|
Welcome to ossbase.org! :wave:
|
|
1
|
65
|
October 31, 2025
|
|
GCVE BCP-05 drafting - Best practices for the "container" format - modified CVE Record Format
|
|
41
|
294
|
December 6, 2025
|
|
End-of-Year Threat Intelligence Sightings Forecast
|
|
0
|
29
|
December 2, 2025
|
|
GCVE BCP-06 drafting - Requirements and Evaluation Criteria for GCVE Numbering Authorities
|
|
1
|
56
|
November 29, 2025
|
|
Describing vulnerabilities in online services
|
|
0
|
29
|
November 24, 2025
|
|
Vulnerability-Lookup 2.18.0 released
|
|
0
|
50
|
November 14, 2025
|
|
GCVE.eu DB and official instance
|
|
0
|
7
|
November 13, 2025
|
|
UAVs and drones MISP galaxy now available
|
|
0
|
12
|
November 6, 2025
|
|
AI datasets and VLAI model
|
|
8
|
219
|
October 31, 2025
|
|
Hack your brain — Pauline Bourmeau (Cookie)
|
|
1
|
20
|
October 31, 2025
|
|
How to better identify (weaponized) file formats with ftguess — Philippe Lagadec
|
|
2
|
95
|
October 28, 2025
|
|
CLI ambush — William Robinet
|
|
1
|
33
|
October 28, 2025
|
|
Extending the GCVE Python cli with a vulnerability lookup command
|
|
3
|
71
|
October 27, 2025
|
|
DCOM Turns 20: Revisiting a Legacy Interface in the Modern Threatscape — Julien Bedel
|
|
1
|
27
|
October 24, 2025
|
|
Automotive Security Analyzer for Exploitability Risks: An Automated and Attack Graph-Based Evaluation of On-Board Networks — Martin Salfer
|
|
1
|
23
|
October 24, 2025
|
|
Exploiting Legit APIs for Covert C2: A New Perspective on Cloud-based Malware Operations — cocomelonc
|
|
1
|
19
|
October 24, 2025
|
|
Lethal Language Models: From Bit Flip to RCE in Ollama — Paul Gerste
|
|
1
|
17
|
October 24, 2025
|
|
Russian-speaking underground - changes in the risks, attack surface and modus operandi — Vladimir Kropotov
|
|
1
|
8
|
October 24, 2025
|
|
From YAML to Root: CI/CD Pipeline Attacks and Countermeasures — Hugo
|
|
1
|
20
|
October 24, 2025
|
|
Palo Alto GlobalProtect : Remote Full Compromise Exploit Chain — Maxime Escourbiac
|
|
1
|
24
|
October 24, 2025
|
|
Breaking Android IPC: A Deep Dive into AIDL Fuzzing — Rajanish Pathak
|
|
1
|
9
|
October 24, 2025
|
|
Practical intro to deeplearning: chihuahuas vs muffins — Pauline Bourmeau (Cookie), William Robinet
|
|
1
|
18
|
October 24, 2025
|
|
Livewire : remote command execution through unmarshalling — Rémi Matasse (@_remsio_), Pierre Martin (@_Worty), Pierre MARTIN
|
|
1
|
14
|
October 24, 2025
|
|
2038 is gonna be epoch! — Pedro Umbelino, Trey Darley
|
|
1
|
22
|
October 24, 2025
|
|
Wyse Management Subversion : Taking over Dell's Wyse Management Suite — Alain Mowat
|
|
1
|
6
|
October 24, 2025
|
|
What's New in Suricata 8: Enhanced Detection and Performance — Eric Leblond, Peter Manev
|
|
1
|
6
|
October 24, 2025
|
|
Hacking for hoodies: MISP edition — Jeroen Pinoy
|
|
1
|
15
|
October 24, 2025
|
|
Building a pipeline to analyse iOS devices at scale — David Durvaux, Christophe Vandeplas
|
|
1
|
12
|
October 23, 2025
|
|
My other ClassLoader is your ClassLoader: Creating evil twin instances of a class — Dimitrios Valsamaras
|
|
1
|
5
|
October 23, 2025
|
|
Field guide to physical attacks against full-disk encryption — Edouard D'hoedt, Hayk Gevorgyan
|
|
1
|
68
|
October 23, 2025
|