#CVE-wg
New on the #CVE Blog:
“Help Shape the Future of CVEs with the CVE Consumer WG”

medium.com/@cve_program...

#vulnerability #vulnerabilitymanagement #informationsecurity #cybersecurity
July 28, 2025 at 4:15 PM
Help Shape the Future of CVEs with the CVE Consumer WG Vulnerability data is part of the foundation of a strong security program. But if you’ve ever tried to work with CVE data at scale, you know...

#cybersecurity #vulnerability-management #information-technology #information-security […]
Original post on medium.com
medium.com
August 5, 2025 at 8:27 PM
On April 9th, 2024, the Rust Security Response WG disclosed CVE-2024-24576, where std::process::Command incorrectly escaped arguments when invoking batch files #rust
CVE-2024-43402: What You Need to Know
hackernoon.com
July 21, 2025 at 11:55 PM
CVE-2024-43402: What You Need to Know

On April 9th, 2024, the Rust Security Response WG disclosed CVE-2024-24576, where std::process::Command incorrectly escaped arguments when invoking batch files on Windows.

#hackernews #news
CVE-2024-43402: What You Need to Know
On April 9th, 2024, the Rust Security Response WG disclosed CVE-2024-24576, where std::process::Command incorrectly escaped arguments when invoking batch files on Windows.
hackernoon.com
July 20, 2025 at 11:07 PM
The security section by @sethmlarson.dev is great!

One cool thing: it links to this guide to becoming a CVE Numbering Authority as an open source software project, created by Seth and Art Manion (CVE Board member) and published by the @openssf.org.

github.com/ossf/wg-vuln...
July 15, 2025 at 3:10 PM
The global vulnerability intelligence platform project is moving forward. Many organisations are joining the efforts.
Our first open community meeting is Tuesday May 20 at 16:00 Central european time. Ping me for a zoom invite or join the #cve-wg slack […]

[Original post on infosec.exchange]
May 14, 2025 at 6:35 PM
The global vulnerability intelligence project is making progress. We’re inviting to our first open meeting Tuesday May 20 at 16:00 CET. DM me to get a zoom invite or join the #CVE-wg slack channel in OWASP slack.

#CVE #NVD #ALLVD
May 14, 2025 at 6:22 PM
OpenSSF / @linuxfoundation.org are also working on this in the Vulnerabilities Disclosure WG.

I’m not convinced a US-based entity can continue to operate the CVE program, without multi-region stewardship anymore though.

It leaves the global community far too vulnerable.
April 16, 2025 at 9:25 AM
CVE-2025-30334 - OpenBSD wg(4) Kernel Crash Vulnerability
CVE ID : CVE-2025-30334

Published : March 20, 2025, 9:15 p.m. | 1 hour, 53 minutes ago

Description : In OpenBSD 7.6 before errata 006 and OpenBSD 7.5 before errata 015, traffic sent over wg(4) could result in kern...
CVE-2025-30334 - OpenBSD wg(4) Kernel Crash Vulnerability
In OpenBSD 7.6 before errata 006 and OpenBSD 7.5 before errata 015, traffic sent over wg(4) could result in kernel crash.
cvefeed.io
March 21, 2025 at 1:09 AM
Extending K8s support longer for CVE fixes: many questions to consider as @jeremyrickard.com kicks off the discussion. bit.ly/wg-lts-propo... #kubecon #kcsna #kubernetes
November 11, 2024 at 6:41 PM