veganism.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Veganism Social is a welcoming space on the internet for vegans to connect and engage with the broader decentralized social media community.

Administered by:

Server stats:

270
active users

#vulnerabilitymanagement

12 posts9 participants0 posts today
Eric The IT Guy<p>I was interviewed by <a href="https://mastodon.social/tags/LinuxInsider" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LinuxInsider</span></a> on <a href="https://mastodon.social/tags/TuxCare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TuxCare</span></a> ’s new in-memory CVE scanner!</p><p>👉 <a href="https://www.linuxinsider.com/story/tuxcares-in-memory-cve-scanner-enhances-linux-security-with-radar-177583.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">linuxinsider.com/story/tuxcare</span><span class="invisible">s-in-memory-cve-scanner-enhances-linux-security-with-radar-177583.html</span></a></p><p><a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/TuxCareRadar" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TuxCareRadar</span></a> <a href="https://mastodon.social/tags/VulnerabilityManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VulnerabilityManagement</span></a></p>
Alexandre Dulaunoy<p>GCVE-BCP-04 - Recommendations and Best Practices for ID Allocation version 1.1 published.</p><p>BCP Document <a href="https://gcve.eu/bcp/gcve-bcp-04/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">gcve.eu/bcp/gcve-bcp-04/</span><span class="invisible"></span></a></p><p>PDF <a href="https://gcve.eu/files/bcp/gcve-bcp-04.pdf" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gcve.eu/files/bcp/gcve-bcp-04.</span><span class="invisible">pdf</span></a></p><p>Comments and feedback <a href="https://discourse.ossbase.org/t/gcve-bcp-04-drafting-recommendations-and-best-practices-for-id-allocation/119/4" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">discourse.ossbase.org/t/gcve-b</span><span class="invisible">cp-04-drafting-recommendations-and-best-practices-for-id-allocation/119/4</span></a></p><p><a href="https://infosec.exchange/tags/cve" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cve</span></a> <a href="https://infosec.exchange/tags/gcve" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gcve</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/vulnerabilitymanagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilitymanagement</span></a> </p><p><span class="h-card" translate="no"><a href="https://social.circl.lu/@gcve" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>gcve</span></a></span> <span class="h-card" translate="no"><a href="https://social.circl.lu/@circl" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>circl</span></a></span> <span class="h-card" translate="no"><a href="https://fosstodon.org/@cedric" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>cedric</span></a></span></p>
ICS Advisory Project<p>ICS[AP] Dashboards are updated with the 9 (6 new &amp; 3 updated) CISA Advisories released on 8/28/25:</p><p>Mitsubishi Electric: 2 New | 2 Updated<br>Schneider Electric: 1 New<br>Delta Electronics: 2 New<br>GE Vernova: 1 New<br>Hitachi Energy: 1 Updated</p><p>www.icsadvisoryproject.com</p><p><a href="https://infosec.exchange/tags/icssecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>icssecurity</span></a><br><a href="https://infosec.exchange/tags/otsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>otsecurity</span></a><br><a href="https://infosec.exchange/tags/vulnerabilitymanagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilitymanagement</span></a></p>
ICS Advisory Project<p>ICS[AP] updated CISA ICS Advisories Master File for 8/28/25 &amp; the following:</p><p>CISA_ICS_ADV_2025_08_28.csv<br>CISA_ICS_ADV_2024_8_28_25.csv</p><p>Available @ ICS[AP] GitHub: <a href="https://github.com/icsadvprj/ICS-Advisory-Project/tree/main" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/icsadvprj/ICS-Advis</span><span class="invisible">ory-Project/tree/main</span></a><br><a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a><br><a href="https://infosec.exchange/tags/vulnerabilitymanagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilitymanagement</span></a> <br><a href="https://infosec.exchange/tags/icssecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>icssecurity</span></a></p>
Eric The IT Guy<p>SMBs can’t afford to play defense only after a breach. In my inaugural <a href="https://mastodon.social/tags/CPOmagazine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CPOmagazine</span></a> article: why proactive vulnerability scanning saves SMBs from costly cyber setbacks.</p><p>👉 <a href="https://www.cpomagazine.com/cyber-security/proactive-approach-to-vulnerability-scanning-saves-smbs-from-cyber-setbacks/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">cpomagazine.com/cyber-security</span><span class="invisible">/proactive-approach-to-vulnerability-scanning-saves-smbs-from-cyber-setbacks/</span></a></p><p><a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/SMB" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SMB</span></a> <a href="https://mastodon.social/tags/VulnerabilityManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VulnerabilityManagement</span></a></p>
GreyNoise<p>30,000+ IPs hit Microsoft Remote Desktop on Aug 24, a significant escalation from our original reporting of nearly 2,000 IPs on August 21. Full analysis: <a href="https://www.greynoise.io/blog/surge-malicious-ips-probe-microsoft-remote-desktop" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">greynoise.io/blog/surge-malici</span><span class="invisible">ous-ips-probe-microsoft-remote-desktop</span></a><br> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntel</span></a> <a href="https://infosec.exchange/tags/RDP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RDP</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/IncidentResponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IncidentResponse</span></a> <a href="https://infosec.exchange/tags/GreyNoise" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GreyNoise</span></a> <a href="https://infosec.exchange/tags/SOC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SOC</span></a> <a href="https://infosec.exchange/tags/VulnerabilityManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VulnerabilityManagement</span></a> <a href="https://infosec.exchange/tags/microsoftrdpserver" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>microsoftrdpserver</span></a></p>
ICS Advisory Project<p>ICS[AP] Dashboards are updated with the 3 (2 new &amp; 1 updated) CISA Advisories released on 8/26/25:</p><p>INVT: 1 New<br>Schneider Electric: 1 New<br>Danfoss: 1 Updated</p><p>www.icsadvisoryproject.com</p><p><a href="https://infosec.exchange/tags/icssecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>icssecurity</span></a><br><a href="https://infosec.exchange/tags/otsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>otsecurity</span></a><br><a href="https://infosec.exchange/tags/vulnerabilitymanagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilitymanagement</span></a></p>
CVE Program<p>AxxonSoft is now a CVE Numbering Authority (CNA) assigning CVE IDs for AxxonSoft products and solutions only <br> <br><a href="https://cve.org/Media/News/item/news/2025/08/26/AxxonSoft-Added-as-CNA" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cve.org/Media/News/item/news/2</span><span class="invisible">025/08/26/AxxonSoft-Added-as-CNA</span></a><br> <br><a href="https://mastodon.social/tags/cve" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cve</span></a> <a href="https://mastodon.social/tags/cna" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cna</span></a> <a href="https://mastodon.social/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://mastodon.social/tags/vulnerabilitymanagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilitymanagement</span></a> <br><a href="https://mastodon.social/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
CVE Program<p>Commvault is now a CVE Numbering Authority (CNA) assigning CVE IDs for vulnerabilities in Commvault SaaS and software products only <br> <br><a href="https://cve.org/Media/News/item/news/2025/08/26/Commvault-Added-as-CNA" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cve.org/Media/News/item/news/2</span><span class="invisible">025/08/26/Commvault-Added-as-CNA</span></a><br> <br><a href="https://mastodon.social/tags/cve" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cve</span></a> <a href="https://mastodon.social/tags/cna" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cna</span></a> <a href="https://mastodon.social/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://mastodon.social/tags/vulnerabilitymanagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilitymanagement</span></a> <br><a href="https://mastodon.social/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
CVE Program<p>GeoVision is now a CVE Numbering Authority (CNA) assigning CVE IDs for vulnerabilities in GeoVision products only <br> <br><a href="https://cve.org/Media/News/item/news/2025/08/26/GeoVision-Added-as-CNA" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cve.org/Media/News/item/news/2</span><span class="invisible">025/08/26/GeoVision-Added-as-CNA</span></a> <br> <br><a href="https://mastodon.social/tags/cve" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cve</span></a> <a href="https://mastodon.social/tags/cna" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cna</span></a> <a href="https://mastodon.social/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://mastodon.social/tags/vulnerabilitymanagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilitymanagement</span></a> <br><a href="https://mastodon.social/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
CVE Program<p>1,099 CVE Records + severity scores when available in CISA’s Vulnerability Summary bulletin for the week of August 11, 2025 <br> <br><a href="https://www.cisa.gov/news-events/bulletins/sb25-230" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">cisa.gov/news-events/bulletins</span><span class="invisible">/sb25-230</span></a> <br> <br><a href="https://mastodon.social/tags/CVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE</span></a> <a href="https://mastodon.social/tags/CVEID" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVEID</span></a> <a href="https://mastodon.social/tags/CVSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVSS</span></a> <a href="https://mastodon.social/tags/CWE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CWE</span></a> <a href="https://mastodon.social/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a> <a href="https://mastodon.social/tags/VulnerabilityManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VulnerabilityManagement</span></a> <a href="https://mastodon.social/tags/HSSEDI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HSSEDI</span></a> <a href="https://mastodon.social/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a></p>
pentest-tools.com<p>📣 You found the risk. Now what?<br>Getting others to act on it is a whole. Different. Story.<br>Clear communication shouldn’t be the hardest part of security, but it often is.</p><p>👇 Vote below - What makes it hard to communicate risk clearly?</p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/vulnerabilitymanagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilitymanagement</span></a> <a href="https://infosec.exchange/tags/offensivesecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>offensivesecurity</span></a></p>
Alexandre Dulaunoy<p>We are excited to announce the release of Vulnerability-Lookup 2.15.0!</p><p>This version brings new features, performance improvements, and several bug fixes.</p><p>Thanks to <span class="h-card" translate="no"><a href="https://fosstodon.org/@cedric" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>cedric</span></a></span> for the hard work.</p><p><a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://infosec.exchange/tags/vulnerabilitymanagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilitymanagement</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/csirt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>csirt</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> </p><p>🔗 <a href="https://www.vulnerability-lookup.org/2025/08/22/vulnerability-lookup-2-15-0/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">vulnerability-lookup.org/2025/</span><span class="invisible">08/22/vulnerability-lookup-2-15-0/</span></a></p><p><span class="h-card" translate="no"><a href="https://social.circl.lu/@circl" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>circl</span></a></span> <span class="h-card" translate="no"><a href="https://social.circl.lu/@gcve" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>gcve</span></a></span></p>
ICS Advisory Project<p>ICS[AP] Dashboards are updated with the 3 (2 new &amp; 1 updated) CISA Advisories released on 8/21/25:</p><p>Mitsubishi Electric: 1 New | 1 Updated<br>FUJIFILM Healthcare Americas Corporation: 1 Updated</p><p>www.icsadvisoryproject.com</p><p><a href="https://infosec.exchange/tags/icssecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>icssecurity</span></a><br><a href="https://infosec.exchange/tags/otsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>otsecurity</span></a><br><a href="https://infosec.exchange/tags/vulnerabilitymanagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilitymanagement</span></a></p>
circl<p>Workhorse Software Services, Inc. software prior to version 1.9.4.48019, default deployment is vulnerable to multiple issues.</p><p>CVE-2025-9037 and CVE-2025-9040 </p><p><a href="https://social.circl.lu/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://social.circl.lu/tags/vulnerabilitymanagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilitymanagement</span></a> <a href="https://social.circl.lu/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> </p><p><a href="https://vulnerability.circl.lu/bundle/6b6e4418-513f-4750-b0bf-8e6f3ebf62dc" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">vulnerability.circl.lu/bundle/</span><span class="invisible">6b6e4418-513f-4750-b0bf-8e6f3ebf62dc</span></a></p>
LimberDuck<p>Do you struggle with processing large Nessus scan results?</p><p>Not anymore! From now on, you can easily split them into smaller chunks using the latest version of NFR from LimberDuck with a simple split command.</p><p>- Run it from the command line<br>- Split by maximum number of scanned hosts<br>- Split selected or all scan results across directories and subdirectories</p><p>Try it today at limberduck.org</p><p><a href="https://mastodon.social/tags/LimberDuck" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LimberDuck</span></a> <a href="https://mastodon.social/tags/nfr" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nfr</span></a> <a href="https://mastodon.social/tags/nessusfileanalyzer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nessusfileanalyzer</span></a> <a href="https://mastodon.social/tags/nessusfileparser" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nessusfileparser</span></a> <a href="https://mastodon.social/tags/vulnerabilityassessment" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilityassessment</span></a> <a href="https://mastodon.social/tags/vulnerabilitymanagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilitymanagement</span></a></p>
CVE Program<p>Software.com is now a CVE Numbering Authority (CNA) assigning CVE IDs for Software.com issues only <br> <br><a href="https://cve.org/Media/News/item/news/2025/08/19/Software-com-Added-as-CNA" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cve.org/Media/News/item/news/2</span><span class="invisible">025/08/19/Software-com-Added-as-CNA</span></a> <br> <br><a href="https://mastodon.social/tags/cve" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cve</span></a> <a href="https://mastodon.social/tags/cna" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cna</span></a> <a href="https://mastodon.social/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://mastodon.social/tags/vulnerabilitymanagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilitymanagement</span></a> <br><a href="https://mastodon.social/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a></p>
CVE Program<p>Spartans Security is now a CVE Numbering Authority (CNA) assigning CVE IDs for vulnerabilities in software, services, and infrastructure owned and managed by Spartans Security, and vulnerabilities researched and found by Spartans Security in third-party products that are not part of another CNA's scope <br> <br><a href="https://cve.org/Media/News/item/news/2025/08/19/Spartans-Security-Added-as-CNA" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cve.org/Media/News/item/news/2</span><span class="invisible">025/08/19/Spartans-Security-Added-as-CNA</span></a> <br> <br><a href="https://mastodon.social/tags/cve" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cve</span></a> <a href="https://mastodon.social/tags/cna" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cna</span></a> <a href="https://mastodon.social/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://mastodon.social/tags/vulnerabilitymanagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilitymanagement</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
CVE Program<p>667 CVE Records + severity scores when available in CISA’s Vulnerability Summary bulletin for the week of August 4, 2025 <br> <br><a href="https://cisa.gov/news-events/bulletins/sb25-223" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cisa.gov/news-events/bulletins</span><span class="invisible">/sb25-223</span></a> <br> <br><a href="https://mastodon.social/tags/CVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE</span></a> <a href="https://mastodon.social/tags/CVEID" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVEID</span></a> <a href="https://mastodon.social/tags/CVSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVSS</span></a> <a href="https://mastodon.social/tags/CWE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CWE</span></a> <a href="https://mastodon.social/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a> <a href="https://mastodon.social/tags/VulnerabilityManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VulnerabilityManagement</span></a> <a href="https://mastodon.social/tags/HSSEDI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HSSEDI</span></a> <a href="https://mastodon.social/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a></p>
LimberDuck<p>Analyze Nessus scan results with ease, try NFA from LimberDuck.</p><p>LimberDuck tools will help you:<br>- analyze&nbsp;.nessus&nbsp;files in seconds<br>- spot misconfigurations across scans and assets<br>- generate clean spreadsheet reports</p><p>Try it today at limberduck.org</p><p>Do you or your team struggle with Nessus automation or scan analysis?<br>If so, I encourage you to get in touch - it’s possible that LimberDuck tools may have the solution.</p><p><a href="https://mastodon.social/tags/LimberDuck" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LimberDuck</span></a> <a href="https://mastodon.social/tags/vulnerabilitymanagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilitymanagement</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/nessus" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nessus</span></a></p>