Skip Navigation
Cedric

I'm a computer scientist, intensely interested in computer security and privacy.

https://fosstodon.org/@cedric

https://www.cedricbonhomme.org

Posts 13
Comments 3

Vulnerability-Lookup 2.2.0

!VL-hori-coul

We’re delighted to announce the release of Vulnerability-Lookup 2.2.0, packed with enhancements, new features, and bug fixes.

What's New

  • Identity:

    • Vulnerability-Lookup now has a beautiful new logo.
  • New Statistics Namespace: The API now offers a dedicated namespace for statistics. Two new endpoints are currently available:

    • /api/stats/vulnerability/most_sighted
    • /api/stats/vulnerability/most_commented Both endpoints provide the option to return results in a Markdown table format. (7a2b8ed, d95b49c)

    You can use the API output directly to generate PDF reports: bash $ curl -s -X 'GET' 'https://vulnerability.circl.lu/api/stats/vulnerability/most_sighted?date_from=2024-07-01&output=markdown' | pandoc --from=markdown --to=pdf -o semestrial-report.pdf !semestrial-report

  • New Client for KEV Sightings: A new Python client, KevSight, is available to generate sightings for Vulnerability-Lookup using the Known Exploited Vulnerabilities (KEV) catalog. For more details, refer to the Vulnerability-Lookup documentation on sightings automation and the available clients.

Changes

  • API Enhancements:

  • Improved Views:

    • /recent: Enhanced for greater consistency and readability.
    • /vuln: Improved display for vulnerabilities from the CVE List v5 and NVD sources. The versions of the impacted products is now displayed in a third column. (9308772, 5f9826a, f71da45, 54ad96e, e8ae16e)
    • We have enhanced the layout and accessibility of various views as part of our ongoing commitment to creating software that is inclusive and usable for everyone.
  • Documentation:

    • The documentation is now exposed by a dedicated Flask Blueprint which is serving static HTML files generated with Sphinx. Updating the documentation is possible via a simple button in the dashboard of Vulnerability-Lookup. (e27ac9f, 6f38ccf)
  • Backend:

    • Harmonization of datetime objects by ensuring that all dates use UTC-aware timestamps (8ea2554, a4defc2)
    • Gunicorn is now by default using Gevent (c79f997)

Fixes

  • Date Parameters in API:

    • The date_from and date_to parameters in the API no longer have default values. It is now the client’s responsibility to specify these values. (036ca3a)
  • CVE Lookup Endpoint:

    • We fixed the API endpoint for searching CVEs by vendor and product. (0867fac)

Funding

!ngsoti-small !eu_funded_en

The NGSOTI project is dedicated to training the next generation of Security Operation Center (SOC) operators, focusing on the human aspect of cybersecurity. It underscores the significance of providing SOC operators with the necessary skills and open-source tools to address challenges such as detection engineering, incident response, and threat intelligence analysis. Involving key partners such as CIRCL, Restena, Tenzir, and the University of Luxembourg, the project aims to establish a real operational infrastructure for practical training. This initiative integrates academic curricula with industry insights, offering hands-on experience in cyber ranges.

vulnerability-lookup is co-funded by CIRCL and by the European Union. Views and opinions expressed are however those of the author(s) only and do not necessarily reflect those of the European Union or ECCC. Neither the European Union nor the granting authority can be held responsible for them.

0
Looking for Lemmy accounts about software vulnerabilities, CVEs, etc.
  • hello,

    Thank you very much for your reply and the information. I'll have a look at your links.

    Actually, I am simply looking for various information about vulnerabilities. The goal is not to find announcements of vulnerabilities. This is part of the "Vulnerability Lookup" project: https://vulnerability.circl.lu/ where we gather "sightings": https://vulnerability.circl.lu/sightings

    A sighting can have various sources such as: GitHub Gist, Pastebin, Fediverse, Telegram channels, etc. So yes... here my questions is about sightings from the Fediverse. For now I am happy with this simple tool to monitor the Fediverse: https://github.com/CIRCL/FediVuln

    It is able to find status related to security vulnerabilities and generate sightings in our "Vulnerability Lookup" project. That's it ;-)

    thank you !

  • Looking for Lemmy accounts about software vulnerabilities, CVEs, etc.

    I am looking for active Lemmy accounts about software vulnerabilities, CVEs, etc. It could be specific to GHSA, CSAF, PySEC, GSD, Pypi or whatever.

    I will use it in a software vulnerability lookup projects: https://github.com/cve-search/vulnerability-lookup/ in order to create Sightings about vulnerabilities.

    (it's fine as well if you can provide me Mastodon accounts. I already follow CVE program)

    thank you !

    2

    Vulnerability Lookup 1.5.0

    We released version 1.5.0 of the Vulnerability Lookup project! 🎉 (https://github.com/cve-search/vulnerability-lookup/)

    !edit-comments-with-tags !meta-field !Japanese source

    This update brings significant new features, improvements, and fixes.

    🆕 Notable Changes

    We've integrated the Japan Database of Vulnerability Countermeasure Information (JVN DB), correlating security advisories from multiple sources (including NVD, GitHub, and CSAF, etc.) already available in Vulnerability Lookup.

    You can now assign tags to comments directly on the website. These tags are stored in the comment's meta field and utilize the MISP Project taxonomy for vulnerabilities. Explore the taxonomy here.

    We've enhanced the API to allow users to filter comments and bundles based on data available in the meta JSON field of the objects. This paves the way for leveraging more taxonomies in the future.

    More details in the release notes.

    Thank you very much to all the contributors and testers! 🙏

    As always, feel free to create an account on the main instance operated by CIRCL.

    We eagerly await your contributions! 😊

    0
    /c/cybersecurity - Cybersecurity News & Discussion @lemmy.ml Cedric @lemmy.ml

    Release 1.3.0 of Vulnerability Lookup with many improvements

    Release 1.3.0 (26-07-2024)

    Improvements

    • Vulnerability Details Page Enhancements: We've significantly enhanced the vulnerabilities details page. It now presents more relevant information and the layout has been substantially improved for a better user experience.
    • API Enhancements: Various improvements have been made to the API for better performance and functionality.
    • UI Enhancements: Edition/action buttons are now hidden when not logged in (#57).
    • Importer Improvements: Enhancements have been made to various importers (37d3a6d).

    Fixes

    • Custom Vulnerability Display Bug: Fixed an issue where custom vulnerabilities were not displayed correctly (#58).
    • New Vulnerability Creation Issue: Resolved the problem where new vulnerabilities couldn't be created without a CVE number (#56).
    • Webservice Sorting Fix: Fixed the sorting issue of contributors versus users (46195d1).
    • Minor Fixes: Various minor fixes have been implemented to improve overall stability and performance.

    !Screenshot_20240726_141051 !Screenshot_20240726_141112

    And do not hesitate to create an account to contribute and share your thoughts on the security advisories: https://vulnerability.circl.lu

    Funding

    !ngsoti-small !eu_funded_en

    The NGSOTI project is dedicated to training the next generation of Security Operation Center (SOC) operators, focusing on the human aspect of cybersecurity. It underscores the significance of providing SOC operators with the necessary skills and open-source tools to address challenges such as detection engineering, incident response, and threat intelligence analysis. Involving key partners such as CIRCL, Restena, Tenzir, and the University of Luxembourg, the project aims to establish a real operational infrastructure for practical training. This initiative integrates academic curricula with industry insights, offering hands-on experience in cyber ranges.

    vulnerability-lookup is co-funded by CIRCL and by the European Union. Views and opinions expressed are however those of the author(s) only and do not necessarily reflect those of the European Union or ECCC. Neither the European Union nor the granting authority can be held responsible for them.

    0

    Vulnerability Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streamlines the management of Coordinated Vulnerability Disclosure.

    github.com GitHub - cve-search/vulnerability-lookup: Vulnerability Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streamlines the management of Coordinated Vulnerability Disclosure (CVD).

    Vulnerability Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streamlines the management of Coordinated Vulnerability Disclosure ...

    GitHub - cve-search/vulnerability-lookup: Vulnerability Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streamlines the management of Coordinated Vulnerability Disclosure (CVD).

    cross-posted from: https://lemmy.ml/post/18049618

    > Vulnerability Lookup facilitates quick correlation of vulnerabilities from various sources (NIST, GitHub, CSAF-Siemens, CSAF-CISCO, CSAF-CERT-Bund, PySec, VARIoT, etc.), > independent of vulnerability IDs, and streamlines the management of Coordinated Vulnerability Disclosure (CVD). > Vulnerability Lookup is also a collaborative platform where users can comment on security advisories and create bundles. > > A Vulnerability Lookup instance operated by CIRCL > is available at https://vulnerability.circl.lu.

    0
    /c/cybersecurity - Cybersecurity News & Discussion @lemmy.ml Cedric @lemmy.ml

    Vulnerability Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streamlines the management of Coordinated Vulnerability Disclosure.

    github.com GitHub - cve-search/vulnerability-lookup: Vulnerability Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streamlines the management of Coordinated Vulnerability Disclosure (CVD).

    Vulnerability Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streamlines the management of Coordinated Vulnerability Disclosure ...

    GitHub - cve-search/vulnerability-lookup: Vulnerability Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streamlines the management of Coordinated Vulnerability Disclosure (CVD).

    Vulnerability Lookup facilitates quick correlation of vulnerabilities from various sources (NIST, GitHub, CSAF-Siemens, CSAF-CISCO, CSAF-CERT-Bund, PySec, VARIoT, etc.), independent of vulnerability IDs, and streamlines the management of Coordinated Vulnerability Disclosure (CVD). Vulnerability Lookup is also a collaborative platform where users can comment on security advisories and create bundles.

    A Vulnerability Lookup instance operated by CIRCL is available at https://vulnerability.circl.lu.

    0
    Show off your side projects @lemmy.ml Cedric @lemmy.ml

    A HIDS written in Python

    github.com GitHub - cedricbonhomme/pyHIDS: A HIDS (host-based intrusion detection system) for verifying the integrity of a system.

    A HIDS (host-based intrusion detection system) for verifying the integrity of a system. - GitHub - cedricbonhomme/pyHIDS: A HIDS (host-based intrusion detection system) for verifying the integrity ...

    GitHub - cedricbonhomme/pyHIDS: A HIDS (host-based intrusion detection system) for verifying the integrity of a system.

    cross-posted from: https://lemmy.ml/post/7283249

    > A HIDS (host-based intrusion detection system) for verifying the integrity of a system. > > ## Features > > * checks the integrity of system's files with a list of rules; > * checks the output of commands (iptables, ...); > * possibity to use RSA to sign to check the integrity of its database; > * alerts are written in the logs of the system; > * alerts can be sent via email to a list of users; > * alerts can be sent on IRC channels through the > irker IRC client (which should be running as > a daemon); > * verify files with Hashlookup, > Pandora, > MISP and > YARA; > * possibility to export the database in a Bloom or a Cuckoo filter. > > pyHIDS is under GPLv3 license. > > Homepage: https://github.com/cedricbonhomme/pyHIDS >

    0

    A HIDS written in Python

    github.com GitHub - cedricbonhomme/pyHIDS: A HIDS (host-based intrusion detection system) for verifying the integrity of a system.

    A HIDS (host-based intrusion detection system) for verifying the integrity of a system. - GitHub - cedricbonhomme/pyHIDS: A HIDS (host-based intrusion detection system) for verifying the integrity ...

    GitHub - cedricbonhomme/pyHIDS: A HIDS (host-based intrusion detection system) for verifying the integrity of a system.

    A HIDS (host-based intrusion detection system) for verifying the integrity of a system.

    Features

    • checks the integrity of system's files with a list of rules;
    • checks the output of commands (iptables, ...);
    • possibity to use RSA to sign to check the integrity of its database;
    • alerts are written in the logs of the system;
    • alerts can be sent via email to a list of users;
    • alerts can be sent on IRC channels through the irker IRC client (which should be running as a daemon);
    • verify files with Hashlookup, Pandora, MISP and YARA;
    • possibility to export the database in a Bloom or a Cuckoo filter.

    pyHIDS is under GPLv3 license.

    Homepage: https://github.com/cedricbonhomme/pyHIDS

    0
    poetry @lemmy.ml Cedric @lemmy.ml
    www.cedricbonhomme.org Night troubles

    Photons are dying. Eyelids are still blinking. Clock is ticking.

    Photons are dying. Eyelids are still blinking. Clock is ticking. Heart is slowly beating. Parasites are rising. Cerebral cells are colliding. Troubles are spreading. Ions are crackling. Soul is screaming. Brain is throttling. SEGMENTATION FAULT - Rebooting in fail-safe mode… Dreams are finally coming. Eyes are twitching. Memory is restructuring. Pulse is accelerating. Demons are fading. Body is healing. Day dawn is breaking. Reality is emerging. Energy is flowing.

    – Night troubles - Cédric Bonhomme - October 2023

    0
    A Cybersecurity Weather Map
  • of course, you can clone/fork the repository as you want.

  • /c/cybersecurity - Cybersecurity News & Discussion @lemmy.ml Cedric @lemmy.ml

    A Cybersecurity Weather Map

    The source code of this software is here: https://github.com/monarc-project/stats-service

    Licensed under Affero GPL v3.

    It is a decentralized service which can aggregate different kind stats about threats and vulnerabilities. Here is more information: https://www.monarc.lu/documentation/stats-service/master/architecture.html if you want to understand the details.

    2
    Pine64's PinePhone @lemmy.ml Cedric @lemmy.ml

    Is there a good case for the PinePhone ?

    0
    /c/cybersecurity - Cybersecurity News & Discussion @lemmy.ml Cedric @lemmy.ml

    MOSP, A platform for creating, editing and sharing, always valid, JSON objects

    github.com GitHub - NC3-LU/MOSP: A collaborative platform for creating, editing and sharing JSON objects.

    A collaborative platform for creating, editing and sharing JSON objects. - GitHub - NC3-LU/MOSP: A collaborative platform for creating, editing and sharing JSON objects.

    GitHub - NC3-LU/MOSP: A collaborative platform for creating, editing and sharing JSON objects.

    MOSP is a platform for creating, editing and sharing validated JSON objects of any type.

    The goal is to gather security related JSON objects, in the first place aimed to be used with MONARC.

    You can use any available JSON schemas in order to create new JSON objects via a web form dynamically generated and based on the selected schema. It is possible to interact with MOSP programmatically thanks to its API (OpenAPI specification).

    You can export MOSP objects for MISP (MISP galaxy). See the this video as example.

    1
    Run It Yourself @lemmy.ml Cedric @lemmy.ml

    A self-hosted web news aggregator.

    github.com GitHub - cedricbonhomme/newspipe: A web news aggregator.

    A web news aggregator. Contribute to cedricbonhomme/newspipe development by creating an account on GitHub.

    GitHub - cedricbonhomme/newspipe: A web news aggregator.

    It is written in Python (Flask) with a simple interface.

    Licensed under GNU Affero General Public License version 3.

    Easy to deploy but you can also use the official instance.

    0