<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[General Discussion]]></title><description><![CDATA[Feel free to discuss what was good or bad in Secunia PSI and what you expect from VulnDetect]]></description><link>https://vulndetect.org/category/5</link><generator>RSS for Node</generator><lastBuildDate>Tue, 21 Apr 2026 00:30:13 GMT</lastBuildDate><atom:link href="https://vulndetect.org/category/5.rss" rel="self" type="application/rss+xml"/><pubDate>Tue, 03 Feb 2026 09:17:44 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Notepad++ supply-chain incident - SecTeer impact assessment]]></title><link>https://vulndetect.org/topic/2761/notepad-supply-chain-incident-secteer-impact-assessment</link><guid isPermaLink="true">https://vulndetect.org/topic/2761/notepad-supply-chain-incident-secteer-impact-assessment</guid><pubDate>Tue, 03 Feb 2026 09:17:44 GMT</pubDate></item><item><title><![CDATA[Google Chrome 131.0.6778.109 Error 1603 (googlechromestandaloneenterprise.msi)]]></title><link>https://vulndetect.org/topic/2698/google-chrome-131-0-6778-109-error-1603-googlechromestandaloneenterprise-msi</link><guid isPermaLink="true">https://vulndetect.org/topic/2698/google-chrome-131-0-6778-109-error-1603-googlechromestandaloneenterprise-msi</guid><pubDate>Thu, 05 Dec 2024 14:13:26 GMT</pubDate></item><item><title><![CDATA[[Corporate] Why do Ignore Rules expire?]]></title><description><![CDATA[@Tom The first feedback you have now
;-)
]]></description><link>https://vulndetect.org/topic/2635/corporate-why-do-ignore-rules-expire</link><guid isPermaLink="true">https://vulndetect.org/topic/2635/corporate-why-do-ignore-rules-expire</guid><dc:creator><![CDATA[OLLI_S]]></dc:creator><pubDate>Sun, 05 Nov 2023 15:38:48 GMT</pubDate></item><item><title><![CDATA[vulndetect newcomer]]></title><description><![CDATA[@WacoJohn
Welcome! This is the first time I've posted. I've been using VulDetect since it was announced after the demise of Secunia PSI. This is the first time I've felt I had a constructive comment to make.
When I finally realized all my accounts were showing just the profile for the first machine I installed on, I combed through and found that each installation needed a separate email address. Since Apple, Comcast and others want to give me unique email addresses, I had enough to make separate accounts for each installation.
I do like the idea of a corporate style account and hope I can change over to that once everything is worked out.
]]></description><link>https://vulndetect.org/topic/2626/vulndetect-newcomer</link><guid isPermaLink="true">https://vulndetect.org/topic/2626/vulndetect-newcomer</guid><dc:creator><![CDATA[Halo2]]></dc:creator><pubDate>Sun, 22 Oct 2023 19:46:45 GMT</pubDate></item><item><title><![CDATA[[0-day][Officially fixed] Microsoft Windows MSDT URI Handler Vulnerability aka &quot;Follina&quot; &#x2F; CVE-2022-30190]]></title><description><![CDATA[Microsoft has issued official fixes for the 0-day CVE-2022-30190 / Follina:
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-30190
As expected, Microsoft has classified it as a Windows vulnerability.
You can see affected systems here:
https://corporate.vulndetect.com/#/applications/versions?channelTag=microsoft.windows.endrule&amp;status=insecure&amp;title=Microsoft Windows
Note that it requires a recent inspection, hosts that haven't inspected since 14-06-2022 20:00 CET will not report the missing KB update.
]]></description><link>https://vulndetect.org/topic/2396/0-day-officially-fixed-microsoft-windows-msdt-uri-handler-vulnerability-aka-follina-cve-2022-30190</link><guid isPermaLink="true">https://vulndetect.org/topic/2396/0-day-officially-fixed-microsoft-windows-msdt-uri-handler-vulnerability-aka-follina-cve-2022-30190</guid><dc:creator><![CDATA[Tom]]></dc:creator><pubDate>Mon, 30 May 2022 12:07:30 GMT</pubDate></item><item><title><![CDATA[Ofiicial Chocolatey Packages]]></title><link>https://vulndetect.org/topic/809/ofiicial-chocolatey-packages</link><guid isPermaLink="true">https://vulndetect.org/topic/809/ofiicial-chocolatey-packages</guid><pubDate>Mon, 18 May 2020 10:04:53 GMT</pubDate></item><item><title><![CDATA[Is VulnDetect dead?]]></title><description><![CDATA[I am surprised (and very disappointed) that the feature "Additional Status for Update Available" (https://vulndetect.org/topic/492/additional-status-for-update-available) is not yet implemented or has at least the status "Work in progress".
Seems like the guys at VulnDetect are busy with other stuff that has not such a great benefit than that feature.
This is very very sad!
]]></description><link>https://vulndetect.org/topic/781/is-vulndetect-dead</link><guid isPermaLink="true">https://vulndetect.org/topic/781/is-vulndetect-dead</guid><dc:creator><![CDATA[Armin]]></dc:creator><pubDate>Sat, 25 Apr 2020 12:46:00 GMT</pubDate></item><item><title><![CDATA[Apps that support Auto-Update (via VulnDetect)]]></title><link>https://vulndetect.org/topic/639/apps-that-support-auto-update-via-vulndetect</link><guid isPermaLink="true">https://vulndetect.org/topic/639/apps-that-support-auto-update-via-vulndetect</guid><pubDate>Wed, 13 Mar 2019 20:09:05 GMT</pubDate></item><item><title><![CDATA[What Version Number to display]]></title><description><![CDATA[Today an update for ToDoList was released.
The old version was 7.2.7.0 and VulnDetect displayed 7.2.7 (VulnDetect left away the last digit for the last versions of ToDoList).
But today the version 7.2.8.1 was released and here you should show the last digit!
In Help -&gt; About I see also the following information: ToDoList 7.2.8.1 (Stable Version).
]]></description><link>https://vulndetect.org/topic/611/what-version-number-to-display</link><guid isPermaLink="true">https://vulndetect.org/topic/611/what-version-number-to-display</guid><dc:creator><![CDATA[OLLI_S]]></dc:creator><pubDate>Thu, 31 Jan 2019 19:43:59 GMT</pubDate></item><item><title><![CDATA[Manual?]]></title><description><![CDATA[VulnDetect is installed as service and is running silently in the background.
If you go to https://personal.vulndetect.com/#/applications and click on Configuration then you can set up when the automatic scan should start.
The scan results you see at https://personal.vulndetect.com/#/applications.
I am programming a small tool that offers a graphical UI and allows to start an immediate scan.
The tool is called Toolbox for VulnDetect and can be found here: https://1drv.ms/f/s!AsiLVok82IpQg_pe63xK8K01XuPIAw (in the folder "Toolbox Beta).
But I am a normal user, not an official of SecTeer (the programmers of VulnDetect) so use the tool at your own risk!
]]></description><link>https://vulndetect.org/topic/440/manual</link><guid isPermaLink="true">https://vulndetect.org/topic/440/manual</guid><dc:creator><![CDATA[OLLI_S]]></dc:creator><pubDate>Sun, 04 Nov 2018 19:13:39 GMT</pubDate></item><item><title><![CDATA[Feedback for the User-Interface]]></title><description><![CDATA[Right now KeePass showed me that a new version is available:
[image: 1537198132106-keepass_update_check.png]
This Update Check window is simple, but shows all important information:

Component (the name of the application)
Status
Installed Version
Available Version (see Show Available Version)

This should be an inspiration of VulnDetect.
]]></description><link>https://vulndetect.org/topic/390/feedback-for-the-user-interface</link><guid isPermaLink="true">https://vulndetect.org/topic/390/feedback-for-the-user-interface</guid><dc:creator><![CDATA[OLLI_S]]></dc:creator><pubDate>Mon, 17 Sep 2018 12:15:52 GMT</pubDate></item><item><title><![CDATA[Merchandise]]></title><link>https://vulndetect.org/topic/374/merchandise</link><guid isPermaLink="true">https://vulndetect.org/topic/374/merchandise</guid><pubDate>Fri, 07 Sep 2018 10:46:11 GMT</pubDate></item><item><title><![CDATA[Passwords, identities and data breaches]]></title><description><![CDATA[Thank you for your feedback.
I agree, the "solution" I suggest, may not suit everybody. I did test out Lastpass at some point, one or two years ago, I didn't really like it, despite all the plugins to support my browsers (or perhaps, that was the very reason I didn't get comfortably with it, I like to keep the password manager far away from my browser).
But I guess more users would find Lastpass easier to deal with, compared to the KeePass solution.
I just noticed that Troy Hunt posted about his new collaboration with 1password, which allows checking if your credentials has been breached. A similar thing can be achieved with a plugin for KeePass, but again, the KeePass approach is less user friendly.
In either case, a password manager will be a great step-up, for most of us. Choosing the right one is a matter of taste and preferences, and trust.
I agree, there could be some perspective to Webauthn, though I always get a rash, when we all start relying on the same technology. Nonetheless, I will test it, once one of my favorite sites / services, offer Webauthn authentication.
]]></description><link>https://vulndetect.org/topic/13/passwords-identities-and-data-breaches</link><guid isPermaLink="true">https://vulndetect.org/topic/13/passwords-identities-and-data-breaches</guid><dc:creator><![CDATA[Tom]]></dc:creator><pubDate>Fri, 13 Apr 2018 08:23:19 GMT</pubDate></item><item><title><![CDATA[IPv6 added for vulndetect.com (testing)]]></title><description><![CDATA[While troubleshooting my private IPv6 connectivity, I decided to enable an IPv6 and IPv4 specific access to the forum, so you and everybody else can test it:
https://ipv4.vulndetect.org/
https://ipv6.vulndetect.org/
https://vulndetect.org/ is naturally dual-stack and most of us need not worry, once you have IPv6, you will use it automatically (if your ISP set it up correctly).
It appears that my ISP currently has a routing issue, but then I could use my cellphone (just needed to enable dual-stack support in the APN under Mobile network).
We also expect to enable dual-stack access to the VulnDetect backend, at some point during the tech preview stage.
]]></description><link>https://vulndetect.org/topic/10/ipv6-added-for-vulndetect-com-testing</link><guid isPermaLink="true">https://vulndetect.org/topic/10/ipv6-added-for-vulndetect-com-testing</guid><dc:creator><![CDATA[VulnDetect]]></dc:creator><pubDate>Sun, 25 Mar 2018 10:04:11 GMT</pubDate></item><item><title><![CDATA[Vulnerability and Patch Information]]></title><description><![CDATA[@Tom I am not sure if this topic should be in Suggestions?
If yes, then add it to the category "Application detection" in the suggestions summary.
]]></description><link>https://vulndetect.org/topic/9/vulnerability-and-patch-information</link><guid isPermaLink="true">https://vulndetect.org/topic/9/vulnerability-and-patch-information</guid><dc:creator><![CDATA[OLLI_S]]></dc:creator><pubDate>Fri, 23 Mar 2018 15:02:08 GMT</pubDate></item><item><title><![CDATA[Secunia PSI Forum]]></title><description><![CDATA[Tom, that's just cold seeing as how they discontinued our beloved psi anyway.  I'm really pleased to hear that someone cares enough to try and build something similar.  I like many other's used psi for years to help me keep vulnerable programs safe.  Please forgive any typo's my vision isn't all that good anymore, lol. I hope you guys have a nice day.  :-)
]]></description><link>https://vulndetect.org/topic/8/secunia-psi-forum</link><guid isPermaLink="true">https://vulndetect.org/topic/8/secunia-psi-forum</guid><dc:creator><![CDATA[astrospacerich]]></dc:creator><pubDate>Thu, 15 Mar 2018 19:11:22 GMT</pubDate></item><item><title><![CDATA[GDPR &#x2F; Privacy Policy &amp; System upgrade &amp; Status]]></title><description><![CDATA[Todays change to the database required a small addition to our Privacy Policy, stating the fact, that MongoDB Cloud Services are managing the backend. Your data is still at the same facility, in Europe.
]]></description><link>https://vulndetect.org/topic/7/gdpr-privacy-policy-system-upgrade-status</link><guid isPermaLink="true">https://vulndetect.org/topic/7/gdpr-privacy-policy-system-upgrade-status</guid><dc:creator><![CDATA[VulnDetect]]></dc:creator><pubDate>Thu, 15 Mar 2018 19:00:22 GMT</pubDate></item><item><title><![CDATA[Things I would look for in a new vulnerability detection program]]></title><description><![CDATA[@WacoJohn My apologies for this.
Please see this response:
https://vulndetect.org/post/6673
]]></description><link>https://vulndetect.org/topic/5/things-i-would-look-for-in-a-new-vulnerability-detection-program</link><guid isPermaLink="true">https://vulndetect.org/topic/5/things-i-would-look-for-in-a-new-vulnerability-detection-program</guid><dc:creator><![CDATA[Tom]]></dc:creator><pubDate>Wed, 14 Mar 2018 14:08:31 GMT</pubDate></item><item><title><![CDATA[Welcome to the &quot;new&quot; Secunia PSI, feel free to discuss and comment and suggest]]></title><link>https://vulndetect.org/topic/4/welcome-to-the-new-secunia-psi-feel-free-to-discuss-and-comment-and-suggest</link><guid isPermaLink="true">https://vulndetect.org/topic/4/welcome-to-the-new-secunia-psi-feel-free-to-discuss-and-comment-and-suggest</guid><pubDate>Wed, 14 Mar 2018 13:40:06 GMT</pubDate></item></channel></rss>