Tootfinder

Opt-in global Mastodon full text search. Join the index!

No exact results. Similar results found.
@adulau@infosec.exchange
2025-06-25 20:06:26

We had the pleasure of presenting at FIRST.org 2025, showcasing the Vulnerability-Lookup and GCVE.eu initiatives.
Slides are now available.
#cybersecurity #vulnerability #cve

@arXiv_csDB_bot@mastoxiv.page
2025-06-11 07:32:43

Evaluating Learned Indexes in LSM-tree Systems: Benchmarks,Insights and Design Choices
Junfeng Liu, Jiarui Ye, Mengshi Chen, Meng Li, Siqiang Luo
arxiv.org/abs/2506.08671

@Techmeme@techhub.social
2025-06-25 19:31:13

License plate reader company Flock has stopped US agencies from accessing cameras in CA, IL, and VA after reports of lookups related to ICE and an abortion case (404 Media)
404media.co/flock-removes-stat

@adulau@infosec.exchange
2025-07-04 16:04:38

Who is right with this sudo vulnerability? The CVSS reported or the VLAI severity model?
#sudo #vulnerability #vulnerabilitymanagement

vulnerability lookup
@Xavier@infosec.exchange
2025-05-30 15:34:25

"Flock's automatic license plate reader (ALPR) cameras are in more than 5,000 communities around the U.S. Local police are doing lookups in the nationwide system for ICE."
404media.co/ice-taps-into-nati

@adulau@infosec.exchange
2025-07-08 08:57:00

VLAI: A RoBERTa-Based Model for Automated Vulnerability Severity Classification.
This paper presents VLAI, a transformer-based model that predicts software vulnerability severity levels directly from text descriptions. Built on RoBERTa, VLAI is fine-tuned on over 600,000 real-world vulnerabilities and achieves over 82% accuracy in predicting severity categories, enabling faster and more consistent triage ahead of manual CVSS scoring. The model and dataset are open-source and integrated…

@Xavier@infosec.exchange
2025-05-30 15:34:25

"Flock's automatic license plate reader (ALPR) cameras are in more than 5,000 communities around the U.S. Local police are doing lookups in the nationwide system for ICE."
404media.co/ice-taps-into-nati

@adulau@infosec.exchange
2025-07-01 09:46:49

The Python-based data-exfiltration utility used by the Cl0p ransomware group (commonly distributed as part of the toolset during the 2023 – 2024 MoveIt campaigns) constructs operating-system commands by directly concatenating attacker-supplied strings without input sanitization. An authenticated endpoint on the Cl0p operators’ staging/collection host passes file-or directory-names received from compromised machines straight into a shell-escape sequence. No official patch or cooperation from …

@adulau@infosec.exchange
2025-06-25 20:29:34

Curious about the Chinese vulnerability database? It's now included on vulnerability-lookup.org!
Big thanks to @… for the aw…

Vulnerability lookup with CNVD imported
@adulau@infosec.exchange
2025-05-14 05:40:47

Many are complaining about CISA removing the RSS feed for KEV. Just a reminder: we expose a lot of the API via RSS and Atom in vulnerability-lookup. KEV is included.
🔗 vulnerability-lookup.org/user-