<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://deepaegis.io</loc>
<lastmod>2026-05-23T20:46:53.121Z</lastmod>
<changefreq>daily</changefreq>
<priority>1</priority>
</url>
<url>
<loc>https://deepaegis.io/about-deepaegis-security</loc>
<lastmod>2026-05-23T20:46:53.121Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://deepaegis.io/contact-us</loc>
<lastmod>2026-05-23T20:46:53.121Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs</loc>
<lastmod>2026-05-23T20:46:53.121Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://deepaegis.io/career</loc>
<lastmod>2026-05-23T20:46:53.121Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories</loc>
<lastmod>2026-05-23T20:46:53.121Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://deepaegis.io/threat-advisories</loc>
<lastmod>2026-05-23T20:46:53.121Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://deepaegis.io/why-deepaegis</loc>
<lastmod>2026-05-23T20:46:53.121Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/critical-telnet-auth-bypass-explained</loc>
<lastmod>2026-03-26T15:34:27.365Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/dark-vector-security</loc>
<lastmod>2026-03-25T05:09:20.154Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/qualcomm-memory-flaw</loc>
<lastmod>2026-03-25T05:08:39.568Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/ai-for-continuous-risk-assessment-in-grc</loc>
<lastmod>2026-03-18T11:32:56.811Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/from-detection-to-response-ai-in-action</loc>
<lastmod>2026-03-18T11:32:49.160Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/the-exploit-report</loc>
<lastmod>2026-03-15T09:54:50.579Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/critical-brute-force-vulnerability-in-medtronic-carelink</loc>
<lastmod>2026-03-15T09:54:05.703Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/how-poor-access-control-causes-data-breaches</loc>
<lastmod>2026-03-03T07:41:02.215Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/anatomy-of-a-data-breach</loc>
<lastmod>2026-03-03T07:40:13.313Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/inside-the-latest-ransomware-surgery</loc>
<lastmod>2026-03-03T07:40:03.701Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/protecting-patient-data-in-cloud-healthcare-systems</loc>
<lastmod>2026-02-25T11:35:26.857Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/why-healthcare-is-a-top-target-for-ransomware</loc>
<lastmod>2026-02-25T11:35:21.566Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/how-hackers-exploit-zero-day-flaws</loc>
<lastmod>2026-02-20T10:08:44.825Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/phishing-tactics-that-still-work</loc>
<lastmod>2026-02-20T10:08:25.002Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/ai-based-threat-triage-in-incident-response</loc>
<lastmod>2026-02-18T10:37:06.679Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/phishing-tactics-that-still-work</loc>
<lastmod>2026-02-18T10:36:55.500Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/ai-in-grc-automating-risk-and-compliance</loc>
<lastmod>2026-02-18T10:36:32.256Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/ai-driven-incident-response-speed-matters</loc>
<lastmod>2026-02-18T10:36:25.031Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/what-is-iomt-and-why-medical-device-security-matters</loc>
<lastmod>2026-02-09T12:37:01.625Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/reducing-alert-fatigue-with-ai-in-socs</loc>
<lastmod>2026-02-09T12:36:55.411Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/governance-challenges-of-ai-in-cybersecurity</loc>
<lastmod>2026-02-09T12:36:26.458Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/machine-learning-in-vulnerability-management</loc>
<lastmod>2026-02-09T12:36:16.861Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/top-causes-of-healthcare-data-breaches</loc>
<lastmod>2026-02-03T11:27:28.124Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/using-ai-to-prioritize-vulnerabilities-faster</loc>
<lastmod>2026-02-03T11:27:17.137Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/how-ai-improves-security-policy-management</loc>
<lastmod>2026-02-03T11:27:06.003Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/ransomware-preparedness-and-recovery-for-healthcare</loc>
<lastmod>2026-01-30T16:04:03.853Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/iomt-security-risks-and-medical-device-protection</loc>
<lastmod>2026-01-18T07:41:27.329Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/securing-patient-data-across-modern-healthcare-systems</loc>
<lastmod>2026-01-18T07:41:10.534Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/patch-and-vulnerability-management-in-clinical-systems</loc>
<lastmod>2026-01-18T07:40:21.788Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/managing-third-party-cyber-risk-in-healthcare</loc>
<lastmod>2026-01-18T07:39:53.171Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/why-medical-device-patching-is-so-difficult</loc>
<lastmod>2026-01-10T12:55:31.047Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/how-hospitals-build-effective-incident-response-plans</loc>
<lastmod>2026-01-08T06:18:34.636Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/hidden-cyber-risks-from-healthcare-vendors</loc>
<lastmod>2026-01-08T06:18:10.832Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/top-5-soc-challenges-every-analyst-faces-in-2025</loc>
<lastmod>2026-01-05T16:29:48.157Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/common-vulnerabilities-in-hospital-networks</loc>
<lastmod>2026-01-05T11:24:22.104Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/risk-based-vulnerability-management</loc>
<lastmod>2026-01-02T06:13:03.688Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/healthcare-cybersecurity-best-practices-for-it-teams</loc>
<lastmod>2026-01-01T05:12:12.611Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/mfa-everywhere-securing-access-across-all-environments</loc>
<lastmod>2026-01-01T05:11:08.527Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/automating-threat-intelligence-the-future-of-cyber-defense</loc>
<lastmod>2026-01-01T05:10:41.630Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/creating-an-effective-cyber-incident-runbook</loc>
<lastmod>2026-01-01T05:09:11.995Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/how-threat-intel-drives-soc-decisions</loc>
<lastmod>2026-01-01T05:09:03.548Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/kpis-that-define-soc-maturity</loc>
<lastmod>2025-12-28T05:50:03.852Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/translating-soc-kpis-into-business-value</loc>
<lastmod>2025-12-28T05:49:53.519Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/soc-maturity-vs-soc-capabilities-whats-the-difference</loc>
<lastmod>2025-12-28T05:49:44.693Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/understanding-maturity-levels-in-security-operations</loc>
<lastmod>2025-12-28T05:49:36.861Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/what-your-soc-metrics-say-about-your-security-posture</loc>
<lastmod>2025-12-28T05:49:27.429Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/understanding-threat-feeds-in-cybersecurity</loc>
<lastmod>2025-12-28T05:49:03.102Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/threat-feeds-signal-or-noise</loc>
<lastmod>2025-12-28T05:48:53.741Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/why-gcc-firms-prioritize-data-privacy-in-2025</loc>
<lastmod>2025-12-28T05:48:41.288Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/how-edr-protects-endpoints-from-hidden-threats</loc>
<lastmod>2025-12-28T05:48:28.132Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/offline-backups-your-last-line-of-defense</loc>
<lastmod>2025-12-23T05:05:21.896Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/measuring-the-effectiveness-of-your-soc-program</loc>
<lastmod>2025-12-23T05:04:57.186Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/understanding-vulnerability-assessment-vs-pen-testing</loc>
<lastmod>2025-12-22T05:46:13.480Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/osint-in-modern-cyber-defense</loc>
<lastmod>2025-12-22T05:45:54.467Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/email-security-and-awareness-stop-phishing-fast</loc>
<lastmod>2025-12-22T05:45:41.603Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/building-a-complete-asset-inventory-checklist</loc>
<lastmod>2025-12-22T05:45:30.420Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/password-managers-smart-way-to-stay-secure</loc>
<lastmod>2025-12-21T11:27:16.120Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/why-your-middle-east-business-needs-247-soc-monitoring</loc>
<lastmod>2025-12-21T11:25:44.111Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/the-future-of-vulnerability-management-ai-cloud-and-zero</loc>
<lastmod>2025-12-17T13:05:20.791Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/vulnerability-management-best-practices-for-small-businesses</loc>
<lastmod>2025-12-17T13:05:13.002Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/what-is-vulnerability-management-and-why-does-it-matter</loc>
<lastmod>2025-12-17T13:04:58.592Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/how-vulnerability-management-fits-into-iso-27001-and-nist</loc>
<lastmod>2025-12-17T13:04:45.314Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/7-steps-to-building-a-practical-vulnerability-management</loc>
<lastmod>2025-12-17T13:04:31.784Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/top-7-cyber-threats-facing-gcc-companies</loc>
<lastmod>2025-12-11T13:44:07.476Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/role-of-automation-in-soc-maturity</loc>
<lastmod>2025-12-11T13:43:57.399Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/why-soc-maturity-is-critical-for-modern-enterprises</loc>
<lastmod>2025-12-11T13:43:49.225Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/tools-and-frameworks-for-soc-assessment</loc>
<lastmod>2025-12-09T11:34:35.698Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/building-a-roadmap-to-soc-optimization</loc>
<lastmod>2025-12-07T05:45:10.752Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/challenges-in-achieving-high-soc-maturity</loc>
<lastmod>2025-12-07T05:44:54.930Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/compliance-driven-kpi-reporting-for-socs</loc>
<lastmod>2025-12-07T05:44:31.791Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/cybersecurity-workforce-and-soc-maturity</loc>
<lastmod>2025-12-07T05:44:18.588Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/essential-soc-metrics-every-ciso-should-track</loc>
<lastmod>2025-12-07T05:43:50.824Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/mermaid-improper-sanitization-of-classdef-in-state-diagrams-leads-to-html-injection</loc>
<lastmod>2026-05-23T06:06:32.407Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/microsoft-entra-id-elevation-of-privilege-vulnerability</loc>
<lastmod>2026-05-23T06:06:32.422Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/azure-privileged-identity-management-pim-elevation-of-privilege-vulnerability</loc>
<lastmod>2026-05-23T06:06:32.357Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/rt-spreadsheet-downloads-vulnerable-to-csvformula-injection-in-microsoft-excel-and-similar-apps</loc>
<lastmod>2026-05-23T06:06:32.606Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/mantisbt-has-potential-referer-based-reflected-html-injection-xss-in-tag-update-page</loc>
<lastmod>2026-05-23T06:06:32.592Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/mantisbt-is-vulnerable-to-xss-and-potential-account-takeover-via-user-font-family-preference-update</loc>
<lastmod>2026-05-23T06:06:35.050Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/authentik-privilege-escalation-via-user-patch-superuser-group-assignment-bypasses-enablegroupsuperuser</loc>
<lastmod>2026-05-23T06:06:35.036Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/typebot-whatsapp-webhook-endpoint-missing-signature-verification</loc>
<lastmod>2026-05-23T06:06:32.579Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-48700</loc>
<lastmod>2026-05-23T06:06:35.099Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/docker-desktop-enhanced-container-isolation-bypass-via-use-api-socket-cli-flag</loc>
<lastmod>2026-05-23T06:06:32.242Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/typebot-async-filter-bypasses-authorization-allowing-idor-in-getlinkedtypebots-and-leaking-cross-workspace-bot-definitions</loc>
<lastmod>2026-05-23T06:06:35.311Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/insecure-deserialization-in-amazon-braket-sdk-job-results-processing</loc>
<lastmod>2026-05-23T06:06:35.444Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/typebot-stored-cross-site-scripting-xss-via-svg-file-upload-on-profile-picture-form</loc>
<lastmod>2026-05-23T06:06:35.018Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/typebot-ssrf-via-open-redirect-bypass-in-http-request-and-code-blocks</loc>
<lastmod>2026-05-23T06:06:35.298Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/typebot-stored-xss-via-javascript-uri-in-text-bubble-links-bot-author-executes-js-on-visitors-browsers</loc>
<lastmod>2026-05-23T06:06:32.565Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/typebot-ssrf-protection-bypass-via-dns-resolved-hostnames-in-webhook-http-request-validation</loc>
<lastmod>2026-05-23T06:06:35.196Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/typebot-unauthenticated-ssrf-via-isolated-vm-fetch-in-preview-chat-endpoint-bypasses-ssrf-controls</loc>
<lastmod>2026-05-23T06:06:35.565Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/tool-execution-without-authorization-via-piped-stdin-in-kiro-cli</loc>
<lastmod>2026-05-23T06:06:35.901Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/github-oauth-scope-validation</loc>
<lastmod>2026-05-23T06:06:36.004Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/typebot-stored-xss-via-rating-block-custom-icon-bypasses-isunsafe-sandbox-in-builder-preview</loc>
<lastmod>2026-05-23T06:06:35.527Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/typebot-idor-in-result-logs-endpoint-allows-cross-workspace-data-disclosure</loc>
<lastmod>2026-05-23T06:06:35.993Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-7325</loc>
<lastmod>2026-05-23T06:06:36.066Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-9251</loc>
<lastmod>2026-05-23T06:06:35.890Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-5171</loc>
<lastmod>2026-05-23T06:06:36.058Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-8477</loc>
<lastmod>2026-05-23T06:06:36.096Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-9246</loc>
<lastmod>2026-05-23T06:06:36.171Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-9224</loc>
<lastmod>2026-05-23T06:06:36.147Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-9249</loc>
<lastmod>2026-05-23T06:06:36.201Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-9245</loc>
<lastmod>2026-05-23T06:06:36.159Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-9247</loc>
<lastmod>2026-05-23T06:06:36.181Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-9248</loc>
<lastmod>2026-05-23T06:06:36.191Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-9223</loc>
<lastmod>2026-05-23T06:06:36.132Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-9047</loc>
<lastmod>2026-05-23T06:06:36.110Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/invoking-duplicate-attributes-can-cause-xss-in-golangorgxnethtml</loc>
<lastmod>2026-05-23T06:06:35.980Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/invoking-incorrect-handling-of-character-references-in-doctype-nodes-in-golangorgxnethtml</loc>
<lastmod>2026-05-23T06:06:35.484Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/invoking-denial-of-service-when-parsing-arbitrary-html-in-golangorgxnethtml</loc>
<lastmod>2026-05-23T06:06:35.968Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/invoking-incorrect-handling-of-html-elements-in-foreign-content-in-golangorgxnethtml</loc>
<lastmod>2026-05-23T06:06:35.688Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/invoking-failure-to-reject-ascii-only-punycode-encoded-labels-in-golangorgxnetidna</loc>
<lastmod>2026-05-23T06:06:35.664Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/invoking-incorrect-handling-of-namespaced-elements-in-foreign-content-in-golangorgxnethtml</loc>
<lastmod>2026-05-23T06:06:35.696Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2022-34363</loc>
<lastmod>2026-05-23T06:06:35.174Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2022-31231</loc>
<lastmod>2026-05-23T06:06:32.553Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-8992</loc>
<lastmod>2026-05-23T06:06:36.579Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/concrete-cms-version-90-to-950-is-vulnerable-to-stored-xss-via-page-name-in-atomik-theme</loc>
<lastmod>2026-05-23T06:06:36.083Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2021-21508</loc>
<lastmod>2026-05-23T06:06:36.244Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/concrete-cms-950-and-below-is-vulnerable-to-idor-wrong-authorization-level-in-express-association-reorder-dialog</loc>
<lastmod>2026-05-23T06:06:35.761Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/concrete-cms-950-and-below-is-vulnerable-to-csrf-via-backendfileapproveversion</loc>
<lastmod>2026-05-23T06:06:35.753Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2025-32751</loc>
<lastmod>2026-05-23T06:06:35.465Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2025-46371</loc>
<lastmod>2026-05-23T06:06:35.942Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2025-26483</loc>
<lastmod>2026-05-23T06:06:35.456Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/heap-buffer-overflow-in-vifm</loc>
<lastmod>2026-05-23T06:06:36.589Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2025-32745</loc>
<lastmod>2026-05-23T06:06:36.374Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/shell-quote-quote-does-not-validate-object-token-shapes-allowing-command-injection-via-line-terminators-in-op</loc>
<lastmod>2026-05-23T06:06:36.621Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/password-re-initialization-mechanism-sends-passwords-in-plain-text</loc>
<lastmod>2026-05-23T06:06:36.571Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/default-credentials-for-internal-db</loc>
<lastmod>2026-05-23T06:06:36.560Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/log-files-contain-encrypted-secrets</loc>
<lastmod>2026-05-23T06:06:36.551Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2025-32746</loc>
<lastmod>2026-05-23T06:06:32.347Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/insecure-session-handling-on-metrics-web-server</loc>
<lastmod>2026-05-23T06:06:36.537Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2025-32747</loc>
<lastmod>2026-05-23T06:06:35.186Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2025-32749</loc>
<lastmod>2026-05-23T06:06:36.842Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/apache-cxf-incomplete-fix-for-cve-2025-48913-untrusted-jms-configuration-can-lead-to-rce</loc>
<lastmod>2026-05-23T06:06:37.604Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/apache-cxf-xxe-vulnerability-in-ws-transfer-functionality</loc>
<lastmod>2026-05-23T06:06:37.615Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/apache-cxf-ldap-injection-vulnerability-in-xkms-ldap-repository</loc>
<lastmod>2026-05-23T06:06:35.712Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/persistent-notification-timing-attack-causing-server-denial-of-service</loc>
<lastmod>2026-05-23T06:06:38.304Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/improper-file-ownership-validation-in-the-boards-api-allows-unauthorised-file-access</loc>
<lastmod>2026-05-23T06:06:37.565Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/insufficient-input-validation-in-github-plugin-api-causes-denial-of-service</loc>
<lastmod>2026-05-23T06:06:37.639Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/sanitize-team-member-data-returned-by-api</loc>
<lastmod>2026-05-23T06:06:37.591Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/unauthenticated-websocket-binary-frame-causes-denial-of-service-in-mattermost-server</loc>
<lastmod>2026-05-23T06:06:37.692Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/missing-request-body-size-limits-on-zoom-plugin-http-endpoints</loc>
<lastmod>2026-05-23T06:06:37.679Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/denial-of-service-via-crafted-tiff-file-upload</loc>
<lastmod>2026-05-23T06:06:37.700Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/lack-of-traffic-encryption-in-ster</loc>
<lastmod>2026-05-23T06:06:38.503Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/weak-password-encoding-in-ster</loc>
<lastmod>2026-05-23T06:06:36.418Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/sql-injection-in-ster</loc>
<lastmod>2026-05-23T06:06:36.405Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/broken-access-control-in-teamviewer-dex-platform-on-premises</loc>
<lastmod>2026-05-23T06:06:36.525Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/audioigniter-music-player-less-202-unauthenticated-insecure-direct-object-reference-to-audioigniterplaylistid-parameter</loc>
<lastmod>2026-05-23T06:06:38.546Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/motopress-hotel-booking-less-601-missing-authorization-to-unauthenticated-arbitrary-booking-notes-modification-via-mphbupdatebookingnotes-ajax-action</loc>
<lastmod>2026-05-23T06:06:38.053Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/fluentcrm-less-2987-unauthenticated-blind-server-side-request-forgery-via-subscribeurl-parameter</loc>
<lastmod>2026-05-23T06:06:35.418Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/slider-by-soliloquy-less-281-authenticated-subscriber-information-disclosure-via-rest-api-endpoint</loc>
<lastmod>2026-05-23T06:06:36.515Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/ditty-less-3165-missing-authorization-to-unauthenticated-sensitive-information-disclosure-via-dittyinit-ajax-action</loc>
<lastmod>2026-05-23T06:06:32.746Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/widget-context-less-133-cross-site-request-forgery-to-settings-update-via-wl-parameter</loc>
<lastmod>2026-05-23T06:06:32.717Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/vedrixa-forms-less-111-missing-authorization-to-authenticated-subscriber-arbitrary-form-structure-modification-via-wefbsaveformstructure-ajax-action</loc>
<lastmod>2026-05-23T06:06:38.065Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/ptp-potential-denial-of-service-via-ptp-interval-shift</loc>
<lastmod>2026-05-23T06:06:36.051Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/easy-elements-for-elementor-addons-and-website-templates-less-145-unauthenticated-privilege-escalation-via-custommeta-parameter</loc>
<lastmod>2026-05-23T06:06:38.078Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/alfie-less-121-cross-site-request-forgery-to-feed-deletion-via-delete-parameter</loc>
<lastmod>2026-05-23T06:06:32.702Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/fastx-less-102-missing-authorization-to-authenticated-subscriber-limited-plugin-installation-and-activation</loc>
<lastmod>2026-05-23T06:06:37.503Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/wp-blockade-less-0914-reflected-cross-site-scripting-via-shortcode-parameter</loc>
<lastmod>2026-05-23T06:06:37.579Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/information-disclosure-vulnerability-in-zte-mu5250</loc>
<lastmod>2026-05-23T06:06:36.435Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/location-weather-less-302-missing-authorization-to-authenticated-contributor-block-settings-modification-and-cache-purging</loc>
<lastmod>2026-05-23T06:06:35.406Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/kia-subtitle-less-401-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting</loc>
<lastmod>2026-05-23T06:06:38.533Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cbx-5-star-rating-and-review-less-107-reflected-cross-site-scripting-via-page-parameter</loc>
<lastmod>2026-05-23T06:06:37.132Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/draft-list-less-263-authenticated-author-stored-cross-site-scripting-via-draft-post-title</loc>
<lastmod>2026-05-23T06:06:38.107Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/invalid-ip-packets-cause-a-kernel-panic</loc>
<lastmod>2026-05-23T06:06:36.119Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-9053</loc>
<lastmod>2026-05-23T06:06:38.091Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/invoking-pathological-inputs-can-lead-to-client-panic-in-golangorgxcryptosshagent</loc>
<lastmod>2026-05-23T06:06:35.348Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/invoking-verifiedpublickeycallback-permissions-skip-enforcement-in-golangorgxcryptossh</loc>
<lastmod>2026-05-23T06:06:35.336Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/invoking-auth-bypass-via-unenforced-revoked-status-in-golangorgxcryptosshknownhosts</loc>
<lastmod>2026-05-23T06:06:35.323Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/invoking-infinite-loop-on-large-channel-writes-in-golangorgxcryptossh</loc>
<lastmod>2026-05-23T06:06:35.288Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/invoking-bypass-of-fidou2f-security-keys-physical-interaction-in-golangorgxcryptossh</loc>
<lastmod>2026-05-23T06:06:35.254Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/invoking-pathological-rsadsa-parameters-may-cause-dos-in-golangorgxcryptossh</loc>
<lastmod>2026-05-23T06:06:35.218Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/invoking-client-can-cause-server-deadlock-on-unexpected-responses-in-golangorgxcryptossh</loc>
<lastmod>2026-05-23T06:06:35.237Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/invoking-memory-leak-when-rejecting-channels-can-lead-to-dos-in-golangorgxcryptossh</loc>
<lastmod>2026-05-23T06:06:34.934Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
</urlset>
