<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Known Exploited Vulnerabilities Catalog in Threats</title>
    <link>https://community.isc2.org/t5/Threats/Known-Exploited-Vulnerabilities-Catalog/m-p/50587#M526</link>
    <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/887781263"&gt;@AppDefects&lt;/a&gt;But however, are actually exploited by Government departments, or kept private for a host of security reasons?&amp;nbsp; How much are they prepared to pay for these exploits?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
    <pubDate>Sun, 17 Apr 2022 04:45:43 GMT</pubDate>
    <dc:creator>Caute_cautim</dc:creator>
    <dc:date>2022-04-17T04:45:43Z</dc:date>
    <item>
      <title>Known Exploited Vulnerabilities Catalog</title>
      <link>https://community.isc2.org/t5/Threats/Known-Exploited-Vulnerabilities-Catalog/m-p/50583#M525</link>
      <description>&lt;P&gt;The US Cybersecurity and Infrastructure Security Agency&amp;nbsp;(CISA) maintains a very interesting resource. It is the&amp;nbsp;&lt;A href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" target="_blank" rel="noopener"&gt;Known Exploited Vulnerabilities Catalog&lt;/A&gt;. Today, there are 644 unique CVEs in the catalog which impact a variety of COTs products. Use the catalog to prioritize remediation and build (in their words) "collective resilience" to threats.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 10:09:30 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Known-Exploited-Vulnerabilities-Catalog/m-p/50583#M525</guid>
      <dc:creator>AppDefects</dc:creator>
      <dc:date>2023-10-09T10:09:30Z</dc:date>
    </item>
    <item>
      <title>Re: Known Exploited Vulnerabilities Catalog</title>
      <link>https://community.isc2.org/t5/Threats/Known-Exploited-Vulnerabilities-Catalog/m-p/50587#M526</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/887781263"&gt;@AppDefects&lt;/a&gt;But however, are actually exploited by Government departments, or kept private for a host of security reasons?&amp;nbsp; How much are they prepared to pay for these exploits?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Sun, 17 Apr 2022 04:45:43 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Known-Exploited-Vulnerabilities-Catalog/m-p/50587#M526</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2022-04-17T04:45:43Z</dc:date>
    </item>
  </channel>
</rss>

