med-mastodon.com is one of the many independent Mastodon servers you can use to participate in the fediverse.
Medical community on Mastodon

Administered by:

Server stats:

371
active users

#cve

7 posts7 participants0 posts today
Puppet Community Team :fedi:<p>In the latest video to drop on the Puppet YouTube, our very own Barr Iserloth and Liam Sexton take you through the flow so you can see how to use Puppet Enterprise Advanced Patching to apply a patch in your infrastructure!</p><p>🎦 YouTube: <a href="https://www.youtube.com/watch?v=vj1acdKTNzI" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">youtube.com/watch?v=vj1acdKTNzI</span><span class="invisible"></span></a></p><p><a href="https://fosstodon.org/tags/devops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>devops</span></a> <a href="https://fosstodon.org/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://fosstodon.org/tags/cve" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cve</span></a></p>
TYPO3 CMS<p>As of 15 July 2025, the TYPO3 Association is approved as a CVE Numbering Authority (CNA) by the CVE Program. </p><p>The TYPO3 Security Team can now assign CVE Identifiers for vulnerabilities in TYPO3 CMS and its ecosystem. This ensures TYPO3 security issues are disclosed in a coordinated and consistent way. </p><p>Learn more: <a href="https://t3.ms/cve-bm" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">t3.ms/cve-bm</span><span class="invisible"></span></a> </p><p><a href="https://typo3.social/tags/TYPO3" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TYPO3</span></a> <a href="https://typo3.social/tags/CVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE</span></a> <a href="https://typo3.social/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a></p>
NLnet Labs<p>Unbound 1.23.1 in now available. This security release fixes the Rebirthday Attack CVE-2025-5994.</p><p>The vulnerability re-opens up <a href="https://social.nlnetlabs.nl/tags/DNS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNS</span></a> resolvers to a birthday paradox, for EDNS client subnet servers that respond with non-ECS answers. The <a href="https://social.nlnetlabs.nl/tags/CVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE</span></a> is described here:<br><a href="https://nlnetlabs.nl/downloads/unbound/CVE-2025-5994.txt" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nlnetlabs.nl/downloads/unbound</span><span class="invisible">/CVE-2025-5994.txt</span></a></p><p>We would like to thank Xiang Li (AOSP Lab, Nankai University) for discovering and responsibly disclosing the vulnerability. <br><a href="https://github.com/NLnetLabs/unbound/releases/tag/release-1.23.1" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/NLnetLabs/unbound/r</span><span class="invisible">eleases/tag/release-1.23.1</span></a></p>
CVE Program<p>Minutes from the CVE Board teleconference meeting on June 25 are now available <br> <br><a href="https://www.mail-archive.com/cve-editorial-board-list@mitre.org/msg00277.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">mail-archive.com/cve-editorial</span><span class="invisible">-board-list@mitre.org/msg00277.html</span></a> <br> <br><a href="https://mastodon.social/tags/cve" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cve</span></a> <a href="https://mastodon.social/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://mastodon.social/tags/vulnerabilitymanagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilitymanagement</span></a> <a href="https://mastodon.social/tags/hssedi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hssedi</span></a> <a href="https://mastodon.social/tags/cisa" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cisa</span></a> <a href="https://mastodon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
Who Let The Dogs Out 🐾<p>FortiWeb взломан изнутри: SQL-инъекция 9.6/10 позволяет писать код в БД</p><p><a href="https://mastodon.ml/tags/CVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE</span></a> <a href="https://mastodon.ml/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://mastodon.ml/tags/FortiWeb" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FortiWeb</span></a> </p><p>В компоненте Fabric Connector (интеграция продуктов Fortinet) обнаружена (<a href="https://fortiguard.fortinet.com/psirt/FG-IR-25-151" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">fortiguard.fortinet.com/psirt/</span><span class="invisible">FG-IR-25-151</span></a>) критическая уязвимость CVE-2025-25257 (9.6/10 CVSS). Атакующий без авторизации мог:<br>→ Выполнять произвольные SQL-запросы через поддельный Bearer-токен в заголовке Authorization;<br>→ Использовать SELECT... INTO OUTFILE для записи вредоносного кода на диск;<br>→ Запускать код через Python, получая полный контроль над системой (от имени пользователя mysql).</p><p>Уязвимые версии:<br>FortiWeb 7.6.0–7.6.3, 7.4.0–7.4.7, 7.2.0–7.2.10, 7.0.0–7.0.10.<br>Решение: Срочно обновиться до 7.6.4, 7.4.8, 7.2.11 или 7.0.11. До патча — отключить веб-интерфейсы HTTP/HTTPS.</p><p>Как починили?<br>Fortinet заменила небезопасные форматные строки на подготовленные выражения (prepared statements), блокирующие SQL-инъекции. Уязвимость нашёл Кентаро Кавана (GMO Cybersecurity) — эксперт по взлому Cisco.</p>
ДевоПес<p>Сьогодні я дізнався, що пісня Janet Jackson “Rhythm Nation” фізично виводила з ладу жорсткі диски 5400rpm (окремі моделі, наприклад Seagate STDT4000100). Послідовність звуків викликала резонанс магнітних пластин та диск перестав працювати. Ця вразливість навіть має CVE-2022-38392<br><a href="https://www.sangfor.com/farsight-labs-threat-intelligence/cybersecurity/cve-2022-38392-5400-rpm-oem-hard-drive-dos-vulnerability" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">sangfor.com/farsight-labs-thre</span><span class="invisible">at-intelligence/cybersecurity/cve-2022-38392-5400-rpm-oem-hard-drive-dos-vulnerability</span></a><br><a href="https://twiukraine.com/tags/CVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE</span></a> <a href="https://twiukraine.com/tags/HDD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HDD</span></a></p>
morgen<p>Just published a proof-of-concept exploit for CVE-2025-32463, a new Linux privilege escalation vulnerability affecting sudo discovered and disclosed by Stratascale about 2 weeks ago.</p><p>The PoC is available on GitHub. A full technical writeup will be published on my blog soon.</p><p>GitHub: <a href="https://github.com/morgenm/sudo-chroot-CVE-2025-32463" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/morgenm/sudo-chroot</span><span class="invisible">-CVE-2025-32463</span></a></p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/ExploitDev" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ExploitDev</span></a> <a href="https://infosec.exchange/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://infosec.exchange/tags/CVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE</span></a> <a href="https://infosec.exchange/tags/PrivilegeEscalation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PrivilegeEscalation</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Exploit</span></a> <a href="https://infosec.exchange/tags/Rust" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Rust</span></a> <a href="https://infosec.exchange/tags/PrivEsc" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PrivEsc</span></a></p>
Europe Says<p><a href="https://www.europesays.com/2226640/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">europesays.com/2226640/</span><span class="invisible"></span></a> Central Banks increase spending on gold in May <a href="https://pubeurope.com/tags/CentralBank" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CentralBank</span></a> <a href="https://pubeurope.com/tags/CentralBankGoldReservesSurvey2025" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CentralBankGoldReservesSurvey2025</span></a> <a href="https://pubeurope.com/tags/CentralBanks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CentralBanks</span></a> <a href="https://pubeurope.com/tags/CVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE</span></a>:NAU <a href="https://pubeurope.com/tags/Economy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Economy</span></a> <a href="https://pubeurope.com/tags/FRA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FRA</span></a>:5E50 <a href="https://pubeurope.com/tags/Gold" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Gold</span></a> <a href="https://pubeurope.com/tags/NevGoldCorp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NevGoldCorp</span></a>. <a href="https://pubeurope.com/tags/NewmontCorporation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NewmontCorporation</span></a> <a href="https://pubeurope.com/tags/NYSE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NYSE</span></a>:NEM <a href="https://pubeurope.com/tags/OTCMKTS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OTCMKTS</span></a>:NAUFF <a href="https://pubeurope.com/tags/QatarCentralBank" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>QatarCentralBank</span></a> <a href="https://pubeurope.com/tags/TSE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TSE</span></a>:NGT <a href="https://pubeurope.com/tags/WorldGoldCouncil" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WorldGoldCouncil</span></a></p>
⠠⠵ avuko<p>I do not consent to be used by, used for, or interact in any way with AI.</p><p>Reason number 163.327.205:</p><p><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-32711" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">msrc.microsoft.com/update-guid</span><span class="invisible">e/en-US/vulnerability/CVE-2025-32711</span></a></p><p><a href="https://infosec.exchange/tags/CVE202532711" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE202532711</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/CVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE</span></a> <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://infosec.exchange/tags/LLM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LLM</span></a> <a href="https://infosec.exchange/tags/enshittification" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>enshittification</span></a></p>
BCWHS<p>MITRE ATT&amp;CK &amp; CISA CVE Mapping<br>I have a connection established with CISA's CVE JSON and MITRE ATT&amp;CK's TAXII API. But how do I map them together?<br><a href="https://wadebach.blackcatwhitehatsecurity.com/blog.cfm#cvemapping" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">wadebach.blackcatwhitehatsecur</span><span class="invisible">ity.com/blog.cfm#cvemapping</span></a><br><a href="https://mastodon.social/tags/Blog" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Blog</span></a> <a href="https://mastodon.social/tags/MITRE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MITRE</span></a> <a href="https://mastodon.social/tags/ATTACK" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ATTACK</span></a> <a href="https://mastodon.social/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> <a href="https://mastodon.social/tags/CVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE</span></a> <a href="https://mastodon.social/tags/Mapping" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mapping</span></a> <a href="https://mastodon.social/tags/programming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>programming</span></a></p>
Paco Hope #resist<p>Somehow I missed <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-38392#vulnCurrentDescriptionTitle" rel="nofollow noopener" target="_blank">this CVE</a> when it came out in 2022.</p><p>I think it's called a Jackson-in-the-Middle attack.</p><blockquote><p>Certain 5400 RPM hard drives, ... allow physically proximate attackers to cause a ... device malfunction ... via a resonant-frequency attack with the audio signal from the Rhythm Nation music video.</p></blockquote><p>I like that CVE links to <a href="https://www.youtube.com/watch?v=nSvu9IDUjZw&amp;t=416s" rel="nofollow noopener" target="_blank">a YouTube video</a> where someone tried to reproduce it. </p><p><a href="https://infosec.exchange/tags/CVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE</span></a> <a href="https://infosec.exchange/tags/NVD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NVD</span></a> <a href="https://infosec.exchange/tags/JanetJackson" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JanetJackson</span></a></p>
Pyrzout :vm:<p>12-Year-Old Sudo Vulnerability Exposes Linux Systems to Root Privilege Escalation <a href="https://gbhackers.com/12-year-old-sudo-vulnerability/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gbhackers.com/12-year-old-sudo</span><span class="invisible">-vulnerability/</span></a> <a href="https://social.skynetcloud.site/tags/CVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE</span></a>/vulnerability <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a> <a href="https://social.skynetcloud.site/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://social.skynetcloud.site/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a></p>
🔘 G◍M◍◍T 🔘<p>💡 Hacker possono spiare da remoto cuffie Bluetooth</p><p><a href="https://gomoot.com/hacker-possono-spiare-da-remoto-cuffie-bluetooth" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gomoot.com/hacker-possono-spia</span><span class="invisible">re-da-remoto-cuffie-bluetooth</span></a></p><p><a href="https://mastodon.uno/tags/airoha" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>airoha</span></a> <a href="https://mastodon.uno/tags/blog" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blog</span></a> <a href="https://mastodon.uno/tags/bluetoothle" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bluetoothle</span></a> <a href="https://mastodon.uno/tags/bose" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bose</span></a> <a href="https://mastodon.uno/tags/cve" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cve</span></a> <a href="https://mastodon.uno/tags/jbl" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>jbl</span></a> <a href="https://mastodon.uno/tags/marshall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>marshall</span></a> <a href="https://mastodon.uno/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a> <a href="https://mastodon.uno/tags/patch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>patch</span></a> <a href="https://mastodon.uno/tags/picks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>picks</span></a> <a href="https://mastodon.uno/tags/sony" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sony</span></a> <a href="https://mastodon.uno/tags/tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tech</span></a> <a href="https://mastodon.uno/tags/tecnologia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tecnologia</span></a> <a href="https://mastodon.uno/tags/wireless" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wireless</span></a></p>
Marko Jahnke<p>Na toll, wie soll ich mein gutes altes <a href="https://bonn.social/tags/Brother" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Brother</span></a>-<a href="https://bonn.social/tags/Multifunktionsger%C3%A4t" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Multifunktionsgerät</span></a> nun aktualisieren? Eine neue Firmware gibt es schon viele Jahre nicht mehr.</p><p>Das Ding läuft seit &gt;10 Jahren problemlos, nachdem ich davor mit HP etc. eine lange Oddyssey mit Probleme hinter mir hatte.</p><p>Na dann eben wieder <a href="https://bonn.social/tags/Elektronikschrott" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Elektronikschrott</span></a> produzieren... Danke für nichts, Bro.</p><p><a href="https://bonn.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://bonn.social/tags/CVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE</span></a> <a href="https://bonn.social/tags/Printer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Printer</span></a> </p><p><a href="https://www.heise.de/news/Sicherheitsluecken-in-fast-750-Multifunktionsdruckern-verschiedener-Hersteller-10461742.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Sicherheitslueck</span><span class="invisible">en-in-fast-750-Multifunktionsdruckern-verschiedener-Hersteller-10461742.html</span></a></p>
Alexandre Dulaunoy<p>We had the pleasure of presenting at FIRST.org 2025, showcasing the Vulnerability-Lookup and GCVE.eu initiatives.</p><p>Slides are now available.</p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://infosec.exchange/tags/cve" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cve</span></a> <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintel</span></a> </p><p><span class="h-card" translate="no"><a href="https://social.circl.lu/@gcve" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>gcve</span></a></span> <span class="h-card" translate="no"><a href="https://social.circl.lu/@circl" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>circl</span></a></span> <br><span class="h-card" translate="no"><a href="https://infosec.exchange/@firstdotorg" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>firstdotorg</span></a></span> </p><p>🔗 <a href="https://www.vulnerability-lookup.org/2025/06/25/beyond-cve-mastering-the-landscape-with-vulnerability-lookup/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">vulnerability-lookup.org/2025/</span><span class="invisible">06/25/beyond-cve-mastering-the-landscape-with-vulnerability-lookup/</span></a></p>
circl<p>An OS command injection vulnerability exists in various models of E-Series Linksys routers via the /tmUnblock.cgi and /hndUnblock.cgi endpoints over HTTP on port 8080. The CGI scripts improperly process user-supplied input passed to the ttcp_ip parameter without sanitization, allowing unauthenticated attackers to inject shell commands. This vulnerability is exploited in the wild by the "TheMoon" worm.</p><p><a href="https://social.circl.lu/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://social.circl.lu/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://social.circl.lu/tags/cve" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cve</span></a> <a href="https://social.circl.lu/tags/linksys" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linksys</span></a> </p><p>🔗 <a href="https://vulnerability.circl.lu/vuln/cve-2025-34037" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">vulnerability.circl.lu/vuln/cv</span><span class="invisible">e-2025-34037</span></a></p>
Josh Bressers<p>I chatted with Philippe Ombredanne about Package URLs, or PURLs. He created them, so he knows a thing or two.</p><p>We do complain about CPE quite a bit :)</p><p>But it's a really hard problem. It feels like a package identifier should be easy, but it's way harder than you think it is. There's nobody better than Philippe to drop some knowledge.</p><p><a href="https://opensourcesecurity.io/2025/2025-06-purl-philippe-ombredanne/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">opensourcesecurity.io/2025/202</span><span class="invisible">5-06-purl-philippe-ombredanne/</span></a></p><p><a href="https://infosec.exchange/tags/PURL" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PURL</span></a> <br><a href="https://infosec.exchange/tags/CVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE</span></a> <br><a href="https://infosec.exchange/tags/SBOM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SBOM</span></a></p>
BCWHS<p>MITRE ATT&amp;CK &amp; CISA CVE Mapping<br>I have a connection established with CISA's CVE JSON and MITRE ATT&amp;CK's TAXII API. But how do I map them together?<br><a href="https://wadebach.blackcatwhitehatsecurity.com/blog.cfm#cvemapping" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">wadebach.blackcatwhitehatsecur</span><span class="invisible">ity.com/blog.cfm#cvemapping</span></a><br><a href="https://mastodon.social/tags/Blog" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Blog</span></a> <a href="https://mastodon.social/tags/MITRE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MITRE</span></a> <a href="https://mastodon.social/tags/ATT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ATT</span></a>&amp;CK <a href="https://mastodon.social/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> <a href="https://mastodon.social/tags/CVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE</span></a> <a href="https://mastodon.social/tags/Mapping" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mapping</span></a> <a href="https://mastodon.social/tags/programming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>programming</span></a></p>
Jan Wildeboer 😷:krulorange:<p>Dear <span class="h-card" translate="no"><a href="https://mastodon.social/@Gargron" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>Gargron</span></a></span> — Can we take another, fresh look at <a href="https://github.com/mastodon/mastodon/issues/20694" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/mastodon/mastodon/i</span><span class="invisible">ssues/20694</span></a> ? Hashtags should ultimately support full UTF8, IMHO, but adding at the very least the dash would be very helpful. It's not just band or artist names. CVEs are a better example. It would be really helpful when I can use <a href="https://social.wildeboer.net/tags/CVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE</span></a>-2025-6019 instead of <a href="https://social.wildeboer.net/tags/CVE20256019" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE20256019</span></a> or <a href="https://social.wildeboer.net/tags/CVE_2025_6019" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE_2025_6019</span></a> as I am forced to do now. I guess hashtags are not in scope of the ActivityPub protocol, <span class="h-card" translate="no"><a href="https://cosocial.ca/@evan" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>evan</span></a></span> ?</p>
Jan Wildeboer 😷:krulorange:<p>It's 2025. We can use emojis in hashtags in some apps. But we still cannot use "-". So, no. still no <a href="https://social.wildeboer.net/tags/CVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE</span></a>-2025-0619. Will this ever be possible? Le sigh.</p>