<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://deepaegis.io</loc>
<lastmod>2026-04-16T13:51:32.606Z</lastmod>
<changefreq>daily</changefreq>
<priority>1</priority>
</url>
<url>
<loc>https://deepaegis.io/about-deepaegis-security</loc>
<lastmod>2026-04-16T13:51:32.606Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://deepaegis.io/contact-us</loc>
<lastmod>2026-04-16T13:51:32.606Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs</loc>
<lastmod>2026-04-16T13:51:32.606Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://deepaegis.io/career</loc>
<lastmod>2026-04-16T13:51:32.606Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories</loc>
<lastmod>2026-04-16T13:51:32.606Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://deepaegis.io/threat-advisories</loc>
<lastmod>2026-04-16T13:51:32.606Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://deepaegis.io/why-deepaegis</loc>
<lastmod>2026-04-16T13:51:32.606Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/critical-telnet-auth-bypass-explained</loc>
<lastmod>2026-03-26T15:34:27.365Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/dark-vector-security</loc>
<lastmod>2026-03-25T05:09:20.154Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/qualcomm-memory-flaw</loc>
<lastmod>2026-03-25T05:08:39.568Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/ai-for-continuous-risk-assessment-in-grc</loc>
<lastmod>2026-03-18T11:32:56.811Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/from-detection-to-response-ai-in-action</loc>
<lastmod>2026-03-18T11:32:49.160Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/the-exploit-report</loc>
<lastmod>2026-03-15T09:54:50.579Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/critical-brute-force-vulnerability-in-medtronic-carelink</loc>
<lastmod>2026-03-15T09:54:05.703Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/how-poor-access-control-causes-data-breaches</loc>
<lastmod>2026-03-03T07:41:02.215Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/anatomy-of-a-data-breach</loc>
<lastmod>2026-03-03T07:40:13.313Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/inside-the-latest-ransomware-surgery</loc>
<lastmod>2026-03-03T07:40:03.701Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/protecting-patient-data-in-cloud-healthcare-systems</loc>
<lastmod>2026-02-25T11:35:26.857Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/why-healthcare-is-a-top-target-for-ransomware</loc>
<lastmod>2026-02-25T11:35:21.566Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/how-hackers-exploit-zero-day-flaws</loc>
<lastmod>2026-02-20T10:08:44.825Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/phishing-tactics-that-still-work</loc>
<lastmod>2026-02-20T10:08:25.002Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/ai-based-threat-triage-in-incident-response</loc>
<lastmod>2026-02-18T10:37:06.679Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/phishing-tactics-that-still-work</loc>
<lastmod>2026-02-18T10:36:55.500Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/ai-in-grc-automating-risk-and-compliance</loc>
<lastmod>2026-02-18T10:36:32.256Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/ai-driven-incident-response-speed-matters</loc>
<lastmod>2026-02-18T10:36:25.031Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/what-is-iomt-and-why-medical-device-security-matters</loc>
<lastmod>2026-02-09T12:37:01.625Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/reducing-alert-fatigue-with-ai-in-socs</loc>
<lastmod>2026-02-09T12:36:55.411Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/governance-challenges-of-ai-in-cybersecurity</loc>
<lastmod>2026-02-09T12:36:26.458Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/machine-learning-in-vulnerability-management</loc>
<lastmod>2026-02-09T12:36:16.861Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/top-causes-of-healthcare-data-breaches</loc>
<lastmod>2026-02-03T11:27:28.124Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/using-ai-to-prioritize-vulnerabilities-faster</loc>
<lastmod>2026-02-03T11:27:17.137Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/how-ai-improves-security-policy-management</loc>
<lastmod>2026-02-03T11:27:06.003Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/ransomware-preparedness-and-recovery-for-healthcare</loc>
<lastmod>2026-01-30T16:04:03.853Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/iomt-security-risks-and-medical-device-protection</loc>
<lastmod>2026-01-18T07:41:27.329Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/securing-patient-data-across-modern-healthcare-systems</loc>
<lastmod>2026-01-18T07:41:10.534Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/patch-and-vulnerability-management-in-clinical-systems</loc>
<lastmod>2026-01-18T07:40:21.788Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/managing-third-party-cyber-risk-in-healthcare</loc>
<lastmod>2026-01-18T07:39:53.171Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/why-medical-device-patching-is-so-difficult</loc>
<lastmod>2026-01-10T12:55:31.047Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/how-hospitals-build-effective-incident-response-plans</loc>
<lastmod>2026-01-08T06:18:34.636Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/hidden-cyber-risks-from-healthcare-vendors</loc>
<lastmod>2026-01-08T06:18:10.832Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/top-5-soc-challenges-every-analyst-faces-in-2025</loc>
<lastmod>2026-01-05T16:29:48.157Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/common-vulnerabilities-in-hospital-networks</loc>
<lastmod>2026-01-05T11:24:22.104Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/risk-based-vulnerability-management</loc>
<lastmod>2026-01-02T06:13:03.688Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/healthcare-cybersecurity-best-practices-for-it-teams</loc>
<lastmod>2026-01-01T05:12:12.611Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/mfa-everywhere-securing-access-across-all-environments</loc>
<lastmod>2026-01-01T05:11:08.527Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/automating-threat-intelligence-the-future-of-cyber-defense</loc>
<lastmod>2026-01-01T05:10:41.630Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/creating-an-effective-cyber-incident-runbook</loc>
<lastmod>2026-01-01T05:09:11.995Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/how-threat-intel-drives-soc-decisions</loc>
<lastmod>2026-01-01T05:09:03.548Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/kpis-that-define-soc-maturity</loc>
<lastmod>2025-12-28T05:50:03.852Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/translating-soc-kpis-into-business-value</loc>
<lastmod>2025-12-28T05:49:53.519Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/soc-maturity-vs-soc-capabilities-whats-the-difference</loc>
<lastmod>2025-12-28T05:49:44.693Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/understanding-maturity-levels-in-security-operations</loc>
<lastmod>2025-12-28T05:49:36.861Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/what-your-soc-metrics-say-about-your-security-posture</loc>
<lastmod>2025-12-28T05:49:27.429Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/understanding-threat-feeds-in-cybersecurity</loc>
<lastmod>2025-12-28T05:49:03.102Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/threat-feeds-signal-or-noise</loc>
<lastmod>2025-12-28T05:48:53.741Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/why-gcc-firms-prioritize-data-privacy-in-2025</loc>
<lastmod>2025-12-28T05:48:41.288Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/how-edr-protects-endpoints-from-hidden-threats</loc>
<lastmod>2025-12-28T05:48:28.132Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/offline-backups-your-last-line-of-defense</loc>
<lastmod>2025-12-23T05:05:21.896Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/measuring-the-effectiveness-of-your-soc-program</loc>
<lastmod>2025-12-23T05:04:57.186Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/understanding-vulnerability-assessment-vs-pen-testing</loc>
<lastmod>2025-12-22T05:46:13.480Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/osint-in-modern-cyber-defense</loc>
<lastmod>2025-12-22T05:45:54.467Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/email-security-and-awareness-stop-phishing-fast</loc>
<lastmod>2025-12-22T05:45:41.603Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/building-a-complete-asset-inventory-checklist</loc>
<lastmod>2025-12-22T05:45:30.420Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/password-managers-smart-way-to-stay-secure</loc>
<lastmod>2025-12-21T11:27:16.120Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/why-your-middle-east-business-needs-247-soc-monitoring</loc>
<lastmod>2025-12-21T11:25:44.111Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/the-future-of-vulnerability-management-ai-cloud-and-zero</loc>
<lastmod>2025-12-17T13:05:20.791Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/vulnerability-management-best-practices-for-small-businesses</loc>
<lastmod>2025-12-17T13:05:13.002Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/what-is-vulnerability-management-and-why-does-it-matter</loc>
<lastmod>2025-12-17T13:04:58.592Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/how-vulnerability-management-fits-into-iso-27001-and-nist</loc>
<lastmod>2025-12-17T13:04:45.314Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/7-steps-to-building-a-practical-vulnerability-management</loc>
<lastmod>2025-12-17T13:04:31.784Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/top-7-cyber-threats-facing-gcc-companies</loc>
<lastmod>2025-12-11T13:44:07.476Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/role-of-automation-in-soc-maturity</loc>
<lastmod>2025-12-11T13:43:57.399Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/why-soc-maturity-is-critical-for-modern-enterprises</loc>
<lastmod>2025-12-11T13:43:49.225Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/tools-and-frameworks-for-soc-assessment</loc>
<lastmod>2025-12-09T11:34:35.698Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/building-a-roadmap-to-soc-optimization</loc>
<lastmod>2025-12-07T05:45:10.752Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/challenges-in-achieving-high-soc-maturity</loc>
<lastmod>2025-12-07T05:44:54.930Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/compliance-driven-kpi-reporting-for-socs</loc>
<lastmod>2025-12-07T05:44:31.791Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/cybersecurity-workforce-and-soc-maturity</loc>
<lastmod>2025-12-07T05:44:18.588Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/essential-soc-metrics-every-ciso-should-track</loc>
<lastmod>2025-12-07T05:43:50.824Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-40960</loc>
<lastmod>2026-04-16T04:00:15.208Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-40959</loc>
<lastmod>2026-04-16T04:00:15.366Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/openharness-path-traversal-information-disclosure-via-memory-show</loc>
<lastmod>2026-04-16T04:00:15.449Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/openharness-remote-administrative-command-injection-via-gateway-handler</loc>
<lastmod>2026-04-16T04:00:15.484Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/use-of-weak-cryptographic-key-in-tp-link-archer-c7</loc>
<lastmod>2026-04-16T04:00:15.531Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/barcode-scanner-mobile-app-less-1110-unauthenticated-privilege-escalation-via-insecure-token-authentication</loc>
<lastmod>2026-04-16T04:00:15.557Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-40947</loc>
<lastmod>2026-04-16T04:00:15.574Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/free5gc-udr-nudr-dr-influencedatasubs-to-notify-leaks-supi-in-error-response-body-without-authentication</loc>
<lastmod>2026-04-16T04:00:15.596Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/maddy-mail-server-ldap-filter-injection-via-unsanitized-username</loc>
<lastmod>2026-04-16T04:00:15.623Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/profilepress-less-41612-missing-authorization-to-authenticated-subscriber-inactive-membership-plan-subscription</loc>
<lastmod>2026-04-16T04:00:15.649Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/owasp-blt-has-rce-in-github-actions-via-untrusted-django-model-execution-in-workflow</loc>
<lastmod>2026-04-16T04:00:15.669Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/pillow-is-vulnerable-to-a-fits-gzip-decompression-bomb</loc>
<lastmod>2026-04-16T04:00:15.692Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/prometheus-stored-xss-via-metric-names-and-label-values-in-web-ui-tooltips-and-metrics-explorer</loc>
<lastmod>2026-04-16T04:00:15.715Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/istio-authorizationpolicy-incorrect-regex-matching-of-dots-in-serviceaccounts-fields-allows-policy-bypass</loc>
<lastmod>2026-04-16T04:00:15.742Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/argocd-image-updater-argocd-image-updater-cross-namespace-privilege-escalation-via-insufficient-namespace-validation</loc>
<lastmod>2026-04-16T04:00:15.762Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/processwire-cms-ssrf-via-add-module-from-url</loc>
<lastmod>2026-04-16T04:00:15.781Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/pega-platform-versions-810-through-2511-are-affected-by-a-stored-cross-site-scripting-vulnerability-in-a-user-interface-component-requires-a-high-privileged-user-with-a-developer-role</loc>
<lastmod>2026-04-16T04:00:15.799Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/pega-platform-versions-810-through-2511-are-affected-by-an-html-injection-vulnerability-in-a-user-interface-component-requires-a-high-privileged-user-with-a-developer-role</loc>
<lastmod>2026-04-16T04:00:15.819Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-6398</loc>
<lastmod>2026-04-16T04:00:15.847Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/composer-has-command-injection-via-malicious-perforce-reference</loc>
<lastmod>2026-04-16T04:00:15.870Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/apostrophecms-sanitize-html-allowedtags-bypass-via-entity-decoded-text-in-nontexttags-elements</loc>
<lastmod>2026-04-16T04:00:15.901Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/dgraph-unauthenticated-pprof-endpoint-leaks-admin-auth-token</loc>
<lastmod>2026-04-16T04:00:15.916Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/barracuda-rmm-less-202522-privilege-escalation-via-insecure-directory-permissions</loc>
<lastmod>2026-04-16T04:00:15.945Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-6364</loc>
<lastmod>2026-04-16T04:00:16.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-6362</loc>
<lastmod>2026-04-16T04:00:16.033Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-6319</loc>
<lastmod>2026-04-16T04:00:16.116Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-6318</loc>
<lastmod>2026-04-16T04:00:16.135Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-6308</loc>
<lastmod>2026-04-16T04:00:16.316Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-6306</loc>
<lastmod>2026-04-16T04:00:16.354Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-6303</loc>
<lastmod>2026-04-16T04:00:16.409Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/gimp-gimp-denial-of-service-via-crafted-pvr-image-file</loc>
<lastmod>2026-04-16T04:00:16.586Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/information-disclosure-via-choicescounts-query-parameters-bypassing-publicapiprojection-field-restrictions</loc>
<lastmod>2026-04-16T04:00:16.683Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/apostrophecms-stored-xss-in-seo-fields-leads-to-authenticated-api-data-exposure-in-apostrophecms</loc>
<lastmod>2026-04-16T04:00:16.706Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/apostrophecms-stored-xss-via-css-custom-property-injection-in-apostrophecmscolor-field-escaping-style-tag-context</loc>
<lastmod>2026-04-16T04:00:16.727Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/apostrophecms-publicapiprojection-bypass-via-project-query-builder-in-piece-type-rest-api</loc>
<lastmod>2026-04-16T06:12:42.770Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/loki-path-traversal-cve-2021-36156-bypass</loc>
<lastmod>2026-04-16T06:12:42.052Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/ffmpeg-ffmpeg-denial-of-service-and-potential-arbitrary-code-execution-via-signed-integer-overflow-in-dvd-subtitle-parser</loc>
<lastmod>2026-04-16T06:12:43.199Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/weblate-prefix-based-repository-boundary-check-bypass-via-symlinkjunction-path-prefix-collision</loc>
<lastmod>2026-04-16T04:00:16.914Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/weblate-javascript-localization-cdn-add-on-allows-arbitrary-local-file-read-outside-the-repository</loc>
<lastmod>2026-04-16T04:00:17.135Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/sensitive-cos-secretkey-exposed-in-plaintext-via-configuration-api-due-to-missing-type-protection</loc>
<lastmod>2026-04-16T06:12:42.516Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/apostrophecms-user-enumeration-via-timing-side-channel-in-password-reset-endpoint</loc>
<lastmod>2026-04-16T06:12:42.755Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/gimp-gimp-arbitrary-code-execution-or-denial-of-service-via-buffer-overflow-in-gif-image-processing</loc>
<lastmod>2026-04-16T06:12:43.188Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-6363</loc>
<lastmod>2026-04-16T06:12:43.176Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-6317</loc>
<lastmod>2026-04-16T06:12:43.122Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-6361</loc>
<lastmod>2026-04-16T06:12:43.164Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-6316</loc>
<lastmod>2026-04-16T06:12:43.110Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-6315</loc>
<lastmod>2026-04-16T06:12:43.101Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-6314</loc>
<lastmod>2026-04-16T06:12:43.091Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-6313</loc>
<lastmod>2026-04-16T06:12:43.081Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-6312</loc>
<lastmod>2026-04-16T06:12:43.070Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-6311</loc>
<lastmod>2026-04-16T06:12:43.058Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-6310</loc>
<lastmod>2026-04-16T06:12:42.389Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-6360</loc>
<lastmod>2026-04-16T06:12:42.456Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-6309</loc>
<lastmod>2026-04-16T06:12:43.048Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-6307</loc>
<lastmod>2026-04-16T06:12:42.366Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-6305</loc>
<lastmod>2026-04-16T06:12:42.354Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-6304</loc>
<lastmod>2026-04-16T06:12:43.033Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-6302</loc>
<lastmod>2026-04-16T06:12:43.020Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-6301</loc>
<lastmod>2026-04-16T06:12:43.010Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-6300</loc>
<lastmod>2026-04-16T06:12:43.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-6359</loc>
<lastmod>2026-04-16T06:12:43.152Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-6358</loc>
<lastmod>2026-04-16T06:12:43.138Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-6299</loc>
<lastmod>2026-04-16T06:12:42.974Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-6298</loc>
<lastmod>2026-04-16T06:12:42.285Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-6297</loc>
<lastmod>2026-04-16T06:12:42.955Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-6296</loc>
<lastmod>2026-04-16T06:12:42.276Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/gimp-gimp-denial-of-service-via-specially-crafted-seattle-filmworks-file</loc>
<lastmod>2026-04-16T06:12:42.246Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/gimp-gimp-application-crashes-or-information-disclosure-via-crafted-icns-image-files</loc>
<lastmod>2026-04-16T06:12:42.856Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/gimp-gimp-denial-of-service-due-to-stack-buffer-overflow-in-tim-image-loader</loc>
<lastmod>2026-04-16T06:12:42.233Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/gimp-gimp-heap-buffer-overflow-due-to-integer-overflow-in-fits-image-loader</loc>
<lastmod>2026-04-16T06:12:42.846Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/grafana-correlations-cross-tenant-data-disclosure-and-permanent-deletion-via-legacy-orgid0-record</loc>
<lastmod>2026-04-16T06:12:42.062Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/nexus-repository-3-hardcoded-credential-in-internal-database-component</loc>
<lastmod>2026-04-16T06:12:43.497Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/openproject-2fa-otp-verification-missing-rate-limiting</loc>
<lastmod>2026-04-16T06:12:42.724Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/photoshop-installer-or-cwe-427-uncontrolled-search-path-element</loc>
<lastmod>2026-04-16T06:12:42.198Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/sssd-out-of-bounds-read-in-the-sssd</loc>
<lastmod>2026-04-16T06:12:42.265Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/weblate-ssrf-via-the-webhook-add-on-using-unprotected-fetchurl</loc>
<lastmod>2026-04-16T06:12:42.832Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/weblate-privilege-escalation-in-the-user-api-endpoint</loc>
<lastmod>2026-04-16T06:12:43.443Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/weblate-ssrf-via-project-level-machinery-configuration</loc>
<lastmod>2026-04-16T06:12:43.424Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/kubevirt-kubevirt-unauthorized-subresource-access-due-to-improper-rbac-evaluation</loc>
<lastmod>2026-04-16T06:12:43.523Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/weblate-arbitrary-file-read-via-symlink</loc>
<lastmod>2026-04-16T06:12:42.797Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-30993</loc>
<lastmod>2026-04-16T04:00:17.277Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/weblate-authenticated-ssrf-via-redirect-bypass-of-allowedassetdomains-in-screenshot-url-uploads</loc>
<lastmod>2026-04-16T06:12:43.409Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/weblate-remote-code-execution-during-backup-restoration</loc>
<lastmod>2026-04-16T06:12:43.398Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/sailpoint-identityiq-debug-ui-incorrect-authorization</loc>
<lastmod>2026-04-16T06:12:43.483Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/weblate-has-improper-access-control-for-the-translation-memory-api</loc>
<lastmod>2026-04-16T06:12:42.696Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/weblate-improper-access-control-for-pending-tasks-in-api</loc>
<lastmod>2026-04-16T06:12:46.010Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/velociraptor-query-plugin-misapplies-permissions-to-orgs</loc>
<lastmod>2026-04-16T06:12:46.195Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/git-for-windows-git-clone-from-manipulated-repositories-can-leak-ntlm-hashes-to-arbitrary-servers</loc>
<lastmod>2026-04-16T06:12:43.387Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/mafintoshs-protocol-buffers-schema-is-vulnerable-to-prototype-pollution</loc>
<lastmod>2026-04-16T06:12:43.508Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/wordpress-accept-cryptocurrencies-with-plisio-plugin-less-205-payment-bypass-vulnerability</loc>
<lastmod>2026-04-16T04:00:17.295Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/wordpress-mini-ajax-cart-for-woocommerce-plugin-less-134-cross-site-scripting-xss-vulnerability</loc>
<lastmod>2026-04-16T04:00:17.317Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/wordpress-smart-online-order-for-clover-plugin-less-160-cross-site-request-forgery-csrf-vulnerability</loc>
<lastmod>2026-04-16T04:00:17.819Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2025-15610</loc>
<lastmod>2026-04-16T06:12:43.564Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/wordpress-wcfm-marketplace-plugin-less-371-sql-injection-vulnerability</loc>
<lastmod>2026-04-16T06:12:43.610Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-30625</loc>
<lastmod>2026-04-16T04:00:17.913Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-30461</loc>
<lastmod>2026-04-16T04:00:17.982Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2025-67841</loc>
<lastmod>2026-04-16T04:00:18.074Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cisco-identity-services-engine-authenticated-privilege-escalation-vulnerability</loc>
<lastmod>2026-04-16T06:12:46.353Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cisco-unity-connection-reflected-cross-site-scripting-vulnerability</loc>
<lastmod>2026-04-16T06:12:46.273Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cisco-unity-connection-sql-injection-vulnerability</loc>
<lastmod>2026-04-16T06:12:46.300Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
</urlset>
