<?xml version="1.0" encoding="ISO-8859-1" ?>
<?xml-stylesheet type="text/xsl" href="https://dev.threatperspective.org/xsl/index.xsl"?>

<BODY>
<TITLE>
Welcome to the ThreatPerspective Security Information Center
</TITLE>
<MENU>
    <MENUOBJECT>

	<MENUTITLE>
		Vulnerability Info	
	</MENUTITLE>

<!--	<MENUITEM>
		<menuurl>https://www.securityfocus.com</menuurl>
		<MENUBODY>
			Security Focus	
		</MENUBODY>
	</MENUITEM> 

	<MENUITEM>
		<menuurl>https://www.osvdb.org</menuurl>
		<MENUBODY>
			OSVDB
		</MENUBODY>
	</MENUITEM> -->


	<MENUITEM>
		<menuurl>https://nvd.nist.gov</menuurl>
		<MENUBODY>
			Nist NVD
		</MENUBODY>
	</MENUITEM>
	<MENUITEM>
		<menuurl>https://cvedetails.com</menuurl>
		<MENUBODY>
			CVE Details
		</MENUBODY>
	</MENUITEM>
	<MENUITEM>
		<menuurl>https://cve.mitre.org</menuurl>
		<MENUBODY>
			Mitre
		</MENUBODY>
	</MENUITEM>

<!--	<MENUITEM>
		<menuurl>https://ciac.llnl.gov</menuurl>
		<MENUBODY>
			CIAC
		</MENUBODY>
	</MENUITEM> -->

	<MENUITEM>
		<menuurl>https://www.cisa.gov/uscert/</menuurl>
		<MENUBODY>
			US CERT
		</MENUBODY>
	</MENUITEM>
	<MENUITEM>
		<menuurl>https://www.cert.org</menuurl>
		<MENUBODY>
			OG CERT
		</MENUBODY>
	</MENUITEM>

	<MENUITEM>
		<menuurl>https://public.cyber.mil</menuurl>
		<MENUBODY>
			DISA
		</MENUBODY>
	</MENUITEM>
	<MENUITEM>
		<menuurl>https://www.nsa.gov/Press-Room/Cybersecurity-Advisories-Guidance/</menuurl>
		<MENUBODY>
			NSA
		</MENUBODY>
	</MENUITEM>
    </MENUOBJECT>
    <MENUOBJECT>
	<MENUTITLE>
		Exploit Info	
	</MENUTITLE>
	<MENUITEM>
		<menuurl>https://www.exploit-db.com</menuurl>
		<MENUBODY>
			Exploit DB
		</MENUBODY>
	</MENUITEM>

	<MENUITEM>
		<menuurl>https://www.packetstormsecurity.org</menuurl>
		<MENUBODY>
			Packet Storm
		</MENUBODY>
	</MENUITEM>


    </MENUOBJECT>
    <MENUOBJECT>
	<MENUTITLE>
		Active Groups
	</MENUTITLE>


	<MENUITEM>
		<menuurl>https://www.thc.org</menuurl>
		<MENUBODY>
			THC
		</MENUBODY>
	</MENUITEM>

    </MENUOBJECT>
    <MENUOBJECT>

	<MENUTITLE>
		Commercial Groups
	</MENUTITLE>

	<MENUITEM>
		<menuurl>https://www.rapid7.com</menuurl>
		<MENUBODY>
			Rapid7
		</MENUBODY>

	</MENUITEM>
	<MENUITEM>
		<menuurl>https://www.secunia.com</menuurl>
		<MENUBODY>
			Secunia
		</MENUBODY>

	</MENUITEM>
	<MENUITEM>
		<menuurl>https://www.securiteam.com</menuurl>
		<MENUBODY>
			Securiteam
		</MENUBODY>
	</MENUITEM>


	<MENUITEM>
		<menuurl>https://www.trustwave.com/Company/SpiderLabs/</menuurl>
		<MENUBODY>
			SpiderLabs	
		</MENUBODY>
	</MENUITEM>


	<MENUITEM>
		<menuurl>https://www.idefense.com</menuurl>
		<MENUBODY>
			Idefense
		</MENUBODY>
	</MENUITEM>


	<MENUITEM>
		<menuurl>https://www.coresecurity.com</menuurl>
		<MENUBODY>
			Core	
		</MENUBODY>
	</MENUITEM>




    </MENUOBJECT>

   <MENUOBJECT>
	<MENUTITLE>
		Defunct Groups ?
	</MENUTITLE>
	<MENUITEM>
		<menuurl>https://www.shmoo.com</menuurl>
		<MENUBODY>
			The Shmoo Group
		</MENUBODY>
	</MENUITEM>

	<MENUITEM>
		<menuurl>https://www.cultdeadcow.com</menuurl>
		<MENUBODY>
			CDC
		</MENUBODY>
	</MENUITEM>
	<MENUITEM>
		<menuurl>https://www.attrition.org</menuurl>
		<MENUBODY>
			Attrition
		</MENUBODY>
	</MENUITEM>

	<MENUITEM>
		<menuurl>https://www.w00w00.org</menuurl>
		<MENUBODY>
			w00w00
		</MENUBODY>
	</MENUITEM>
	<MENUITEM>
		<menuurl>https://packetstormsecurity.com/groups/ADM</menuurl>
		<MENUBODY>
			ADM
		</MENUBODY>
	</MENUITEM>

	<MENUITEM>
		<menuurl>https://packetstormsecurity.com/groups/teso</menuurl>
		<MENUBODY>
			TESO	
		</MENUBODY>
	</MENUITEM>
    </MENUOBJECT>
    <MENUOBJECT>
	<MENUTITLE>
		Security Organizations
	</MENUTITLE>
	<MENUITEM>
		<menuurl>https://www.owasp.org</menuurl>
		<MENUBODY>
			OWASP
		</MENUBODY>
	</MENUITEM>


	<MENUITEM>
		<menuurl>https://www.isc2.org</menuurl>
		<MENUBODY>
			ISC2
		</MENUBODY>
	</MENUITEM>
	<MENUITEM>
		<menuurl>https://www.isecom.org</menuurl>
		<MENUBODY>
			ISECOM
		</MENUBODY>
	</MENUITEM>


	<MENUITEM>
		<menuurl>https://www.sans.org</menuurl>
		<MENUBODY>
			SANS
		</MENUBODY>
	</MENUITEM>

	<MENUITEM>
		<menuurl>https://www.infragard.org</menuurl>
		<MENUBODY>
			Infragard
		</MENUBODY>
	</MENUITEM>

    </MENUOBJECT>

    <MENUOBJECT>
	<MENUTITLE>
		Methodologies	
	</MENUTITLE>

	<MENUITEM>
		<menuurl>https://www.isecom.org/</menuurl>
		<MENUBODY>
			ISECOM
		</MENUBODY>
	</MENUITEM>

	<MENUITEM>
		<menuurl>https://www.osstmm.org</menuurl>
		<MENUBODY>
			OSSTMM
		</MENUBODY>
	</MENUITEM>
    </MENUOBJECT>
    <MENUOBJECT>

	<MENUTITLE>
		Free Tools
	</MENUTITLE>

	<MENUITEM>
		<menuurl>https://www.openvas.org/</menuurl>
		<MENUBODY>
			OpenVAS
		</MENUBODY>
	</MENUITEM>

	<MENUITEM>
		<menuurl>https://www.portswigger.net/proxy/</menuurl>
		<MENUBODY>
			Burp Proxy
		</MENUBODY>
	</MENUITEM>

	<MENUITEM>
		<menuurl>https://www.insecure.org</menuurl>
		<MENUBODY>
			Nmap
		</MENUBODY>
	</MENUITEM>
	<MENUITEM>
		<menuurl>https://www.metasploit.org</menuurl>
		<MENUBODY>
			Metasploit
		</MENUBODY>
	</MENUITEM>

	<MENUITEM>
		<menuurl>https://www.nessus.org</menuurl>
		<MENUBODY>
			Nessus
		</MENUBODY>
	</MENUITEM>
	<MENUITEM>
		<menuurl>https://github.com/SecureAuthCorp/impacket</menuurl>
		<MENUBODY>
			Impacket
		</MENUBODY>
	</MENUITEM>

	<MENUITEM>
		<menuurl>https://github.com/OWASP/Amass</menuurl>
		<MENUBODY>
			Amass
		</MENUBODY>
	</MENUITEM>
	<MENUITEM>
		<menuurl>https://github.com/EmpireProject/Empire</menuurl>
		<MENUBODY>
			Empire
		</MENUBODY>
	</MENUITEM>

	<MENUITEM>
		<menuurl>https://w3af.org</menuurl>
		<MENUBODY>
			w3af 
		</MENUBODY>
	</MENUITEM>
	<MENUITEM>
		<menuurl>https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project</menuurl>
		<MENUBODY>
			ZAP
		</MENUBODY>
	</MENUITEM>
	<MENUITEM>
		<menuurl>https://sqlmap.org</menuurl>
		<MENUBODY>
			SQLMap 
		</MENUBODY>
	</MENUITEM>

	<MENUITEM>
		<menuurl>https://www.cirt.net</menuurl>
		<MENUBODY>
			Nikto
		</MENUBODY>
	</MENUITEM>

	<MENUITEM>
		<menuurl>https://docs.microsoft.com/en-us/sysinternals/</menuurl>
		<MENUBODY>
			Sysinternals
		</MENUBODY>
	</MENUITEM>


	<MENUITEM>
		<menuurl>https://www.coresecurity.com/grid/index-open-source-tools</menuurl>
		<MENUBODY>
			Core Tools
		</MENUBODY>
	</MENUITEM>

	<MENUITEM>
		<menuurl>https://github.com/SpiderLabs</menuurl>
		<MENUBODY>
			SpiderLabs Tools
		</MENUBODY>
	</MENUITEM>

	<MENUITEM>
		<menuurl>https://thc.org/</menuurl>
		<MENUBODY>
			THC Tools
		</MENUBODY>
	</MENUITEM>


	<MENUITEM>
		<menuurl>https://beefproject.com/</menuurl>
		<MENUBODY>
		 BeEF
		</MENUBODY>
	</MENUITEM>
	<MENUITEM>
		<menuurl>https://wpscan.org</menuurl>
		<MENUBODY>
		WP Scan 
		</MENUBODY>
	</MENUITEM>






	<MENUITEM>
		<menuurl>https://https://www.ettercap-project.org/</menuurl>
		<MENUBODY>
			Ettercap
		</MENUBODY>
	</MENUITEM>




	<MENUITEM>
		<menuurl>https://sqlninja.sourceforge.net</menuurl>
		<MENUBODY>
			SQL Ninja
		</MENUBODY>
	</MENUITEM>

	<MENUITEM>
		<menuurl>https://www.wireshark.org/</menuurl>
		<MENUBODY>
			Wireshark
		</MENUBODY>
	</MENUITEM>

	<MENUITEM>
		<menuurl>https://sectools.org/</menuurl>
		<MENUBODY>
			Sectools.org
		</MENUBODY>
	</MENUITEM>
    </MENUOBJECT>
    <MENUOBJECT>
	<MENUTITLE>
		Virtualization Tools	
	</MENUTITLE>

	<MENUITEM>
		<menuurl>https://www.vmware.com/</menuurl>
		<MENUBODY>
			VMWare Server
		</MENUBODY>
	</MENUITEM>

	<MENUITEM>
		<menuurl>https://www.virtualbox.org/wiki/Downloads</menuurl>
		<MENUBODY>
			Virtual Box
		</MENUBODY>
	</MENUITEM>

	<MENUITEM>
		<menuurl>https://www.proxmox.com/</menuurl>
		<MENUBODY>
			Proxmox	
		</MENUBODY>
	</MENUITEM>

	<MENUITEM>
		<menuurl>https://bochs.sourceforge.net/</menuurl>
		<MENUBODY>
			Bochs
		</MENUBODY>
	</MENUITEM>

	<MENUITEM>
		<menuurl>https://pearpc.sourceforge.net/</menuurl>
		<MENUBODY>
			PearPC	
		</MENUBODY>
	</MENUITEM>

	<MENUITEM>
		<menuurl>https://www.microsoft.com/en-us/download/details.aspx?id=3702</menuurl>
		<MENUBODY>
			MS Virtual PC
		</MENUBODY>
	</MENUITEM>
	<MENUITEM>
		<menuurl>https://docs.microsoft.com/en-us/windows/wsl/install-win10</menuurl>
		<MENUBODY>
			Microsoft WSL
		</MENUBODY>
	</MENUITEM>
    </MENUOBJECT>

    <MENUOBJECT>
	<MENUTITLE>
		Reverse Engineering	
	</MENUTITLE>
	<MENUITEM>
		<menuurl>https://www.gnu.org/software/binutils/</menuurl>
		<MENUBODY>
			binutils
		</MENUBODY>
	</MENUITEM>
	<MENUITEM>
		<menuurl>https://www.gnu.org/software/gdb/</menuurl>
		<MENUBODY>
			GDB
		</MENUBODY>
	</MENUITEM>

	<MENUITEM>
		<menuurl>https://www.gnu.org/software/ddd/</menuurl>
		<MENUBODY>
			DDD
		</MENUBODY>
	</MENUITEM>

	<MENUITEM>
		<menuurl>https://www.ollydbg.de/</menuurl>
		<MENUBODY>
			Ollydbg 
		</MENUBODY>
	</MENUITEM>
	<MENUITEM>
		<menuurl>https://tools.kali.org/reverse-engineering/edb-debugger</menuurl>
		<MENUBODY>
			EDB-Debugger
		</MENUBODY>
	</MENUITEM>


	<MENUITEM>
		<menuurl>https://www.coresecurity.com/grid/index-open-source-tools</menuurl>
		<MENUBODY>
			CORE
		</MENUBODY>
	</MENUITEM>

	<MENUITEM>
		<menuurl>https://tools.kali.org/reverse-engineering/jad</menuurl>
		<MENUBODY>
			Jad	
		</MENUBODY>
	</MENUITEM>

	<MENUITEM>
		<menuurl>https://tools.kali.org/reverse-engineering/javasnoop</menuurl>
		<MENUBODY>
			Javasnoop
		</MENUBODY>
	</MENUITEM>
	<MENUITEM>
		<menuurl>https://tools.kali.org/forensics/binwalk</menuurl>
		<MENUBODY>
			Binwalk
		</MENUBODY>
	</MENUITEM>
    </MENUOBJECT>
    <MENUOBJECT>
	<MENUTITLE>
		Defaced Websites
	</MENUTITLE>


	<MENUITEM>
		<menuurl>https://www.zone-h.org/component/option,com_attacks/Itemid,43/</menuurl>
		<MENUBODY>
			Zone H
		</MENUBODY>
	</MENUITEM>
    </MENUOBJECT>

    <MENUOBJECT>
	<MENUTITLE>
		Technical Conferences
	</MENUTITLE>
	<MENUITEM>
		<menuurl>https://www.defcon.org</menuurl>
		<MENUBODY>
			DefCon
		</MENUBODY>
	</MENUITEM>
	<MENUITEM>
		<menuurl>https://www.owasp.org/index.php/Category:OWASP_AppSec_Conference</menuurl>
		<MENUBODY>
		 	AppSec	
		</MENUBODY>
	</MENUITEM>

	<MENUITEM>
		<menuurl>https://www.blackhat.com</menuurl>
		<MENUBODY>
			Blackhat
		</MENUBODY>
	</MENUITEM>
	<MENUITEM>
		<menuurl>https://www.cansecwest.com</menuurl>
		<MENUBODY>
			CanSecWest
		</MENUBODY>
	</MENUITEM>


	<MENUITEM>
		<menuurl>https://toorcon.com</menuurl>
		<MENUBODY>
			Toorcon
		</MENUBODY>
	</MENUITEM>

	<MENUITEM>
		<menuurl>https://www.shmoocon.org/</menuurl>
		<MENUBODY>
			ShmooCon
		</MENUBODY>
	</MENUITEM>


	<MENUITEM>
		<menuurl>https://hope.net/</menuurl>
		<MENUBODY>
			H.O.P.E.
		</MENUBODY>
	</MENUITEM>

	<MENUITEM>
		<menuurl>https://www.ccc.de/</menuurl>
		<MENUBODY>
			CCC
		</MENUBODY>
	</MENUITEM>

	<MENUITEM>
		<menuurl>https://conference.hackinthebox.org/</menuurl>
		<MENUBODY>
			HiTB
		</MENUBODY>
	</MENUITEM>

	<MENUITEM>
		<menuurl>https://www.derbycon.com</menuurl>
		<MENUBODY>
			DerbyCon
		</MENUBODY>
	</MENUITEM>



	<MENUITEM>
		<menuurl>https://www.securitybsides.com</menuurl>
		<MENUBODY>
			Security BSides
		</MENUBODY>
	</MENUITEM>


	<MENUITEM>
		<menuurl>https://www.rsaconference.com</menuurl>
		<MENUBODY>
			RSA
		</MENUBODY>
	</MENUITEM>
	<MENUITEM>
		<menuurl>https://infosecsouthwest.com</menuurl>
		<MENUBODY>
			ISSW
		</MENUBODY>
	</MENUITEM>


    </MENUOBJECT>
    <MENUOBJECT>
	<MENUTITLE>
		Groups and Meetups	
	</MENUTITLE>

	<MENUITEM>
		<menuurl>https://www.owasp.org/index.php/OWASP_Chapter</menuurl>
		<MENUBODY>
			OWASP
		</MENUBODY>
	</MENUITEM>
	<MENUITEM>
		<menuurl>https://www.2600.com/meetings/mtg.html</menuurl>
		<MENUBODY>
			2600
		</MENUBODY>
	</MENUITEM>
    </MENUOBJECT>
    <MENUOBJECT>
	<MENUTITLE>
		Distros
	</MENUTITLE>


	<MENUITEM>
		<menuurl>https://www.kali.org</menuurl>
		<MENUBODY>
			Kali
		</MENUBODY>
	</MENUITEM>
	<MENUITEM>
		<menuurl>https://www.knopper.net/knoppix/index-en.html</menuurl>
		<MENUBODY>
			Knoppix
		</MENUBODY>
	</MENUITEM>

    </MENUOBJECT>

    <MENUOBJECT>
	<MENUTITLE>
		Wireless Tools
	</MENUTITLE>
	<MENUITEM>
		<menuurl>https://www.kismetwireless.net</menuurl>
		<MENUBODY>
			Kismet
		</MENUBODY>
	</MENUITEM>



	<MENUITEM>
		<menuurl>https://www.aircrack-ng.org/</menuurl>
		<MENUBODY>
			Aircrack-ng
		</MENUBODY>
	</MENUITEM>


	<MENUITEM>
		<menuurl>https://csrc.nist.gov/publications/nistpubs/800-48/NIST_SP-48.pdf</menuurl>
		<MENUBODY>
			Wireless SP
		</MENUBODY>
	</MENUITEM>

	<MENUITEM>
		<menuurl>https://theta44.org/karma/index.html</menuurl>
		<MENUBODY>
			Karma
		</MENUBODY>
	</MENUITEM>
	<MENUITEM>
		<menuurl>https://tools.kali.org/wireless-attacks/reaver</menuurl>
		<MENUBODY>
			Reaver
		</MENUBODY>
	</MENUITEM>

    </MENUOBJECT>

    <MENUOBJECT>
	<MENUTITLE>
		Checklists
	</MENUTITLE>

	<MENUITEM>
		<menuurl>https://csrc.nist.gov</menuurl>
		<MENUBODY>
			NIST CSRC
		</MENUBODY>
	</MENUITEM>

	<MENUITEM>
		<menuurl>https://nvd.nist.gov/cvss.cfm?version=2</menuurl>
		<MENUBODY>
		 	CVSS	
		</MENUBODY>
	</MENUITEM>

	<MENUITEM>
		<menuurl>https://checklists.nist.gov</menuurl>
		<MENUBODY>
			NIST Checklists
		</MENUBODY>
	</MENUITEM>
	<MENUITEM>
		<menuurl>https://www.cisecurity.org</menuurl>
		<MENUBODY>
			CIS
		</MENUBODY>
	</MENUITEM>
	<MENUITEM>
		<menuurl>https://www.iad.gov/iad/library/ia-guidance/index.cfm</menuurl>
		<MENUBODY>
			IAD
		</MENUBODY>
	</MENUITEM>

	<MENUITEM>

		<menuurl>https://docs.oracle.com/database/121/DBSEG/title.htm</menuurl>
		<MENUBODY>
			Oracle 
		</MENUBODY>
	</MENUITEM>
	<MENUITEM>

		<menuurl>https://www.petefinnigan.com/orasec.htm</menuurl>
		<MENUBODY>
			PF's Checklists
		</MENUBODY>

	</MENUITEM>

	<MENUITEM>
		<menuurl>https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-security-baselines</menuurl>
		<MENUBODY>
			Microsoft
		</MENUBODY>
	</MENUITEM>
    </MENUOBJECT>

   <MENUOBJECT>
        <MENUTITLE>
		OS Hardening
        </MENUTITLE>



        <MENUITEM>
                <menuurl>https://bastille-linux.sourceforge.net</menuurl>
                <MENUBODY>
			Bastille Linux
                </MENUBODY>
        </MENUITEM>
        <MENUITEM>
                <menuurl>https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-security-configuration-framework/windows-security-baselines</menuurl>
                <MENUBODY>
			Microsoft
                </MENUBODY>
        </MENUITEM>
   </MENUOBJECT>


    <MENUOBJECT>
	<MENUTITLE>
		Professional Security Programs
	</MENUTITLE>

	<MENUITEM>
		<menuurl>https://www.pcisecuritystandards.org/</menuurl>
		<MENUBODY>
		  PCI	
		</MENUBODY>
	</MENUITEM>

	<MENUITEM>
		<menuurl>https://www.isc2.org</menuurl>
		<MENUBODY>
			ISC2
		</MENUBODY>
	</MENUITEM>

	<MENUITEM>
		<menuurl>https://www.eccouncil.org/</menuurl>
		<MENUBODY>
		 	EC Council	
		</MENUBODY>
	</MENUITEM>
	<MENUITEM>
		<menuurl>https://www.sans.org/</menuurl>
		<MENUBODY>
		 	SANS	
		</MENUBODY>
	</MENUITEM>

    </MENUOBJECT>

   <MENUOBJECT>
        <MENUTITLE>
                Password Crackers
        </MENUTITLE>

	<MENUITEM>
		<menuurl>https://www.openwall.com/john/</menuurl>
		<MENUBODY>
			John the Ripper
		</MENUBODY>
	</MENUITEM>

	<MENUITEM>
		<menuurl>https://hashcat.net/hashcat/</menuurl>
		<MENUBODY>
			Hashcat 
		</MENUBODY>
	</MENUITEM>
	<MENUITEM>
		<menuurl>https://en.wikipedia.org/wiki/RainbowCrack</menuurl>
		<MENUBODY>
			RainbowCrack 
		</MENUBODY>
	</MENUITEM>
	<MENUITEM>
		<menuurl>https://rainbowtables.shmoo.com/</menuurl>
		<MENUBODY>
			Rainbow Tables
		</MENUBODY>
	</MENUITEM>
	<MENUITEM>
		<menuurl>https://www.l0phtcrack.com</menuurl>
		<MENUBODY>
			L0phtcrack 
		</MENUBODY>
	</MENUITEM>
	<MENUITEM>
		<menuurl>https://en.wikipedia.org/wiki/Cain_and_Abel_(software)</menuurl>
		<MENUBODY>
			Cain and Abel
		</MENUBODY>
	</MENUITEM>
    </MENUOBJECT>


    <MENUOBJECT>
	<MENUTITLE>
		Default Passwords
	</MENUTITLE>
	<MENUITEM>
		<menuurl>https://cirt.net/passwords</menuurl>
		<MENUBODY>
			Cirt
		</MENUBODY>
	</MENUITEM>

	<MENUITEM>
		<menuurl>https://www.petefinnigan.com/default/default_password_list.htm</menuurl>
		<MENUBODY>Oracle</MENUBODY>
	</MENUITEM>



	<MENUITEM>
		<menuurl>https://defaultpassword.com/</menuurl>
		<MENUBODY>
			def pass
		</MENUBODY>
	</MENUITEM>




	<MENUITEM>
		<menuurl>https://www.uktsupport.co.uk/reference/biosp.htm</menuurl>
		<MENUBODY>
			Bios Passwords
		</MENUBODY>
	</MENUITEM>

    </MENUOBJECT>

   <MENUOBJECT>
        <MENUTITLE>
                OSI
        </MENUTITLE>

        <MENUITEM>
                <menuurl>https://www.shodanhq.com</menuurl>
                <MENUBODY>
			SHODAN
                </MENUBODY>
        </MENUITEM>



        <MENUITEM>
                <menuurl>https://www.archive.org/</menuurl>
                <MENUBODY>
                        Way Back Machine
                </MENUBODY>
        </MENUITEM>


        <MENUITEM>
                <menuurl>https://www.domaintools.com</menuurl>
                <MENUBODY>
                        DomainTools
                </MENUBODY>
        </MENUITEM>

    </MENUOBJECT>

   <MENUOBJECT>
        <MENUTITLE>
		Compliance Resources
        </MENUTITLE>

        <MENUITEM>
                <menuurl>https://www.hhs.gov/hipaa/</menuurl>
                <MENUBODY>
                        HIPAA
                </MENUBODY>
        </MENUITEM>

        <MENUITEM>
                <menuurl>https://www.congress.gov/bill/107th-congress/house-bill/3763</menuurl>
                <MENUBODY>
			SOX
                </MENUBODY>
        </MENUITEM>

        <MENUITEM>
                <menuurl>https://www.congress.gov/bill/106th-congress/senate-bill/900</menuurl>
                <MENUBODY>
			FMA (GLBA)
                </MENUBODY>
        </MENUITEM>


        <MENUITEM>
                <menuurl>https://csrc.nist.gov/</menuurl>
                <MENUBODY>
			FISMA
                </MENUBODY>
        </MENUITEM>

        <MENUITEM>
                <menuurl>https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf</menuurl>
                <MENUBODY>
		 	NIST 800-53	
                </MENUBODY>
        </MENUITEM>

        <MENUITEM>
                <menuurl>https://www.iso.org/standard/75652.html</menuurl>
                <MENUBODY>
			ISO 27002:2022
                </MENUBODY>
        </MENUITEM>


        <MENUITEM>
                <menuurl>https://www.fedramp.gov</menuurl>
                <MENUBODY>
		 	FedRAMP
                </MENUBODY>
        </MENUITEM>


        <MENUITEM>
                <menuurl>https://www.sans.org/resources/policies/</menuurl>
                <MENUBODY>
			SANS Policies
                </MENUBODY>
        </MENUITEM>

    </MENUOBJECT>

   <MENUOBJECT>
        <MENUTITLE>
		Email Lists
        </MENUTITLE>

<!--        <MENUITEM>
                <menuurl>https://www.securityfocus.com/archive</menuurl>
                <MENUBODY>
			Security Focus
                </MENUBODY>
        </MENUITEM> -->

        <MENUITEM>
                <menuurl>https://seclists.org/fulldisclosure/</menuurl>
                <MENUBODY>
			Full Disclosure
                </MENUBODY>
        </MENUITEM>


        <MENUITEM>
                <menuurl>https://seclists.org/dailydave/</menuurl>
                <MENUBODY>
			Daily Dave
                </MENUBODY>
        </MENUITEM>
        <MENUITEM>
                <menuurl>https://seclists.org</menuurl>
                <MENUBODY>
			Security Lists
                </MENUBODY>
        </MENUITEM>


   </MENUOBJECT>


   <MENUOBJECT>
        <MENUTITLE>
		Defense / IDS
        </MENUTITLE>

        <MENUITEM>
                <menuurl>https://www.snort.org</menuurl>
                <MENUBODY>
			Snort
                </MENUBODY>
        </MENUITEM>


   </MENUOBJECT>

   <MENUOBJECT>

        <MENUTITLE>
		Helpful Sites	
        </MENUTITLE>



        <MENUITEM>


                <menuurl>https://pentestmonkey.net</menuurl>
                <MENUBODY>
			Pentest Monkey
                </MENUBODY>
        </MENUITEM>
        <MENUITEM>
                <menuurl>https://www.offensive-security.com</menuurl>
                <MENUBODY>
			Offensive Security
                </MENUBODY>

        </MENUITEM>

   </MENUOBJECT>

   <MENUOBJECT>
        <MENUTITLE>
		Institutional Stuff	
        </MENUTITLE>

        <MENUITEM>
                <menuurl>https://www.phrack.org</menuurl>
                <MENUBODY>
			Phrack
                </MENUBODY>
        </MENUITEM>
	<MENUITEM>
		<menuurl>https://www.2600.com</menuurl>
		<MENUBODY>
			2600
		</MENUBODY>
	</MENUITEM>

   </MENUOBJECT>

</MENU>

<MSG>
    <MSGARTICLE>
	<MSGTITLE>Welcome to the Security Information Center</MSGTITLE>
	<MSGBODY>This is a portal site created by ThreatPerspective to enable our clients and other interested parties to learn more about Information Security.  The boxes on the left correlate to free information and tools that realate to Information Security.  The boxes on the right are various Information Security related news feeds.</MSGBODY>
    </MSGARTICLE>
</MSG>
<rss version="2.0">
<channel>
    <title>CISA Cybersecurity Advisories</title>
    <link>https://www.cisa.gov/</link>
    <description/>
    <item>
  <title>Defending Against China-Nexus Covert Networks of Compromised Devices</title>
  <link>https://www.cisa.gov/news-events/cybersecurity-advisories/aa26-113a</link>
  <description>&lt;div class="SCXW131754345 BCX8"&gt;
</description>
    </item>
<item>
  <title>Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure</title>
  <link>https://www.cisa.gov/news-events/cybersecurity-advisories/aa26-097a</link>
  <description>&lt;h2&gt;&lt;strong&gt;Advisory at a Glance&lt;/strong&gt;&lt;/h2&gt;
</description>
    </item>
<item>
  <title>Pro-Russia Hacktivists Conduct Opportunistic Attacks Against US and Global Critical Infrastructure</title>
  <link>https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-343a</link>
  <description>&lt;h2&gt;&lt;strong&gt;Summary&lt;/strong&gt;&lt;/h2&gt;
</description>
    </item>
<item>
  <title>CISA Shares Lessons Learned from an Incident Response Engagement</title>
  <link>https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-266a</link>
  <description>&lt;h2&gt;&lt;strong&gt;Advisory at a Glance&lt;/strong&gt;&lt;/h2&gt;
</description>
    </item>
<item>
  <title>Countering Chinese State-Sponsored Actors Compromise of Networks Worldwide to Feed Global Espionage System</title>
  <link>https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-239a</link>
  <description>&lt;h2&gt;&lt;strong&gt;Executive summary&lt;/strong&gt;&lt;/h2&gt;
</description>
    </item>
<item>
  <title>CISA and USCG Identify Areas for Cyber Hygiene Improvement After Conducting Proactive Threat Hunt at US Critical Infrastructure Organization</title>
  <link>https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-212a</link>
  <description>&lt;div class="WordSection1"&gt;
</description>
    </item>
<item>
  <title>#StopRansomware: Interlock</title>
  <link>https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-203a</link>
  <description>&lt;h2&gt;&lt;strong&gt;Summary&lt;/strong&gt;&lt;/h2&gt;
</description>
    </item>
<item>
  <title>Ransomware Actors Exploit Unpatched SimpleHelp Remote Monitoring and Management to Compromise Utility Billing Software Provider</title>
  <link>https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-163a</link>
  <description>&lt;h2&gt;&lt;strong&gt;Summary&lt;/strong&gt;&lt;/h2&gt;
</description>
    </item>
<item>
  <title>Russian GRU Targeting Western Logistics Entities and Technology Companies</title>
  <link>https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-141a</link>
  <description>&lt;h2&gt;&lt;strong&gt;Executive Summary&lt;/strong&gt;&lt;/h2&gt;
</description>
    </item>
<item>
  <title>Threat Actors Deploy LummaC2 Malware to Exfiltrate Sensitive Data from Organizations</title>
  <link>https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-141b</link>
  <description>&lt;h2&gt;&lt;strong&gt;Summary&lt;/strong&gt;&lt;/h2&gt;
</description>
    </item>
</channel>
</rss>
<rss version="2.0">
<channel>
    <title>CISA Analysis Reports</title>
    <link>https://www.cisa.gov/</link>
    <description/>
    <item>
  <title>FIRESTARTER Backdoor</title>
  <link>https://www.cisa.gov/news-events/analysis-reports/ar26-113a</link>
  <description>&lt;h2&gt;&lt;strong&gt;Malware Analysis Report at a Glance&lt;/strong&gt;&lt;/h2&gt;
</description>
    </item>
<item>
  <title>BRICKSTORM Backdoor</title>
  <link>https://www.cisa.gov/news-events/analysis-reports/ar25-338a</link>
  <description>&lt;h2&gt;&lt;strong&gt;Malware Analysis at a Glance&lt;/strong&gt;&lt;/h2&gt;
</description>
    </item>
<item>
  <title>Malicious Listener for Ivanti Endpoint Mobile Management Systems</title>
  <link>https://www.cisa.gov/news-events/analysis-reports/ar25-261a</link>
  <description>&lt;table class="tablesaw tablesaw-stack" data-tablesaw-mode="stack" data-tablesaw-minimap&gt;
</description>
    </item>
<item>
  <title>MAR-251132.c1.v1 Exploitation of SharePoint Vulnerabilities</title>
  <link>https://www.cisa.gov/news-events/analysis-reports/ar25-218a</link>
  <description>&lt;h3&gt;Notification&lt;/h3&gt;
</description>
    </item>
<item>
  <title>MAR-25993211-r1.v2 Ivanti Connect Secure (RESURGE)</title>
  <link>https://www.cisa.gov/news-events/analysis-reports/ar25-087a</link>
  <description>&lt;h3&gt;Notification&lt;/h3&gt;
</description>
    </item>
<item>
  <title>MAR-10448362-1.v1 Volt Typhoon</title>
  <link>https://www.cisa.gov/news-events/analysis-reports/ar24-038a</link>
  <description>&lt;h3&gt;Notification&lt;/h3&gt;
</description>
    </item>
<item>
  <title>MAR-10478915-1.v1 Citrix Bleed</title>
  <link>https://www.cisa.gov/news-events/analysis-reports/ar23-325a</link>
  <description>&lt;p&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;
</description>
    </item>
<item>
  <title>MAR-10454006.r5.v1 SUBMARINE, SKIPJACK, SEASPRAY, WHIRLPOOL, and SALTWATER Backdoors </title>
  <link>https://www.cisa.gov/news-events/analysis-reports/ar23-250a-0</link>
  <description>&lt;p&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;
</description>
    </item>
<item>
  <title>MAR-10430311-1.v1 Multiple Nation-State Threat Actors Exploit CVE-2022-47966 and CVE-2022-42475</title>
  <link>https://www.cisa.gov/news-events/analysis-reports/ar23-250a</link>
  <description>&lt;p&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;
</description>
    </item>
<item>
  <title>Infamous Chisel Malware Analysis Report</title>
  <link>https://www.cisa.gov/news-events/analysis-reports/ar23-243a</link>
  <description>&lt;h4&gt;Infamous Chisel–A collection of components associated with Sandworm designed to enable remote access and exfiltrate information from Android phones.&lt;/h4&gt;
</description>
    </item>
</channel>
</rss>
<rss version="2.0">
<channel>
    <title>Bulletins</title>
    <link>https://www.cisa.gov/</link>
    <description/>
    <item>
  <title>Vulnerability Summary for the Week of April 13, 2026</title>
  <link>https://www.cisa.gov/news-events/bulletins/sb26-110</link>
  <description>&lt;div id="high_v"&gt;
</description>
    </item>
<item>
  <title>Vulnerability Summary for the Week of April 6, 2026</title>
  <link>https://www.cisa.gov/news-events/bulletins/sb26-103</link>
  <description>&lt;div id="high_v"&gt;
</description>
    </item>
<item>
  <title>Vulnerability Summary for the Week of February 2, 2026</title>
  <link>https://www.cisa.gov/news-events/bulletins/sb26-040</link>
  <description>&lt;div id="high_v"&gt;
</description>
    </item>
<item>
  <title>Vulnerability Summary for the Week of January 26, 2026</title>
  <link>https://www.cisa.gov/news-events/bulletins/sb26-033</link>
  <description>&lt;div id="high_v"&gt;
</description>
    </item>
<item>
  <title>Vulnerability Summary for the Week of January 19, 2026</title>
  <link>https://www.cisa.gov/news-events/bulletins/sb26-026</link>
  <description>&lt;div id="high_v"&gt;
</description>
    </item>
<item>
  <title>Vulnerability Summary for the Week of January 12, 2026</title>
  <link>https://www.cisa.gov/news-events/bulletins/sb26-020</link>
  <description>&lt;div id="high_v"&gt;
</description>
    </item>
<item>
  <title>Vulnerability Summary for the Week of January 5, 2026</title>
  <link>https://www.cisa.gov/news-events/bulletins/sb26-012</link>
  <description>&lt;div id="high_v"&gt;
</description>
    </item>
<item>
  <title>Vulnerability Summary for the Week of December 29, 2025</title>
  <link>https://www.cisa.gov/news-events/bulletins/sb26-005</link>
  <description>&lt;div id="high_v"&gt;
</description>
    </item>
<item>
  <title>Vulnerability Summary for the Week of December 22, 2025</title>
  <link>https://www.cisa.gov/news-events/bulletins/sb25-363</link>
  <description>&lt;div id="high_v"&gt;
</description>
    </item>
<item>
  <title>Vulnerability Summary for the Week of December 15, 2025</title>
  <link>https://www.cisa.gov/news-events/bulletins/sb25-356</link>
  <description>&lt;div id="high_v"&gt;
</description>
    </item>
</channel>
</rss>
<rss version="2.0">
<channel>
    <title>CERT Advisories</title>
    <link>https://seclists.org/#cert</link>
    <description>The &lt;a href=&quot;http://www.cert.org/&quot;&gt;Computer Emergency Response Team&lt;/a&gt; has been responding to security incidents and sharing vulnerability information since the Morris Worm hit in 1986. This archive combines their technical security alerts, tips, and current activity lists.</description>
  <item>
    <title>Apple Releases Security Updates for Multiple Products</title>
    <link>https://seclists.org/cert/2023/3</link>
    <description>&lt;p&gt;Posted by CISA on Mar 28&lt;/p&gt;Cybersecurity and Infrastructure Security Agency (CISA) - Defend Today, Secure Tomorrow&lt;br&gt;
Apple...&lt;br&gt;</description>
  </item>
  <item>
    <title>CISA Releases Six Industrial Control Systems Advisories</title>
    <link>https://seclists.org/cert/2023/2</link>
    <description>&lt;p&gt;Posted by CISA on Mar 23&lt;/p&gt;Cybersecurity and Infrastructure Security Agency (CISA) - Defend Today, Secure Tomorrow&lt;br&gt;
08:00 AM EDT...&lt;br&gt;</description>
  </item>
  <item>
    <title>CISA Releases Eight Industrial Control Systems Advisories</title>
    <link>https://seclists.org/cert/2023/1</link>
    <description>&lt;p&gt;Posted by CISA on Mar 21&lt;/p&gt;Cybersecurity and Infrastructure Security Agency (CISA) - Defend Today, Secure Tomorrow&lt;br&gt;
03/21/2023 08:00 AM...&lt;br&gt;</description>
  </item>
  <item>
    <title>CISA and NSA Release Enduring Security Framework Guidance on Identity and Access Management</title>
    <link>https://seclists.org/cert/2023/0</link>
    <description>&lt;p&gt;Posted by CISA on Mar 21&lt;/p&gt;Cybersecurity and Infrastructure Security Agency (CISA) - Defend Today, Secure Tomorrow&lt;br&gt;
CISA and NSA Release Enduring Security Framework Guidance on Identity and Access Management [...&lt;br&gt;</description>
  </item>
</channel>
</rss>
<rss version="2.0">
<channel>
    <title>Alerts</title>
    <link>https://www.cisa.gov/</link>
    <description/>
    <item>
  <title>CISA Adds Four Known Exploited Vulnerabilities to Catalog</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/04/24/cisa-adds-four-known-exploited-vulnerabilities-catalog</link>
  <description>&lt;p&gt;CISA has added four new vulnerabilities to its &lt;a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog"&gt;Known Exploited Vulnerabilities (KEV) Catalog&lt;/a&gt;, based on evidence of active exploitation.&lt;/p&gt;
</description>
    </item>
<item>
  <title>CISA Adds One Known Exploited Vulnerability to Catalog</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/04/23/cisa-adds-one-known-exploited-vulnerability-catalog</link>
  <description>&lt;p&gt;CISA has added one new vulnerability to its &lt;a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" data-entity-type="node" data-entity-uuid="79453b83-86b9-4e2f-b1ec-abf73c6eb291" data-entity-substitution="canonical" title="Known Exploited Vulnerabilities Catalog"&gt;Known Exploited Vulnerabilities (KEV) Catalog&lt;/a&gt;, based on evidence of active exploitation.&lt;/p&gt;
</description>
    </item>
<item>
  <title>CISA Adds One Known Exploited Vulnerability to Catalog</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/04/22/cisa-adds-one-known-exploited-vulnerability-catalog</link>
  <description>&lt;p&gt;CISA has added one new vulnerability to its &lt;a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" data-entity-type="node" data-entity-uuid="79453b83-86b9-4e2f-b1ec-abf73c6eb291" data-entity-substitution="canonical" title="Known Exploited Vulnerabilities Catalog"&gt;Known Exploited Vulnerabilities (KEV) Catalog&lt;/a&gt;, based on evidence of active exploitation.&lt;/p&gt;
</description>
    </item>
<item>
  <title>CISA Adds Eight Known Exploited Vulnerabilities to Catalog</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/04/20/cisa-adds-eight-known-exploited-vulnerabilities-catalog</link>
  <description>&lt;div class="OutlineElement Ltr SCXW178812853 BCX8"&gt;
</description>
    </item>
<item>
  <title>​​Supply Chain Compromise Impacts Axios Node Package Manager​ </title>
  <link>https://www.cisa.gov/news-events/alerts/2026/04/20/supply-chain-compromise-impacts-axios-node-package-manager</link>
  <description>&lt;div class="OutlineElement Ltr SCXW232133708 BCX8"&gt;
</description>
    </item>
<item>
  <title>CISA Adds One Known Exploited Vulnerability to Catalog</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/04/16/cisa-adds-one-known-exploited-vulnerability-catalog</link>
  <description>&lt;p&gt;CISA has added one new vulnerability to its &lt;a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" data-entity-type="node" data-entity-uuid="79453b83-86b9-4e2f-b1ec-abf73c6eb291" data-entity-substitution="canonical" title="Known Exploited Vulnerabilities Catalog"&gt;Known Exploited Vulnerabilities (KEV) Catalog&lt;/a&gt;, based on evidence of active exploitation.&lt;/p&gt;
</description>
    </item>
<item>
  <title>CISA Adds Two Known Exploited Vulnerabilities to Catalog</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/04/14/cisa-adds-two-known-exploited-vulnerabilities-catalog</link>
  <description>&lt;p&gt;CISA has added two new vulnerabilities to its &lt;a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" data-entity-type="node" data-entity-uuid="79453b83-86b9-4e2f-b1ec-abf73c6eb291" data-entity-substitution="canonical" title="Known Exploited Vulnerabilities Catalog"&gt;Known Exploited Vulnerabilities (KEV) Catalog&lt;/a&gt;, based on evidence of active exploitation.&lt;/p&gt;
</description>
    </item>
<item>
  <title>CISA Adds Seven Known Exploited Vulnerabilities to Catalog</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/04/13/cisa-adds-seven-known-exploited-vulnerabilities-catalog</link>
  <description>&lt;p&gt;CISA has added seven new vulnerabilities to its &lt;a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" data-entity-type="node" data-entity-uuid="79453b83-86b9-4e2f-b1ec-abf73c6eb291" data-entity-substitution="canonical" title="Known Exploited Vulnerabilities Catalog"&gt;Known Exploited Vulnerabilities (KEV) Catalog&lt;/a&gt;, based on evidence of active exploitation.&lt;/p&gt;
</description>
    </item>
<item>
  <title>CISA Adds One Known Exploited Vulnerability to Catalog</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/04/08/cisa-adds-one-known-exploited-vulnerability-catalog</link>
  <description>&lt;p&gt;CISA has added one new vulnerability to its &lt;a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" data-entity-type="node" data-entity-uuid="79453b83-86b9-4e2f-b1ec-abf73c6eb291" data-entity-substitution="canonical" title="Known Exploited Vulnerabilities Catalog"&gt;Known Exploited Vulnerabilities (KEV) Catalog&lt;/a&gt;, based on evidence of active exploitation.&lt;/p&gt;
</description>
    </item>
<item>
  <title>CISA Adds One Known Exploited Vulnerability to Catalog</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/04/06/cisa-adds-one-known-exploited-vulnerability-catalog</link>
  <description>&lt;p&gt;CISA has added one new vulnerability to its &lt;a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" data-entity-type="node" data-entity-uuid="79453b83-86b9-4e2f-b1ec-abf73c6eb291" data-entity-substitution="canonical" title="Known Exploited Vulnerabilities Catalog"&gt;Known Exploited Vulnerabilities (KEV) Catalog&lt;/a&gt;, based on evidence of active exploitation.&lt;/p&gt;
</description>
    </item>
<item>
  <title>CISA Adds One Known Exploited Vulnerability to Catalog</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/04/02/cisa-adds-one-known-exploited-vulnerability-catalog</link>
  <description>&lt;p&gt;CISA has added&amp;nbsp;one&amp;nbsp;new&amp;nbsp;vulnerability&amp;nbsp;to its&amp;nbsp;&lt;a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog"&gt;Known Exploited Vulnerabilities (KEV) Catalog&lt;/a&gt;, based on evidence of active exploitation.&amp;nbsp;&lt;/p&gt;
</description>
    </item>
<item>
  <title>CISA Adds One Known Exploited Vulnerability to Catalog</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/04/01/cisa-adds-one-known-exploited-vulnerability-catalog</link>
  <description>&lt;p&gt;CISA has added one new vulnerability to its&lt;a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" data-entity-type="node" data-entity-uuid="79453b83-86b9-4e2f-b1ec-abf73c6eb291" data-entity-substitution="canonical" title="Known Exploited Vulnerabilities Catalog"&gt; Known Exploited Vulnerabilities (KEV) Catalog&lt;/a&gt;, based on evidence of active exploitation.&lt;/p&gt;
</description>
    </item>
<item>
  <title>CISA Adds One Known Exploited Vulnerability to Catalog</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/03/30/cisa-adds-one-known-exploited-vulnerability-catalog</link>
  <description>&lt;p&gt;CISA has added one new vulnerability to its &lt;a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" data-entity-type="node" data-entity-uuid="79453b83-86b9-4e2f-b1ec-abf73c6eb291" data-entity-substitution="canonical" title="Known Exploited Vulnerabilities Catalog"&gt;Known Exploited Vulnerabilities (KEV) Catalog&lt;/a&gt;, based on evidence of active exploitation.&lt;/p&gt;
</description>
    </item>
<item>
  <title>CISA Adds One Known Exploited Vulnerability to Catalog</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/03/27/cisa-adds-one-known-exploited-vulnerability-catalog</link>
  <description>&lt;p&gt;CISA has added one new vulnerability to its &lt;a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" data-entity-type="node" data-entity-uuid="79453b83-86b9-4e2f-b1ec-abf73c6eb291" data-entity-substitution="canonical" title="Known Exploited Vulnerabilities Catalog"&gt;Known Exploited Vulnerabilities (KEV) Catalog&lt;/a&gt;, based on evidence of active exploitation.&lt;/p&gt;
</description>
    </item>
<item>
  <title>CISA Adds One Known Exploited Vulnerability to Catalog</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/03/26/cisa-adds-one-known-exploited-vulnerability-catalog</link>
  <description>&lt;p&gt;CISA has added one new vulnerability to its &lt;a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" data-entity-type="node" data-entity-uuid="79453b83-86b9-4e2f-b1ec-abf73c6eb291" data-entity-substitution="canonical" title="Known Exploited Vulnerabilities Catalog"&gt;Known Exploited Vulnerabilities (KEV) Catalog&lt;/a&gt;, based on evidence of active exploitation.&lt;/p&gt;
</description>
    </item>
<item>
  <title>CISA Adds One Known Exploited Vulnerability to Catalog</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/03/25/cisa-adds-one-known-exploited-vulnerability-catalog</link>
  <description>&lt;p&gt;CISA has added one new vulnerability to its &lt;a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" data-entity-type="node" data-entity-uuid="79453b83-86b9-4e2f-b1ec-abf73c6eb291" data-entity-substitution="canonical" title="Known Exploited Vulnerabilities Catalog"&gt;Known Exploited Vulnerabilities (KEV) Catalog&lt;/a&gt;, based on evidence of active exploitation.&lt;/p&gt;
</description>
    </item>
<item>
  <title>CISA Adds Five Known Exploited Vulnerabilities to Catalog</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/03/20/cisa-adds-five-known-exploited-vulnerabilities-catalog</link>
  <description>&lt;p&gt;CISA has added five new vulnerabilities to its &lt;a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" data-entity-type="node" data-entity-uuid="79453b83-86b9-4e2f-b1ec-abf73c6eb291" data-entity-substitution="canonical" title="Known Exploited Vulnerabilities Catalog"&gt;Known Exploited Vulnerabilities (KEV) Catalog&lt;/a&gt;, based on evidence of active exploitation.&lt;/p&gt;
</description>
    </item>
<item>
  <title>CISA Adds One Known Exploited Vulnerability to Catalog</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/03/19/cisa-adds-one-known-exploited-vulnerability-catalog</link>
  <description>&lt;p&gt;CISA has added one new vulnerability to its &lt;a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog"&gt;Known Exploited Vulnerabilities (KEV) Catalog&lt;/a&gt;, based on evidence of active exploitation.&amp;nbsp;&lt;/p&gt;
</description>
    </item>
<item>
  <title>CISA Adds One Known Exploited Vulnerability to Catalog</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/03/18/cisa-adds-one-known-exploited-vulnerability-catalog-0</link>
  <description>&lt;p&gt;CISA has added one new vulnerability to its &lt;a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" data-entity-type="node" data-entity-uuid="79453b83-86b9-4e2f-b1ec-abf73c6eb291" data-entity-substitution="canonical" title="Known Exploited Vulnerabilities Catalog"&gt;Known Exploited Vulnerabilities (KEV) Catalog&lt;/a&gt;, based on evidence of active exploitation.&lt;/p&gt;
</description>
    </item>
<item>
  <title>CISA Adds One Known Exploited Vulnerability to Catalog</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/03/18/cisa-adds-one-known-exploited-vulnerability-catalog</link>
  <description>&lt;p&gt;CISA has added one new vulnerability to its &lt;a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" data-entity-type="node" data-entity-uuid="79453b83-86b9-4e2f-b1ec-abf73c6eb291" data-entity-substitution="canonical" title="Known Exploited Vulnerabilities Catalog"&gt;Known Exploited Vulnerabilities (KEV) Catalog&lt;/a&gt;, based on evidence of active exploitation.&lt;/p&gt;
</description>
    </item>
<item>
  <title>CISA Urges Endpoint Management System Hardening After Cyberattack Against US Organization</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/03/18/cisa-urges-endpoint-management-system-hardening-after-cyberattack-against-us-organization</link>
  <description>&lt;p&gt;CISA is aware of malicious cyber activity targeting endpoint management systems of U.S. organizations based on the March 11, 2026 cyberattack against U.S.-based medical technology firm Stryker Corporation, which affected their Microsoft environment.&lt;a href="#note1"&gt;&lt;sup&gt;1&lt;/sup&gt;&lt;/a&gt; To defend against similar malicious cyber activity, CISA urges organizations to harden endpoint management system configurations using the recommendations and resources provided in this alert. CISA is conducting enhanced coordination with federal partners, including the Federal Bureau of Investigation (FBI), to identify additional threats and determine mitigation actions.&lt;/p&gt;
</description>
    </item>
<item>
  <title>CISA Adds One Known Exploited Vulnerability to Catalog</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/03/16/cisa-adds-one-known-exploited-vulnerability-catalog</link>
  <description>&lt;div class="OutlineElement Ltr SCXW244767289 BCX8"&gt;
</description>
    </item>
<item>
  <title>CISA Adds Two Known Exploited Vulnerabilities to Catalog</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/03/13/cisa-adds-two-known-exploited-vulnerabilities-catalog</link>
  <description>&lt;p&gt;CISA has added two new vulnerabilities to its &lt;a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" data-entity-type="node" data-entity-uuid="79453b83-86b9-4e2f-b1ec-abf73c6eb291" data-entity-substitution="canonical" title="Known Exploited Vulnerabilities Catalog"&gt;Known Exploited Vulnerabilities (KEV) Catalog&lt;/a&gt;, based on evidence of active exploitation.&lt;/p&gt;
</description>
    </item>
<item>
  <title>CISA Adds One Known Exploited Vulnerability to Catalog</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/03/11/cisa-adds-one-known-exploited-vulnerability-catalog</link>
  <description>&lt;p&gt;CISA has added one new vulnerability to its &lt;a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog"&gt;Known Exploited Vulnerabilities (KEV) Catalog&lt;/a&gt;, based on evidence of active exploitation.&lt;/p&gt;
</description>
    </item>
<item>
  <title>CISA Adds Three Known Exploited Vulnerabilities to Catalog</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/03/09/cisa-adds-three-known-exploited-vulnerabilities-catalog</link>
  <description>&lt;p&gt;CISA has added three new vulnerabilities to its &lt;a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" data-entity-type="node" data-entity-uuid="79453b83-86b9-4e2f-b1ec-abf73c6eb291" data-entity-substitution="canonical" title="Known Exploited Vulnerabilities Catalog"&gt;Known Exploited Vulnerabilities (KEV) Catalog&lt;/a&gt;, based on evidence of active exploitation.&lt;/p&gt;
</description>
    </item>
<item>
  <title>CISA Adds Five Known Exploited Vulnerabilities to Catalog</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/03/05/cisa-adds-five-known-exploited-vulnerabilities-catalog</link>
  <description>&lt;p&gt;CISA has added five new vulnerabilities to its &lt;a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" data-entity-type="node" data-entity-uuid="79453b83-86b9-4e2f-b1ec-abf73c6eb291" data-entity-substitution="canonical" title="Known Exploited Vulnerabilities Catalog"&gt;Known Exploited Vulnerabilities (KEV) Catalog&lt;/a&gt;, based on evidence of active exploitation.&lt;/p&gt;
</description>
    </item>
<item>
  <title>CISA Adds Two Known Exploited Vulnerabilities to Catalog</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/03/03/cisa-adds-two-known-exploited-vulnerabilities-catalog</link>
  <description>&lt;p&gt;CISA has added two new vulnerabilities to its &lt;a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" data-entity-type="node" data-entity-uuid="79453b83-86b9-4e2f-b1ec-abf73c6eb291" data-entity-substitution="canonical" title="Known Exploited Vulnerabilities Catalog"&gt;Known Exploited Vulnerabilities (KEV) Catalog&lt;/a&gt;, based on evidence of active exploitation.&lt;/p&gt;
</description>
    </item>
<item>
  <title>CISA and Partners Release Guidance for Ongoing Global Exploitation of Cisco SD-WAN Systems</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/02/25/cisa-and-partners-release-guidance-ongoing-global-exploitation-cisco-sd-wan-systems</link>
  <description>&lt;p&gt;&lt;em&gt;The purpose of this Alert is to provide resources for organizations with Cisco Software-Defined Wide-Area Networking (SD-WAN) systems, including Federal Civilian Executive Branch (FCEB) agencies, to address ongoing exploitation of multiple vulnerabilities. Notably, the Cybersecurity and Infrastructure Security Agency (CISA) has added&amp;nbsp;&lt;/em&gt;&lt;a href="https://www.cve.org/CVERecord?id=CVE-2026-20127" target="_blank"&gt;&lt;em&gt;CVE-2026-20127&lt;/em&gt;&lt;/a&gt;&lt;em&gt; and&amp;nbsp;&lt;/em&gt;&lt;a href="https://www.cve.org/CVERecord?id=CVE-2022-20775" target="_blank"&gt;&lt;em&gt;CVE-2022-20775&lt;/em&gt;&lt;/a&gt;&lt;em&gt; to its Known Exploited Vulnerabilities (KEV) Catalog on Feb. 25, 2026. As a result of the malicious cyber activity and vulnerabilities involving Cisco SD-WAN systems, CISA has outlined requirements for FCEB agencies in Emergency Directive (ED) 26-03 to inventory Cisco SD-WAN systems, update them, and assess compromise.&lt;/em&gt;&lt;/p&gt;
</description>
    </item>
<item>
  <title>CISA Adds Two Known Exploited Vulnerabilities to Catalog</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/02/25/cisa-adds-two-known-exploited-vulnerabilities-catalog</link>
  <description>&lt;p&gt;CISA has added&amp;nbsp;two&amp;nbsp;new&amp;nbsp;vulnerabilities&amp;nbsp;to its&amp;nbsp;&lt;a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog"&gt;Known Exploited Vulnerabilities (KEV) Catalog&lt;/a&gt;, based on evidence of active exploitation.&amp;nbsp;&lt;/p&gt;
</description>
    </item>
<item>
  <title>CISA Adds One Known Exploited Vulnerability to Catalog</title>
  <link>https://www.cisa.gov/news-events/alerts/2026/02/24/cisa-adds-one-known-exploited-vulnerability-catalog</link>
  <description>&lt;p&gt;CISA has added one new vulnerability to its &lt;a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" data-entity-type="node" data-entity-uuid="79453b83-86b9-4e2f-b1ec-abf73c6eb291" data-entity-substitution="canonical" title="Known Exploited Vulnerabilities Catalog"&gt;Known Exploited Vulnerabilities (KEV) Catalog&lt;/a&gt;, based on evidence of active exploitation.&lt;/p&gt;
</description>
    </item>
</channel>
</rss>
<rss version="2.0">
<channel>
    <title>Daily Dave</title>
    <link>https://seclists.org/#dailydave</link>
    <description>This technical discussion list covers vulnerability research, exploit development, and security events/gossip.  It was started by &lt;a href=&quot;http://www.immunitysec.com/&quot;&gt;ImmunitySec&lt;/a&gt; founder Dave Aitel and many security luminaries participate.  Many posts simply advertise Immunity products, but you can&#39;t really fault Dave for being self-promotional on a list named DailyDave.</description>
  <item>
    <title>OpenAI Codex Security</title>
    <link>https://seclists.org/dailydave/2026/q1/2</link>
    <description>&lt;p&gt;Posted by Dave Aitel via Dailydave on Mar 07&lt;/p&gt;&lt;a  rel=&quot;nofollow&quot; href=&quot;https://openai.com/index/codex-security-now-in-research-preview/&quot;&gt;https://openai.com/index/codex-security-now-in-research-preview/&lt;/a&gt;&lt;br&gt;
1. Say what...&lt;br&gt;</description>
  </item>
  <item>
    <title>RE//verse, DistrictCon, an Anole Friend</title>
    <link>https://seclists.org/dailydave/2026/q1/1</link>
    <description>&lt;p&gt;Posted by Dave Aitel via Dailydave on Feb 02&lt;/p&gt;Last month was DistrictCon, a great conference that I did not attend&lt;br&gt;
Today it is...&lt;br&gt;</description>
  </item>
  <item>
    <title>feeling the air</title>
    <link>https://seclists.org/dailydave/2026/q1/0</link>
    <description>&lt;p&gt;Posted by Dave Aitel via Dailydave on Jan 05&lt;/p&gt;For reasons I still don’t fully understand, Miami Beach has enormous&lt;br&gt;
them somewhere overhead, wings spread wide, fingers splayed, feeling the...&lt;br&gt;</description>
  </item>
  <item>
    <title>Re: Defense ?</title>
    <link>https://seclists.org/dailydave/2025/q4/6</link>
    <description>&lt;p&gt;Posted by Dean Pierce via Dailydave on Nov 16&lt;/p&gt;I like the idea of having a software supply chain that people can pay into&lt;br&gt;
with is a software ecosystem where anyone can build what they need...&lt;br&gt;</description>
  </item>
  <item>
    <title>Re: Defense ?</title>
    <link>https://seclists.org/dailydave/2025/q4/5</link>
    <description>&lt;p&gt;Posted by Chris Anley via Dailydave on Nov 16&lt;/p&gt;(gingerly raises head above parapet)&lt;br&gt;
of 1 per 15 minutes (calendar year 2024), means that patching an enterprise before an...&lt;br&gt;</description>
  </item>
  <item>
    <title>Re: Defense ?</title>
    <link>https://seclists.org/dailydave/2025/q4/4</link>
    <description>&lt;p&gt;Posted by Alfonso De Gregorio via Dailydave on Nov 16&lt;/p&gt;Imbalances in the skills and workforce are real. The gap remains hard&lt;br&gt;
regardless: those imbalances are a byproduct of the...&lt;br&gt;</description>
  </item>
  <item>
    <title>Re: Defense ?</title>
    <link>https://seclists.org/dailydave/2025/q4/3</link>
    <description>&lt;p&gt;Posted by Conan Dooley via Dailydave on Nov 16&lt;/p&gt;Reduce complexity, duplication, and scope in your infrastructure. Your&lt;br&gt;
say, just...&lt;br&gt;</description>
  </item>
  <item>
    <title>Re: Defense ?</title>
    <link>https://seclists.org/dailydave/2025/q4/2</link>
    <description>&lt;p&gt;Posted by etojake--- via Dailydave on Nov 16&lt;/p&gt;The content of this message was lost. It was probably cross-posted to&lt;br&gt;
multiple lists and previously handled on another list.&lt;br&gt;</description>
  </item>
  <item>
    <title>Defense ?</title>
    <link>https://seclists.org/dailydave/2025/q4/1</link>
    <description>&lt;p&gt;Posted by Dave Aitel via Dailydave on Nov 15&lt;/p&gt;How would one actually move the actual bar in defense? A big part of me&lt;br&gt;
Like...&lt;br&gt;</description>
  </item>
  <item>
    <title>Offensive AI Con</title>
    <link>https://seclists.org/dailydave/2025/q4/0</link>
    <description>&lt;p&gt;Posted by Dave Aitel via Dailydave on Oct 08&lt;/p&gt;So I just got back from &amp;quot;Offensive AI Conference&amp;quot; in San Diego and it was a&lt;br&gt;
FOMO, but also, when a conference is &amp;quot;invite only&amp;quot; then you...&lt;br&gt;</description>
  </item>
</channel>
</rss>
<rss version="2.0">
<channel>
    <title>BreachExchange</title>
    <link>https://seclists.org/#dataloss</link>
    <description>BreachExchange focuses on all things data breach. Topics include actual data breaches, cyber insurance, risk management, metrics and more. This archive includes its predecessor, the Data Loss news and discussion lists.</description>
</channel>
</rss>
<rss version="2.0">
<channel>
    <title>Educause Security Discussion</title>
    <link>https://seclists.org/#educause</link>
    <description>Securing networks and computers in an academic environment.</description>
</channel>
</rss>
<rss version="2.0">
<channel>
    <title>Full Disclosure</title>
    <link>https://seclists.org/#fulldisclosure</link>
    <description>A public, vendor-neutral forum for detailed discussion of vulnerabilities and exploitation techniques, as well as tools, papers, news, and events of interest to the community.  The relaxed atmosphere of this quirky list provides some comic relief and certain industry gossip.  More importantly, fresh vulnerabilities sometimes hit this list many hours or days before they pass through the Bugtraq moderation queue.</description>
  <item>
    <title>CyberDanube Security Research 20260408-1 | Multiple Vulnerabilities in Siemens SICAM A8000</title>
    <link>https://seclists.org/fulldisclosure/2026/Apr/7</link>
    <description>&lt;p&gt;Posted by Thomas Weber | CyberDanube via Fulldisclosure on Apr 14&lt;/p&gt;CyberDanube Security Research 20260408-1&lt;br&gt;
                found|...&lt;br&gt;</description>
  </item>
  <item>
    <title>CyberDanube Security Research 20260408-0 | Remote Operation Denial of Service in Siemens SICAM A8000</title>
    <link>https://seclists.org/fulldisclosure/2026/Apr/6</link>
    <description>&lt;p&gt;Posted by Thomas Weber | CyberDanube via Fulldisclosure on Apr 14&lt;/p&gt;CyberDanube Security Research 20260408-0&lt;br&gt;
             homepage| &lt;a  rel=&quot;nofollow&quot; href=&quot;https://siemens.com/&quot;&gt;https://siemens.com/&lt;/a&gt;...&lt;br&gt;</description>
  </item>
  <item>
    <title>SEC Consult SA-20260414-0 :: Improper Enforcement of Locked Accounts in WebUI (SSO) in Kiuwan SAST on-premise (KOP) &amp; cloud/SaaS</title>
    <link>https://seclists.org/fulldisclosure/2026/Apr/5</link>
    <description>&lt;p&gt;Posted by SEC Consult Vulnerability Lab via Fulldisclosure on Apr 14&lt;/p&gt;SEC Consult Vulnerability Lab Security Advisory &amp;lt; 20260414-0 &amp;gt;&lt;br&gt;
              impact: medium...&lt;br&gt;</description>
  </item>
  <item>
    <title>SEC Consult SA-20260401-0 :: Broken Access Control in Open	WebUI</title>
    <link>https://seclists.org/fulldisclosure/2026/Apr/4</link>
    <description>&lt;p&gt;Posted by SEC Consult Vulnerability Lab via Fulldisclosure on Apr 02&lt;/p&gt;SEC Consult Vulnerability Lab Security Advisory &amp;lt; 20260401-0 &amp;gt;&lt;br&gt;
               found: 2026-02-06...&lt;br&gt;</description>
  </item>
  <item>
    <title>SEC Consult SA-20260326-0 :: Local Privilege Escalation in Vienna Assistant (MacOS) - Vienna Symphonic Library</title>
    <link>https://seclists.org/fulldisclosure/2026/Apr/3</link>
    <description>&lt;p&gt;Posted by SEC Consult Vulnerability Lab via Fulldisclosure on Apr 02&lt;/p&gt;SEC Consult Vulnerability Lab Security Advisory &amp;lt; 20260326-0 &amp;gt;&lt;br&gt;
          ...&lt;br&gt;</description>
  </item>
  <item>
    <title> Apple OHTTP Relay: 14 Third-Party Endpoints, 6 Countries,	Zero User Visibility</title>
    <link>https://seclists.org/fulldisclosure/2026/Apr/2</link>
    <description>&lt;p&gt;Posted by Joseph Goydish II via Fulldisclosure on Apr 02&lt;/p&gt;SUMMARY&lt;br&gt;
This is shared infrastructure. All devices using Live...&lt;br&gt;</description>
  </item>
  <item>
    <title>[KIS-2026-06] MetInfo CMS &lt;= 8.1 (weixinreply.class.php) PHP Code Injection Vulnerability</title>
    <link>https://seclists.org/fulldisclosure/2026/Apr/1</link>
    <description>&lt;p&gt;Posted by Egidio Romano on Apr 02&lt;/p&gt;---------------------------------------------------------------------------&lt;br&gt;
The vulnerable code is located into the...&lt;br&gt;</description>
  </item>
  <item>
    <title>[CVE-2026-33691] OWASP CRS whitespace padding bypass	vulnerability</title>
    <link>https://seclists.org/fulldisclosure/2026/Apr/0</link>
    <description>&lt;p&gt;Posted by cyber security on Apr 02&lt;/p&gt;A vulnerability was identified in OWASP CRS where whitespace padding&lt;br&gt;
practical on Windows backends that normalize whitespace in filenames...&lt;br&gt;</description>
  </item>
  <item>
    <title>APPLE-SA-03-24-2026-10 Xcode 26.4</title>
    <link>https://seclists.org/fulldisclosure/2026/Mar/25</link>
    <description>&lt;p&gt;Posted by Apple Product Security via Fulldisclosure on Mar 28&lt;/p&gt;APPLE-SA-03-24-2026-10 Xcode 26.4&lt;br&gt;
Description: An...&lt;br&gt;</description>
  </item>
  <item>
    <title>APPLE-SA-03-24-2026-9 Safari 26.4</title>
    <link>https://seclists.org/fulldisclosure/2026/Mar/24</link>
    <description>&lt;p&gt;Posted by Apple Product Security via Fulldisclosure on Mar 28&lt;/p&gt;APPLE-SA-03-24-2026-9 Safari 26.4&lt;br&gt;
Security...&lt;br&gt;</description>
  </item>
  <item>
    <title>APPLE-SA-03-24-2026-8 visionOS 26.4</title>
    <link>https://seclists.org/fulldisclosure/2026/Mar/23</link>
    <description>&lt;p&gt;Posted by Apple Product Security via Fulldisclosure on Mar 28&lt;/p&gt;APPLE-SA-03-24-2026-8 visionOS 26.4&lt;br&gt;
intercept...&lt;br&gt;</description>
  </item>
  <item>
    <title>APPLE-SA-03-24-2026-7 watchOS 26.4</title>
    <link>https://seclists.org/fulldisclosure/2026/Mar/22</link>
    <description>&lt;p&gt;Posted by Apple Product Security via Fulldisclosure on Mar 28&lt;/p&gt;APPLE-SA-03-24-2026-7 watchOS 26.4&lt;br&gt;
intercept...&lt;br&gt;</description>
  </item>
  <item>
    <title>APPLE-SA-03-24-2026-6 tvOS 26.4</title>
    <link>https://seclists.org/fulldisclosure/2026/Mar/21</link>
    <description>&lt;p&gt;Posted by Apple Product Security via Fulldisclosure on Mar 28&lt;/p&gt;APPLE-SA-03-24-2026-6 tvOS 26.4&lt;br&gt;
intercept...&lt;br&gt;</description>
  </item>
  <item>
    <title>APPLE-SA-03-24-2026-5 macOS Sonoma 14.8.5</title>
    <link>https://seclists.org/fulldisclosure/2026/Mar/20</link>
    <description>&lt;p&gt;Posted by Apple Product Security via Fulldisclosure on Mar 28&lt;/p&gt;APPLE-SA-03-24-2026-5 macOS Sonoma 14.8.5&lt;br&gt;
intercept network...&lt;br&gt;</description>
  </item>
  <item>
    <title>APPLE-SA-03-24-2026-4 macOS Sequoia 15.7.5</title>
    <link>https://seclists.org/fulldisclosure/2026/Mar/19</link>
    <description>&lt;p&gt;Posted by Apple Product Security via Fulldisclosure on Mar 28&lt;/p&gt;APPLE-SA-03-24-2026-4 macOS Sequoia 15.7.5&lt;br&gt;
intercept...&lt;br&gt;</description>
  </item>
</channel>
</rss>
<rss version="2.0">
<channel>
    <title>Funsec</title>
    <link>https://seclists.org/#funsec</link>
    <description>While most security lists ban off-topic discussion, Funsec is a haven for free community discussion and enjoyment of the lighter, more humorous side of the security community</description>
</channel>
</rss>
<rss version="2.0">
<channel>
    <title>Info Security News</title>
    <link>https://seclists.org/#isn</link>
    <description>Carries news items (generally from mainstream sources) that relate to security.</description>
</channel>
</rss>
<rss version="2.0">
<channel>
    <title>Metasploit</title>
    <link>https://seclists.org/#metasploit</link>
    <description>Development discussion for &lt;a href=&quot;http://metasploit.com/&quot;&gt;Metasploit&lt;/a&gt;, the premier open source remote exploitation tool</description>
</channel>
</rss>
<rss version="2.0">
<channel>
    <title>Microsoft Sec Notification</title>
    <link>https://seclists.org/#microsoft</link>
    <description>Beware that MS often uses these security bulletins as marketing propaganda to downplay serious vulnerabilities in their products&amp;mdash;note how most have a prominent and often-misleading &quot;mitigating factors&quot; section.</description>
</channel>
</rss>
<rss version="2.0">
<channel>
    <title>Nmap Development</title>
    <link>https://seclists.org/#nmap-dev</link>
    <description>Unmoderated technical development forum for debating ideas, patches, and suggestions regarding proposed changes to &lt;a href=&quot;https://nmap.org&quot;&gt;Nmap&lt;/A&gt; and related projects. &lt;a href=&quot;https://nmap.org/mailman/listinfo/dev&quot;&gt;Subscribe to nmap-dev here&lt;/a&gt;.</description>
  <item>
    <title>[PATCH 0/5] ALPN-based HTTP/2 service detection improvements</title>
    <link>https://seclists.org/nmap-dev/2026/q2/3</link>
    <description>&lt;p&gt;Posted by Urval Kheni on Apr 14&lt;/p&gt;Hi,&lt;br&gt;
 1. Fix OpenSSL provider...&lt;br&gt;</description>
  </item>
  <item>
    <title>Bug Report: ssl-enum-ciphers fails (EOF) on CloudFront/ECDSA targets supporting TLS 1.2</title>
    <link>https://seclists.org/nmap-dev/2026/q2/2</link>
    <description>&lt;p&gt;Posted by Jack Seredyniecki via dev on Apr 14&lt;/p&gt;Hello nmap dev team,&lt;br&gt;
NSE: [ssl-enum-ciphers...&lt;br&gt;</description>
  </item>
  <item>
    <title>[PATCH] Support Linux capabilities for non-root raw packet scanning</title>
    <link>https://seclists.org/nmap-dev/2026/q2/1</link>
    <description>&lt;p&gt;Posted by Ali Norouzi via dev on Apr 14&lt;/p&gt;Hi everyone,&lt;br&gt;
Ali&lt;br&gt;</description>
  </item>
  <item>
    <title>Fix for issue #3326</title>
    <link>https://seclists.org/nmap-dev/2026/q2/0</link>
    <description>&lt;p&gt;Posted by advait deshmukh on Apr 14&lt;/p&gt;Issue link &amp;lt;&lt;a  rel=&quot;nofollow&quot; href=&quot;https://github.com/nmap/nmap/issues/3326&quot;&gt;https://github.com/nmap/nmap/issues/3326&lt;/a&gt;&amp;gt;&lt;br&gt;
Since the user has explicitly specified -6 in the command, it...&lt;br&gt;</description>
  </item>
  <item>
    <title>Interview Invitation for Educational Research</title>
    <link>https://seclists.org/nmap-dev/2026/q1/5</link>
    <description>&lt;p&gt;Posted by Muhammad Hassan Tanveer via dev on Mar 31&lt;/p&gt;Hello Everyone!&lt;br&gt;
invite you to participate in a ~45-minute online...&lt;br&gt;</description>
  </item>
  <item>
    <title>Re: GSoC 2026: Password Security Wizard - Optimizing the NSE Brute Library</title>
    <link>https://seclists.org/nmap-dev/2026/q1/4</link>
    <description>&lt;p&gt;Posted by Adithya Shetty on Mar 13&lt;/p&gt;Ah, my mistake.&lt;br&gt;
Thanks for letting me know Gordon&lt;br&gt;</description>
  </item>
  <item>
    <title>[no subject]</title>
    <link>https://seclists.org/nmap-dev/2026/q1/3</link>
    <description>&lt;p&gt;Posted by Juan jose Rodriguez on Mar 08&lt;/p&gt;Contraseña&lt;br&gt;</description>
  </item>
  <item>
    <title>GSoC 2026: Password Security Wizard - Optimizing the NSE Brute Library</title>
    <link>https://seclists.org/nmap-dev/2026/q1/2</link>
    <description>&lt;p&gt;Posted by Adithya Shetty on Mar 02&lt;/p&gt;Hi Nmap Development Team and Fotis,&lt;br&gt;
several of the -brute.nse scripts (specifically focusing on...&lt;br&gt;</description>
  </item>
  <item>
    <title>Question about Nmap and GSoC 2026</title>
    <link>https://seclists.org/nmap-dev/2026/q1/1</link>
    <description>&lt;p&gt;Posted by Sweekar on Jan 29&lt;/p&gt;Hi Nmap developers,&lt;br&gt;
Sweekar&lt;br&gt;</description>
  </item>
  <item>
    <title>PR #3277: Clean up and harden POP3 helper login functions</title>
    <link>https://seclists.org/nmap-dev/2026/q1/0</link>
    <description>&lt;p&gt;Posted by Sweekar on Jan 23&lt;/p&gt;Hello Nmap Developers,&lt;br&gt;
   Normalized...&lt;br&gt;</description>
  </item>
</channel>
</rss>
<rss version="2.0">
<channel>
    <title>Nmap Announce</title>
    <link>https://seclists.org/#nmap-announce</link>
    <description>Moderated list for the most important new releases and announcements regarding the &lt;a href=&quot;https://nmap.org&quot;&gt;Nmap Security Scanner&lt;/a&gt; and related projects. We recommend that all Nmap users &lt;a href=&quot;https://nmap.org/mailman/listinfo/announce&quot;&gt;subscribe to stay informed&lt;/a&gt;.</description>
  <item>
    <title>Npcap Version 1.82 Released with VLAN Tagging and More</title>
    <link>https://seclists.org/nmap-announce/2025/0</link>
    <description>&lt;p&gt;Posted by Gordon Fyodor Lyon on Apr 28&lt;/p&gt;Dear Nmap Community,&lt;br&gt;
useful for Wireshark users.  You can also now send...&lt;br&gt;</description>
  </item>
  <item>
    <title>Nmap 7.95 released: OS and service detection signatures galore!</title>
    <link>https://seclists.org/nmap-announce/2024/0</link>
    <description>&lt;p&gt;Posted by Gordon Fyodor Lyon on May 05&lt;/p&gt;Dear Nmap Community,&lt;br&gt;
Additions include iOS 15...&lt;br&gt;</description>
  </item>
</channel>
</rss>
<rss version="2.0">
<channel>
    <title>OpenVAS</title>
    <link>http://seclists.org/#openvas</link>
    <description>Development and announcements regarding &lt;a href=&quot;http://www.openvas.com/&quot;&gt;OpenVAS&lt;/a&gt;, a free network security scanner which forked from Nessus. This is a combination of the English openvas-announce, openvas-devel, openvas-discuss, and openvas-plugins lists.</description>
  <item>
    <title>Re: Help with openvas setup</title>
    <link>http://seclists.org/openvas/2013/q3/107</link>
    <description>&lt;p&gt;Posted by Florent THOMAS on Aug 23&lt;/p&gt;+1 I agree, it&amp;apos;s precious.&lt;br&gt;
Regards&lt;br&gt;</description>
  </item>
  <item>
    <title>Re: Help with openvas setup</title>
    <link>http://seclists.org/openvas/2013/q3/106</link>
    <description>&lt;p&gt;Posted by Hariharan Madhavan on Aug 23&lt;/p&gt;The best way to get openvas running is by adding the atomic corp repository and installing using yum... There is no &lt;br&gt;
Am running Backtrack R3 which...&lt;br&gt;</description>
  </item>
  <item>
    <title>SCAP plugins and OpenVAS</title>
    <link>http://seclists.org/openvas/2013/q3/105</link>
    <description>&lt;p&gt;Posted by Rajesh Bhavsar on Aug 23&lt;/p&gt;Hi all,&lt;br&gt;
 &lt;br&gt;</description>
  </item>
  <item>
    <title>Re: Help with openvas setup</title>
    <link>http://seclists.org/openvas/2013/q3/104</link>
    <description>&lt;p&gt;Posted by Florent THOMAS on Aug 22&lt;/p&gt;Hy,&lt;br&gt;
Regards&lt;br&gt;</description>
  </item>
  <item>
    <title>Re: Help with openvas setup</title>
    <link>http://seclists.org/openvas/2013/q3/103</link>
    <description>&lt;p&gt;Posted by Samuel Mwai on Aug 22&lt;/p&gt;Am running Backtrack R3 which installed fine. Stumbled on this blog, check&lt;br&gt;
K () sper&lt;br&gt;</description>
  </item>
  <item>
    <title>Help with openvas setup</title>
    <link>http://seclists.org/openvas/2013/q3/102</link>
    <description>&lt;p&gt;Posted by Russell, Sean on Aug 22&lt;/p&gt;Hello all.&lt;br&gt;
I run openvasmd --rebuild, then run openvas-check-setup again, but I...&lt;br&gt;</description>
  </item>
  <item>
    <title>Easy startup script for self-compiled OpenVAS</title>
    <link>http://seclists.org/openvas/2013/q3/101</link>
    <description>&lt;p&gt;Posted by Winfried Neessen on Aug 21&lt;/p&gt;Hi,&lt;br&gt;
each service. Also you can kill one service of OpenVAS, run the startup...&lt;br&gt;</description>
  </item>
  <item>
    <title>OpenVAS Feed Server: Load and Cron</title>
    <link>http://seclists.org/openvas/2013/q3/100</link>
    <description>&lt;p&gt;Posted by Jan-Oliver Wagner on Aug 21&lt;/p&gt;Hello OpenVAS users,&lt;br&gt;
If your...&lt;br&gt;</description>
  </item>
  <item>
    <title>&quot;Issue&quot; for create schedule</title>
    <link>http://seclists.org/openvas/2013/q3/99</link>
    <description>&lt;p&gt;Posted by Florent THOMAS on Aug 20&lt;/p&gt;Hy,&lt;br&gt;
regards&lt;br&gt;</description>
  </item>
  <item>
    <title>Re: Create credential failed</title>
    <link>http://seclists.org/openvas/2013/q3/98</link>
    <description>&lt;p&gt;Posted by Florent THOMAS on Aug 20&lt;/p&gt;I think I found the problem.&lt;br&gt;
regards&lt;br&gt;</description>
  </item>
  <item>
    <title>Get_schedules not show task information</title>
    <link>http://seclists.org/openvas/2013/q3/97</link>
    <description>&lt;p&gt;Posted by Rodrigo Seguel on Aug 19&lt;/p&gt;after execute get_schedules command with option details=&amp;quot;1&amp;quot;, the output xml&lt;br&gt;
&amp;lt;get_schedules_response status=&amp;quot;200&amp;quot; status_text=&amp;quot;OK&amp;quot;&amp;gt;&amp;lt;schedule...&lt;br&gt;</description>
  </item>
  <item>
    <title>Re: cannot connect to the manager</title>
    <link>http://seclists.org/openvas/2013/q3/96</link>
    <description>&lt;p&gt;Posted by brad on Aug 19&lt;/p&gt;I even brought the ports up one at a time like so,&lt;br&gt;
There is only one error I can find, but little on...&lt;br&gt;</description>
  </item>
  <item>
    <title>Re: cannot connect to the manager</title>
    <link>http://seclists.org/openvas/2013/q3/95</link>
    <description>&lt;p&gt;Posted by brad on Aug 19&lt;/p&gt;Here is the output of my openvasmd --rebuild -v  &lt;br&gt;
From: Openvas-discuss...&lt;br&gt;</description>
  </item>
  <item>
    <title>Re: Create credential failed</title>
    <link>http://seclists.org/openvas/2013/q3/94</link>
    <description>&lt;p&gt;Posted by Florent THOMAS on Aug 18&lt;/p&gt;Thanks for your answer. I&amp;apos;m not sure of the use of this. My french level &lt;br&gt;
Thanks for your help&lt;br&gt;</description>
  </item>
  <item>
    <title>Re: Create credential failed</title>
    <link>http://seclists.org/openvas/2013/q3/93</link>
    <description>&lt;p&gt;Posted by Michael Meyer on Aug 18&lt;/p&gt;*** Florent THOMAS wrote:&lt;br&gt;
Micha&lt;br&gt;</description>
  </item>
</channel>
</rss>
<rss version="2.0">
<channel>
    <title>Open Source Security</title>
    <link>https://seclists.org/#oss-sec</link>
    <description>Discussion of security flaws, concepts, and practices in the Open Source community</description>
  <item>
    <title>rust-openssl-v0.10.78 fixes 5 CVEs</title>
    <link>https://seclists.org/oss-sec/2026/q2/214</link>
    <description>&lt;p&gt;Posted by Alan Coopersmith on Apr 24&lt;/p&gt;&lt;a  rel=&quot;nofollow&quot; href=&quot;https://github.com/rust-openssl/rust-openssl/releases/tag/openssl-v0.10.78&quot;&gt;https://github.com/rust-openssl/rust-openssl/releases/tag/openssl-v0.10.78&lt;/a&gt;&lt;br&gt;
&lt;a  rel=&quot;nofollow&quot; href=&quot;https://github.com/rust-openssl/rust-openssl/security/advisories/GHSA-8c75-8mhr-p7r9&quot;&gt;https://github.com/rust-openssl/rust-openssl/security/advisories/GHSA-8c75-8mhr-p7r9&lt;/a&gt; cautions:...&lt;br&gt;</description>
  </item>
  <item>
    <title>CVE-2026-40690: Apache Airflow: Assets graph view bypasses DAG level access control displaying unrelated topologies and all DAGs names to unauthorized users</title>
    <link>https://seclists.org/oss-sec/2026/q2/213</link>
    <description>&lt;p&gt;Posted by Rahul Vats on Apr 24&lt;/p&gt;Severity: low &lt;br&gt;
Users are recommended to upgrade to version 3.2.1, which...&lt;br&gt;</description>
  </item>
  <item>
    <title>CVE-2026-38743: Apache Airflow: Dags endpoint might provide access to otherwise inaccessible entities</title>
    <link>https://seclists.org/oss-sec/2026/q2/212</link>
    <description>&lt;p&gt;Posted by Rahul Vats on Apr 24&lt;/p&gt;Severity: low &lt;br&gt;
HITL...&lt;br&gt;</description>
  </item>
  <item>
    <title>CVE-2025-62233: Apache DolphinScheduler: Deserialization of untrusted data in RPC</title>
    <link>https://seclists.org/oss-sec/2026/q2/211</link>
    <description>&lt;p&gt;Posted by Wenjun Ruan on Apr 23&lt;/p&gt;Severity: Moderate &lt;br&gt;
Attackers who can access the Master or Worker nodes can compromise the system by creating a StandardRpcRequest,...&lt;br&gt;</description>
  </item>
  <item>
    <title>CVE-2026-23902: Apache DolphinScheduler: Users are able to use tenants that are not defined on the platform during workflow execution.</title>
    <link>https://seclists.org/oss-sec/2026/q2/210</link>
    <description>&lt;p&gt;Posted by Wenjun Ruan on Apr 23&lt;/p&gt;Severity: moderate &lt;br&gt;
Users are recommended to...&lt;br&gt;</description>
  </item>
  <item>
    <title>CVE-2026-41044: Apache ActiveMQ, Apache ActiveMQ Broker, Apache ActiveMQ All: Authenticated user can perform RCE via DestinationView MBean exposed by Jolokia</title>
    <link>https://seclists.org/oss-sec/2026/q2/209</link>
    <description>&lt;p&gt;Posted by Christopher L. Shannon on Apr 23&lt;/p&gt;Severity: important &lt;br&gt;
- Apache ActiveMQ All...&lt;br&gt;</description>
  </item>
  <item>
    <title>CVE-2026-41043: Apache ActiveMQ, Apache ActiveMQ Web: ActiveMQ Web Console -  XSS vulnerability when browsing queues</title>
    <link>https://seclists.org/oss-sec/2026/q2/208</link>
    <description>&lt;p&gt;Posted by Christopher L. Shannon on Apr 23&lt;/p&gt;Severity: important &lt;br&gt;
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in Apache...&lt;br&gt;</description>
  </item>
  <item>
    <title>CVE-2026-40466: Apache ActiveMQ Broker, Apache ActiveMQ All, Apache ActiveMQ: Possible bypass of CVE-2026-34197 via HTTP discovery second-stage URI</title>
    <link>https://seclists.org/oss-sec/2026/q2/207</link>
    <description>&lt;p&gt;Posted by Christopher L. Shannon on Apr 23&lt;/p&gt;Severity: important &lt;br&gt;
- Apache ActiveMQ...&lt;br&gt;</description>
  </item>
  <item>
    <title>PowerDNS Authoritative Server 4.9.14 and 5.0.4 released</title>
    <link>https://seclists.org/oss-sec/2026/q2/206</link>
    <description>&lt;p&gt;Posted by Miod Vallat on Apr 23&lt;/p&gt;Today, we are releasing two new versions of the PowerDNS Authoritative&lt;br&gt;
   * CVE-2026-33257 An attacker can send a web request that...&lt;br&gt;</description>
  </item>
  <item>
    <title>CVE-2026-41564: CryptX versions before 0.088 for Perl do not reseed the Crypt::PK PRNG state after forking</title>
    <link>https://seclists.org/oss-sec/2026/q2/205</link>
    <description>&lt;p&gt;Posted by Stig Palmquist on Apr 23&lt;/p&gt;========================================================================&lt;br&gt;
CryptX versions before 0.088 for Perl do not...&lt;br&gt;</description>
  </item>
  <item>
    <title>PowerDNS Security Advisory 2026-03 for PowerDNS Recursor: Multiple issues</title>
    <link>https://seclists.org/oss-sec/2026/q2/204</link>
    <description>&lt;p&gt;Posted by Otto Moerbeek on Apr 23&lt;/p&gt;   We have released PowerDNS Recursor 5.2.9, 5.3.6 and 5.4.1.&lt;br&gt;
     *...&lt;br&gt;</description>
  </item>
  <item>
    <title>[vim-security] OS Command Injection in netrw affects Vim &lt; 9.2.0383</title>
    <link>https://seclists.org/oss-sec/2026/q2/203</link>
    <description>&lt;p&gt;Posted by Christian Brabandt on Apr 22&lt;/p&gt;OS Command Injection in netrw affects Vim &amp;lt; 9.2.0383&lt;br&gt;
plugin bundled with Vim. By inducing a user to open a crafted URL (e.g.,...&lt;br&gt;</description>
  </item>
  <item>
    <title>Re: CVE-2017-20230: Storable versions before 3.05 for Perl has a stack overflow</title>
    <link>https://seclists.org/oss-sec/2026/q2/202</link>
    <description>&lt;p&gt;Posted by Steffen Nurpmeso on Apr 22&lt;/p&gt;Sam James wrote in&lt;br&gt;
 |&amp;gt;&amp;gt;       VCS Repo:  &lt;a  rel=&quot;nofollow&quot; href=&quot;https://github.com/Perl/perl5/&quot;&gt;https://github.com/Perl/perl5/&lt;/a&gt;...&lt;br&gt;</description>
  </item>
  <item>
    <title>CVE-2026-41651: TOCTOU vulnerability in PackageKit &lt;= 1.3.4 leads to local root exploit</title>
    <link>https://seclists.org/oss-sec/2026/q2/201</link>
    <description>&lt;p&gt;Posted by Matthias Klumpp on Apr 22&lt;/p&gt;Hello everyone!&lt;br&gt;
to a local root exploit on most systems....&lt;br&gt;</description>
  </item>
  <item>
    <title>[SECURITY] CVE-2026-40542: Apache HttpClient 5.6 SCRAM-SHA-256 mutual authentication bypass</title>
    <link>https://seclists.org/oss-sec/2026/q2/200</link>
    <description>&lt;p&gt;Posted by Arturo Bernal on Apr 22&lt;/p&gt;Severity: important&lt;br&gt;
References:...&lt;br&gt;</description>
  </item>
</channel>
</rss>
<rss version="2.0">
<channel>
    <title>PaulDotCom</title>
    <link>https://seclists.org/#pauldotcom</link>
    <description>General discussion of security news, research, vulnerabilities, and the PaulDotCom Security Weekly podcast.</description>
</channel>
</rss>
<rss version="2.0">
<channel>
    <title>Penetration Testing</title>
    <link>https://seclists.org/#pen-test</link>
    <description>While this list is intended for &quot;professionals&quot;, participants frequenly disclose techniques and strategies that would be useful to anyone with a practical interest in security and network auditing.</description>
</channel>
</rss>
<rss version="2.0">
<channel>
        <title>Exploit-DB.com RSS Feed</title>
        <link>https://www.exploit-db.com</link>
        <description>The Exploit Database - Exploits, Shellcode, 0days, Remote Exploits, Local Exploits, Web Apps, Vulnerability Reports, Security Articles, Tutorials and more.</description>
         <item>
            <title>[local] Throttlestop Kernel Driver - Kernel Out-of-Bounds Write Privilege Escalation</title>
            <link>https://www.exploit-db.com/exploits/52512</link>
            <description>Throttlestop Kernel Driver - Kernel Out-of-Bounds Write Privilege Escalation</description>
        </item>
         <item>
            <title>[webapps] WordPress Plugin  5.2.0 - Broken Access Control</title>
            <link>https://www.exploit-db.com/exploits/52511</link>
            <description>WordPress Plugin  5.2.0 - Broken Access Control</description>
        </item>
         <item>
            <title>[local] AVAST Antivirus 25.11 - Unquoted Service Path</title>
            <link>https://www.exploit-db.com/exploits/52510</link>
            <description>AVAST Antivirus 25.11 - Unquoted Service Path</description>
        </item>
         <item>
            <title>[local] NetBT e-Fatura - Privilege Escalation</title>
            <link>https://www.exploit-db.com/exploits/52509</link>
            <description>NetBT e-Fatura - Privilege Escalation</description>
        </item>
         <item>
            <title>[webapps] D-Link DIR-650IN - Authenticated Command Injection</title>
            <link>https://www.exploit-db.com/exploits/52508</link>
            <description>D-Link DIR-650IN - Authenticated Command Injection</description>
        </item>
         <item>
            <title>[webapps] React Server 19.2.0 - Remote Code Execution</title>
            <link>https://www.exploit-db.com/exploits/52506</link>
            <description>React Server 19.2.0 - Remote Code Execution</description>
        </item>
         <item>
            <title>[webapps] RomM  4.4.0 -  XSS_CSRF Chain</title>
            <link>https://www.exploit-db.com/exploits/52505</link>
            <description>RomM  4.4.0 -  XSS_CSRF Chain</description>
        </item>
         <item>
            <title>[webapps] Jumbo Website Manager  - Remote Code Execution</title>
            <link>https://www.exploit-db.com/exploits/52504</link>
            <description>Jumbo Website Manager  - Remote Code Execution</description>
        </item>
         <item>
            <title>[local] ZSH 5.9 - RCE</title>
            <link>https://www.exploit-db.com/exploits/52503</link>
            <description>ZSH 5.9 - RCE</description>
        </item>
         <item>
            <title>[webapps] FortiWeb  8.0.2 - Remote Code Execution</title>
            <link>https://www.exploit-db.com/exploits/52502</link>
            <description>FortiWeb  8.0.2 - Remote Code Execution</description>
        </item>
         <item>
            <title>[local] 7-Zip 24.00 - Directory Traversal</title>
            <link>https://www.exploit-db.com/exploits/52501</link>
            <description>7-Zip 24.00 - Directory Traversal</description>
        </item>
         <item>
            <title>[webapps] xibocms 3.3.4 - RCE</title>
            <link>https://www.exploit-db.com/exploits/52500</link>
            <description>xibocms 3.3.4 - RCE</description>
        </item>
         <item>
            <title>[local] SQLite 3.50.1 - Heap Overflow</title>
            <link>https://www.exploit-db.com/exploits/52499</link>
            <description>SQLite 3.50.1 - Heap Overflow</description>
        </item>
         <item>
            <title>[local] Microsoft MMC MSC EvilTwin - Local Admin Creation</title>
            <link>https://www.exploit-db.com/exploits/52498</link>
            <description>Microsoft MMC MSC EvilTwin - Local Admin Creation</description>
        </item>
         <item>
            <title>[webapps] Horilla v1.3 - RCE</title>
            <link>https://www.exploit-db.com/exploits/52497</link>
            <description>Horilla v1.3 - RCE</description>
        </item>
         <item>
            <title>[local] is-localhost-ip 2.0.0 - SSRF</title>
            <link>https://www.exploit-db.com/exploits/52496</link>
            <description>is-localhost-ip 2.0.0 - SSRF</description>
        </item>
         <item>
            <title>[webapps] Fortinet FortiWeb v8.0.1 - Auth Bypass</title>
            <link>https://www.exploit-db.com/exploits/52495</link>
            <description>Fortinet FortiWeb v8.0.1 - Auth Bypass</description>
        </item>
         <item>
            <title>[local] Windows Kernel - Elevation of Privilege</title>
            <link>https://www.exploit-db.com/exploits/52494</link>
            <description>Windows Kernel - Elevation of Privilege</description>
        </item>
         <item>
            <title>[local] Desktop Window Manager Core Library 10.0.10240.0 - Privilege Escalation</title>
            <link>https://www.exploit-db.com/exploits/52493</link>
            <description>Desktop Window Manager Core Library 10.0.10240.0 - Privilege Escalation</description>
        </item>
         <item>
            <title>[webapps] ASP.net  8.0.10 - Bypass</title>
            <link>https://www.exploit-db.com/exploits/52492</link>
            <description>ASP.net  8.0.10 - Bypass</description>
        </item>
         <item>
            <title>[webapps] Grafana 11.6.0 - SSRF</title>
            <link>https://www.exploit-db.com/exploits/52491</link>
            <description>Grafana 11.6.0 - SSRF</description>
        </item>
         <item>
            <title>[webapps] Zhiyuan OA - arbitrary file upload leading</title>
            <link>https://www.exploit-db.com/exploits/52490</link>
            <description>Zhiyuan OA - arbitrary file upload leading</description>
        </item>
         <item>
            <title>[webapps] WBCE CMS 1.6.4 - Remote Code Execution</title>
            <link>https://www.exploit-db.com/exploits/52489</link>
            <description>WBCE CMS 1.6.4 - Remote Code Execution</description>
        </item>
         <item>
            <title>[webapps] RiteCMS 3.1.0 - Authenticated Remote Code Execution</title>
            <link>https://www.exploit-db.com/exploits/52488</link>
            <description>RiteCMS 3.1.0 - Authenticated Remote Code Execution</description>
        </item>
         <item>
            <title>[webapps] WordPress  Madara - Local File Inclusion</title>
            <link>https://www.exploit-db.com/exploits/52487</link>
            <description>WordPress  Madara - Local File Inclusion</description>
        </item>
         <item>
            <title>[webapps] WordPress Backup Migration 1.3.7 - Remote Command Execution</title>
            <link>https://www.exploit-db.com/exploits/52486</link>
            <description>WordPress Backup Migration 1.3.7 - Remote Command Execution</description>
        </item>
         <item>
            <title>[webapps] mailcow 2025-01a - Host Header Password Reset Poisoning</title>
            <link>https://www.exploit-db.com/exploits/52485</link>
            <description>mailcow 2025-01a - Host Header Password Reset Poisoning</description>
        </item>
         <item>
            <title>[webapps] Easy File Sharing Web Server v7.2 - Buffer Overflow</title>
            <link>https://www.exploit-db.com/exploits/52484</link>
            <description>Easy File Sharing Web Server v7.2 - Buffer Overflow</description>
        </item>
         <item>
            <title>[webapps] WeGIA 3.5.0 - SQL Injection</title>
            <link>https://www.exploit-db.com/exploits/52483</link>
            <description>WeGIA 3.5.0 - SQL Injection</description>
        </item>
         <item>
            <title>[webapps] Boss Mini v1.4.0 - Local File Inclusion (LFI)</title>
            <link>https://www.exploit-db.com/exploits/52482</link>
            <description>Boss Mini v1.4.0 - Local File Inclusion (LFI)</description>
        </item>
         <item>
            <title>[webapps] motionEye 0.43.1b4 - RCE</title>
            <link>https://www.exploit-db.com/exploits/52481</link>
            <description>motionEye 0.43.1b4 - RCE</description>
        </item>
         <item>
            <title>[remote] Windows 10.0.17763.7009 - spoofing vulnerability</title>
            <link>https://www.exploit-db.com/exploits/52480</link>
            <description>Windows 10.0.17763.7009 - spoofing vulnerability</description>
        </item>
         <item>
            <title>[local] glibc 2.38 - Buffer Overflow</title>
            <link>https://www.exploit-db.com/exploits/52479</link>
            <description>glibc 2.38 - Buffer Overflow</description>
        </item>
         <item>
            <title>[remote] windows 10/11 - NTLM Hash Disclosure Spoofing</title>
            <link>https://www.exploit-db.com/exploits/52478</link>
            <description>windows 10/11 - NTLM Hash Disclosure Spoofing</description>
        </item>
         <item>
            <title>[remote] Redis 8.0.2 - RCE</title>
            <link>https://www.exploit-db.com/exploits/52477</link>
            <description>Redis 8.0.2 - RCE</description>
        </item>
         <item>
            <title>[webapps] OctoPrint 1.11.2 - File Upload</title>
            <link>https://www.exploit-db.com/exploits/52476</link>
            <description>OctoPrint 1.11.2 - File Upload</description>
        </item>
         <item>
            <title>[remote] Ingress-NGINX Admission Controller v1.11.1 - FD Injection to RCE</title>
            <link>https://www.exploit-db.com/exploits/52475</link>
            <description>Ingress-NGINX Admission Controller v1.11.1 - FD Injection to RCE</description>
        </item>
         <item>
            <title>[webapps] aiohttp 3.9.1 - directory traversal PoC</title>
            <link>https://www.exploit-db.com/exploits/52474</link>
            <description>aiohttp 3.9.1 - directory traversal PoC</description>
        </item>
         <item>
            <title>[webapps] FortiWeb Fabric Connector 7.6.x - SQL Injection to Remote Code Execution</title>
            <link>https://www.exploit-db.com/exploits/52473</link>
            <description>FortiWeb Fabric Connector 7.6.x - SQL Injection to Remote Code Execution</description>
        </item>
         <item>
            <title>[local] Docker Desktop 4.44.3 - Unauthenticated  API Exposure</title>
            <link>https://www.exploit-db.com/exploits/52472</link>
            <description>Docker Desktop 4.44.3 - Unauthenticated  API Exposure</description>
        </item>
         <item>
            <title>[webapps] Piranha CMS 12.0 - Stored XSS in Text Block</title>
            <link>https://www.exploit-db.com/exploits/52471</link>
            <description>Piranha CMS 12.0 - Stored XSS in Text Block</description>
        </item>
         <item>
            <title>[webapps] RPi-Jukebox-RFID 2.8.0 - Stored Cross-Site Scripting (XSS)</title>
            <link>https://www.exploit-db.com/exploits/52470</link>
            <description>RPi-Jukebox-RFID 2.8.0 - Stored Cross-Site Scripting (XSS)</description>
        </item>
         <item>
            <title>[hardware] D-Link DIR-825 Rev.B 2.10 - Stack Buffer Overflow (DoS)</title>
            <link>https://www.exploit-db.com/exploits/52469</link>
            <description>D-Link DIR-825 Rev.B 2.10 - Stack Buffer Overflow (DoS)</description>
        </item>
         <item>
            <title>[webapps] RPi-Jukebox-RFID 2.8.0 - Remote Command Execution</title>
            <link>https://www.exploit-db.com/exploits/52468</link>
            <description>RPi-Jukebox-RFID 2.8.0 - Remote Command Execution</description>
        </item>
         <item>
            <title>[webapps] Siklu EtherHaul Series EH-8010 - Arbitrary File Upload</title>
            <link>https://www.exploit-db.com/exploits/52467</link>
            <description>Siklu EtherHaul Series EH-8010 - Arbitrary File Upload</description>
        </item>
         <item>
            <title>[webapps] Siklu EtherHaul Series EH-8010 - Remote Command Execution</title>
            <link>https://www.exploit-db.com/exploits/52466</link>
            <description>Siklu EtherHaul Series EH-8010 - Remote Command Execution</description>
        </item>
         <item>
            <title>[webapps] WordPress Quiz Maker 6.7.0.56 - SQL Injection</title>
            <link>https://www.exploit-db.com/exploits/52465</link>
            <description>WordPress Quiz Maker 6.7.0.56 - SQL Injection</description>
        </item>
         <item>
            <title>[webapps] Chained Quiz  1.3.5 - Unauthenticated Insecure Direct Object Reference via Cookie</title>
            <link>https://www.exploit-db.com/exploits/52464</link>
            <description>Chained Quiz  1.3.5 - Unauthenticated Insecure Direct Object Reference via Cookie</description>
        </item>
         <item>
            <title>[webapps] FreeBSD rtsold 15.x - Remote Code Execution via DNSSL</title>
            <link>https://www.exploit-db.com/exploits/52463</link>
            <description>FreeBSD rtsold 15.x - Remote Code Execution via DNSSL</description>
        </item>
         <item>
            <title>[webapps] Summar Employee Portal  3.98.0 - Authenticated SQL Injection</title>
            <link>https://www.exploit-db.com/exploits/52462</link>
            <description>Summar Employee Portal  3.98.0 - Authenticated SQL Injection</description>
        </item>
</channel>
</rss>
<rss version="2.0">
<channel>
    <title>Secure Coding</title>
    <link>https://seclists.org/#securecoding</link>
    <description>The Secure Coding list (SC-L) is an open forum for the discussion on developing secure applications. It is moderated by the authors of &lt;a href=&quot;http://www.amazon.com/dp/0596002424?tag=secbks-20&quot;&gt;Secure Coding: Principles and Practices&lt;/a&gt;.</description>
</channel>
</rss>
<rss version="2.0">
<channel>
    <title>Snort</title>
    <link>https://seclists.org/#snort</link>
    <description>Everyone&#39;s favorite open source IDS, &lt;a href=&quot;http://www.snort.org/&quot;&gt;Snort&lt;/a&gt;. This archive combines the snort-announce, snort-devel, snort-users, and snort-sigs lists.</description>
  <item>
    <title>Snort Subscriber Rules Update 2026-04-23</title>
    <link>https://seclists.org/snort/2026/q2/6</link>
    <description>&lt;p&gt;Posted by Research via Snort-sigs on Apr 23&lt;/p&gt;Talos Snort Subscriber Rules Update&lt;br&gt;
&lt;a  rel=&quot;nofollow&quot; href=&quot;https://www.snort.org/advisories&quot;&gt;https://www.snort.org/advisories&lt;/a&gt;&lt;br&gt;</description>
  </item>
  <item>
    <title>Snort Subscriber Rules Update 2026-04-21</title>
    <link>https://seclists.org/snort/2026/q2/5</link>
    <description>&lt;p&gt;Posted by Research via Snort-sigs on Apr 21&lt;/p&gt;Talos Snort Subscriber Rules Update&lt;br&gt;
&lt;a  rel=&quot;nofollow&quot; href=&quot;https://www.snort.org/advisories&quot;&gt;https://www.snort.org/advisories&lt;/a&gt;&lt;br&gt;</description>
  </item>
  <item>
    <title>Snort Subscriber Rules Update 2026-04-16</title>
    <link>https://seclists.org/snort/2026/q2/4</link>
    <description>&lt;p&gt;Posted by Research via Snort-sigs on Apr 16&lt;/p&gt;Talos Snort Subscriber Rules Update&lt;br&gt;
&lt;a  rel=&quot;nofollow&quot; href=&quot;https://www.snort.org/advisories&quot;&gt;https://www.snort.org/advisories&lt;/a&gt;&lt;br&gt;</description>
  </item>
  <item>
    <title>Snort Subscriber Rules Update 2026-04-14</title>
    <link>https://seclists.org/snort/2026/q2/3</link>
    <description>&lt;p&gt;Posted by Research via Snort-sigs on Apr 14&lt;/p&gt;Talos Snort Subscriber Rules Update&lt;br&gt;
Snort 3: GID...&lt;br&gt;</description>
  </item>
  <item>
    <title>Snort Subscriber Rules Update 2026-04-09</title>
    <link>https://seclists.org/snort/2026/q2/2</link>
    <description>&lt;p&gt;Posted by Research via Snort-sigs on Apr 09&lt;/p&gt;Talos Snort Subscriber Rules Update&lt;br&gt;
&lt;a  rel=&quot;nofollow&quot; href=&quot;https://www.snort.org/advisories&quot;&gt;https://www.snort.org/advisories&lt;/a&gt;&lt;br&gt;</description>
  </item>
  <item>
    <title>Snort Subscriber Rules Update 2026-04-07</title>
    <link>https://seclists.org/snort/2026/q2/1</link>
    <description>&lt;p&gt;Posted by Research via Snort-sigs on Apr 07&lt;/p&gt;Talos Snort Subscriber Rules Update&lt;br&gt;
&lt;a  rel=&quot;nofollow&quot; href=&quot;https://www.snort.org/advisories&quot;&gt;https://www.snort.org/advisories&lt;/a&gt;&lt;br&gt;</description>
  </item>
  <item>
    <title>Snort Subscriber Rules Update 2026-04-02</title>
    <link>https://seclists.org/snort/2026/q2/0</link>
    <description>&lt;p&gt;Posted by Research via Snort-sigs on Apr 02&lt;/p&gt;Talos Snort Subscriber Rules Update&lt;br&gt;
&lt;a  rel=&quot;nofollow&quot; href=&quot;https://www.snort.org/advisories&quot;&gt;https://www.snort.org/advisories&lt;/a&gt;&lt;br&gt;</description>
  </item>
  <item>
    <title>Snort Subscriber Rules Update 2026-03-31</title>
    <link>https://seclists.org/snort/2026/q1/27</link>
    <description>&lt;p&gt;Posted by Research via Snort-sigs on Mar 31&lt;/p&gt;Talos Snort Subscriber Rules Update&lt;br&gt;
&lt;a  rel=&quot;nofollow&quot; href=&quot;https://www.snort.org/advisories&quot;&gt;https://www.snort.org/advisories&lt;/a&gt;&lt;br&gt;</description>
  </item>
  <item>
    <title>Re: Error in registered TalosLightSPD ruleset released on 2026-03-24?</title>
    <link>https://seclists.org/snort/2026/q1/26</link>
    <description>&lt;p&gt;Posted by Dheeraj Gupta via Snort-devel on Mar 29&lt;/p&gt;Following up on this,&lt;br&gt;
there is something missing in the registered ruleset (The...&lt;br&gt;</description>
  </item>
  <item>
    <title>Snort Subscriber Rules Update 2026-03-26</title>
    <link>https://seclists.org/snort/2026/q1/25</link>
    <description>&lt;p&gt;Posted by Research via Snort-sigs on Mar 26&lt;/p&gt;Talos Snort Subscriber Rules Update&lt;br&gt;
&lt;a  rel=&quot;nofollow&quot; href=&quot;https://www.snort.org/advisories&quot;&gt;https://www.snort.org/advisories&lt;/a&gt;&lt;br&gt;</description>
  </item>
  <item>
    <title>Error in registered TalosLightSPD ruleset released on 2026-03-24?</title>
    <link>https://seclists.org/snort/2026/q1/24</link>
    <description>&lt;p&gt;Posted by Dheeraj Gupta via Snort-devel on Mar 26&lt;/p&gt;Hi,&lt;br&gt;
release, there is a reference to 3.1.25 (which was not...&lt;br&gt;</description>
  </item>
  <item>
    <title>Error in registered TalosLightSPD ruleset released on 2026-03-24?</title>
    <link>https://seclists.org/snort/2026/q1/23</link>
    <description>&lt;p&gt;Posted by Dheeraj Gupta via Snort-sigs on Mar 24&lt;/p&gt;Hi,&lt;br&gt;
release, there is a reference to 3.1.25 (which was not...&lt;br&gt;</description>
  </item>
  <item>
    <title>Snort Subscriber Rules Update 2026-03-24</title>
    <link>https://seclists.org/snort/2026/q1/22</link>
    <description>&lt;p&gt;Posted by Research via Snort-sigs on Mar 24&lt;/p&gt;Talos Snort Subscriber Rules Update&lt;br&gt;
&lt;a  rel=&quot;nofollow&quot; href=&quot;https://www.snort.org/advisories&quot;&gt;https://www.snort.org/advisories&lt;/a&gt;&lt;br&gt;</description>
  </item>
  <item>
    <title>Snort Subscriber Rules Update 2026-03-05</title>
    <link>https://seclists.org/snort/2026/q1/21</link>
    <description>&lt;p&gt;Posted by Research via Snort-sigs on Mar 05&lt;/p&gt;Talos Snort Subscriber Rules Update&lt;br&gt;
&lt;a  rel=&quot;nofollow&quot; href=&quot;https://www.snort.org/advisories&quot;&gt;https://www.snort.org/advisories&lt;/a&gt;&lt;br&gt;</description>
  </item>
  <item>
    <title>Snort Subscriber Rules Update 2026-03-03</title>
    <link>https://seclists.org/snort/2026/q1/20</link>
    <description>&lt;p&gt;Posted by Research via Snort-sigs on Mar 03&lt;/p&gt;Talos Snort Subscriber Rules Update&lt;br&gt;
&lt;a  rel=&quot;nofollow&quot; href=&quot;https://www.snort.org/advisories&quot;&gt;https://www.snort.org/advisories&lt;/a&gt;&lt;br&gt;</description>
  </item>
</channel>
</rss>
<rss version="2.0">
<channel>
    <title>VulnWatch</title>
    <link>https://seclists.org/#vulnwatch</link>
    <description>A non-discussion, non-patch, all-vulnerability annoucement list supported and run by a community of volunteer moderators distributed around the world.</description>
</channel>
</rss>
<rss version="2.0">
<channel>
    <title>Web App Security</title>
    <link>https://seclists.org/#webappsec</link>
    <description>Provides insights on the unique challenges which make web applications notoriously hard to secure, as well as attack methods including SQL injection, cross-site scripting (XSS), cross-site request forgery, and more.</description>
</channel>
</rss>
<rss version="2.0">
<channel>
    <title>Wireshark</title>
    <link>https://seclists.org/#wireshark</link>
    <description>Discussion of the free and open source &lt;a href=&quot;http://www.wireshark.org/&quot;&gt;Wireshark&lt;/a&gt; network sniffer.  No other sniffer (commercial or otherwise) comes close. This archive combines the Wireshark announcement, users, and developers mailing lists.</description>
</channel>
</rss>
</BODY>
