I'm now GNA 119 under CIRCL's GCVE system — a decentralized vulnerability
identification authority. I have authority to mint vulnerability
identifiers for cloud findings, including ones where vendor CNAs decline
to issue CVEs.

I could start assigning IDs to my own research today. I won't.

Cloud vulnerability validation shouldn't be one person's judgment. Mine
or anyone else's.

I'm forming a consensus panel of practitioners for each major cloud
platform — AWS, GCP, Azure, and managed services. GCVE-119 allocations
will go through panel review, not solo decisions.

Charter, scope, and membership criteria coming. Community input on
structure welcome before anything is finalized.

Background on GCVE and the cloud finding gap:
https://olearysec.com/gcve/

#infosec #vulnerability #GCVE #cloudsecurity #security

GCVE: Global CVE Allocation System

Understanding the decentralized vulnerability identification system, the GNA model, and olearysec's participation as GNA 119.

OLearySec

We just published a new GCVE repository: gcve-enriched-dumps.

This repository demonstrates a practical and reproducible enrichment pipeline for vulnerability records. The current workflow uses VLAI, a RoBERTa-based model from Vulnerability-Lookup, to estimate vulnerability severity directly from vulnerability descriptions.

For more details: https://gcve.eu/2026/05/21/gcve-enriched-dumps/

@circl

#cve #gcve #vulnerabilitymanagement #cybersecurity #opensource #opendata #ai

Publishing GCVE enriched dumps with VL-AI severity classification

GCVE is not only about allocating vulnerability identifiers. It is also about building a practical, decentralized, and reproducible ecosystem around vulnerability publication, enrichment, and consumption. The new gcve-enriched-dumps repository demonstrates a first concrete automated enrichment pipeline for vulnerability records. The current enrichment published there focuses on VLAI severity classification: a RoBERTa-based model estimates the vulnerability severity from the vulnerability description. This is intentionally different from the LLM-based summarisation and recommendation example available in gcve-eu-ai-extension. The LLM example shows how local models can generate analyst-oriented summaries and recommendations, but those LLM-generated summaries are not what is currently published in gcve-enriched-dumps.

RE: https://infosec.exchange/@sambowne/116593682047881738

If I understood #GCVE correctly, this is exactly the sort of case where you want to use this process to assign a #GCVE identifier, @adulau -> what do you think?

We are happy to announce a new extension mechanism in the GCVE vulnerability format, starting with a very practical and timely one: AI-assisted vulnerability information annotations.

The first extension, GCVE BCP-05-X-01, defines how GCVE records can describe when AI or automated processing was used to create, enrich, summarize, classify, or analyze vulnerability information.

#ai #ia #gcve #vulnerabilitymanagement #vulnerability #opensource #openstandard

🔗 https://gcve.eu/bcp/extension/gcve-bcp-05-x-01/

GCVE BCP-05-X-01 - AI-Assisted Vulnerability Information Annotation

An extension to GCVE BCP-05 to support the annotation of vulnerability records where Artificial Intelligence (AI) or automated processing has been used during their creation, enrichment, or analysis.

GCVE has published a description of the scope of a GCVE record. It is based on feedback, misunderstandings from articles about the GCVE initiative, and ideas from GNAs actually assigning IDs.

The document is still in draft before in a final publication. Feedback is welcome via the standard Discourse platform.

BCP-09 -> https://gcve.eu/bcp/gcve-bcp-09/

#gcve #cve #vulnerability #opensource #vulnerability #cybersecurity

https://social.circl.lu/@gcve/116588958833692618

GCVE-BCP-09: Scope of a GCVE Record

This document clarifies what is actually recorded in GCVE. A GCVE record is not limited to the traditional concept of a vulnerability description. In the GCVE model, records are assigned independently by a GCVE Numbering Authority (GNA) and may represent a broader set of vulnerability-related information.

#cve #gcve #vulnerabilitymanagement #vulnerability #opensource #standard

🔗 https://gcve.eu/bcp/gcve-bcp-09/

@Le_suisse @ariadne @gregkh @wdormann @Viss @andrewnez @Di4na

Yes! The #GCVE folks are really on the ball about all this

I would be willing to bet a milkshake they will be one of the more authoritative sources in the future

RE: https://social.circl.lu/@gcve/116472772889791098

After the recent hackathon and the feedback from different contributors, we published a first draft version of GCVE-BCP-10 to refresh the Common Platform Enumeration model.

#gcve #cpe #cybersecurity

https://infosec.exchange/@gcve@social.circl.lu/116472772989905449

GCVE-BCP-10: Improved Common Platform Enumeration for GCVE

This document specifies an improved platform enumeration model for GCVE aligned with the current implementation of cpe-editor.

#cpe #cve #gcve #infosec #vulnerabilitymanagement

🔗 https://gcve.eu/bcp/gcve-bcp-10/

GCVE-BCP-10 - Improved Common Platform Enumeration for GCVE

GCVE-BCP-10: Improved Common Platform Enumeration for GCVE Version: 1.0 Status: Draft (for Public Review) Date: 2026-04-26 Authors: GCVE Working Group BCP ID: BCP-10 This guide is distributed and available under CC-BY-4.0. Copyright (C) 2025-2026 GCVE Initiative. Abstract This document specifies an improved platform enumeration model for GCVE aligned with the current implementation of cpe-editor. The model remains compatible with existing Common Platform Enumeration (CPE) practices and string formats, while adding registry records for vendors, products, CPE entries, metadata, relationships, and optional moderation proposals.

Does anyone know how to report errors to https://db.gcve.eu/? Just their info@ mail? I looked up CVE-2026-6042 and CVE-2026-40200 there because I was annoyed that the NVD database (which #Buildroot uses for automated vulnerability checks) still didn't have them correctly labeled with the CPE (so automated tools can't identify the package is vulnerable).

Result:
CVE-2026-40200 is correctly labeled (good!), while CVE-2026-6042 is not (different vendor/product). Mistakes happen, an organization that's trying to run as serious vulnerability DB really needs to provide an obvious "report errors here" mail address (or other means, but really… mail). ​#CVE #GCVE
Vulnerability-Lookup

Vulnerability-Lookup - Fast vulnerability lookup correlation from different sources.