<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://deepaegis.io</loc>
<lastmod>2026-05-10T10:56:00.855Z</lastmod>
<changefreq>daily</changefreq>
<priority>1</priority>
</url>
<url>
<loc>https://deepaegis.io/about-deepaegis-security</loc>
<lastmod>2026-05-10T10:56:00.855Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://deepaegis.io/contact-us</loc>
<lastmod>2026-05-10T10:56:00.855Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs</loc>
<lastmod>2026-05-10T10:56:00.855Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://deepaegis.io/career</loc>
<lastmod>2026-05-10T10:56:00.855Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories</loc>
<lastmod>2026-05-10T10:56:00.855Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://deepaegis.io/threat-advisories</loc>
<lastmod>2026-05-10T10:56:00.855Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://deepaegis.io/why-deepaegis</loc>
<lastmod>2026-05-10T10:56:00.855Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/critical-telnet-auth-bypass-explained</loc>
<lastmod>2026-03-26T15:34:27.365Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/dark-vector-security</loc>
<lastmod>2026-03-25T05:09:20.154Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/qualcomm-memory-flaw</loc>
<lastmod>2026-03-25T05:08:39.568Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/ai-for-continuous-risk-assessment-in-grc</loc>
<lastmod>2026-03-18T11:32:56.811Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/from-detection-to-response-ai-in-action</loc>
<lastmod>2026-03-18T11:32:49.160Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/the-exploit-report</loc>
<lastmod>2026-03-15T09:54:50.579Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/critical-brute-force-vulnerability-in-medtronic-carelink</loc>
<lastmod>2026-03-15T09:54:05.703Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/how-poor-access-control-causes-data-breaches</loc>
<lastmod>2026-03-03T07:41:02.215Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/anatomy-of-a-data-breach</loc>
<lastmod>2026-03-03T07:40:13.313Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/inside-the-latest-ransomware-surgery</loc>
<lastmod>2026-03-03T07:40:03.701Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/protecting-patient-data-in-cloud-healthcare-systems</loc>
<lastmod>2026-02-25T11:35:26.857Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/why-healthcare-is-a-top-target-for-ransomware</loc>
<lastmod>2026-02-25T11:35:21.566Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/how-hackers-exploit-zero-day-flaws</loc>
<lastmod>2026-02-20T10:08:44.825Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/phishing-tactics-that-still-work</loc>
<lastmod>2026-02-20T10:08:25.002Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/ai-based-threat-triage-in-incident-response</loc>
<lastmod>2026-02-18T10:37:06.679Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/phishing-tactics-that-still-work</loc>
<lastmod>2026-02-18T10:36:55.500Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/ai-in-grc-automating-risk-and-compliance</loc>
<lastmod>2026-02-18T10:36:32.256Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/ai-driven-incident-response-speed-matters</loc>
<lastmod>2026-02-18T10:36:25.031Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/what-is-iomt-and-why-medical-device-security-matters</loc>
<lastmod>2026-02-09T12:37:01.625Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/reducing-alert-fatigue-with-ai-in-socs</loc>
<lastmod>2026-02-09T12:36:55.411Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/governance-challenges-of-ai-in-cybersecurity</loc>
<lastmod>2026-02-09T12:36:26.458Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/machine-learning-in-vulnerability-management</loc>
<lastmod>2026-02-09T12:36:16.861Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/top-causes-of-healthcare-data-breaches</loc>
<lastmod>2026-02-03T11:27:28.124Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/using-ai-to-prioritize-vulnerabilities-faster</loc>
<lastmod>2026-02-03T11:27:17.137Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/how-ai-improves-security-policy-management</loc>
<lastmod>2026-02-03T11:27:06.003Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/ransomware-preparedness-and-recovery-for-healthcare</loc>
<lastmod>2026-01-30T16:04:03.853Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/iomt-security-risks-and-medical-device-protection</loc>
<lastmod>2026-01-18T07:41:27.329Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/securing-patient-data-across-modern-healthcare-systems</loc>
<lastmod>2026-01-18T07:41:10.534Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/patch-and-vulnerability-management-in-clinical-systems</loc>
<lastmod>2026-01-18T07:40:21.788Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/managing-third-party-cyber-risk-in-healthcare</loc>
<lastmod>2026-01-18T07:39:53.171Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/why-medical-device-patching-is-so-difficult</loc>
<lastmod>2026-01-10T12:55:31.047Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/how-hospitals-build-effective-incident-response-plans</loc>
<lastmod>2026-01-08T06:18:34.636Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/hidden-cyber-risks-from-healthcare-vendors</loc>
<lastmod>2026-01-08T06:18:10.832Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/top-5-soc-challenges-every-analyst-faces-in-2025</loc>
<lastmod>2026-01-05T16:29:48.157Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/common-vulnerabilities-in-hospital-networks</loc>
<lastmod>2026-01-05T11:24:22.104Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/risk-based-vulnerability-management</loc>
<lastmod>2026-01-02T06:13:03.688Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/healthcare-cybersecurity-best-practices-for-it-teams</loc>
<lastmod>2026-01-01T05:12:12.611Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/mfa-everywhere-securing-access-across-all-environments</loc>
<lastmod>2026-01-01T05:11:08.527Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/automating-threat-intelligence-the-future-of-cyber-defense</loc>
<lastmod>2026-01-01T05:10:41.630Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/creating-an-effective-cyber-incident-runbook</loc>
<lastmod>2026-01-01T05:09:11.995Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/how-threat-intel-drives-soc-decisions</loc>
<lastmod>2026-01-01T05:09:03.548Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/kpis-that-define-soc-maturity</loc>
<lastmod>2025-12-28T05:50:03.852Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/translating-soc-kpis-into-business-value</loc>
<lastmod>2025-12-28T05:49:53.519Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/soc-maturity-vs-soc-capabilities-whats-the-difference</loc>
<lastmod>2025-12-28T05:49:44.693Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/understanding-maturity-levels-in-security-operations</loc>
<lastmod>2025-12-28T05:49:36.861Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/what-your-soc-metrics-say-about-your-security-posture</loc>
<lastmod>2025-12-28T05:49:27.429Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/understanding-threat-feeds-in-cybersecurity</loc>
<lastmod>2025-12-28T05:49:03.102Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/threat-feeds-signal-or-noise</loc>
<lastmod>2025-12-28T05:48:53.741Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/why-gcc-firms-prioritize-data-privacy-in-2025</loc>
<lastmod>2025-12-28T05:48:41.288Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/how-edr-protects-endpoints-from-hidden-threats</loc>
<lastmod>2025-12-28T05:48:28.132Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/offline-backups-your-last-line-of-defense</loc>
<lastmod>2025-12-23T05:05:21.896Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/measuring-the-effectiveness-of-your-soc-program</loc>
<lastmod>2025-12-23T05:04:57.186Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/understanding-vulnerability-assessment-vs-pen-testing</loc>
<lastmod>2025-12-22T05:46:13.480Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/osint-in-modern-cyber-defense</loc>
<lastmod>2025-12-22T05:45:54.467Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/email-security-and-awareness-stop-phishing-fast</loc>
<lastmod>2025-12-22T05:45:41.603Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/building-a-complete-asset-inventory-checklist</loc>
<lastmod>2025-12-22T05:45:30.420Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/password-managers-smart-way-to-stay-secure</loc>
<lastmod>2025-12-21T11:27:16.120Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/why-your-middle-east-business-needs-247-soc-monitoring</loc>
<lastmod>2025-12-21T11:25:44.111Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/the-future-of-vulnerability-management-ai-cloud-and-zero</loc>
<lastmod>2025-12-17T13:05:20.791Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/vulnerability-management-best-practices-for-small-businesses</loc>
<lastmod>2025-12-17T13:05:13.002Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/what-is-vulnerability-management-and-why-does-it-matter</loc>
<lastmod>2025-12-17T13:04:58.592Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/how-vulnerability-management-fits-into-iso-27001-and-nist</loc>
<lastmod>2025-12-17T13:04:45.314Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/7-steps-to-building-a-practical-vulnerability-management</loc>
<lastmod>2025-12-17T13:04:31.784Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/top-7-cyber-threats-facing-gcc-companies</loc>
<lastmod>2025-12-11T13:44:07.476Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/role-of-automation-in-soc-maturity</loc>
<lastmod>2025-12-11T13:43:57.399Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/why-soc-maturity-is-critical-for-modern-enterprises</loc>
<lastmod>2025-12-11T13:43:49.225Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/tools-and-frameworks-for-soc-assessment</loc>
<lastmod>2025-12-09T11:34:35.698Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/building-a-roadmap-to-soc-optimization</loc>
<lastmod>2025-12-07T05:45:10.752Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/challenges-in-achieving-high-soc-maturity</loc>
<lastmod>2025-12-07T05:44:54.930Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/compliance-driven-kpi-reporting-for-socs</loc>
<lastmod>2025-12-07T05:44:31.791Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/cybersecurity-workforce-and-soc-maturity</loc>
<lastmod>2025-12-07T05:44:18.588Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/essential-soc-metrics-every-ciso-should-track</loc>
<lastmod>2025-12-07T05:43:50.824Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/industrial-application-software-ias-canias-erp-java-rmi-session-management-iasserverremoteinterfacedoaction-improper-authentication</loc>
<lastmod>2026-05-10T04:00:12.440Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/industrial-application-software-ias-canias-erp-rmi-iasrequestfileevent-path-traversal</loc>
<lastmod>2026-05-10T04:00:12.545Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/industrial-application-software-ias-canias-erp-rmi-doaction-improper-authentication</loc>
<lastmod>2026-05-10T04:00:12.616Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/osgeo-gdal-grid-file-gdapic-gdsdfldsrch-heap-based-overflow</loc>
<lastmod>2026-05-10T04:00:12.671Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/osgeo-gdal-swapic-swsdfldsrch-heap-based-overflow</loc>
<lastmod>2026-05-10T04:00:12.731Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/codelibs-fess-jsp-file-admindesignactionjava-update-code-injection</loc>
<lastmod>2026-05-10T04:00:12.765Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-45184</loc>
<lastmod>2026-05-10T04:00:12.787Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-45182</loc>
<lastmod>2026-05-10T04:00:12.804Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-45181</loc>
<lastmod>2026-05-10T04:00:12.817Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/aandrew-me-tgpt-update-helpergo-helperupdate-command-injection</loc>
<lastmod>2026-05-10T04:00:12.837Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/jeecgboot-mlogin-endpoint-logincontrollerjava-authorization</loc>
<lastmod>2026-05-10T04:00:12.859Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/jeecgboot-svg-file-commoncontrollerjava-cross-site-scripting</loc>
<lastmod>2026-05-10T04:00:12.877Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/osticket-dispatcher-classdispatcherphp-cross-site-request-forgery</loc>
<lastmod>2026-05-10T04:00:12.894Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/azuracast-password-reset-poisoning-via-untrusted-x-forwarded-host-header-leads-to-account-takeover-and-2fa-bypass</loc>
<lastmod>2026-05-10T04:00:12.910Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/azuracast-path-traversal-in-currentdirectory-parameter-enables-remote-code-execution-via-media-upload</loc>
<lastmod>2026-05-10T04:00:12.925Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/archivebox-vulnerable-to-rce-via-unvalidated-per-crawl-config-overrides-in-addview</loc>
<lastmod>2026-05-10T04:00:12.942Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/apko-discoverkeys-has-a-panic-on-non-rsa-jwks-key-that-causes-crash-during-key-discovery</loc>
<lastmod>2026-05-10T04:00:12.957Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/apko-doesnt-verify-downloaded-apk-packages-against-apkindex-checksum-package-substitution-possible</loc>
<lastmod>2026-05-10T04:00:12.970Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/apko-dirfs-has-a-symlink-following-path-traversal-that-allows-multiple-entry-points-to-escape-the-build-root</loc>
<lastmod>2026-05-10T04:00:12.985Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/privilege-escalation-attack-affecting-pelican-web-ui</loc>
<lastmod>2026-05-10T04:00:12.996Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/phpvms-importer-authorization-bypass-causing-full-database-wipe</loc>
<lastmod>2026-05-10T04:00:13.009Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/plainpad-privilege-escalation-via-writable-admin-field-in-profile-update-access-control</loc>
<lastmod>2026-05-10T04:00:13.023Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/quarkus-openapi-generator-has-overly-broad-path-parameter-matching-that-sends-authentication-headers-to-unintended-operations</loc>
<lastmod>2026-05-10T04:00:13.043Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/net-imap-command-injection-via-unvalidated-symbol-inputs</loc>
<lastmod>2026-05-10T04:00:13.061Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/net-imap-command-injection-via-raw-arguments-to-multiple-commands</loc>
<lastmod>2026-05-10T04:00:13.075Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/net-imap-denial-of-service-via-high-iteration-count-for-scram-authentication</loc>
<lastmod>2026-05-10T04:00:13.090Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/net-imap-vulnerable-to-starttls-stripping-via-invalid-response-timing</loc>
<lastmod>2026-05-10T04:00:13.107Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/net-imap-quadratic-complexity-when-reading-response-literals</loc>
<lastmod>2026-05-10T04:00:13.123Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/signal-k-servers-websocket-login-endpoint-lacks-rate-limiting-credential-brute-force</loc>
<lastmod>2026-05-10T04:00:13.143Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/akaunting-invoice-pdf-rendering-dompdfphp-server-side-request-forgery</loc>
<lastmod>2026-05-10T04:00:13.155Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/wavlink-nu516u1-admcgi-wzdap-os-command-injection</loc>
<lastmod>2026-05-10T04:00:13.171Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/wavlink-nu516u1-admcgi-wifiregion-os-command-injection</loc>
<lastmod>2026-05-10T04:00:13.185Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/wavlink-nu516u1-admcgi-wan-os-command-injection</loc>
<lastmod>2026-05-10T04:00:13.197Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/wavlink-nu516u1-admcgi-wzdrepeater-os-command-injection</loc>
<lastmod>2026-05-10T04:00:13.210Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/wavlink-nu516u1-admcgi-changewifipassword-os-command-injection</loc>
<lastmod>2026-05-10T04:00:13.228Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/activity-logs-user-activity-tracking-multisite-activity-log-from-logtivity-less-336-unauthenticated-information-disclosure-via-rest-api</loc>
<lastmod>2026-05-10T04:00:13.247Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/open5gs-nf-clientc-ogssbiclientsendviascporsepp-out-of-bounds</loc>
<lastmod>2026-05-10T04:00:13.261Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/open5gs-upf-gtp-pathc-gtpv1urecvcb-resource-consumption</loc>
<lastmod>2026-05-10T04:00:13.275Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/ugreen-cm933-administrative-missing-authentication</loc>
<lastmod>2026-05-10T04:00:13.292Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-3828</loc>
<lastmod>2026-05-10T04:00:13.305Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-32683</loc>
<lastmod>2026-05-10T04:00:13.318Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-1749</loc>
<lastmod>2026-05-10T04:00:13.331Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/auth-patreon-provider-assigns-the-same-local-user-id-to-every-authenticated-patreon-account-enabling-crossuser-impersonation</loc>
<lastmod>2026-05-10T04:00:13.347Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/pillow-oob-write-with-invalid-psd-tile-extents-integer-overflow</loc>
<lastmod>2026-05-10T04:00:13.364Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/pillow-pdf-parsing-trailer-infinite-loop-dos</loc>
<lastmod>2026-05-10T04:00:13.382Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/pillow-heap-buffer-overflow-with-nested-list-coordinates</loc>
<lastmod>2026-05-10T04:00:13.393Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/pillow-integer-overflow-when-processing-fonts</loc>
<lastmod>2026-05-10T04:00:13.403Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/hcl-bigfix-webui-is-affected-by-a-missing-authorization-vulnerability</loc>
<lastmod>2026-05-10T04:00:13.417Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/hcl-bigfix-webui-is-affected-by-an-improper-authorization-vulnerability</loc>
<lastmod>2026-05-10T04:00:13.434Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-8209</loc>
<lastmod>2026-05-10T04:00:13.451Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-8208</loc>
<lastmod>2026-05-10T04:00:13.467Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/arcane-vulnerable-to-unauthenticated-disclosure-of-custom-compose-template-content-incl-env-secrets</loc>
<lastmod>2026-05-10T04:00:13.484Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/improper-input-validation-leading-to-improper-control-of-generation-of-code-code-injection-in-pyp2spec</loc>
<lastmod>2026-05-10T04:00:13.501Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/argo-workflows-is-missing-authorization-in-sync-configmap-provider</loc>
<lastmod>2026-05-10T04:00:13.516Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/argo-workflows-has-incomplete-fix-for-cve-2026-31892-hostnetwork-securitycontext-serviceaccountname-bypass-templatereferencing-strictsecure</loc>
<lastmod>2026-05-10T04:00:13.537Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/argo-workflows-exposure-of-artifact-repository-credentials</loc>
<lastmod>2026-05-10T04:00:13.559Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/argo-workflows-unauthenticated-memory-exhaustion-dos-in-webhook-interceptor</loc>
<lastmod>2026-05-10T04:00:13.578Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/argo-workflows-sso-rbac-delegation-nil-pointer-dereference-dos-gatekeepergo</loc>
<lastmod>2026-05-10T04:00:13.596Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/kirby-user-avatar-creation-replacement-and-deletion-are-not-gated-by-user-update-permissions</loc>
<lastmod>2026-05-10T04:00:13.612Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/kirby-pagesaccesslist-and-filesaccesslist-permissions-are-not-consistently-checked-in-the-rest-api-and-changes-dialog</loc>
<lastmod>2026-05-10T04:00:13.637Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/kirby-read-access-to-site-user-and-role-information-is-not-gated-by-permissions</loc>
<lastmod>2026-05-10T04:00:13.662Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/kirby-system-api-endpoint-leaks-license-data-and-installed-version-to-authenticated-users</loc>
<lastmod>2026-05-10T04:00:13.686Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/liquidjs-is-vulnerable-to-denial-of-service-via-circular-block-reference-in-layout</loc>
<lastmod>2026-05-10T04:00:13.705Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/bubblewrap-vulnerable-to-privilege-escalation-in-setuid-mode-via-ptrace</loc>
<lastmod>2026-05-10T04:00:13.721Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-8207</loc>
<lastmod>2026-05-10T04:00:13.737Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/latepoint-less-550-unauthenticated-account-takeover-via-weak-password-recovery-mechanism</loc>
<lastmod>2026-05-10T04:00:13.773Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/pgbouncer-missing-authorization-check-in-killclient-admin-command</loc>
<lastmod>2026-05-09T04:00:18.995Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/pgbouncer-crash-in-killpoolloginsservererror</loc>
<lastmod>2026-05-09T04:00:19.052Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/pgbouncer-buffer-overflow-in-scram</loc>
<lastmod>2026-05-09T04:00:19.088Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/pgbouncer-integer-overflow-in-pgbouncer-network-packet-parsing</loc>
<lastmod>2026-05-09T04:00:19.111Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-41705</loc>
<lastmod>2026-05-09T04:00:19.140Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/linkwarden-server-side-request-forgery-ssrf-in-link-creation-via-fetchtitleandheaders-function</loc>
<lastmod>2026-05-09T04:00:19.168Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/linkwarden-stored-xss-via-client-side-archive-upload-unsanitized-html-served-from-same-origin</loc>
<lastmod>2026-05-09T04:00:19.191Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/vim-heap-buffer-overflow-in-spell-file-loading</loc>
<lastmod>2026-05-09T04:00:19.222Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/sysreptor-privilege-escalation-from-user-admin-to-superuser</loc>
<lastmod>2026-05-09T04:00:19.239Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/vim-os-command-injection-via-path-completion</loc>
<lastmod>2026-05-09T04:00:19.255Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/fastgpt-ssrf-vulnerability-in-laf-workflow-node-via-missing-internal-address-validation</loc>
<lastmod>2026-05-09T04:00:19.266Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/fastgpt-stored-mcp-tool-url-ssrf-in-fastgpt-workflow-execution</loc>
<lastmod>2026-05-09T04:00:19.284Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/postiz-stored-xss-in-public-preview-page</loc>
<lastmod>2026-05-09T04:00:19.299Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/anythingllm-cross-user-tts-audio-disclosure-via-chat-id-idor</loc>
<lastmod>2026-05-09T04:00:19.317Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/termix-os-command-injection-in-docker-container-management-endpoints</loc>
<lastmod>2026-05-09T04:00:19.337Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/termix-command-injection-in-extractarchivecompressfiles-via-double-quote-escaping-bypass</loc>
<lastmod>2026-05-09T04:00:19.354Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/termix-pending-totp-temporary-token-can-regenerate-backup-codes-and-neutralize-totp</loc>
<lastmod>2026-05-09T04:00:19.369Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/grimmory-stored-xss-via-malicious-epub-enables-session-token-theft</loc>
<lastmod>2026-05-09T04:00:19.388Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/pygeoapi-023x-unauthenticated-ssrf-via-ogc-api-processes-subscriber</loc>
<lastmod>2026-05-09T04:00:19.422Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/pygeoapi-path-traversal-in-stac-filesystemprovider</loc>
<lastmod>2026-05-09T04:00:19.436Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/kargo-open-redirect-in-ui-oidc-login-flow-via-redirectto-query-parameter</loc>
<lastmod>2026-05-09T04:00:19.450Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/postiz-toctou-dns-rebinding-bypasses-all-ssrf-url-validation-paths</loc>
<lastmod>2026-05-09T04:00:19.466Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/fastgpt-cloud-metadata-endpoint-ssrf-protection-bypass-via-port-specification-ipv6-mapping-hexdecimal-ip-encoding-and-trailing-dot</loc>
<lastmod>2026-05-09T04:00:19.480Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/fastgpt-dns-rebinding-toctou-bypass-in-isinternaladdress-allows-ssrf-on-all-protected-endpoints</loc>
<lastmod>2026-05-09T04:00:19.495Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/fastgpt-uncontrolled-resource-consumption-leading-to-sandbox-exhaustion</loc>
<lastmod>2026-05-09T04:00:19.511Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/new-api-ssrf-filter-bypass-via-0000</loc>
<lastmod>2026-05-09T04:00:19.528Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/vim-os-command-injection-in-netrw</loc>
<lastmod>2026-05-09T04:00:19.547Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/fastgpt-unauthenticated-remote-code-execution-rce-via-code-server-misconfiguration-in-agent-sandbox</loc>
<lastmod>2026-05-09T04:00:19.563Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/postiz-arbitrary-code-execution-and-token-exfiltration-in-pr-docker-buildyml-via-untrusted-dockerfiledev</loc>
<lastmod>2026-05-09T04:00:19.574Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/sysreptor-read-write-access-to-personal-notes-by-sharing-link-creation-with-no-authorization-in-sysreptor-professional</loc>
<lastmod>2026-05-09T04:00:19.588Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/iplweb-is-vulnerable-to-reflected-xss-by-malformed-search-requests</loc>
<lastmod>2026-05-09T04:00:19.602Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/pupnp-port-truncation-via-atoi-cast-in-parseuri-allows-ssrf-port-confusion</loc>
<lastmod>2026-05-09T04:00:19.617Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cillium-exposes-sensitive-information-included-in-the-cilium-bugtool-debug-archive</loc>
<lastmod>2026-05-09T04:00:19.640Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/new-api-stripe-webhook-signature-bypass-via-empty-secret-enables-unlimited-quota-fraud</loc>
<lastmod>2026-05-09T04:00:19.656Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
</urlset>
