the week of May 12, 2025
https://cisa.gov/news-events/bulletins/sb25-139
#CVE #CVEID #CVSS #CWE #Vulnerability #VulnerabilityManagement #HSSEDI #CISA
New on the #CVE Blog:
“CNA Operational Rules Version 4.1.0” Now in Effect
https://medium.com/@cve_program/cna-operational-rules-version-4-1-0-now-in-effect-2f929f4e52da
#VulnerabilityManagement #Vulnerability #InformationSecurity #Cybersecurity
Extreme Networks is now a CVE Numbering Authority (CNA) assigning CVE IDs for vulnerabilities discovered in Extreme Networks products & services
https://cve.org/Media/News/item/news/2025/05/20/Extreme-Networks-Added-as-CNA
#cve #cna #vulnerability #vulnerabilitymanagement #cybersecurity
Minutes from the CVE Board teleconference meeting on April 30 are now available
https://cve.mitre.org/community/board/meeting_summaries/30_April_2025.pdf
#CVE #Vulnerability #VulnerabilityManagement #HSSEDI #CISA #Infosec #Cybersecurity
773 CVE Records + severity scores when available in CISA’s Vulnerability Summary bulletin for the week of May 5, 2025
https://www.cisa.gov/news-events/bulletins/sb25-132
#CVE #CVEID #CVSS #CWE #Vulnerability #VulnerabilityManagement #HSSEDI #CISA
Minutes from the CVE Board teleconference meeting on April 16 are now available
https://cve.mitre.org/community/board/meeting_summaries/16_April_2025.pdf
#CVE #Vulnerability #VulnerabilityManagement #HSSEDI #CISA #Infosec #Cybersecurity
Doch es gibt auch gute Nachrichten, nämlich Schritte zur Reduktion der Abhängigkeit Europas von den USA:
Zum einen gibt es seit letzter Woche einen Ableger der für IT-Sicherheit unabdingbaren #CVE-Datenbank mit dem Verzeichnis der öffentlich bekannten Sicherheitslücken (und weiteren Infos dazu).
Falls die US-Finanzierung für CVE also wirklich in 10 Monaten ausläuft (wie vor einem Monat schon einmal fast passiert), kann es trotzdem weitergehen.
How is Github doing CVSS scoring? I was looking at CVE-2022-41966 and it has a CVSS vector that indicates Integrity: Low.
The vulnerability allows an attacker who can feed malicious data to an XML deserialiser to crash the parser with a StackOverflowError. The fix changes this to a different type of exception. How can that in any way be marked as having an integrity impact at all?
I note that the NIST assessment has the much more appropriate assessment here where there is no impact of integrity.
#OT #Advisory VDE-2025-041
Weidmueller: ResMa is affected by a Vulnerability for ASP.NET AJAX
Weidmueller product ResMa is affected by ASP.NET AJAX vulnerability.
Weidmueller has released a new firmware for the affected product to fix the vulnerability.
#CVE CVE-2025-3600
https://certvde.com/en/advisories/VDE-2025-041
#CSAF https://weidmueller.csaf-tp.certvde.com/.well-known/csaf/white/2025/vde-2025-041.json
Start der European-Vulnerability-Database (EUVD)
#CSIRT #CVE #CVENumberingAuthority #Cybersecurity #Cybersicherheit #ENISA #EuropeanVulnerabilityDatabase #EUVD #NIS2 #Schwachstelle #SchwachstellenDatenbank #Schwachstellenmanagement #ThreatIntelligence #Vulnerability
https://netzpalaver.de/2025/05/18/start-der-european-vulnerability-database-euvd/
@cedric Thanks for the continuous work on the Python GCVE client for the registry.
The client is available at the following location:
#Europa baut eine eigene Datenbank für #IT Schwachstellen auf. Nachdem die Finanzierung des #CVE durch die #USA eine Weile ungesichert war, eine gute Idee. Außerdem wird der #CIA der Zugriff verweigert.
Wichtiger Schritt der #Digitalisierung in der #EU.
URL: https://euvd.enisa.europa.eu/
ENDLICH: Die EU-Datenbank mit allen SICHERHEITSLÜCKEN!
#Europa baut eine eigene Datenbank für #IT Schwachstellen auf. Nachdem die Finanzierung des #CVE durch die #USA eine Weile ungesichert war, eine gute Idee. Außerdem wird der #CIA der Zugriff verweigert.
Wichtiger Schritt der #Digitalisierung in der #EU.
URL: euvd.enisa.europa.eu
ENDLICH: Die EU-Datenbank mit ...
https://www.europesays.com/de/112805/ Athen/Berlin | Neue EU-Datenbank listet bekannte IT-Sicherheitslücken #AktuelleNachrichtenAusBerlin #AktuelleNewsAusBerlin #Berlin #BerlinNews #Computer #CVE #Deutschland #Enisa #EU #EUVD #Germany #Internet #NachrichtenAusBerlin #NewsAusBerlin #Schwachstellen #Sicherheit #Sicherheitslücken #Software #Technik #tmn1130 #TPDS #Updates #USA