<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
    <title>pfsense</title>
    <link rel="self" type="application/atom+xml" href="https://links.pgmac.net.au/guest/tags/384/feed"/>
    <updated>2026-05-07T01:07:44+10:00</updated>
    <id>https://links.pgmac.net.au/guest/tags/384/feed</id>
            <entry>
            <id>https://links.pgmac.net.au/links/518</id>
            <title type="text"><![CDATA[Open Source Firewall pfsense Vulnerable to Remote Code Execution Attacks]]></title>
            <link rel="alternate" href="https://cybersecuritynews.com/open-source-firewall-pfsense-vulnerable/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/518"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[A vulnerability in the popular open-source firewall software pfSense has been identified, allowing for remote code execution (RCE) attacks.]]>
            </summary>
            <updated>2025-12-19T04:00:16+10:00</updated>
        </entry>
    </feed>
