<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Undercover Vulnerability List &#8211; Request for Updates</title>
	<atom:link href="http://spiresecurity.com/?feed=rss2&#038;p=140" rel="self" type="application/rss+xml" />
	<link>http://spiresecurity.com/?p=140</link>
	<description>Risk and Cybersecurity Analysis</description>
	<lastBuildDate>Wed, 21 Aug 2013 23:28:51 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5.1</generator>
	<item>
		<title>By: Spire Security Viewpoint</title>
		<link>http://spiresecurity.com/?p=140&#038;cpage=1#comment-153</link>
		<dc:creator>Spire Security Viewpoint</dc:creator>
		<pubDate>Mon, 27 Oct 2008 13:08:38 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=140#comment-153</guid>
		<description><![CDATA[&lt;strong&gt;Undercover Exploits and Vulnerabilities - 10-27-08&lt;/strong&gt;

Looks like we have a confirmed addition to the undercover exploit list (old list). That makes 21 total since 1988. 10/27/08 - MS08-067 RPC vulnerability (public info). 11/23/07 - Xunlei Thunder PPlayer ActiveX control (credit: Symantec*) 4/5/07 - DNS R...
]]></description>
		<content:encoded><![CDATA[<p><strong>Undercover Exploits and Vulnerabilities &#8211; 10-27-08</strong></p>
<p>Looks like we have a confirmed addition to the undercover exploit list (old list). That makes 21 total since 1988. 10/27/08 &#8211; MS08-067 RPC vulnerability (public info). 11/23/07 &#8211; Xunlei Thunder PPlayer ActiveX control (credit: Symantec*) 4/5/07 &#8211; DNS R&#8230;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Pete Lindstrom</title>
		<link>http://spiresecurity.com/?p=140&#038;cpage=1#comment-152</link>
		<dc:creator>Pete Lindstrom</dc:creator>
		<pubDate>Sat, 23 Aug 2008 04:00:37 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=140#comment-152</guid>
		<description><![CDATA[@Druid -

I think 0day would have been a great term except it got abused a few years back and so now people think of something other than what I mean. Many people consider &quot;0day vulnerabilities&quot; those vulnerabilities that don&#039;t have a patch available when they are disclosed, regardless of how they are discovered. (There are plenty of so-called &quot;0days&quot; that have never actually been exploited.)

I think &quot;0day vulnerability&quot; is a misnomer because 0day implies an attack, not simply a vuln.

Anyway, undercover vulnerabilities are only those vulns that were identified due to exploits in the wild - a subset of the common 0day definition (though I would dispute the notion that it is well-established).
]]></description>
		<content:encoded><![CDATA[<p>@Druid -</p>
<p>I think 0day would have been a great term except it got abused a few years back and so now people think of something other than what I mean. Many people consider &#8220;0day vulnerabilities&#8221; those vulnerabilities that don&#8217;t have a patch available when they are disclosed, regardless of how they are discovered. (There are plenty of so-called &#8220;0days&#8221; that have never actually been exploited.)</p>
<p>I think &#8220;0day vulnerability&#8221; is a misnomer because 0day implies an attack, not simply a vuln.</p>
<p>Anyway, undercover vulnerabilities are only those vulns that were identified due to exploits in the wild &#8211; a subset of the common 0day definition (though I would dispute the notion that it is well-established).</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: I)ruid</title>
		<link>http://spiresecurity.com/?p=140&#038;cpage=1#comment-151</link>
		<dc:creator>I)ruid</dc:creator>
		<pubDate>Fri, 22 Aug 2008 20:41:13 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=140#comment-151</guid>
		<description><![CDATA[&quot;Undercover&quot;?  I&#039;ve never heard that term before in relation to a vulnerability or exploit...  Don&#039;t you mean &quot;0day&quot;?  If so, why are you trying to coin new terminology for things which already have well-established terminology for them?

Fun Fact: Once it&#039;s discovered in the wild and disclosed to the public, such as to a &#039;undercover list page&#039;, it&#039;s no longer 0day.
]]></description>
		<content:encoded><![CDATA[<p>&#8220;Undercover&#8221;?  I&#8217;ve never heard that term before in relation to a vulnerability or exploit&#8230;  Don&#8217;t you mean &#8220;0day&#8221;?  If so, why are you trying to coin new terminology for things which already have well-established terminology for them?</p>
<p>Fun Fact: Once it&#8217;s discovered in the wild and disclosed to the public, such as to a &#8216;undercover list page&#8217;, it&#8217;s no longer 0day.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
