|
Welcome to ossbase.org! :wave:
|
|
1
|
69
|
October 31, 2025
|
|
GPU Efficiency in VLAI Model Training
|
|
0
|
8
|
December 12, 2025
|
|
AIL v6.6 – Advanced PDF Processing and Manual Crawling Support
|
|
0
|
10
|
December 12, 2025
|
|
MISP v2.5.28 released with security fixes and improvements
|
|
0
|
3
|
December 11, 2025
|
|
Vulnerability-Lookup 2.19.0
|
|
0
|
20
|
December 10, 2025
|
|
GCVE BCP-05 drafting - Best practices for the "container" format - modified CVE Record Format
|
|
42
|
327
|
December 10, 2025
|
|
GCVE-BCP-02 - Practical Guide to Vulnerability Handling and Disclosure
|
|
1
|
18
|
December 9, 2025
|
|
End-of-Year Threat Intelligence Sightings Forecast
|
|
0
|
38
|
December 2, 2025
|
|
GCVE BCP-06 drafting - Requirements and Evaluation Criteria for GCVE Numbering Authorities
|
|
1
|
65
|
November 29, 2025
|
|
Describing vulnerabilities in online services
|
|
0
|
31
|
November 24, 2025
|
|
Vulnerability-Lookup 2.18.0 released
|
|
0
|
52
|
November 14, 2025
|
|
GCVE.eu DB and official instance
|
|
0
|
7
|
November 13, 2025
|
|
UAVs and drones MISP galaxy now available
|
|
0
|
12
|
November 6, 2025
|
|
AI datasets and VLAI model
|
|
8
|
226
|
October 31, 2025
|
|
Hack your brain — Pauline Bourmeau (Cookie)
|
|
1
|
23
|
October 31, 2025
|
|
How to better identify (weaponized) file formats with ftguess — Philippe Lagadec
|
|
2
|
98
|
October 28, 2025
|
|
CLI ambush — William Robinet
|
|
1
|
36
|
October 28, 2025
|
|
Extending the GCVE Python cli with a vulnerability lookup command
|
|
3
|
73
|
October 27, 2025
|
|
DCOM Turns 20: Revisiting a Legacy Interface in the Modern Threatscape — Julien Bedel
|
|
1
|
28
|
October 24, 2025
|
|
Automotive Security Analyzer for Exploitability Risks: An Automated and Attack Graph-Based Evaluation of On-Board Networks — Martin Salfer
|
|
1
|
24
|
October 24, 2025
|
|
Exploiting Legit APIs for Covert C2: A New Perspective on Cloud-based Malware Operations — cocomelonc
|
|
1
|
20
|
October 24, 2025
|
|
Lethal Language Models: From Bit Flip to RCE in Ollama — Paul Gerste
|
|
1
|
19
|
October 24, 2025
|
|
Russian-speaking underground - changes in the risks, attack surface and modus operandi — Vladimir Kropotov
|
|
1
|
9
|
October 24, 2025
|
|
From YAML to Root: CI/CD Pipeline Attacks and Countermeasures — Hugo
|
|
1
|
23
|
October 24, 2025
|
|
Palo Alto GlobalProtect : Remote Full Compromise Exploit Chain — Maxime Escourbiac
|
|
1
|
25
|
October 24, 2025
|
|
Breaking Android IPC: A Deep Dive into AIDL Fuzzing — Rajanish Pathak
|
|
1
|
12
|
October 24, 2025
|
|
Practical intro to deeplearning: chihuahuas vs muffins — Pauline Bourmeau (Cookie), William Robinet
|
|
1
|
19
|
October 24, 2025
|
|
Livewire : remote command execution through unmarshalling — Rémi Matasse (@_remsio_), Pierre Martin (@_Worty), Pierre MARTIN
|
|
1
|
16
|
October 24, 2025
|
|
2038 is gonna be epoch! — Pedro Umbelino, Trey Darley
|
|
1
|
24
|
October 24, 2025
|
|
Wyse Management Subversion : Taking over Dell's Wyse Management Suite — Alain Mowat
|
|
1
|
9
|
October 24, 2025
|