<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Please nitpick the following (or suggest an authority, such as NIST or CISA )]]></title><description><![CDATA[<p>Please nitpick the following (or suggest an authority, such as NIST or CISA )</p><p>A vulnerability is a weakness that can be exploited to gain some goal or milestone for an attacker, such as the ability to run code. Vulnerabilities are usually bugs which get patched, and weaknesses are a broader set that includes susceptibility to threats. Code which demonstrates that a vulnerability is exploitable is called “proof-of-concept” or PoC. A PoC may be developed into an exploit, which is code that actually achieves that goal. Weaponized exploit code has been made production-ready with reliability or integration into some attack framework. The attackers may be not be malicious, for example external researchers or penetration testers.</p>]]></description><link>https://board.circlewithadot.net/topic/159ad51f-8e08-4ca1-9489-0b550ba3bd5e/please-nitpick-the-following-or-suggest-an-authority-such-as-nist-or-cisa</link><generator>RSS for Node</generator><lastBuildDate>Fri, 17 Apr 2026 03:20:55 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/159ad51f-8e08-4ca1-9489-0b550ba3bd5e.rss" rel="self" type="application/rss+xml"/><pubDate>Sat, 04 Apr 2026 20:01:06 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to Please nitpick the following (or suggest an authority, such as NIST or CISA ) on Mon, 06 Apr 2026 07:17:20 GMT]]></title><description><![CDATA[<p><span><a href="/user/adamshostack%40infosec.exchange">@<span>adamshostack</span></a></span> nails it pretty well imo</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/d3tm4r/statuses/116356536126448345</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/d3tm4r/statuses/116356536126448345</guid><dc:creator><![CDATA[d3tm4r@infosec.exchange]]></dc:creator><pubDate>Mon, 06 Apr 2026 07:17:20 GMT</pubDate></item><item><title><![CDATA[Reply to Please nitpick the following (or suggest an authority, such as NIST or CISA ) on Sat, 04 Apr 2026 21:41:56 GMT]]></title><description><![CDATA[<p><span><a href="/user/adamshostack%40infosec.exchange" rel="nofollow noopener">@<span>adamshostack</span></a></span> </p><p>I would include under the umbrella of weakness "lack of observability."</p><p>It's a definite weakness if there's no monitoring in place to alert on obvious suspicious behaviour, and I don't see that accounted for in what's written.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.space/users/fennix/statuses/116348611237431772</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.space/users/fennix/statuses/116348611237431772</guid><dc:creator><![CDATA[fennix@infosec.space]]></dc:creator><pubDate>Sat, 04 Apr 2026 21:41:56 GMT</pubDate></item><item><title><![CDATA[Reply to Please nitpick the following (or suggest an authority, such as NIST or CISA ) on Sat, 04 Apr 2026 21:26:34 GMT]]></title><description><![CDATA[<p><span><a href="/user/heiglandreas%40phpc.social" rel="nofollow noopener">@<span>heiglandreas</span></a></span> It absolutely does, but in a nuanced way that's far less salient than say, "pwned."</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/adamshostack/statuses/116348550828388844</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/adamshostack/statuses/116348550828388844</guid><dc:creator><![CDATA[adamshostack@infosec.exchange]]></dc:creator><pubDate>Sat, 04 Apr 2026 21:26:34 GMT</pubDate></item><item><title><![CDATA[Reply to Please nitpick the following (or suggest an authority, such as NIST or CISA ) on Sat, 04 Apr 2026 20:47:17 GMT]]></title><description><![CDATA[<p><span><a href="/user/adamshostack%40infosec.exchange">@<span>adamshostack</span></a></span> Another nitpick: consider changing “gain” to “reach” or “achieve”.</p><p>I agree with Prof. <span><a href="/user/mattblaze%40federate.social">@<span>mattblaze</span></a></span> about “weaponize”. It’s my preferred alternative, but his suggestion “fieldable” works fine. Also consider “operational” or “operationalized” as alternatives closer to “weaponized”.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/0xd0ug/statuses/116348396348102297</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/0xd0ug/statuses/116348396348102297</guid><dc:creator><![CDATA[0xd0ug@infosec.exchange]]></dc:creator><pubDate>Sat, 04 Apr 2026 20:47:17 GMT</pubDate></item><item><title><![CDATA[Reply to Please nitpick the following (or suggest an authority, such as NIST or CISA ) on Sat, 04 Apr 2026 20:42:47 GMT]]></title><description><![CDATA[<p><span><a href="/user/adamshostack%40infosec.exchange">@<span>adamshostack</span></a></span> well does RCE not negatively influence integrity and confidentiality?</p><p>I mean... when someone can execurlte anything on a server, then integrity is compromised and confidentiality can't be guaranteed... <img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f937.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--shrug" style="height:23px;width:auto;vertical-align:middle" title="🤷" alt="🤷" /></p>]]></description><link>https://board.circlewithadot.net/post/https://phpc.social/users/heiglandreas/statuses/116348378637298996</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://phpc.social/users/heiglandreas/statuses/116348378637298996</guid><dc:creator><![CDATA[heiglandreas@phpc.social]]></dc:creator><pubDate>Sat, 04 Apr 2026 20:42:47 GMT</pubDate></item><item><title><![CDATA[Reply to Please nitpick the following (or suggest an authority, such as NIST or CISA ) on Sat, 04 Apr 2026 20:39:38 GMT]]></title><description><![CDATA[<p>Some vulnerabilities can't be exploited in ways that lead to attacker success, e.g. the next/previous line of defense is sound, but they're still vulnerabilities in that they allow one or more lines of defense to be bypassed.<br />I'd also ask:<br />- do bugs usually get patched? <br />- is this definition supposed to cover social-engineering or insider threats?<br />- is this definition supposed to cover volumetric DOS?</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/BenAveling/statuses/116348366263099078</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/BenAveling/statuses/116348366263099078</guid><dc:creator><![CDATA[benaveling@infosec.exchange]]></dc:creator><pubDate>Sat, 04 Apr 2026 20:39:38 GMT</pubDate></item><item><title><![CDATA[Reply to Please nitpick the following (or suggest an authority, such as NIST or CISA ) on Sat, 04 Apr 2026 20:35:54 GMT]]></title><description><![CDATA[<p><span><a href="/user/adamshostack%40infosec.exchange">@<span>adamshostack</span></a></span> "Fieldable"</p>]]></description><link>https://board.circlewithadot.net/post/https://federate.social/users/mattblaze/statuses/116348351580823341</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://federate.social/users/mattblaze/statuses/116348351580823341</guid><dc:creator><![CDATA[mattblaze@federate.social]]></dc:creator><pubDate>Sat, 04 Apr 2026 20:35:54 GMT</pubDate></item><item><title><![CDATA[Reply to Please nitpick the following (or suggest an authority, such as NIST or CISA ) on Sat, 04 Apr 2026 20:26:26 GMT]]></title><description><![CDATA[<p><span><a href="/user/heiglandreas%40phpc.social" rel="nofollow noopener">@<span>heiglandreas</span></a></span> Yeah, I looked at that, and frankly, respond really negatively to "a negative impact to confidentiality, integrity, or availability" ; I've never found C/I/A to be that useful around RCE</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/adamshostack/statuses/116348314336810648</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/adamshostack/statuses/116348314336810648</guid><dc:creator><![CDATA[adamshostack@infosec.exchange]]></dc:creator><pubDate>Sat, 04 Apr 2026 20:26:26 GMT</pubDate></item><item><title><![CDATA[Reply to Please nitpick the following (or suggest an authority, such as NIST or CISA ) on Sat, 04 Apr 2026 20:24:47 GMT]]></title><description><![CDATA[<p><span><a href="/user/mattblaze%40federate.social" rel="nofollow noopener">@<span>mattblaze</span></a></span> thanks! I thought about productize, bit not all 'fully developed' exploits are in products. do you have a better term handy?</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/adamshostack/statuses/116348307861806336</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/adamshostack/statuses/116348307861806336</guid><dc:creator><![CDATA[adamshostack@infosec.exchange]]></dc:creator><pubDate>Sat, 04 Apr 2026 20:24:47 GMT</pubDate></item><item><title><![CDATA[Reply to Please nitpick the following (or suggest an authority, such as NIST or CISA ) on Sat, 04 Apr 2026 20:23:44 GMT]]></title><description><![CDATA[<p><span><a href="/user/cford%40toot.thoughtworks.com" rel="nofollow noopener">@<span>cford</span></a></span> that is what i meant by milestone. I think it's misleading to claim that there are people who care about controlling EiP. They care about something else and that's a stepping stone along the way</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/adamshostack/statuses/116348303713732936</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/adamshostack/statuses/116348303713732936</guid><dc:creator><![CDATA[adamshostack@infosec.exchange]]></dc:creator><pubDate>Sat, 04 Apr 2026 20:23:44 GMT</pubDate></item><item><title><![CDATA[Reply to Please nitpick the following (or suggest an authority, such as NIST or CISA ) on Sat, 04 Apr 2026 20:20:10 GMT]]></title><description><![CDATA[<p><span><a href="/user/adamshostack%40infosec.exchange">@<span>adamshostack</span></a></span> sounds about right. I like the definition from the <span><a href="/user/cve_program%40mastodon.social">@<span>CVE_Program</span></a></span> glossary as well, <a href="https://www.cve.org/ResourcesSupport/Glossary#glossaryVulnerability" rel="nofollow noopener noreferrer"><span>https://www.</span><span>cve.org/ResourcesSupport/Gloss</span><span>ary#glossaryVulnerability</span></a> - especially how they explicitly mention the security policy.</p>]]></description><link>https://board.circlewithadot.net/post/https://merveilles.town/users/raboof/statuses/116348289709784042</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://merveilles.town/users/raboof/statuses/116348289709784042</guid><dc:creator><![CDATA[raboof@merveilles.town]]></dc:creator><pubDate>Sat, 04 Apr 2026 20:20:10 GMT</pubDate></item><item><title><![CDATA[Reply to Please nitpick the following (or suggest an authority, such as NIST or CISA ) on Sat, 04 Apr 2026 20:09:49 GMT]]></title><description><![CDATA[<p><span><a href="/user/adamshostack%40infosec.exchange">@<span>adamshostack</span></a></span> Would it make sense to say that a vulnerability can be exploited to attain some goal or achieve further compromise? Or is that what you mean by "milestone"?</p>]]></description><link>https://board.circlewithadot.net/post/https://toot.thoughtworks.com/users/cford/statuses/116348249004030064</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://toot.thoughtworks.com/users/cford/statuses/116348249004030064</guid><dc:creator><![CDATA[cford@toot.thoughtworks.com]]></dc:creator><pubDate>Sat, 04 Apr 2026 20:09:49 GMT</pubDate></item><item><title><![CDATA[Reply to Please nitpick the following (or suggest an authority, such as NIST or CISA ) on Sat, 04 Apr 2026 20:09:45 GMT]]></title><description><![CDATA[<p><span><a href="/user/adamshostack%40infosec.exchange">@<span>adamshostack</span></a></span> Nitpick: This seems to imply a progression from a PoC demo (something generally produced with the aim demonstrating a bug so it can be fixed) to actual exploit code. While that can certainly happen, we don't know that that distinction is always present for malicious exploits (it's only one path).</p><p>Also, people react to the term "weaponize". It carries some baggage. It doesn't particularly bother me, but some people dislike it.</p>]]></description><link>https://board.circlewithadot.net/post/https://federate.social/users/mattblaze/statuses/116348248735309266</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://federate.social/users/mattblaze/statuses/116348248735309266</guid><dc:creator><![CDATA[mattblaze@federate.social]]></dc:creator><pubDate>Sat, 04 Apr 2026 20:09:45 GMT</pubDate></item><item><title><![CDATA[Reply to Please nitpick the following (or suggest an authority, such as NIST or CISA ) on Sat, 04 Apr 2026 20:09:08 GMT]]></title><description><![CDATA[<p><span><a href="/user/adamshostack%40infosec.exchange">@<span>adamshostack</span></a></span> I know. I was asking myself that question every time I answer Bug-Bounty reports. </p><p>NIST defines it quite well in <a href="https://nvd.nist.gov/vuln" rel="nofollow noopener"><span>https://</span><span>nvd.nist.gov/vuln</span><span></span></a> - but that definition focuses on the attacked party and the impact on them.</p><p>Which is why I asked....</p>]]></description><link>https://board.circlewithadot.net/post/https://phpc.social/users/heiglandreas/statuses/116348246312590519</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://phpc.social/users/heiglandreas/statuses/116348246312590519</guid><dc:creator><![CDATA[heiglandreas@phpc.social]]></dc:creator><pubDate>Sat, 04 Apr 2026 20:09:08 GMT</pubDate></item><item><title><![CDATA[Reply to Please nitpick the following (or suggest an authority, such as NIST or CISA ) on Sat, 04 Apr 2026 20:06:04 GMT]]></title><description><![CDATA[<p><span><a href="/user/heiglandreas%40phpc.social" rel="nofollow noopener">@<span>heiglandreas</span></a></span> I think that in this context, the vulnerability is a more specific concept than the wider English term.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/adamshostack/statuses/116348234257881949</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/adamshostack/statuses/116348234257881949</guid><dc:creator><![CDATA[adamshostack@infosec.exchange]]></dc:creator><pubDate>Sat, 04 Apr 2026 20:06:04 GMT</pubDate></item><item><title><![CDATA[Reply to Please nitpick the following (or suggest an authority, such as NIST or CISA ) on Sat, 04 Apr 2026 20:03:56 GMT]]></title><description><![CDATA[<p><span><a href="/user/adamshostack%40infosec.exchange">@<span>adamshostack</span></a></span> Is a vulnerability something that benefits the attacker? Or something that hurts the attacked? (and being the IP-source of an attack on someone else *is* hurting the attacked)</p>]]></description><link>https://board.circlewithadot.net/post/https://phpc.social/users/heiglandreas/statuses/116348225899999958</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://phpc.social/users/heiglandreas/statuses/116348225899999958</guid><dc:creator><![CDATA[heiglandreas@phpc.social]]></dc:creator><pubDate>Sat, 04 Apr 2026 20:03:56 GMT</pubDate></item></channel></rss>