<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Does anyone know how to report errors to https:&#x2F;&#x2F;db.gcve.eu&#x2F;?]]></title><description><![CDATA[<p>Does anyone know how to report errors to <a href="https://db.gcve.eu/">https://db.gcve.eu/</a>? Just their <code>info@</code> mail? I looked up CVE-2026-6042 and CVE-2026-40200 there because I was annoyed that the NVD database (which <a href="https://woem.men/tags/Buildroot" rel="tag">#Buildroot</a><span> uses for automated vulnerability checks) still didn't have them correctly labeled with the CPE (so automated tools can't identify the package is vulnerable).<br /><br />Result: </span><a href="https://db.gcve.eu/vuln/cve-2026-40200">CVE-2026-40200</a> is correctly labeled (good!), while <a href="https://db.gcve.eu/vuln/CVE-2026-6042">CVE-2026-6042</a> is not (different vendor/product). Mistakes happen, an organization that's trying to run as serious vulnerability DB really needs to provide an obvious "report errors here" mail address (or other means, but really… mail). ​<img class="not-responsive emoji" src="https://woem.men/files/68646dac-4c80-4d39-8b88-efa6b1f08d86" title=":neocat_glare:" />​ <a href="https://woem.men/tags/CVE" rel="tag">#CVE</a> <a href="https://woem.men/tags/GCVE" rel="tag">#GCVE</a></p>]]></description><link>https://board.circlewithadot.net/topic/e2ac1345-7586-4e6a-9fa9-7a97ecfb912f/does-anyone-know-how-to-report-errors-to-https-db.gcve.eu</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 04:10:31 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/e2ac1345-7586-4e6a-9fa9-7a97ecfb912f.rss" rel="self" type="application/rss+xml"/><pubDate>Sun, 19 Apr 2026 12:21:44 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to Does anyone know how to report errors to https:&#x2F;&#x2F;db.gcve.eu&#x2F;? on Thu, 30 Apr 2026 16:11:57 GMT]]></title><description><![CDATA[<p><span><a href="/user/airtower%40woem.men" rel="nofollow noopener">@<span>airtower</span></a></span></p><p>It’s indeed a problem and we are working on a cpe editor at GCVE to propose links to vulnerabilities towards vendor, product, version.  And people can query that for correcting potential wrong attribution to vendor, product.</p><p><div class="card col-md-9 col-lg-6 position-relative link-preview p-0">



<a href="https://github.com/gcve-eu/cpe-editor" title="GitHub - gcve-eu/cpe-editor: A collaborative CPE editor">
<img src="https://opengraph.githubassets.com/ea9947e18b5e8f20c32b990b0c2d7b16b06f053ca6afa150126d0dd930133450/gcve-eu/cpe-editor" class="card-img-top not-responsive" style="max-height: 15rem;" alt="Link Preview Image" />
</a>



<div class="card-body">
<h5 class="card-title">
<a href="https://github.com/gcve-eu/cpe-editor">
GitHub - gcve-eu/cpe-editor: A collaborative CPE editor
</a>
</h5>
<p class="card-text line-clamp-3">A collaborative CPE editor. Contribute to gcve-eu/cpe-editor development by creating an account on GitHub.</p>
</div>
<a href="https://github.com/gcve-eu/cpe-editor" class="card-footer text-body-secondary small d-flex gap-2 align-items-center lh-2">



<img src="https://github.githubassets.com/favicons/favicon.svg" alt="favicon" class="not-responsive overflow-hiddden" style="max-width: 21px; max-height: 21px;" />



<p class="d-inline-block text-truncate mb-0">GitHub <span class="text-secondary">(github.com)</span></p>
</a>
</div></p><p>We plan to release it online in the next weeks.</p><p><span><a href="https://chaos.social/@Bubu" rel="nofollow noopener">@<span>Bubu</span></a></span> <span><a href="/user/gcve%40social.circl.lu" rel="nofollow noopener">@<span>gcve</span></a></span></p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/adulau/statuses/116494533724380150</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/adulau/statuses/116494533724380150</guid><dc:creator><![CDATA[adulau@infosec.exchange]]></dc:creator><pubDate>Thu, 30 Apr 2026 16:11:57 GMT</pubDate></item><item><title><![CDATA[Reply to Does anyone know how to report errors to https:&#x2F;&#x2F;db.gcve.eu&#x2F;? on Wed, 29 Apr 2026 19:04:59 GMT]]></title><description><![CDATA[<p><span><a href="/user/airtower%40woem.men" rel="nofollow noopener">@<span>airtower</span></a></span> </p><p><a href="https://vulnerability.circl.lu/dumps/" rel="nofollow noopener"><span>https://</span><span>vulnerability.circl.lu/dumps/</span><span></span></a> contains the full dump of all the sources. I feel your pain but we are trying to provide at minima the correlation among the different sources. We don’t actually modify the source but if you see a way to actually get proposal in an automatic way and extend it via GCVE records. I’m interested. </p><p><span><a href="https://chaos.social/@Bubu" rel="nofollow noopener">@<span>Bubu</span></a></span> <span><a href="/user/gcve%40social.circl.lu" rel="nofollow noopener">@<span>gcve</span></a></span></p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/adulau/statuses/116489551812366943</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/adulau/statuses/116489551812366943</guid><dc:creator><![CDATA[adulau@infosec.exchange]]></dc:creator><pubDate>Wed, 29 Apr 2026 19:04:59 GMT</pubDate></item><item><title><![CDATA[Reply to Does anyone know how to report errors to https:&#x2F;&#x2F;db.gcve.eu&#x2F;? on Wed, 29 Apr 2026 17:44:52 GMT]]></title><description><![CDATA[<p><a href="/user/adulau%40infosec.exchange">@adulau@infosec.exchange</a> <a href="/user/gcve%40social.circl.lu">@gcve@social.circl.lu</a> For context: <a href="https://woem.men/tags/Buildroot" rel="tag">#Buildroot</a> has tools to list known vulnerabilities for packages, currently based on NVD data (via <a href="https://github.com/fkie-cad/nvd-json-data-feeds">https://github.com/fkie-cad/nvd-json-data-feeds</a><span>).<br /><br />I noticed it's missing a bunch of vulnerabilities (e.g. CVE-2026-40200, CVE-2026-6042 in musl libc) because the NVD data is missing CPE match information. At the time the CVEs were listed as "Awaiting Analysis", now "Deferred", so I assume it's not going to be added any time soon, if ever (generally the CPE match is present for vulnerabilities in "Analyzed" status). Looking at the GCVE listings was an attempt to find another, hopefully better, source, because an automated check that misses so many vulnerabilities is not going to be very useful.<br /><br />Today </span><a href="https://chaos.social/@Bubu">@Bubu@chaos.social</a><span> pointed me at a similar example: CVE-2025-6020 (note the year), a "high" level vulnerability in linux-pam, which is also marked as "Deferred" in NVD. So we really could use a better source.<br /><br />We'd need one we can download (rather than query individual packages one by one) without excessive load, but solving that is another matter, first we need a suitable source at all.</span></p>]]></description><link>https://board.circlewithadot.net/post/https://woem.men/notes/alnwszqpquxk000v</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://woem.men/notes/alnwszqpquxk000v</guid><dc:creator><![CDATA[airtower@woem.men]]></dc:creator><pubDate>Wed, 29 Apr 2026 17:44:52 GMT</pubDate></item><item><title><![CDATA[Reply to Does anyone know how to report errors to https:&#x2F;&#x2F;db.gcve.eu&#x2F;? on Wed, 29 Apr 2026 17:21:51 GMT]]></title><description><![CDATA[<p><a href="/user/adulau%40infosec.exchange">@adulau@infosec.exchange</a> <a href="/user/gcve%40social.circl.lu">@gcve@social.circl.lu</a> </p><blockquote>I think there is a confusion between the messenger (GCVE database which is correlating more than 70 sources) and the source of the CVE records. </blockquote>Maybe. I thought it's intended as an alternative to e.g. NVD (especially given somewhat recent political developments), to get machine-readable vulnerability information. Is that wrong? If my understanding is correct, ensuring accurate information is a necessary part of the task, aggregate or not. A system that produces lots of false negatives (the issue at hand, not finding the issue by CPE) creates a false sense of complacency, a system that produces a lot of false positives tends to be ignored eventually. ​<img class="not-responsive emoji" src="https://woem.men/files/266b81ad-6d2d-438a-bbb9-a8bbaea928be" title=":neocat_think:" />​<blockquote>The contact email is in the GCVE about page -&gt; <a href="https://db.gcve.eu/about">https://db.gcve.eu/about</a></blockquote>Do you mean the <code>info@</code> address? It's listed as a general contact address, which I'd usually expect that to go to a front desk, not bug handling. Maybe I'm thinking too complicated, but in any case lack of clarity is my point. ​<img class="not-responsive emoji" src="https://woem.men/files/c691e199-a5aa-4b03-9f09-0fd3a0d48ed5" title=":neocat_laugh_sweat:" />​<blockquote>We feel your pain with incorrect data from the sources. Ideas are more than welcome.</blockquote><span>If GCVE doesn't have the resources to handle error reports (possibly forward them), a clear link on the vulnerability listing would already help. Something like "Report an error" which would then indicate where to report an error for the relevant source (without digging through a maze of documents).<br /><br />For people like me who are looking at this stuff as part of volunteer work, minimizing friction of reporting is critical. I have only so much time and energy to spend. If it looks like reports aren't wanted anyway (the GCVE FAQ sadly does), or reporting is too much trouble, it's likely I'll drop it and focus on things where my effort feels more appreciated (and maybe grumble about it on Fedi).</span><p></p>]]></description><link>https://board.circlewithadot.net/post/https://woem.men/notes/alnvzedzquxk000i</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://woem.men/notes/alnvzedzquxk000i</guid><dc:creator><![CDATA[airtower@woem.men]]></dc:creator><pubDate>Wed, 29 Apr 2026 17:21:51 GMT</pubDate></item><item><title><![CDATA[Reply to Does anyone know how to report errors to https:&#x2F;&#x2F;db.gcve.eu&#x2F;? on Sun, 26 Apr 2026 20:23:02 GMT]]></title><description><![CDATA[<p><span><a href="/user/airtower%40woem.men" rel="nofollow noopener">@<span>airtower</span></a></span> </p><p>I think there is a confusion between the messenger (GCVE database which is correlating more than 70 sources) and the source of the CVE records. </p><p>The two CVEs mentioned are coming from the official cvelistv5 source. We (GCVE) don't change the records from the different sources. The origin is the actual CVE program database. </p><p>The contact email is in the GCVE about page -&gt; <a href="https://db.gcve.eu/about" rel="nofollow noopener"><span>https://</span><span>db.gcve.eu/about</span><span></span></a></p><p>You can also put comments on the records on the <a href="https://vulnerability.circl.lu/" rel="nofollow noopener"><span>https://</span><span>vulnerability.circl.lu/</span><span></span></a> which is also synced to the DB GCVE.  </p><p>We feel your pain with incorrect data from the sources. Ideas are more than welcome. </p><p><span><a href="/user/gcve%40social.circl.lu" rel="nofollow noopener">@<span>gcve</span></a></span></p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/adulau/statuses/116472871813959467</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/adulau/statuses/116472871813959467</guid><dc:creator><![CDATA[adulau@infosec.exchange]]></dc:creator><pubDate>Sun, 26 Apr 2026 20:23:02 GMT</pubDate></item></channel></rss>