<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://deepaegis.io</loc>
<lastmod>2026-05-01T05:48:06.006Z</lastmod>
<changefreq>daily</changefreq>
<priority>1</priority>
</url>
<url>
<loc>https://deepaegis.io/about-deepaegis-security</loc>
<lastmod>2026-05-01T05:48:06.006Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://deepaegis.io/contact-us</loc>
<lastmod>2026-05-01T05:48:06.006Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs</loc>
<lastmod>2026-05-01T05:48:06.006Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://deepaegis.io/career</loc>
<lastmod>2026-05-01T05:48:06.006Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories</loc>
<lastmod>2026-05-01T05:48:06.006Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://deepaegis.io/threat-advisories</loc>
<lastmod>2026-05-01T05:48:06.006Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://deepaegis.io/why-deepaegis</loc>
<lastmod>2026-05-01T05:48:06.006Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/critical-telnet-auth-bypass-explained</loc>
<lastmod>2026-03-26T15:34:27.365Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/dark-vector-security</loc>
<lastmod>2026-03-25T05:09:20.154Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/qualcomm-memory-flaw</loc>
<lastmod>2026-03-25T05:08:39.568Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/ai-for-continuous-risk-assessment-in-grc</loc>
<lastmod>2026-03-18T11:32:56.811Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/from-detection-to-response-ai-in-action</loc>
<lastmod>2026-03-18T11:32:49.160Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/the-exploit-report</loc>
<lastmod>2026-03-15T09:54:50.579Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/critical-brute-force-vulnerability-in-medtronic-carelink</loc>
<lastmod>2026-03-15T09:54:05.703Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/how-poor-access-control-causes-data-breaches</loc>
<lastmod>2026-03-03T07:41:02.215Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/anatomy-of-a-data-breach</loc>
<lastmod>2026-03-03T07:40:13.313Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/inside-the-latest-ransomware-surgery</loc>
<lastmod>2026-03-03T07:40:03.701Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/protecting-patient-data-in-cloud-healthcare-systems</loc>
<lastmod>2026-02-25T11:35:26.857Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/why-healthcare-is-a-top-target-for-ransomware</loc>
<lastmod>2026-02-25T11:35:21.566Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/how-hackers-exploit-zero-day-flaws</loc>
<lastmod>2026-02-20T10:08:44.825Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/phishing-tactics-that-still-work</loc>
<lastmod>2026-02-20T10:08:25.002Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/ai-based-threat-triage-in-incident-response</loc>
<lastmod>2026-02-18T10:37:06.679Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/phishing-tactics-that-still-work</loc>
<lastmod>2026-02-18T10:36:55.500Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/ai-in-grc-automating-risk-and-compliance</loc>
<lastmod>2026-02-18T10:36:32.256Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/ai-driven-incident-response-speed-matters</loc>
<lastmod>2026-02-18T10:36:25.031Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/what-is-iomt-and-why-medical-device-security-matters</loc>
<lastmod>2026-02-09T12:37:01.625Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/reducing-alert-fatigue-with-ai-in-socs</loc>
<lastmod>2026-02-09T12:36:55.411Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/governance-challenges-of-ai-in-cybersecurity</loc>
<lastmod>2026-02-09T12:36:26.458Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/machine-learning-in-vulnerability-management</loc>
<lastmod>2026-02-09T12:36:16.861Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/top-causes-of-healthcare-data-breaches</loc>
<lastmod>2026-02-03T11:27:28.124Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/using-ai-to-prioritize-vulnerabilities-faster</loc>
<lastmod>2026-02-03T11:27:17.137Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/how-ai-improves-security-policy-management</loc>
<lastmod>2026-02-03T11:27:06.003Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/ransomware-preparedness-and-recovery-for-healthcare</loc>
<lastmod>2026-01-30T16:04:03.853Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/iomt-security-risks-and-medical-device-protection</loc>
<lastmod>2026-01-18T07:41:27.329Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/securing-patient-data-across-modern-healthcare-systems</loc>
<lastmod>2026-01-18T07:41:10.534Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/patch-and-vulnerability-management-in-clinical-systems</loc>
<lastmod>2026-01-18T07:40:21.788Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/managing-third-party-cyber-risk-in-healthcare</loc>
<lastmod>2026-01-18T07:39:53.171Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/why-medical-device-patching-is-so-difficult</loc>
<lastmod>2026-01-10T12:55:31.047Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/how-hospitals-build-effective-incident-response-plans</loc>
<lastmod>2026-01-08T06:18:34.636Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/hidden-cyber-risks-from-healthcare-vendors</loc>
<lastmod>2026-01-08T06:18:10.832Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/top-5-soc-challenges-every-analyst-faces-in-2025</loc>
<lastmod>2026-01-05T16:29:48.157Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/common-vulnerabilities-in-hospital-networks</loc>
<lastmod>2026-01-05T11:24:22.104Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/risk-based-vulnerability-management</loc>
<lastmod>2026-01-02T06:13:03.688Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/healthcare-cybersecurity-best-practices-for-it-teams</loc>
<lastmod>2026-01-01T05:12:12.611Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/mfa-everywhere-securing-access-across-all-environments</loc>
<lastmod>2026-01-01T05:11:08.527Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/automating-threat-intelligence-the-future-of-cyber-defense</loc>
<lastmod>2026-01-01T05:10:41.630Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/creating-an-effective-cyber-incident-runbook</loc>
<lastmod>2026-01-01T05:09:11.995Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/how-threat-intel-drives-soc-decisions</loc>
<lastmod>2026-01-01T05:09:03.548Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/kpis-that-define-soc-maturity</loc>
<lastmod>2025-12-28T05:50:03.852Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/translating-soc-kpis-into-business-value</loc>
<lastmod>2025-12-28T05:49:53.519Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/soc-maturity-vs-soc-capabilities-whats-the-difference</loc>
<lastmod>2025-12-28T05:49:44.693Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/understanding-maturity-levels-in-security-operations</loc>
<lastmod>2025-12-28T05:49:36.861Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/what-your-soc-metrics-say-about-your-security-posture</loc>
<lastmod>2025-12-28T05:49:27.429Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/understanding-threat-feeds-in-cybersecurity</loc>
<lastmod>2025-12-28T05:49:03.102Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/threat-feeds-signal-or-noise</loc>
<lastmod>2025-12-28T05:48:53.741Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/why-gcc-firms-prioritize-data-privacy-in-2025</loc>
<lastmod>2025-12-28T05:48:41.288Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/how-edr-protects-endpoints-from-hidden-threats</loc>
<lastmod>2025-12-28T05:48:28.132Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/offline-backups-your-last-line-of-defense</loc>
<lastmod>2025-12-23T05:05:21.896Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/measuring-the-effectiveness-of-your-soc-program</loc>
<lastmod>2025-12-23T05:04:57.186Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/understanding-vulnerability-assessment-vs-pen-testing</loc>
<lastmod>2025-12-22T05:46:13.480Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/osint-in-modern-cyber-defense</loc>
<lastmod>2025-12-22T05:45:54.467Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/email-security-and-awareness-stop-phishing-fast</loc>
<lastmod>2025-12-22T05:45:41.603Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/building-a-complete-asset-inventory-checklist</loc>
<lastmod>2025-12-22T05:45:30.420Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/password-managers-smart-way-to-stay-secure</loc>
<lastmod>2025-12-21T11:27:16.120Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/why-your-middle-east-business-needs-247-soc-monitoring</loc>
<lastmod>2025-12-21T11:25:44.111Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/the-future-of-vulnerability-management-ai-cloud-and-zero</loc>
<lastmod>2025-12-17T13:05:20.791Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/vulnerability-management-best-practices-for-small-businesses</loc>
<lastmod>2025-12-17T13:05:13.002Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/what-is-vulnerability-management-and-why-does-it-matter</loc>
<lastmod>2025-12-17T13:04:58.592Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/how-vulnerability-management-fits-into-iso-27001-and-nist</loc>
<lastmod>2025-12-17T13:04:45.314Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/7-steps-to-building-a-practical-vulnerability-management</loc>
<lastmod>2025-12-17T13:04:31.784Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/top-7-cyber-threats-facing-gcc-companies</loc>
<lastmod>2025-12-11T13:44:07.476Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/role-of-automation-in-soc-maturity</loc>
<lastmod>2025-12-11T13:43:57.399Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/why-soc-maturity-is-critical-for-modern-enterprises</loc>
<lastmod>2025-12-11T13:43:49.225Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/tools-and-frameworks-for-soc-assessment</loc>
<lastmod>2025-12-09T11:34:35.698Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/building-a-roadmap-to-soc-optimization</loc>
<lastmod>2025-12-07T05:45:10.752Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/challenges-in-achieving-high-soc-maturity</loc>
<lastmod>2025-12-07T05:44:54.930Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/compliance-driven-kpi-reporting-for-socs</loc>
<lastmod>2025-12-07T05:44:31.791Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/cybersecurity-workforce-and-soc-maturity</loc>
<lastmod>2025-12-07T05:44:18.588Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/blogs/essential-soc-metrics-every-ciso-should-track</loc>
<lastmod>2025-12-07T05:43:50.824Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/open5gs-transfer-update-denial-of-service</loc>
<lastmod>2026-05-01T04:00:26.169Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/fujian-apex-livebos-endpoint-uploadimagedo-path-traversal</loc>
<lastmod>2026-05-01T04:00:26.199Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/open5gs-amf-sbi-endpoint-sdmsubscription-notify-amfnamfcallbackhandlesdmdatachangenotify-denial-of-service</loc>
<lastmod>2026-05-01T04:00:26.221Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/utt-hiper-1200gw-formremotecontrol-strcpy-buffer-overflow</loc>
<lastmod>2026-05-01T04:00:26.254Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/utt-hiper-1200gw-formuser-strcpy-buffer-overflow</loc>
<lastmod>2026-05-01T04:00:26.277Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-wireshark</loc>
<lastmod>2026-05-01T04:00:26.298Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/heap-based-buffer-overflow-in-wireshark</loc>
<lastmod>2026-05-01T04:00:29.534Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/route-services-firewall-bypass</loc>
<lastmod>2026-05-01T04:00:26.393Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/owap-defectdojo-benchmarkengagementproductsurvey-authorization</loc>
<lastmod>2026-05-01T04:00:26.414Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/bootstrap-cms-page-creation-showbladephp-code-injection</loc>
<lastmod>2026-05-01T04:00:26.441Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/sourcecodester-hotel-management-system-check-sql-injection</loc>
<lastmod>2026-05-01T04:00:26.466Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/nextlevelbuilder-goclawgoclaw-lite-rpc-improper-authorization</loc>
<lastmod>2026-05-01T04:00:26.489Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-4178</loc>
<lastmod>2026-05-01T04:00:26.503Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-28909</loc>
<lastmod>2026-05-01T04:00:26.517Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/hkuds-openharness-remote-command-execution-via-bridge-slash-command</loc>
<lastmod>2026-05-01T04:00:26.535Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/code-projects-for-plugin-cstecgicgi-setwifimultipleconfig-buffer-overflow</loc>
<lastmod>2026-05-01T04:00:26.555Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/linkstackorg-linkstack-management-endpoint-usercontrollerphp-savelink-authorization</loc>
<lastmod>2026-05-01T04:00:26.574Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/authenticated-remote-code-execution-vulnerability-in-langflow-code-validation-endpoint</loc>
<lastmod>2026-05-01T04:00:26.592Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/monitor-api-allows-cross-user-read-of-transaction-logs-and-deletion-of-build-data-via-flowid</loc>
<lastmod>2026-05-01T04:00:26.606Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/ibm-turbonomic-prometurbo-agent-used-by-ibm-turbonomic-application-resource-management-is-affected-by-a-single-vulnerability</loc>
<lastmod>2026-05-01T04:00:26.627Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-40687</loc>
<lastmod>2026-05-01T04:00:26.649Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-40686</loc>
<lastmod>2026-05-01T04:00:26.671Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-40685</loc>
<lastmod>2026-05-01T04:00:26.688Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-40684</loc>
<lastmod>2026-05-01T04:00:26.703Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/path-traversal-and-arbitrary-file-write-vulnerability-in-ibm-langflow-desktop-api-v2-file-upload-endpoint</loc>
<lastmod>2026-05-01T04:00:26.718Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/ibm-i-is-affected-by-a-privilege-escalation-vulnerability-in-web-administration-gui</loc>
<lastmod>2026-05-01T04:00:26.742Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/ibmr-db2r-is-vulnerable-to-a-denial-of-service-with-a-specially-crafted-query-involving-multiple-subqueries</loc>
<lastmod>2026-05-01T04:00:26.759Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/vulnerabilities-found</loc>
<lastmod>2026-05-01T04:00:26.774Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/inadequate-pod-communication-restrictions-affects-watsonxdata</loc>
<lastmod>2026-05-01T04:00:26.789Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/ibmr-db2r-is-vulnerable-to-a-denial-of-service-with-a-specially-crafted-query-when-stmtheap-is-set-to-automatic</loc>
<lastmod>2026-05-01T04:00:26.803Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/ibmr-db2r-is-vulnerable-to-a-denial-of-service-when-fetching-from-certain-tables-under-specific-configurations</loc>
<lastmod>2026-05-01T04:00:26.813Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/linkstackorg-linkstack-usercontrollerphp-editpage-cross-site-scripting</loc>
<lastmod>2026-05-01T04:00:26.835Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/sscms-v740-sql-injection-via-stlsqlcontent-querystring</loc>
<lastmod>2026-05-01T04:00:26.853Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/notepad-893-format-string-injection-via-nativelangxml</loc>
<lastmod>2026-05-01T04:00:26.868Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/unauthenticated-insecure-direct-object-reference-idor-vulnerability-in-langflow-desktop-image-download-endpoint</loc>
<lastmod>2026-05-01T04:00:26.880Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/arbitrary-file-write-and-remote-code-execution-vulnerability-in-langflow-v2-api</loc>
<lastmod>2026-05-01T04:00:26.914Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/traefik-basicauth-middleware-timing-side-channel-vulnerability</loc>
<lastmod>2026-05-01T04:00:26.968Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/traefik-kubernetes-crd-allows-unauthorized-cross-namespace-middleware-binding</loc>
<lastmod>2026-05-01T04:00:27.005Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/memory-corruption-in-secure-access-windows-clients-prior-to-1450</loc>
<lastmod>2026-05-01T04:00:27.040Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/buffer-overflow-in-the-secure-access-server-prior-to-1450</loc>
<lastmod>2026-05-01T04:00:27.067Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/buffer-overflow-in-windows-clients-prior-to-1450</loc>
<lastmod>2026-05-01T04:00:27.229Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/traefik-stripprefixregex-auth-bypass-via-pathrawpath-desync</loc>
<lastmod>2026-05-01T04:00:27.137Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/stored-cross-site-scripting-xss-in-langflow-markdown-rendering-via-rehyperaw</loc>
<lastmod>2026-05-01T04:00:27.176Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/server-side-request-forgery-ssrf-in-langflow-url-component</loc>
<lastmod>2026-05-01T04:00:27.189Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/traefik-forwarded-alias-spoofing-top-pre-auth-decision-bypass</loc>
<lastmod>2026-05-01T04:00:27.203Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/traefik-forwardauth-trustforwardheaderfalse-allows-spoofed-x-forwarded-prefix-to-bypass-auth</loc>
<lastmod>2026-05-01T04:00:27.214Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/arbitrary-readwrite-vulnerability-in-windows-clients-prior-to-1450</loc>
<lastmod>2026-05-01T04:00:27.248Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/out-of-bounds-read-in-secure-access-macos-clients-prior-to-1450</loc>
<lastmod>2026-05-01T04:00:27.263Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/message-handler-buffer-overflow-in-clients-prior-to-1450</loc>
<lastmod>2026-05-01T04:00:27.278Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/frrouting-less-1053-integer-overflow-in-ospf-tlv-parser-functions</loc>
<lastmod>2026-05-01T04:00:27.293Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/sscms-v740-reflected-cross-site-scripting-via-stl-processing</loc>
<lastmod>2026-05-01T04:00:27.309Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/format-string-vulnerability-in-macos-clients-prior-to-1450</loc>
<lastmod>2026-05-01T04:00:27.322Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-33447</loc>
<lastmod>2026-05-01T04:00:27.340Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/buffer-overflow-in-client-authentication-prior-to-version-1450</loc>
<lastmod>2026-05-01T04:00:27.357Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2025-56568</loc>
<lastmod>2026-05-01T04:00:27.370Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2025-46115</loc>
<lastmod>2026-05-01T04:00:27.382Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/os-command-injection-in-amazon-ecs-agent-via-fsx-windows-file-server-volume-credentials</loc>
<lastmod>2026-05-01T04:00:27.397Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/chartbrew-incorrect-access-control-in-dataset-and-datarequest-routes-via-team-scoped-permission-checks</loc>
<lastmod>2026-05-01T04:00:27.411Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/chartbrew-incorrect-access-control-in-apiprojectdashboardbrewname-via-same-team-override</loc>
<lastmod>2026-05-01T04:00:27.431Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/chartbrew-missing-authorization-in-apichartchartidquery-via-team-level-refresh-toggle</loc>
<lastmod>2026-05-01T04:00:27.452Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/chartbrew-incorrect-access-control-in-project-share-policy-routes-via-unbound-policyid</loc>
<lastmod>2026-05-01T04:00:27.466Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/chartbrew-incorrect-access-control-in-public-chart-and-export-routes-via-missing-onreport-and-sharepolicy-checks</loc>
<lastmod>2026-05-01T04:00:27.481Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/unauthenticated-account-registration-via-userinvited-bypasses-all-signup-restrictions-in-chartbrew</loc>
<lastmod>2026-05-01T04:00:27.494Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/lockfile-checksums-not-verified-in-hex-allows-dependency-integrity-bypass</loc>
<lastmod>2026-05-01T04:00:27.512Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/gnutls-gnutls-policy-bypass-due-to-case-sensitive-nameconstraints-comparison</loc>
<lastmod>2026-05-01T04:00:27.538Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/gnutls-gnutls-security-bypass-allows-acceptance-of-revoked-server-certificates-via-crafted-ocsp-response</loc>
<lastmod>2026-05-01T04:00:27.555Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-36766</loc>
<lastmod>2026-05-01T04:00:27.569Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-36765</loc>
<lastmod>2026-05-01T04:00:27.583Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-36763</loc>
<lastmod>2026-05-01T04:00:27.598Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-36762</loc>
<lastmod>2026-05-01T04:00:27.612Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-36761</loc>
<lastmod>2026-05-01T04:00:27.639Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/gnutls-gnutls-denial-of-service-via-dtls-zero-length-fragment</loc>
<lastmod>2026-05-01T04:00:27.655Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-36767</loc>
<lastmod>2026-05-01T04:00:27.670Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-36764</loc>
<lastmod>2026-05-01T04:00:27.687Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-36760</loc>
<lastmod>2026-05-01T04:00:27.712Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-36757</loc>
<lastmod>2026-05-01T04:00:27.739Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/synway-smg-gateway-management-software-os-command-injection-via-radiusaddress</loc>
<lastmod>2026-05-01T04:00:27.767Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cryptpad-unbounded-websocket-frame-flood</loc>
<lastmod>2026-05-01T04:00:27.784Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/weaver-e-office-less-10020221201-unauthenticated-arbitrary-file-read-via-xmlrpcservlet</loc>
<lastmod>2026-05-01T04:00:27.805Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/weaver-e-cology-95-unauthenticated-arbitrary-file-read-via-xmlrpcservlet</loc>
<lastmod>2026-05-01T04:00:27.831Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/improper-access-control-vulnerability-in-progress-moveit-automation</loc>
<lastmod>2026-05-01T04:00:27.853Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/improper-authentication-vulnerability-in-progress-moveit-automation</loc>
<lastmod>2026-05-01T04:00:27.870Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-38940</loc>
<lastmod>2026-05-01T04:00:27.889Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-38939</loc>
<lastmod>2026-05-01T04:00:27.903Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-36960</loc>
<lastmod>2026-05-01T04:00:27.919Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-36759</loc>
<lastmod>2026-05-01T04:00:27.939Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-36758</loc>
<lastmod>2026-05-01T04:00:27.956Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-36756</loc>
<lastmod>2026-05-01T04:00:27.969Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-36340</loc>
<lastmod>2026-05-01T04:00:27.985Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-34998</loc>
<lastmod>2026-05-01T04:00:27.995Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-34997</loc>
<lastmod>2026-05-01T04:00:28.005Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-34996</loc>
<lastmod>2026-05-01T04:00:28.015Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-34995</loc>
<lastmod>2026-05-01T04:00:28.030Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2026-34994</loc>
<lastmod>2026-05-01T04:00:28.044Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2025-51850</loc>
<lastmod>2026-05-01T04:00:28.056Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2025-51849</loc>
<lastmod>2026-05-01T04:00:28.067Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2025-51847</loc>
<lastmod>2026-05-01T04:00:28.078Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/improper-restriction-of-xml-external-entity-reference-vulnerability-in-connext-professional-core-libraries-allows-serialized-data-external-linking</loc>
<lastmod>2026-05-01T04:00:28.095Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/cve-2025-13890</loc>
<lastmod>2026-05-01T04:00:28.106Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://deepaegis.io/vulnerability-advisories/orgkeycloakkeycloak-services-improper-access-control-on-keycloak-server-when-the-account-account-api-feature-is-disabled</loc>
<lastmod>2026-05-01T04:00:28.118Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
</urlset>
