Advertisement · 728 × 90
#
Hashtag
#CVSS
Advertisement · 728 × 90
Preview
NVD makes up vulnerability severity levels When a security vulnerability has been found and confirmed in curl, we request a **CVE Id** for the issue. This is a global unique identifier for this specific problem. We request the ID from our CVE Numbering Authority (CNA), Hackerone, which once we make the issue public will publish all details about it to MITRE, which hosts the central database. In the curl project we have until today requested CVE Ids for and provided information about 135 vulnerabilities spread out over twenty-five years. A CVE identifier affects a specific product (or set of products), and the problem affects the product from a version until a fixed version. And then there is a **severity**. How bad is the problem? ## CVSS score The Common Vulnerability Scoring System (CVSS) is a way to grade severity on a scale from zero to ten. You typically use a CVSS calculator, fill in the info as good as you can and voilá, out comes a score. The ranges have corresponding names: **Name**| **Range** ---|--- Low| lower 4 Medium| 4.0-6.9 High| 7.0-8.9 Critical| 9 or higher ## CVSS is a shitty system Anyone who ever gets a problem reported for their project and tries to assess and set a CVSS score will immediately realize what an imperfect, simplified and one-dimensional concept this is. The CVSS score leaves out several very important factors like how widespread the affected platform is, how common the affected configuration is and yet it is still very subjective as you need to assess as and mark different things as None, Low, Medium or High. The same bug is therefore likely to end up with different CVSS scores depending on who fills in the form – even when the persons are familiar with the product and the error in question. ## curl severity In the curl project we decided to abandon CVSS years ago because of its inherent problems. Instead we use only the four severity names: **Low, Medium, High,** and **Critical** and we work out the severity together in the curl security team as we work on the vulnerability. We make sure we understand the problem, the risks, its prevalence and more. We take all factors into account and then we set a severity level we think helps the world understand it. All security vulnerabilities are vulnerabilities and therefore security risks, even the ones set to severity Low, but having the correct severity is still important in messaging and for the rest of the world to get a better picture of _how_ _seriou_ s the issue is. **Getting the right severity is important.** ## NVD Let me introduce yet another player in this game. The National Vulnerability Database (NVD). (And no, it’s not “national” really). NVD hosts a database of vulnerabilities. All CVEs that are submitted to MITRE are sucked in into NVD’s database. NVD says it “ _performs analysis on CVEs that have been published to the CVE Dictionary_ “. That last sentence is probably important. NVD imports CVEs into their database and they in turn offer other databases to import vulnerabilities from them. One large and known user of the NVD database is this I mentioned in a recent blog post: GitHub Security Advisory Database (GHSA DB) . ## GHSA DB This GitHub thing an ambitious database that subsequently hosts a lot of vulnerabilities that people and projects reported themselves in addition to them importing information about all vulnerabilities ever published with CVE Ids. This creates a huge database that in theory should contain just about every software vulnerability ever reported in the public. Pretty cool. ## Enter reality NVD, in their great wisdom, _rescores_ the CVSS score for CVE Ids they import into their database! (It’s not clear how or why, but they seem to not do it for all issues). NVD decides they know better than the project that set the severity level for the issue, enters their own answers in the CVSS calculator and eventually sets that new score on the CVEs they import. NVD clearly thinks they need to do this and that they improve the state of the CVEs by this practice, but the end result is close to **scaremongering**. ## Result Because NVD sets their own severity level and they have some sort of “worst case” approach, virtually all issues that NVD sets severity for is graded worse or much worse when they do it than how we set the severity levels. Let’s take an example: CVE-2022-42915: HTTP proxy double-free. We deemed this a **medium severity**. It was not made higher partly because of the very limited time-window between the two frees, making it harder to take advantage of. What did NVD say? **Severity 9.8: critical.** See the same issue on GitHub. Yes, it makes you wonder what magic insights and knowledge the person/bots on NVD possessed when they did this. ## Scaremongering The different severity levels should not matter too much but people find those inflated ones and they believe them. Users also find the discrepancies, get confused and won’t know what to believe or whom to trust. After all, NVD is trust-inducing brand. People think they know their stuff and if they say **critical** and the curl project says **medium** , what are we expected to think? I claim that NVD overstate their severity levels and there unnecessarily scares readers and make them think issues are worse and more dangerous than they actually are. The fact that GitHub now imports all CVE data from NVD makes these severity levels get transported, shown and _believed_ as they are now also shown in the GHSA DB. Look how many _critical_ issues there are! ## Not exactly GitHub’s fault This NVD habit of re-scoring is an old existing habit and I just recently learned it. GitHub’s displaying the severity levels highlighted it for me, especially since users out there seem to trust and use this GitHub database. I have talked to humans on the GitHub database team and I push for them to ignore or filter out the severity levels as set by NVD, if possible. But me being just a single complaining maintainer I do not expect this to have much of an effect. I would urge NVD to stop this insanity if I had any way to. ## Hackerone glitches? (Updated after first post). It turns out that some CVEs that we have filed from the curl project that uses our CNA hackerone have been submitted to MITRE without any severity level or CVSS score at all. For such issues, I of course understand why someone would put their own score on the issue because then our originally set score/severity is not passed on. Then the “blame” is instead shifted to Hackerone. I have contacted them about it. ## Dispute a CVSS NVD provides a way to dispute their rescores, but that’s just an open free-text form. I have use that form to request that NVD stop rescoring all curl issues. Although I honestly think they should rather stop all rescoring and only do that in the rare occasions where the original score or severity is obviously wrong. I cannot dispute the severity levels at GitHub. They show the NVD levels.

Was searching for an explanation, why #NVD #CVE ratings are usually higher than others', landed on daniel.haxx.se/blog/2023/03/06/nvd-make... and saw a familiar face: Thanks for posting this, @bagder@maston.social.

#cybersecurity

0 0 0 0
Preview
Was ist CVSS? CVSS ist ein Standard zur Bewertung der technischen Schwere von Sicherheitslücken. Der Score liegt zwischen 0 und 10 und wird aus verschiedenen Eigenschaften einer Schwachstelle berechnet.

Das Fundament der CVE-Priorisierung: CVSS. Was steckt dahinter und wie kommt ein CVSS-Score zustande? 🛡️
👉 vulndex.at/blog/cvss-sc...

#CVSS #Cybersecurity #VulnerabilityManagement

1 1 0 0
Preview
Registration / CVE Program & FIRST VulnCon 2026 Save the Date: CVE/FIRST VulnCon 2026 & Annual CNA Summit - Scottsdale (US), April 13–16, 2026

Let's be vulnerable together 🤓 Join us at #VulnCon26 🔗go.first.org/syt8W #vulnerabilitymanagement #CVEProgram #CVSS

0 0 0 0
Post image

Score 10 su 10 per i BMS Honeywell che espongono gli edifici al controllo remoto

📌 Link all'articolo : www.redhotcyber.com/post/sco...

#redhotcyber #news #cybersecurity #hacking #vulnerabilità #sicurezzainformatica #honeywell #iq4xbms #cvss

0 0 0 0
Increasing the Value of the CVE Record - CNA Enrichment Recognition List

Increasing the Value of the CVE Record - CNA Enrichment Recognition List

“CNA Enrichment Recognition” - 259 CNAs on the list for March 2, 2026

Published monthly, this list recognizes those CVE Numbering Authorities (#CNAs) actively providing #CVSS and #CWE vulnerability data in their #CVE Records

medium.com/@cve_program...

0 0 0 0
Post image

Il lato oscuro dei CVE: il dietro le quinte dei database NVD (Usa), CNVD e CNNVD (Cina)

📌 Link all'articolo : www.redhotcyber.com/post/il-...

#redhotcyber #news #sicurezzainformatica #vulnerabilitainformatica #cybersecurity #gestionevulnerabilita #nist #nvd #cvss #sicurezzadigital

0 0 0 0
Awakari App

Why it needs to be easier for security teams to fix vulnerabilities [Q&A] Agentic AI and rising attack speed are putting new pressure on security teams that already struggle with growing backlo...

#Article #CVSS #cybersecurity #Q&A; #SecOps #vulnerabilities

Origin | Interest | Match

0 0 0 0
Post image

Mozilla Firefox Issues Emergency Patch for Heap Buffer Overflow in Firefox v147 Mozilla has released an out-of-band security update to address a critical vulnerability affecting its browser. The up...

#Firewall #Daily #Cyber #News #Vulnerabilities […]

[Original post on thecyberexpress.com]

0 0 0 0
Post image

Mozilla Firefox Issues Emergency Patch for Heap Buffer Overflow in Firefox v147 Mozilla has released an out-of-band security update to address a critical vulnerability affecting its browser. The up...

#Firewall #Daily #Cyber #News #Vulnerabilities […]

[Original post on thecyberexpress.com]

0 0 0 0
Post image

Mozilla Firefox Issues Emergency Patch for Heap Buffer Overflow in Firefox v147 Mozilla has released an out-of-band security update to address a critical vulnerability affecting its browser. The up...

#Firewall #Daily #Cyber #News #Vulnerabilities […]

[Original post on thecyberexpress.com]

0 0 0 0
Post image

Mozilla Firefox Issues Emergency Patch for Heap Buffer Overflow in Firefox v147 Mozilla has released an out-of-band security update to address a critical vulnerability affecting its browser. The up...

#Firewall #Daily #Cyber #News #Vulnerabilities […]

[Original post on thecyberexpress.com]

0 0 0 0
Post image

Mozilla Firefox Issues Emergency Patch for Heap Buffer Overflow in Firefox v147 Mozilla has released an out-of-band security update to address a critical vulnerability affecting its browser. The up...

#Firewall #Daily #Cyber #News #Vulnerabilities […]

[Original post on thecyberexpress.com]

0 0 0 0
Preview
Registration / CVE Program & FIRST VulnCon 2026 Save the Date: CVE/FIRST VulnCon 2026 & Annual CNA Summit - Scottsdale (US), April 13–16, 2026

Let's be vulnerable together 🤓 Join us at #VulnCon26 🔗go.first.org/syt8W #vulnerabilitymanagement #CVEProgram #CVSS

0 0 0 0
Vulnerability Summary for the Week of January 26, 2026 | CISA High Vulnerabilities PrimaryVendor -- Product Description Published CVSS Score Source Info

837 CVE Records + severity scores when available in CISA’s Vulnerability Summary bulletin for the week of January 26, 2026

www.cisa.gov/news-events/...

#cve #cveid #cvss #cwe #vulnerabilitymanagement #vulnerability #hssedi #cisa

0 0 0 0
Preview
Vulnerability Data Enrichment for CVE Records: 256 CNAs on the Enrichment Recognition List for… The “CNA Enrichment Recognition List” for February 2, 2026, is now available with 256 CNAs listed. Published monthly on the CVE website…

“CNA Enrichment Recognition” - 256 CNAs on the list for February 2, 2026

Published monthly, this list recognizes those CVE Numbering Authorities (#CNAs) actively providing #CVSS and #CWE vulnerability data in their #CVE Records

medium.com/@cve_program...

0 0 0 0
Video

Two #CVEs can both have a #CVSS score of 9.8, but one requires physical access while the other is remotely exploitable.

CVSS vector data shows you that difference & the Vulnerability Agent makes it easy to filter by it.

Here are 7 filter combinations to get you started: feedly.com/new-features...

2 0 0 0
Preview
SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score found and reported by watchTowr researchers read more about SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score reconbee.com/smartermail-...

#smartermail #RCEflaw #CVSS #CybersecurityNews #cyberattack

1 0 0 0
Vulnerability Summary for the Week of January 19, 2026 | CISA High Vulnerabilities PrimaryVendor -- Product Description Published CVSS Score Source Info

1,268 CVE Records + severity scores when available in CISA’s Vulnerability Summary bulletin for the week of January 19, 2026

cisa.gov/news-events/...

#cve #cveid #cvss #cwe #vulnerabilitymanagement #vulnerability #hssedi #cisa

0 0 0 0
Vulnerability Summary for the Week of January 12, 2026 | CISA High Vulnerabilities PrimaryVendor -- Product Description Published CVSS Score Source Info

1,135 CVE Records + severity scores when available in CISA’s Vulnerability Summary bulletin for the week of January 12, 2026

www.cisa.gov/news-events/...

#cve #cveid #cvss #cwe #vulnerabilitymanagement #vulnerability #hssedi #cisa

0 0 0 0
Preview
CVSS v4.0 Consumer Implementation Guide

@first.org's CVSS SIG has released the v4.0 Consumer Implementation Guide!

Learn how to score for your environment. Proper enrichment can drop scores from Critical to Medium or lower to optimize response.

Read more: go.first.org/LL6gz

#cybersecurity #CVSS

1 1 0 1
Vulnerability Summary for the Week of December 29, 2025 | CISA High Vulnerabilities PrimaryVendor -- Product Description Published CVSS Score Source Info

935 CVE Records + severity scores when available in CISA’s Vulnerability Summary bulletin for the week of December 29, 2025

cisa.gov/news-events/...

#cve #cveid #cvss #cwe #vulnerabilitymanagement #vulnerability #hssedi #cisa

0 0 0 0
Post image

Join us for the GVIP Summit - the pre-FOSDEM conference on vulnerability management. Supported by the @sovtechfund

https://www.gvip-project.org

#NVD #CVE #SBOM #CVSS #CWE #CRA

0 0 0 0
Preview
Vulnerability Data Enrichment for CVE Records: 263 CNAs on the Enrichment Recognition List for… The “CNA Enrichment Recognition List” for January 5, 2026, is now available with 263 CNAs listed. Published monthly on the CVE website, the…

“CNA Enrichment Recognition” - 263 CNAs on the list for January 5, 2026

Published monthly, this list recognizes those CVE Numbering Authorities (#CNAs) actively providing #CVSS and #CWE vulnerability data in their #CVE Records

medium.com/@cve_program...

0 0 0 0
Vulnerability Summary for the Week of December 22, 2025 | CISA High Vulnerabilities PrimaryVendor -- Product Description Published CVSS Score Source Info

914 CVE Records + severity scores when available in CISA’s Vulnerability Summary bulletin for the week of December 22, 2025

www.cisa.gov/news-events/...

#cve #cveid #cvss #cwe #vulnerabilitymanagement #vulnerability #hssedi #cisa

0 0 0 0
Vulnerability Summary for the Week of December 15, 2025 | CISA High Vulnerabilities PrimaryVendor -- Product Description Published CVSS Score Source Info

1,270 CVE Records + severity scores when available in CISA’s Vulnerability Summary bulletin for the week of December 15, 2025

www.cisa.gov/news-events/...

#cve #cveid #cvss #cwe #vulnerabilitymanagement #vulnerability #hssedi #cisa

0 0 0 0
Vulnerability Summary for the Week of December 8, 2025 | CISA High Vulnerabilities PrimaryVendor -- Product Description Published CVSS Score Source Info

1,736 CVE Records + severity scores when available in CISA’s Vulnerability Summary bulletin for the week of December 8, 2025

cisa.gov/news-events/...

#CVE #CVEID #CVSS #CWE #Vulnerability #VulnerabilityManagement #HSSEDI #CISA

0 0 0 0
Preview
HPE OneView Flaw Rated CVSS 10.0 Allows Unauthenticated Remote Code Execution has been made available by the company read more about HPE OneView Flaw Rated CVSS 10.0 Allows Unauthenticated Remote Code Execution

HPE OneView Flaw Rated CVSS 10.0 Allows Unauthenticated Remote Code Execution reconbee.com/hpe-oneview-...

#HPE #OneView #CVSS #remotecodeexecution #RCE #CybersecurityNews #cyberattacks

0 0 0 0
Vulnerability Summary for the Week of December 1, 2025 | CISA High Vulnerabilities PrimaryVendor -- Product Description Published CVSS Score Source Info

816 CVE Records + severity scores when available in CISA’s Vulnerability Summary bulletin for the week of December 1, 2025

www.cisa.gov/news-events/...

#CVE #CVEID #CVSS #CWE #Vulnerability #VulnerabilityManagement #HSSEDI #CISA

1 1 0 0
Preview
Critical Flaws Discovered in Ivanti EPM Endpoint Management Software Ivanti Endpoint Manager faces four security vulnerabilities, including a critical 9.6 CVSS flaw. Updates now available for EPM users.

Ivanti Endpoint Manager faces four security vulnerabilities, including a critical 9.6 CVSS flaw. Updates now available for EPM users.

#SecurityLand #CyberWatch #SecurityVulnerability #Ivanti #EPM #CVSS #CVE #XSS

Read More: www.security.land/critical-fla...

2 0 0 0
Post image

Save the date! A full day of vulnerabilities. Wednesday Jan 28th 26 in Brussels, Belgium. More details to follow. DM me if you want to speak! #CVE #NVD #CVSS #EUVD #OSV

0 0 0 0