Andrey Lukashenkov’s Post

View profile for Andrey Lukashenkov, graphic

Vulnerability Intelligence and Research | B2B SaaS GoToMarket | Engineering Background | Startups

There was an unexpected follow-up to this story. Chris Madden spotted likely wrong #CWE provided to the #CVE-2024-0042 by #Vulnrichment (check his issue on GitHub for details https://lnkd.in/dnHrgUmj). Honestly, this is baffling. Having to question and double-check all and every bit of data coming from the sources that are meant to be trustable puts all the #cybersecurity industry in a bad place. #informationsecurity #vulnerabilityassessment #vulnerabilitymanagement

View profile for Andrey Lukashenkov, graphic

Vulnerability Intelligence and Research | B2B SaaS GoToMarket | Engineering Background | Startups

Glad to see new update from National Institute of Standards and Technology (NIST) National Vulnerability Database (#NVD). https://lnkd.in/dmaBdzbH The update is focused about two main themes: — #CVSSv4 support — it will appear on vulnerability details pages, in search form and search results. Moreover, there is new CVSS v4 calculator https://lnkd.in/dF4RiiaD As of now, I wasn't able to find any #CVE scored with CVSS v4 by NVD. — #CISA Authorized Data Publisher (#ADP) Support — NVD CVE record will include data from CISA’s #Vulnrichment CVSS and #CWE information (see one example here https://lnkd.in/dj_7kUYf). Unfortunately, it looks like Vulnrichment affected configurations (with some of them also including #CPE) are not available via the NVD at the moment. #informationsecurity #vulnerabilityassessment #vulnerabilitymanagement

  • No alternative text description for this image

To view or add a comment, sign in

Explore topics