photog.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
🌈 An inclusive place for your photos, silliness, and convos! 🌈

Administered by:

Server stats:

245
active users

#cve

0 posts0 participants0 posts today
Alexandre Dulaunoy<p>Vulnerability Lookup and GCVE: A Decentralized Approach to Vulnerability Publishing and Management Workshop at Hack.lu 2025</p><p>We published all the materials from the workshop given at <a href="https://infosec.exchange/tags/hacklu" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacklu</span></a> 2025 </p><p><a href="https://infosec.exchange/tags/gcve" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gcve</span></a> <a href="https://infosec.exchange/tags/vulnerabilitymanagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilitymanagement</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/cve" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cve</span></a> </p><p>🔗 <a href="https://www.vulnerability-lookup.org/2025/10/24/workshop-at-hack-lu-2025/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">vulnerability-lookup.org/2025/</span><span class="invisible">10/24/workshop-at-hack-lu-2025/</span></a></p><p><span class="h-card" translate="no"><a href="https://social.circl.lu/@circl" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>circl</span></a></span> <span class="h-card" translate="no"><a href="https://social.circl.lu/@gcve" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>gcve</span></a></span></p>

Glad to present at #UYBHYS with @cedric our work on GCVE and Vulnerability Lookup, facilitating vulnerability management and publishing through a fully open-source stack.

🔗 Online version vulnerability.circl.lu/
🔗 github.com/vulnerability-lookup
🔗 gcve.eu/

#vulnerability #vulnerabilitymanagement #cybersecurity #infosec #cve #gcve

@gcve @circl

#UYBHYS [Samedi 8/11 11h15] TALK de Cédric Bonhomme (@cedric) et Alexandre Dulaunoy (@adulau) du @circl :

Advancing Vulnerability Tracking and Disclosure Through an open and distributed platform

unlockyourbrain.bzh/conferences

Hey folks, if you run Redis you should be aware of a CVSS 10 vuln, CVE-2025-49844, which is a lua related RCE. Redis have release a patch for this and 3 other CVEs. According to Wiz, this vuln has existed for 13 years. That means forks such as Valkey may also be impacted. Valkey has also released updates to address the same CVEs.

Redis: runzero.com/blog/redis/

Valkey: runzero.com/blog/valkey/

#Security #Redis #Valkey #CVE-2025-49844 #CVE202549844

Redis has disclosed four vulnerabilities in certain versions of the database server's Lua scripting functionality. Here's how to find affected assets.
runZeroRedis vulnerabilities: How to find impacted assetsRedis has disclosed four vulnerabilities in certain versions of the database server's Lua scripting functionality. Here's how to find affected assets.

Just a thought as I work through some bugs reported to NodeBB... would there be interest in ActivityPub.space hosting a "security" category for discussion around vulnerabilities, CVEs, and such that are related to ActivityPub?

For example, if NodeBB were to receive a bug bounty report and responsibly disclose the details, it would be ideal to have it archived in a place where it won't just disappear off the feed in a matter of minutes.

« Recently, security researcher Dirk-Jan Mollema disclosed CVE-2025–55241, a vulnerability so catastrophic that it reads like fiction : a single token, obtained from any test tenant, could have granted complete administrative control over every Microsoft Entra ID (Azure AD) tenant in the world. Every. Single. One. »

tide.org/blog/god-mode-vulnera

Tide FoundationThe God Mode Vulnerability That Should Kill "Trust Microsoft"How CVE-2025-55241 exposed a catastrophic flaw affecting every Microsoft tenant worldwide, and why authorityless security is the only path forward.

CISA reaffirms support for the CVE Program, securing funding until 2026 and promising modernization, automation, and global inclusion.

Nick Andersen: “Defenders must operate from the same map. That’s what the CVE Program provides.”

💬 How do you see CVE evolving in the next few years?
Follow @technadu for continuous infosec updates.

Mitigations for #vmscape have been merged to #Linux mainline and included in new stable and longterm #kernel versions released about an hour ago (like 6.16.7 or 6.12.47).

Vmscape is a vulnerability that essentially takes Spectre-v2 and attacks host userspace from a guest. It particularly affects hypervisors like #QEMU.

For more details see this #LinuxKernel merge commit git.kernel.org/torvalds/c/223b, the doc changes in contains at git.kernel.org/torvalds/c/9969, or the following page from those that published the vulnerability:

comsec.ethz.ch/research/microa

It is tracked as #CVE-2025-40300

cve.org/CVERecord?id=CVE-2025-

New update for CVE Crowd!

You can now:
- Search for vendors or products to see all related CVEs and discussions
- Browse Bluesky posts alongside Fediverse ones
- Enjoy cleaner feeds thanks to the "similar post counter"

And believe it or not... all of that without any ✨AI💩

Learn more below 🧵 or visit cvecrowd.com to see the changes live and in color :heart_cyber:

cvecrowd.comCVE Crowd | Crowd Intelligence on CVEsKeep track of actively discussed CVEs and integrate them into your application or business!

How is it, that in the year of the flying spaghetti monster of 2025, people are still allowed to submit CVE's on Java versions as recent as Java 24, that contains the following text (from EUVD-2025-11051 (alternatively CVE-2025-30698)):

This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security.

In case anyone think I'm not being cautious enough, I present to you a quote from JEP 486, which explains why the Java security manager is being removed:

The Security Manager has not been the primary means of securing client-side Java code for many years, it has rarely been used to secure server-side code, and it is costly to maintain. We therefore deprecated it for removal in Java 17 via JEP 411 (2021). As the next step toward removing the Security Manager, we will revise the Java Platform specification so that developers cannot enable it and other Platform classes do not refer to it. This change will have no impact on the vast majority of applications, libraries, and tools. We will remove the Security Manager API in a future release.

Seriously. And people wonder why I don't take the vulnerability ecosystem seriously.

How many man-years are wasted doing analysis on these kinds of useless reports?

All projects needs someone like @bagder to keep things serious.

euvd.enisa.europa.euEUVDEuropean Vulnerability Database