<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
    xmlns:content="http://purl.org/rss/1.0/modules/content/"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>vulnerabilities — LowEndSpirit</title>
        <link>https://staging.lowendspirit.com/index.php?p=/</link>
        <pubDate>Sun, 12 Apr 2026 02:32:21 +0000</pubDate>
        <language>en</language>
            <description>vulnerabilities — LowEndSpirit</description>
    <atom:link href="https://staging.lowendspirit.com/index.php?p=/discussions/tagged/vulnerabilities/feed.rss" rel="self" type="application/rss+xml"/>
    <item>
        <title>Important PSA - Codecov.IO Bash Uploader Security Update</title>
        <link>https://staging.lowendspirit.com/index.php?p=/discussion/2803/important-psa-codecov-io-bash-uploader-security-update</link>
        <pubDate>Sat, 17 Apr 2021 18:12:21 +0000</pubDate>
        <category>General</category>
        <dc:creator>nullnothere</dc:creator>
        <guid isPermaLink="false">2803@/index.php?p=/discussions</guid>
        <description><![CDATA[<p>There has been a fairly serious backdoor implanted resulting in credential leakage.</p>

<p>If you use/have used their tool, please be sure to revoke/rotate your (relevant, affected) credentials immediately.</p>

<p>More information:</p>

<p><a href="https://about.codecov.io/security-update/" rel="nofollow">https://about.codecov.io/security-update/</a></p>

<p>Ars Technica has coverage here: <a href="https://arstechnica.com/gadgets/2021/04/backdoored-developer-tool-that-stole-credentials-escaped-notice-for-3-months/" rel="nofollow">https://arstechnica.com/gadgets/2021/04/backdoored-developer-tool-that-stole-credentials-escaped-notice-for-3-months/</a></p>
]]>
        </description>
    </item>
    <item>
        <title>Cloudflare open-sources Flan Scan, a network vulnerability scanner</title>
        <link>https://staging.lowendspirit.com/index.php?p=/discussion/130/cloudflare-open-sources-flan-scan-a-network-vulnerability-scanner</link>
        <pubDate>Fri, 22 Nov 2019 16:27:11 +0000</pubDate>
        <category>General</category>
        <dc:creator>ITLabs</dc:creator>
        <guid isPermaLink="false">130@/index.php?p=/discussions</guid>
        <description><![CDATA[<p>Cloudflare open sourced Flan Scan, its in-house lightweight network vulnerability scanner.</p>

<p>Flan Scan is a lightweight network vulnerability scanner. With Flan Scan you can easily find open ports on your network, identify services and their version, and get a list of relevant CVEs affecting your network.</p>

<p>Flan Scan is a wrapper over Nmap and the vulners script which turns Nmap into a full-fledged network vulnerability scanner. Flan Scan makes it easy to deploy Nmap locally within a container, push results to the cloud, and deploy the scanner on Kubernetes.</p>

<p>&nbsp;<br />
Ref.: <a href="https://blog.cloudflare.com/introducing-flan-scan/" rel="nofollow">https://blog.cloudflare.com/introducing-flan-scan/</a><br />
Ref.: <a href="https://github.com/cloudflare/flan" rel="nofollow">https://github.com/cloudflare/flan</a><br />
&nbsp;</p>

<p>Do you use any vulnerability scanner in your daily activities? Which one performs better in your opinion?</p>
]]>
        </description>
    </item>
   </channel>
</rss>
