<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://vulnios.com/</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>weekly</changefreq>
<priority>1</priority>
</url>
<url>
<loc>https://vulnios.com/product</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://vulnios.com/pricing</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://vulnios.com/security</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/contact</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://vulnios.com/partners</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://vulnios.com/use-cases</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://vulnios.com/use-cases/vulnerability-management</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://vulnios.com/use-cases/compliance</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://vulnios.com/use-cases/msp</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://vulnios.com/videos</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/industries</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/industries/fintech</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/industries/healthcare</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/industries/saas</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/industries/government</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/industries/ecommerce</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/compare/tenable</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://vulnios.com/compare/qualys</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://vulnios.com/compare/rapid7</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://vulnios.com/compare/intruder</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://vulnios.com/compare/nessus-essentials</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://vulnios.com/compare/snyk</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://vulnios.com/compare/wiz</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://vulnios.com/compare/openvas</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://vulnios.com/compare/recorded-future</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://vulnios.com/for-mssp</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://vulnios.com/for-ciso</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://vulnios.com/for-smb</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://vulnios.com/sign-in</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://vulnios.com/sign-up</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://vulnios.com/scan</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.95</priority>
</url>
<url>
<loc>https://vulnios.com/dark-web-check</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.95</priority>
</url>
<url>
<loc>https://vulnios.com/pt</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.95</priority>
</url>
<url>
<loc>https://vulnios.com/brief</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://vulnios.com/blog</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/blog/replaced-5-cybersecurity-tools-with-one</loc>
<lastmod>2026-04-30T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://vulnios.com/blog/crowdstrike-vs-vulnios-comparison-2026</loc>
<lastmod>2026-04-12T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://vulnios.com/blog/dark-web-monitoring-small-business-guide</loc>
<lastmod>2026-04-12T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://vulnios.com/blog/qualys-vs-vulnios-comparison-2026</loc>
<lastmod>2026-04-12T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://vulnios.com/blog/rapid7-vs-vulnios-comparison-2026</loc>
<lastmod>2026-04-12T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://vulnios.com/blog/self-hosted-vulnerability-scanner-setup-guide</loc>
<lastmod>2026-04-12T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://vulnios.com/blog/snyk-vs-vulnios-comparison-2026</loc>
<lastmod>2026-04-12T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://vulnios.com/blog/tenable-vs-vulnios-comparison-2026</loc>
<lastmod>2026-04-12T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://vulnios.com/blog/wiz-vs-vulnios-comparison-2026</loc>
<lastmod>2026-04-12T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://vulnios.com/blog/complete-guide-vulnerability-scanning-2026</loc>
<lastmod>2026-03-20T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://vulnios.com/blog/epss-vs-cvss-vulnerability-prioritization</loc>
<lastmod>2026-03-19T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://vulnios.com/blog/soc2-compliance-checklist-startups-2026</loc>
<lastmod>2026-03-18T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://vulnios.com/blog/container-security-scanning-docker-kubernetes-guide</loc>
<lastmod>2026-03-17T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://vulnios.com/blog/msp-security-platform-multi-tenant-guide</loc>
<lastmod>2026-03-15T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://vulnios.com/blog/what-is-sbom-software-bill-of-materials</loc>
<lastmod>2026-03-13T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://vulnios.com/blog/automated-security-scanning-cicd-pipelines</loc>
<lastmod>2026-03-11T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://vulnios.com/blog/what-is-sbom-complete-guide</loc>
<lastmod>2026-03-11T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://vulnios.com/blog/epss-vs-cvss-vulnerability-scoring</loc>
<lastmod>2026-03-10T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://vulnios.com/blog/top-10-open-source-vulnerability-scanners</loc>
<lastmod>2026-03-09T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://vulnios.com/blog/understanding-kev-cisa-known-exploited-vulnerabilities</loc>
<lastmod>2026-03-09T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://vulnios.com/blog/free-vs-paid-vulnerability-scanners</loc>
<lastmod>2026-03-07T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://vulnios.com/privacy</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.4</priority>
</url>
<url>
<loc>https://vulnios.com/terms</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.4</priority>
</url>
<url>
<loc>https://vulnios.com/docs</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/docs/getting-started</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://vulnios.com/docs/msp</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://vulnios.com/docs/scanning</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://vulnios.com/docs/workers</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://vulnios.com/docs/billing</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://vulnios.com/docs/api</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://vulnios.com/docs/admin</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://vulnios.com/docs/security</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://vulnios.com/docs/osint</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://vulnios.com/docs/integrations</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://vulnios.com/docs/dark-web</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://vulnios.com/threats</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://vulnios.com/threats/vendor/aws</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://vulnios.com/threats/vendor/microsoft</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://vulnios.com/threats/vendor/google</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://vulnios.com/threats/vendor/fortinet</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://vulnios.com/threats/vendor/intel</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://vulnios.com/threats/vendor/amd</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://vulnios.com/threats/vendor/azure</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://vulnios.com/threats/vendor/debian</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://vulnios.com/threats/vendor/openssl</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://vulnios.com/threats/vendor/linux</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://vulnios.com/threats/vendor/ivanti</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://vulnios.com/threats/vendor/apple</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://vulnios.com/threats/vendor/sap</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://vulnios.com/threats/vendor/ubuntu</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://vulnios.com/threats/vendor/apache</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://vulnios.com/threats/vendor/kubernetes</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://vulnios.com/threats/vendor/nvidia</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://vulnios.com/threats/vendor/chrome</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://vulnios.com/threats/category/critical</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://vulnios.com/threats/category/high</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://vulnios.com/threats/category/kev</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://vulnios.com/threats/category/cve</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://vulnios.com/threats/category/osint</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://vulnios.com/threats/category/advisory</loc>
<lastmod>2026-05-13T09:21:35.134Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://vulnios.com/threats/the-record-by-recorded-future-advisory-may-12-2026-2026-05-13-mp3skqv8</loc>
<lastmod>2026-05-13T08:22:44.192Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/the-record-by-recorded-future-advisory-may-12-2026-2026-05-13</loc>
<lastmod>2026-05-13T08:22:44.138Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/the-record-by-recorded-future-advisory-may-12-2026-2026-05-13</loc>
<lastmod>2026-05-13T08:22:44.135Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/sans-internet-storm-center-advisory-may-13-2026-2026-05-13-mp3skpwc</loc>
<lastmod>2026-05-13T08:22:42.923Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/sans-internet-storm-center-advisory-may-13-2026-2026-05-13</loc>
<lastmod>2026-05-13T08:22:42.913Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/sans-internet-storm-center-advisory-may-12-2026-2026-05-13</loc>
<lastmod>2026-05-13T08:22:42.913Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/sans-internet-storm-center-advisory-may-13-2026-2026-05-13</loc>
<lastmod>2026-05-13T08:22:42.867Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/defense-at-ai-speed-microsofts-new-multi-model-agentic-security-system-tops-lead-2026-05-13</loc>
<lastmod>2026-05-13T08:22:10.035Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/exaforce-raises-125-million-for-agentic-soc-platform-2026-05-13</loc>
<lastmod>2026-05-13T08:22:04.525Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/hundreds-of-malicious-packages-force-rubygems-to-suspend-registrations-2026-05-13</loc>
<lastmod>2026-05-13T08:22:04.507Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/microsoft-patches-137-vulnerabilities-2026-05-13</loc>
<lastmod>2026-05-13T08:22:04.494Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/ics-patch-tuesday-new-security-advisories-from-siemens-schneider-cisa-2026-05-13</loc>
<lastmod>2026-05-13T08:22:03.965Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/rapid7-blog-advisory-may-13-2026-2026-05-13</loc>
<lastmod>2026-05-13T08:21:43.994Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/us-govt-seeks-instructure-testimony-on-massive-canvas-cyberattack-2026-05-13</loc>
<lastmod>2026-05-13T08:21:21.307Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/signal-adds-security-warnings-for-social-engineering-phishing-attacks-2026-05-13</loc>
<lastmod>2026-05-13T08:21:21.257Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/microsoft-releases-windows-10-kb5087544-extended-security-update-2026-05-13</loc>
<lastmod>2026-05-13T08:21:21.254Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/uk-fines-water-supplier-13m-for-exposing-data-of-664k-customers-2026-05-13</loc>
<lastmod>2026-05-13T08:21:11.318Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/microsoft-may-2026-patch-tuesday-fixes-120-flaws-no-zero-days-2026-05-13</loc>
<lastmod>2026-05-13T08:21:11.080Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/webinar-fixing-the-gaps-in-network-incident-response-2026-05-13</loc>
<lastmod>2026-05-13T08:21:10.820Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/fortinet-warns-of-critical-rce-flaws-in-fortisandbox-and-fortiauthenticator-2026-05-13</loc>
<lastmod>2026-05-13T08:21:10.561Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/windows-11-kb5089549-kb5087420-cumulative-updates-released-2026-05-13</loc>
<lastmod>2026-05-13T08:21:10.197Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/android-adds-intrusion-logging-for-sophisticated-spyware-forensics-2026-05-13</loc>
<lastmod>2026-05-13T08:20:36.945Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/new-exim-bdat-vulnerability-exposes-gnutls-builds-to-potential-code-execution-2026-05-13</loc>
<lastmod>2026-05-13T08:20:26.469Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cisco-talos-intelligence-advisory-may-12-2026-2026-05-13</loc>
<lastmod>2026-05-13T08:20:18.391Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/new-soc-ready-reporting-for-faster-triage-escalation-and-incident-response-with-2026-05-13</loc>
<lastmod>2026-05-13T08:20:11.047Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-40401-windows-tcpip-denial-of-service-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:10.533Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-40398-windows-remote-desktop-services-elevation-of-privilege-vulnerabil-2026-05-13</loc>
<lastmod>2026-05-13T08:13:10.514Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-40359-microsoft-excel-remote-code-execution-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:10.462Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-40362-microsoft-excel-remote-code-execution-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:10.273Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-33837-windows-tcpip-local-elevation-of-privilege-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:10.266Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-34331-win32k-elevation-of-privilege-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:10.207Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-32161-windows-native-wifi-miniport-driver-remote-code-execution-vulnera-2026-05-13</loc>
<lastmod>2026-05-13T08:13:10.036Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-41613-visual-studio-code-elevation-of-privilege-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:10.005Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-40377-microsoft-cryptographic-services-elevation-of-privilege-vulnerabi-2026-05-13</loc>
<lastmod>2026-05-13T08:13:09.963Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-34340-windows-projected-file-system-elevation-of-privilege-vulnerabilit-2026-05-13</loc>
<lastmod>2026-05-13T08:13:09.743Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-41109-github-copilot-and-visual-studio-code-security-feature-bypass-vul-2026-05-13</loc>
<lastmod>2026-05-13T08:13:09.708Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-35424-internet-key-exchange-ike-protocol-denial-of-service-vulnerabilit-2026-05-13</loc>
<lastmod>2026-05-13T08:13:09.706Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-34338-windows-telephony-service-elevation-of-privilege-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:09.481Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-40364-microsoft-word-remote-code-execution-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:09.467Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-34334-windows-tcpip-elevation-of-privilege-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:09.423Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-34344-windows-ancillary-function-driver-for-winsock-elevation-of-privil-2026-05-13</loc>
<lastmod>2026-05-13T08:13:09.215Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-41102-microsoft-powerpoint-for-android-spoofing-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:09.202Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-34347-windows-win32k-elevation-of-privilege-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:09.147Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-32175-net-core-tampering-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:08.960Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-32185-microsoft-teams-spoofing-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:08.942Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-34351-windows-tcpip-elevation-of-privilege-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:08.873Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-40403-windows-graphics-component-remote-code-execution-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:08.669Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-34350-windows-storport-miniport-driver-denial-of-service-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:08.613Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-40382-windows-telephony-service-elevation-of-privilege-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:08.560Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-32177-net-elevation-of-privilege-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:07.389Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-34329-microsoft-message-queuing-msmq-remote-code-execution-vulnerabilit-2026-05-13</loc>
<lastmod>2026-05-13T08:13:07.378Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-34333-windows-win32k-elevation-of-privilege-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:07.376Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-40420-microsoft-office-click-to-run-elevation-of-privilege-vulnerabilit-2026-05-13</loc>
<lastmod>2026-05-13T08:13:07.162Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-40361-microsoft-word-remote-code-execution-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:07.130Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-40407-windows-common-log-file-system-driver-elevation-of-privilege-vuln-2026-05-13</loc>
<lastmod>2026-05-13T08:13:07.130Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-34345-windows-ancillary-function-driver-for-winsock-elevation-of-privil-2026-05-13</loc>
<lastmod>2026-05-13T08:13:06.961Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-33839-win32k-elevation-of-privilege-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:06.881Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-41094-microsoft-data-formulator-remote-code-execution-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:06.861Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-35415-windows-storage-spaces-controller-elevation-of-privilege-vulnerab-2026-05-13</loc>
<lastmod>2026-05-13T08:13:06.734Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-34339-windows-lightweight-directory-access-protocol-ldap-denial-of-serv-2026-05-13</loc>
<lastmod>2026-05-13T08:13:06.625Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-40418-microsoft-office-click-to-run-elevation-of-privilege-vulnerabilit-2026-05-13</loc>
<lastmod>2026-05-13T08:13:06.622Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2025-54518-amd-cve-2025-54518-cpu-op-cache-corruption-2026-05-13</loc>
<lastmod>2026-05-13T08:13:06.518Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-40358-microsoft-office-remote-code-execution-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:06.395Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-35421-windows-gdi-remote-code-execution-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:06.349Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-41088-windows-ancillary-function-driver-for-winsock-elevation-of-privil-2026-05-13</loc>
<lastmod>2026-05-13T08:13:06.286Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-34341-windows-link-layer-discovery-protocol-lldp-elevation-of-privilege-2026-05-13</loc>
<lastmod>2026-05-13T08:13:06.144Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-42896-windows-dwm-core-library-elevation-of-privilege-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:06.100Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-40367-microsoft-word-remote-code-execution-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:06.037Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-40415-windows-tcpip-remote-code-execution-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:05.845Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-33833-azure-machine-learning-notebook-spoofing-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:05.823Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-42898-microsoft-dynamics-365-on-premises-remote-code-execution-vulnerab-2026-05-13</loc>
<lastmod>2026-05-13T08:13:05.792Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-40381-azure-connected-machine-agent-elevation-of-privilege-vulnerabilit-2026-05-13</loc>
<lastmod>2026-05-13T08:13:05.590Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-40397-windows-common-log-file-system-driver-elevation-of-privilege-vuln-2026-05-13</loc>
<lastmod>2026-05-13T08:13:05.547Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-35418-windows-cloud-files-mini-filter-driver-elevation-of-privilege-vul-2026-05-13</loc>
<lastmod>2026-05-13T08:13:05.512Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-40399-windows-tcpip-elevation-of-privilege-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:05.326Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-32209-windows-filtering-platform-wfp-security-feature-bypass-vulnerabil-2026-05-13</loc>
<lastmod>2026-05-13T08:13:05.268Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-35438-windows-admin-center-elevation-of-privilege-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:05.229Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-41095-data-deduplication-elevation-of-privilege-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:05.031Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-40366-microsoft-word-remote-code-execution-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:05.005Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-42832-microsoft-office-spoofing-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:04.987Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-40405-windows-tcpip-denial-of-service-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:04.970Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-40365-microsoft-sharepoint-server-remote-code-execution-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:04.861Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-32204-azure-monitor-agent-elevation-of-privilege-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:04.756Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-42893-microsoft-outlook-for-ios-tampering-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:04.751Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-35433-net-elevation-of-privilege-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:04.638Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-40363-microsoft-office-remote-code-execution-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:04.533Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-34337-windows-cloud-files-mini-filter-driver-elevation-of-privilege-vul-2026-05-13</loc>
<lastmod>2026-05-13T08:13:04.530Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-41097-secure-boot-security-feature-bypass-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:04.463Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-35439-microsoft-sharepoint-server-remote-code-execution-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:04.458Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-35422-windows-tcpip-driver-security-feature-bypass-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:04.340Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-42899-aspnet-core-denial-of-service-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:04.213Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-35417-windows-win32k-elevation-of-privilege-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:04.172Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-33112-microsoft-sharepoint-server-remote-code-execution-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:04.063Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-40417-microsoft-dynamics-365-business-central-elevation-of-privilege-vu-2026-05-13</loc>
<lastmod>2026-05-13T08:13:03.960Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-33835-windows-cloud-files-mini-filter-driver-elevation-of-privilege-vul-2026-05-13</loc>
<lastmod>2026-05-13T08:13:03.891Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-33110-microsoft-sharepoint-server-remote-code-execution-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:03.797Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-40421-microsoft-word-information-disclosure-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:03.668Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-42823-azure-logic-apps-elevation-of-privilege-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:03.538Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-40360-microsoft-excel-information-disclosure-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:03.476Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-40419-microsoft-office-click-to-run-elevation-of-privilege-vulnerabilit-2026-05-13</loc>
<lastmod>2026-05-13T08:13:03.390Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-41101-microsoft-word-for-android-spoofing-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:03.214Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-41610-visual-studio-code-security-feature-bypass-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:03.212Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-33117-azure-sdk-for-java-security-feature-bypass-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:03.069Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-41096-windows-dns-client-remote-code-execution-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:02.946Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-41086-windows-admin-center-in-azure-portal-elevation-of-privilege-vulne-2026-05-13</loc>
<lastmod>2026-05-13T08:13:02.927Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-40402-windows-hyper-v-elevation-of-privilege-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:02.715Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-40406-windows-tcpip-information-disclosure-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:02.612Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-34336-windows-dwm-core-library-information-disclosure-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:02.585Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-35436-microsoft-office-click-to-run-elevation-of-privilege-vulnerabilit-2026-05-13</loc>
<lastmod>2026-05-13T08:13:02.509Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-35420-windows-kernel-elevation-of-privilege-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:02.406Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-33838-windows-message-queuing-msmq-elevation-of-privilege-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:02.384Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-33841-windows-kernel-elevation-of-privilege-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:02.168Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-34342-windows-print-spooler-elevation-of-privilege-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:02.146Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-41100-microsoft-365-copilot-for-android-spoofing-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:02.106Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-35423-windows-11-telnet-client-information-disclosure-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:01.877Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-40368-microsoft-sharepoint-server-remote-code-execution-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:01.869Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-34343-windows-application-identity-appid-subsystem-elevation-of-privile-2026-05-13</loc>
<lastmod>2026-05-13T08:13:01.781Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-41089-windows-netlogon-remote-code-execution-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:01.618Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-42831-microsoft-office-remote-code-execution-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:01.591Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-40408-windows-wan-arp-driver-elevation-of-privilege-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:01.410Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-42830-azure-monitor-agent-metrics-extension-elevation-of-privilege-vuln-2026-05-13</loc>
<lastmod>2026-05-13T08:13:01.357Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-21530-windows-rich-text-edit-elevation-of-privilege-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:01.305Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-35416-windows-ancillary-function-driver-for-winsock-elevation-of-privil-2026-05-13</loc>
<lastmod>2026-05-13T08:13:01.122Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-42825-windows-telephony-service-elevation-of-privilege-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:00.996Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-40413-windows-tcpip-denial-of-service-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:00.890Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-40357-microsoft-sharepoint-server-remote-code-execution-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:00.698Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-35419-windows-dwm-core-library-information-disclosure-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:00.586Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-35440-microsoft-word-information-disclosure-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:00.431Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-41611-visual-studio-code-remote-code-execution-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:00.284Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-34330-win32k-elevation-of-privilege-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:00.283Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-40410-windows-smb-client-elevation-of-privilege-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:13:00.156Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-33834-windows-event-logging-service-elevation-of-privilege-vulnerabilit-2026-05-13</loc>
<lastmod>2026-05-13T08:12:59.979Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-34332-windows-kernel-mode-driver-remote-code-execution-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:12:59.932Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-33840-win32k-elevation-of-privilege-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:12:59.827Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-41612-visual-studio-code-information-disclosure-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:12:59.695Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-40374-microsoft-power-automate-desktop-information-disclosure-vulnerabi-2026-05-13</loc>
<lastmod>2026-05-13T08:12:59.599Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-41614-m365-copilot-for-desktop-spoofing-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:12:59.522Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-40370-sql-server-remote-code-execution-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:12:59.401Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-41103-microsoft-sso-plugin-for-jira-confluence-elevation-of-privilege-v-2026-05-13</loc>
<lastmod>2026-05-13T08:12:59.216Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-40414-windows-tcpip-denial-of-service-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:12:59.156Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-42833-microsoft-dynamics-365-on-premises-remote-code-execution-vulnerab-2026-05-13</loc>
<lastmod>2026-05-13T08:12:59.103Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-40380-windows-volume-manager-extension-driver-remote-code-execution-vul-2026-05-13</loc>
<lastmod>2026-05-13T08:12:58.768Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-40369-windows-kernel-elevation-of-privilege-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:12:58.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-32170-windows-rich-text-edit-elevation-of-privilege-vulnerability-2026-05-13</loc>
<lastmod>2026-05-13T08:12:58.676Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/stable-channel-update-for-desktop-2026-05-13</loc>
<lastmod>2026-05-13T00:40:03.251Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chrome-for-android-update-2026-05-13</loc>
<lastmod>2026-05-13T00:40:03.215Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/dsa-6265-1-exim4-security-update-2026-05-12</loc>
<lastmod>2026-05-12T21:58:21.823Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chrome-stable-for-ios-update-2026-05-12</loc>
<lastmod>2026-05-12T18:39:05.398Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/android-17-to-expand-banking-scam-call-and-privacy-protections-2026-05-12</loc>
<lastmod>2026-05-12T17:52:09.929Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/koda-warns-of-customer-data-breach-after-online-shop-hack-2026-05-12</loc>
<lastmod>2026-05-12T17:52:09.325Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/rubygems-suspends-new-signups-after-hundreds-of-malicious-packages-are-uploaded-2026-05-12</loc>
<lastmod>2026-05-12T17:37:34.038Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/the-record-by-recorded-future-advisory-may-12-2026-2026-05-12-mp2wegtd</loc>
<lastmod>2026-05-12T17:22:03.501Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/adobe-patches-52-vulnerabilities-in-10-products-2026-05-12</loc>
<lastmod>2026-05-12T17:06:19.230Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/white-circle-raises-11-million-for-ai-control-platform-2026-05-12</loc>
<lastmod>2026-05-12T17:06:19.078Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/usn-8270-1-exim-vulnerability-2026-05-12</loc>
<lastmod>2026-05-12T17:06:19.036Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/fuji-electric-tellus-2026-05-12</loc>
<lastmod>2026-05-12T15:36:24.175Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/subnet-solutions-powersystem-center-2026-05-12</loc>
<lastmod>2026-05-12T15:36:22.892Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/abb-webpro-snmp-card-powervalue-multiple-vulnerabilities-2026-05-12</loc>
<lastmod>2026-05-12T15:36:22.667Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/abb-automation-builder-gateway-for-windows-2026-05-12</loc>
<lastmod>2026-05-12T15:36:22.637Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/abb-ac500-v3-multiple-vulnerabilities-2026-05-12</loc>
<lastmod>2026-05-12T15:36:22.592Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/abb-ac500-v3-stack-buffer-overflow-in-cryptographic-message-syntax-2026-05-12</loc>
<lastmod>2026-05-12T15:36:20.437Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/bwh-hotels-says-hackers-had-access-to-reservation-data-for-6-months-2026-05-12</loc>
<lastmod>2026-05-12T14:51:58.983Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/west-pharmaceutical-services-hit-by-disruptive-ransomware-attack-2026-05-12</loc>
<lastmod>2026-05-12T14:51:54.552Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/deal-reached-with-hackers-to-delete-data-stolen-from-the-canvas-educational-plat-2026-05-12</loc>
<lastmod>2026-05-12T14:51:54.502Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/free-onlyfans-lure-used-to-spread-cross-platform-crpx0-malware-2026-05-12</loc>
<lastmod>2026-05-12T14:51:54.482Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/copyfail-linux-vulnerability-2026-05-12</loc>
<lastmod>2026-05-12T14:36:27.283Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/new-trickmo-variant-uses-ton-c2-and-socks5-to-create-android-network-pivots-2026-05-12</loc>
<lastmod>2026-05-12T14:35:51.899Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/anyrun-elastic-security-bring-threat-intelligence-into-detection-and-investigati-2026-05-12</loc>
<lastmod>2026-05-12T14:35:38.773Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/may-2026-security-update-2026-05-12</loc>
<lastmod>2026-05-12T14:35:34.130Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/the-record-by-recorded-future-advisory-may-12-2026-2026-05-12</loc>
<lastmod>2026-05-12T13:50:45.859Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/software-bill-of-materials-for-ai-minimum-elements-2026-05-12</loc>
<lastmod>2026-05-12T13:35:23.566Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/claude-mythos-finds-only-one-curl-vulnerability-experts-divided-on-what-it-reall-2026-05-12</loc>
<lastmod>2026-05-12T12:49:57.286Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/sap-patches-critical-s4hana-commerce-vulnerabilities-2026-05-12</loc>
<lastmod>2026-05-12T12:49:56.942Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/apple-patches-dozens-of-vulnerabilities-in-macos-ios-2026-05-12</loc>
<lastmod>2026-05-12T12:49:56.622Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/is-the-soc-obsolete-and-we-just-havent-admitted-it-yet-2026-05-12</loc>
<lastmod>2026-05-12T12:49:56.266Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/webinar-what-the-riskiest-soc-alerts-go-unanswered-and-how-radiant-security-can-2026-05-12</loc>
<lastmod>2026-05-12T12:34:10.764Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/shai-hulud-attack-ships-signed-malicious-tanstack-mistral-npm-packages-2026-05-12</loc>
<lastmod>2026-05-12T11:48:09.596Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/sap-fixes-critical-vulnerabilities-in-commerce-cloud-and-s4hana-2026-05-12</loc>
<lastmod>2026-05-12T11:48:09.260Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/why-agentic-ai-is-securitys-next-blind-spot-2026-05-12</loc>
<lastmod>2026-05-12T11:33:21.348Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/usn-8263-1-imagemagick-vulnerabilities-2026-05-12</loc>
<lastmod>2026-05-12T11:03:18.940Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/tanstack-mistral-ai-uipath-hit-in-fresh-supply-chain-attack-2026-05-12</loc>
<lastmod>2026-05-12T10:35:14.438Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/instructure-reaches-agreement-with-shinyhunters-to-stop-data-leak-2026-05-12</loc>
<lastmod>2026-05-12T09:30:19.206Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/mini-shai-hulud-worm-compromises-tanstack-mistral-ai-guardrails-ai-more-packages-2026-05-12</loc>
<lastmod>2026-05-12T09:30:17.349Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/the-record-by-recorded-future-advisory-may-11-2026-2026-05-12</loc>
<lastmod>2026-05-12T08:35:00.441Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/the-record-by-recorded-future-advisory-may-11-2026-2026-05-12</loc>
<lastmod>2026-05-12T08:35:00.332Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/sans-internet-storm-center-advisory-may-11-2026-2026-05-12</loc>
<lastmod>2026-05-12T08:34:58.053Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/sans-internet-storm-center-advisory-may-12-2026-2026-05-12</loc>
<lastmod>2026-05-12T08:34:58.038Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/frame-security-emerges-from-stealth-with-50m-for-awareness-and-training-platform-2026-05-12</loc>
<lastmod>2026-05-12T08:33:50.490Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/build-application-firewalls-aim-to-stop-the-next-supply-chain-attack-2026-05-12</loc>
<lastmod>2026-05-12T08:33:49.841Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/inside-ad-cs-escalation-unpacking-advanced-misuse-techniques-and-tools-2026-05-12</loc>
<lastmod>2026-05-12T08:32:31.137Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/gm-agrees-to-1275m-california-settlement-over-sale-of-drivers-data-2026-05-12</loc>
<lastmod>2026-05-12T08:28:46.772Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/official-checkmarx-jenkins-package-compromised-with-infostealer-2026-05-12</loc>
<lastmod>2026-05-12T08:28:46.705Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/new-ghostlock-tool-abuses-windows-api-to-block-file-access-2026-05-12</loc>
<lastmod>2026-05-12T08:28:45.645Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cpanel-cve-2026-41940-under-active-exploitation-to-deploy-filemanager-backdoor-2026-05-12</loc>
<lastmod>2026-05-12T08:28:40.803Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/hackers-used-ai-to-develop-first-known-zero-day-2fa-bypass-for-mass-exploitation-2026-05-12</loc>
<lastmod>2026-05-12T08:28:40.789Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/ios-265-brings-default-end-to-end-encrypted-rcs-messaging-between-iphone-and-and-2026-05-12</loc>
<lastmod>2026-05-12T08:28:29.919Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/teampcp-compromises-checkmarx-jenkins-ast-plugin-weeks-after-kics-supply-chain-a-2026-05-12</loc>
<lastmod>2026-05-12T08:28:29.663Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/openai-launches-daybreak-for-ai-powered-vulnerability-detection-and-patch-valida-2026-05-12</loc>
<lastmod>2026-05-12T08:28:29.371Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/instructure-reaches-ransom-agreement-with-shinyhunters-to-stop-365tb-canvas-leak-2026-05-12</loc>
<lastmod>2026-05-12T08:28:29.060Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-43500-rxrpc-also-unshare-dataresponse-packets-when-paged-frags-are-pres-2026-05-12</loc>
<lastmod>2026-05-12T08:26:45.442Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/long-term-support-channel-update-for-chromeos-2026-05-12</loc>
<lastmod>2026-05-12T00:24:10.792Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/dsa-6264-1-dnsmasq-security-update-2026-05-11</loc>
<lastmod>2026-05-11T21:30:23.337Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/usn-8267-1-linux-kernel-vulnerabilities-2026-05-11</loc>
<lastmod>2026-05-11T18:32:23.608Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/gtig-ai-threat-tracker-adversaries-leverage-ai-for-vulnerability-exploitation-au-2026-05-11</loc>
<lastmod>2026-05-11T18:16:01.337Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/11th-may-threat-intelligence-report-2026-05-11</loc>
<lastmod>2026-05-11T18:15:42.963Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/vu471747-dnsmasq-contains-several-vulnerabilities-including-attacker-dns-redirec-2026-05-11</loc>
<lastmod>2026-05-11T18:15:30.960Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/usn-8255-2-linux-kernel-azure-vulnerabilities-2026-05-11</loc>
<lastmod>2026-05-11T16:30:07.024Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/usn-8266-1-linux-kernel-vulnerabilities-2026-05-11</loc>
<lastmod>2026-05-11T16:30:06.588Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/vu937808-casdoor-contains-arbitrary-file-write-vulnerability-2026-05-11</loc>
<lastmod>2026-05-11T16:15:18.365Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/sans-internet-storm-center-advisory-may-11-2026-2026-05-11-mp1dibkg</loc>
<lastmod>2026-05-11T15:45:24.441Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/instructure-confirms-hackers-used-canvas-flaw-to-deface-portals-2026-05-11</loc>
<lastmod>2026-05-11T15:29:48.478Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/why-changing-passwords-doesnt-end-an-active-directory-breach-2026-05-11</loc>
<lastmod>2026-05-11T14:28:41.874Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/flash-alert-etherrat-and-tuktuk-c2-end-in-the-gentleman-ransomware-2026-05-11</loc>
<lastmod>2026-05-11T14:28:36.540Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/-weekly-recap-linux-rootkit-macos-crypto-stealer-websocket-skimmers-and-more-2026-05-11</loc>
<lastmod>2026-05-11T14:28:24.781Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2025-21833-iommuvt-d-avoid-use-of-null-after-warnononce-2026-05-11</loc>
<lastmod>2026-05-11T14:26:55.341Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/usn-8254-2-linux-kernel-nvidia-vulnerabilities-2026-05-11</loc>
<lastmod>2026-05-11T14:25:29.452Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/usn-8180-6-linux-kernel-raspberry-pi-vulnerabilities-2026-05-11</loc>
<lastmod>2026-05-11T14:25:29.124Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/usn-8265-1-linux-kernel-nvidia-tegra-vulnerabilities-2026-05-11</loc>
<lastmod>2026-05-11T14:25:29.093Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/the-record-by-recorded-future-advisory-may-11-2026-2026-05-11-mp190m7j</loc>
<lastmod>2026-05-11T13:39:39.964Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/the-record-by-recorded-future-advisory-may-11-2026-2026-05-11</loc>
<lastmod>2026-05-11T13:39:39.891Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cloudflare-lays-off-1100-employees-in-ai-driven-restructuring-2026-05-11</loc>
<lastmod>2026-05-11T13:24:54.570Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/skoda-data-breach-hits-online-shop-customers-2026-05-11</loc>
<lastmod>2026-05-11T13:24:54.527Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/sailpoint-discloses-github-repository-hack-2026-05-11</loc>
<lastmod>2026-05-11T13:24:54.175Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/google-detects-first-ai-generated-zero-day-exploit-2026-05-11</loc>
<lastmod>2026-05-11T13:24:53.026Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/llms-and-text-in-text-steganography-2026-05-11</loc>
<lastmod>2026-05-11T13:23:57.961Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/google-hackers-used-ai-to-develop-zero-day-exploit-for-web-admin-tool-2026-05-11</loc>
<lastmod>2026-05-11T13:22:44.441Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/webinar-this-week-prevention-alone-is-not-enough-against-modern-attacks-2026-05-11</loc>
<lastmod>2026-05-11T13:22:43.901Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/your-purple-team-isnt-purple-its-just-red-and-blue-in-the-same-room-2026-05-11</loc>
<lastmod>2026-05-11T13:22:28.242Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2025-68304-bluetooth-hcicore-lookup-hciconn-on-rx-path-on-protocol-side-2026-05-11</loc>
<lastmod>2026-05-11T13:15:07.698Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/usn-8200-3-linux-kernel-raspberry-pi-vulnerabilities-2026-05-11</loc>
<lastmod>2026-05-11T12:23:21.973Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/new-dirty-frag-linux-vulnerability-possibly-exploited-in-attacks-2026-05-11</loc>
<lastmod>2026-05-11T09:43:25.287Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/resurrected-crimenetwork-marketplace-taken-down-administrator-arrested-2026-05-11</loc>
<lastmod>2026-05-11T09:43:24.439Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/checkmarx-jenkins-ast-plugin-compromised-in-supply-chain-attack-2026-05-11</loc>
<lastmod>2026-05-11T09:43:24.320Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/canvas-system-is-online-after-a-cyberattack-disrupted-thousands-of-schools-2026-05-11</loc>
<lastmod>2026-05-11T09:43:24.187Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/trickmo-android-banker-adopts-ton-blockchain-for-covert-comms-2026-05-11</loc>
<lastmod>2026-05-11T09:42:50.346Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-43310-media-verisilicon-avoid-g2-bus-error-while-decoding-h264-and-hevc-2026-05-11</loc>
<lastmod>2026-05-11T09:42:38.244Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-43311-soctegra-pmc-fix-unsafe-generichandleirq-call-2026-05-11</loc>
<lastmod>2026-05-11T09:42:38.223Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-43292-mmvmalloc-prevent-rcu-stalls-in-kasanreleasevmallocnode-2026-05-11</loc>
<lastmod>2026-05-11T09:42:38.079Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-43306-bpf-crypto-use-the-correct-destructor-kfunc-type-2026-05-11</loc>
<lastmod>2026-05-11T09:42:37.938Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-31771-bluetooth-hcievent-move-wake-reason-storage-into-validated-event-2026-05-11</loc>
<lastmod>2026-05-11T09:42:37.834Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-43299-btrfs-do-not-assert-when-the-fs-flips-ro-inside-btrfsrepairiofail-2026-05-11</loc>
<lastmod>2026-05-11T09:42:37.755Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-7262-null-pointer-dereference-in-soap-apachemap-decoder-with-missing-2026-05-11</loc>
<lastmod>2026-05-11T09:42:37.540Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-43338-btrfs-reserve-enough-transaction-items-for-qgroup-ioctls-2026-05-11</loc>
<lastmod>2026-05-11T09:42:37.540Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-43318-drmamdgpu-fix-sync-handling-in-amdgpudmabufmovenotify-2026-05-11</loc>
<lastmod>2026-05-11T09:42:37.339Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-31729-usb-typec-ucsi-validate-connector-number-in-ucsinotifycommon-2026-05-11</loc>
<lastmod>2026-05-11T09:42:37.218Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2025-14179-sql-injection-in-pdofirebird-via-nul-bytes-in-quoted-strings-2026-05-11</loc>
<lastmod>2026-05-11T09:42:37.208Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-45186-2026-05-11</loc>
<lastmod>2026-05-11T09:42:36.191Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-43036-net-use-skbheaderpointer-for-tcpv4-gso-fragoff-check-2026-05-11</loc>
<lastmod>2026-05-11T09:42:36.012Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-43294-drm-renesas-rz-du-mipidsi-fix-kernel-panic-when-rebooting-for-som-2026-05-11</loc>
<lastmod>2026-05-11T09:42:35.996Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-43352-i3c-mipi-i3c-hci-correct-ringctrlabort-handling-in-dma-dequeue-2026-05-11</loc>
<lastmod>2026-05-11T09:42:35.940Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-43309-md-raid-fix-hang-when-stopping-arrays-with-metadata-through-dm-ra-2026-05-11</loc>
<lastmod>2026-05-11T09:42:35.781Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-43421-usb-gadget-fncm-fix-netdevice-lifecycle-with-devicemove-2026-05-11</loc>
<lastmod>2026-05-11T09:42:35.773Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-31709-smb-client-validate-the-whole-dacl-before-rewriting-it-in-cifsacl-2026-05-11</loc>
<lastmod>2026-05-11T09:42:35.731Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-43320-drmamddisplay-fix-dsc-edp-issue-2026-05-11</loc>
<lastmod>2026-05-11T09:42:35.718Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-31712-ksmbd-require-minimum-ace-size-in-smbcheckpermdacl-2026-05-11</loc>
<lastmod>2026-05-11T09:42:35.670Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-31723-usb-gadget-fsubset-fix-netdevice-lifecycle-with-devicemove-2026-05-11</loc>
<lastmod>2026-05-11T09:42:35.664Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2025-21714-rdmamlx5-fix-implicit-odp-use-after-free-2026-05-11</loc>
<lastmod>2026-05-11T09:42:35.550Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-43048-hid-core-mitigate-potential-oob-by-removing-bogus-memset-2026-05-11</loc>
<lastmod>2026-05-11T09:42:35.548Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2025-71302-drmpanthor-fix-for-dma-fence-safe-access-rules-2026-05-11</loc>
<lastmod>2026-05-11T09:42:35.504Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-42256-net-imap-denial-of-service-via-high-iteration-count-for-scram-aut-2026-05-11</loc>
<lastmod>2026-05-11T09:42:35.484Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2025-71299-spi-cadence-quadspi-parse-dt-for-flashes-with-the-rest-of-the-dt-2026-05-11</loc>
<lastmod>2026-05-11T09:42:35.412Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-7261-soapserver-session-persisted-object-use-after-free-via-soap-header-2026-05-11</loc>
<lastmod>2026-05-11T09:42:35.379Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-43284-xfrm-esp-avoid-in-place-decrypt-on-shared-skb-frags-2026-05-11</loc>
<lastmod>2026-05-11T09:42:35.371Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-43319-spi-spidev-fix-lock-inversion-between-spilock-and-buflock-2026-05-11</loc>
<lastmod>2026-05-11T09:42:35.354Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-7258-out-of-bounds-read-in-urldecode-on-netbsd-2026-05-11</loc>
<lastmod>2026-05-11T09:42:35.343Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-43052-wifi-mac80211-check-tdls-flag-in-ieee80211tdlsoper-2026-05-11</loc>
<lastmod>2026-05-11T09:42:35.261Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-43321-bpf-properly-mark-live-registers-for-indirect-jumps-2026-05-11</loc>
<lastmod>2026-05-11T09:42:35.241Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-31706-ksmbd-validate-numaces-and-harden-ace-walk-in-smbinheritdacl-2026-05-11</loc>
<lastmod>2026-05-11T09:42:35.228Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-43344-perfx86inteluncore-fix-die-id-init-and-look-up-bugs-2026-05-11</loc>
<lastmod>2026-05-11T09:42:35.105Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-31722-usb-gadget-frndis-fix-netdevice-lifecycle-with-devicemove-2026-05-11</loc>
<lastmod>2026-05-11T09:42:35.085Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-43042-mpls-add-seqcount-to-protect-the-platformlabels-pair-2026-05-11</loc>
<lastmod>2026-05-11T09:42:35.063Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-43300-drmpanel-fix-a-possible-null-pointer-dereference-in-jdipaneldsire-2026-05-11</loc>
<lastmod>2026-05-11T09:42:35.052Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-43353-i3c-mipi-i3c-hci-fix-race-in-dma-ring-dequeue-2026-05-11</loc>
<lastmod>2026-05-11T09:42:35.019Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-43053-xfs-close-crash-window-in-attr-dabtree-inactivation-2026-05-11</loc>
<lastmod>2026-05-11T09:42:35.014Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-43298-drmamdgpu-skip-vcn-poison-irq-release-on-vf-2026-05-11</loc>
<lastmod>2026-05-11T09:42:34.945Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-7259-null-pointer-dereference-in-phpmbcheckencoding-via-mberegsearchini-2026-05-11</loc>
<lastmod>2026-05-11T09:42:34.931Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-43398-drmamdgpu-add-upper-bound-check-on-user-inputs-in-wait-ioctl-2026-05-11</loc>
<lastmod>2026-05-11T09:42:34.915Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-6735-xss-within-php-fpm-status-endpoint-2026-05-11</loc>
<lastmod>2026-05-11T09:42:34.774Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-43474-fs-init-flagsvalid-before-calling-vfsfileattrget-2026-05-11</loc>
<lastmod>2026-05-11T09:42:34.721Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-42257-net-imap-command-injection-via-raw-arguments-to-multiple-commands-2026-05-11</loc>
<lastmod>2026-05-11T09:42:34.692Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-42246-net-imap-vulnerable-to-starttls-stripping-via-invalid-response-ti-2026-05-11</loc>
<lastmod>2026-05-11T09:42:34.675Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-6722-use-after-free-in-soap-using-apache-map-2026-05-11</loc>
<lastmod>2026-05-11T09:42:34.669Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-43019-bluetooth-hciconn-fix-potential-uaf-in-setcigparamssync-2026-05-11</loc>
<lastmod>2026-05-11T09:42:34.665Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-43049-hid-logitech-hidpp-prevent-use-after-free-on-force-feedback-initi-2026-05-11</loc>
<lastmod>2026-05-11T09:42:34.644Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-31777-alsa-ctxfi-check-the-error-for-index-mapping-2026-05-11</loc>
<lastmod>2026-05-11T09:42:34.613Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-43009-bpf-fix-incorrect-pruning-due-to-atomic-fetch-precision-tracking-2026-05-11</loc>
<lastmod>2026-05-11T09:42:34.519Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-7568-signed-integer-overflow-in-metaphone-2026-05-11</loc>
<lastmod>2026-05-11T09:42:34.347Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2025-21723-scsi-mpi3mr-fix-possible-crash-when-setting-up-bsg-fails-2026-05-11</loc>
<lastmod>2026-05-11T09:42:34.331Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-43305-drmamddisplay-fix-mismatched-unlock-for-dmub-hw-lock-in-hwss-fast-2026-05-11</loc>
<lastmod>2026-05-11T09:42:34.326Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-43456-bonding-fix-type-confusion-in-bondsetupbyslave-2026-05-11</loc>
<lastmod>2026-05-11T09:42:34.322Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-43317-most-core-fix-leak-on-early-registration-failure-2026-05-11</loc>
<lastmod>2026-05-11T09:42:34.309Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-31707-ksmbd-validate-response-sizes-in-ipcvalidatemsg-2026-05-11</loc>
<lastmod>2026-05-11T09:42:34.218Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-31725-usb-gadget-fecm-fix-netdevice-lifecycle-with-devicemove-2026-05-11</loc>
<lastmod>2026-05-11T09:42:33.886Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-43443-asoc-amd-acp-mach-common-add-missing-error-check-for-clock-acquis-2026-05-11</loc>
<lastmod>2026-05-11T09:42:33.668Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-43010-bpf-reject-sleepable-kprobemulti-programs-at-attach-time-2026-05-11</loc>
<lastmod>2026-05-11T09:42:33.596Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-43400-drmamdgpu-add-upper-bound-check-on-user-inputs-in-signal-ioctl-2026-05-11</loc>
<lastmod>2026-05-11T09:42:33.487Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-43416-powerpc-perf-check-that-current-mm-is-alive-before-getting-user-c-2026-05-11</loc>
<lastmod>2026-05-11T09:42:33.335Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-43308-btrfs-dont-bug-on-unexpected-delayed-ref-type-in-runonedelayedref-2026-05-11</loc>
<lastmod>2026-05-11T09:42:33.326Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-31715-f2fs-fix-uaf-caused-by-decrementing-sbi-nrpages-in-f2fswriteendio-2026-05-11</loc>
<lastmod>2026-05-11T09:42:33.082Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-42258-net-imap-command-injection-via-unvalidated-symbol-inputs-2026-05-11</loc>
<lastmod>2026-05-11T09:42:33.032Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-31724-usb-gadget-feem-fix-netdevice-lifecycle-with-devicemove-2026-05-11</loc>
<lastmod>2026-05-11T09:42:32.938Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/fake-openai-privacy-filter-repo-hits-1-on-hugging-face-draws-244k-downloads-2026-05-11</loc>
<lastmod>2026-05-11T08:36:20.631Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/over-500-organizations-hit-in-years-long-phishing-campaign-2026-05-11</loc>
<lastmod>2026-05-11T05:23:12.131Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/sans-internet-storm-center-advisory-may-11-2026-2026-05-11</loc>
<lastmod>2026-05-11T03:21:26.470Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/sans-internet-storm-center-advisory-may-10-2026-2026-05-10</loc>
<lastmod>2026-05-10T23:19:16.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/dsa-6263-1-libpng16-security-update-2026-05-10</loc>
<lastmod>2026-05-10T21:07:15.632Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/dsa-6261-1-corosync-security-update-2026-05-10</loc>
<lastmod>2026-05-10T21:07:07.778Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/dsa-6262-1-lcms2-security-update-2026-05-10</loc>
<lastmod>2026-05-10T21:07:07.676Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/hackers-abuse-google-ads-claudeai-chats-to-push-mac-malware-2026-05-10</loc>
<lastmod>2026-05-10T18:50:37.877Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/dsa-6260-1-tor-security-update-2026-05-10</loc>
<lastmod>2026-05-10T15:03:14.531Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/police-shut-down-reboot-of-crimenetwork-marketplace-arrest-admin-2026-05-10</loc>
<lastmod>2026-05-10T14:48:27.117Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/ollama-out-of-bounds-read-vulnerability-allows-remote-process-memory-leak-2026-05-10</loc>
<lastmod>2026-05-10T13:47:32.886Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-33079-mistune-redos-in-linktitlere-allows-denial-of-service-with-crafte-2026-05-10</loc>
<lastmod>2026-05-10T09:58:15.618Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-39820-quadratic-string-concatentation-in-consumecomment-in-netmail-2026-05-10</loc>
<lastmod>2026-05-10T09:58:15.446Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-6665-pgbouncer-buffer-overflow-in-scram-2026-05-10</loc>
<lastmod>2026-05-10T09:58:15.199Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-6664-pgbouncer-integer-overflow-in-pgbouncer-network-packet-parsing-2026-05-10</loc>
<lastmod>2026-05-10T09:58:15.198Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-44656-vim-os-command-injection-via-path-completion-2026-05-10</loc>
<lastmod>2026-05-10T09:58:15.176Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-42501-malicious-module-proxy-can-bypass-checksum-database-in-cmdgo-2026-05-10</loc>
<lastmod>2026-05-10T09:58:13.288Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-39819-invoking-go-bug-follows-symlinks-in-predictable-temporary-filenam-2026-05-10</loc>
<lastmod>2026-05-10T09:58:13.253Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-39826-escaper-bypass-leads-to-xss-in-htmltemplate-2026-05-10</loc>
<lastmod>2026-05-10T09:58:13.221Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-39825-reverseproxy-forwards-queries-with-more-than-urlmaxqueryparams-pa-2026-05-10</loc>
<lastmod>2026-05-10T09:58:10.525Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-42499-quadratic-string-concatenation-in-consumephrase-in-netmail-2026-05-10</loc>
<lastmod>2026-05-10T09:58:10.403Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-33814-infinite-loop-in-http2-transport-when-given-bad-settingsmaxframes-2026-05-10</loc>
<lastmod>2026-05-10T09:58:10.379Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-6666-pgbouncer-crash-in-killpoolloginsservererror-2026-05-10</loc>
<lastmod>2026-05-10T09:58:09.546Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-39823-bypass-of-meta-content-url-escaping-causes-xss-in-htmltemplate-2026-05-10</loc>
<lastmod>2026-05-10T09:58:09.283Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-45130-vim-heap-buffer-overflow-in-spell-file-loading-2026-05-10</loc>
<lastmod>2026-05-10T09:58:09.261Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-39836-panic-in-dial-and-lookupport-when-handling-nul-byte-on-windows-in-2026-05-10</loc>
<lastmod>2026-05-10T09:58:09.206Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-33811-crash-when-handling-long-cname-response-in-net-2026-05-10</loc>
<lastmod>2026-05-10T09:58:04.974Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-41889-pgx-sql-injection-via-placeholder-confusion-with-dollar-quoted-st-2026-05-10</loc>
<lastmod>2026-05-10T09:58:04.589Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-39817-invoking-go-tool-pack-does-not-sanitize-output-paths-in-cmdgo-2026-05-10</loc>
<lastmod>2026-05-10T09:58:04.232Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-6667-pgbouncer-missing-authorization-check-in-killclient-admin-command-2026-05-10</loc>
<lastmod>2026-05-10T09:58:03.792Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/dsa-6259-1-pyjwt-security-update-2026-05-09</loc>
<lastmod>2026-05-09T20:50:15.020Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/jdownloader-site-hacked-to-replace-installers-with-python-rat-malware-2026-05-09</loc>
<lastmod>2026-05-09T19:59:31.028Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/dsa-6258-1-linux-security-update-2026-05-09</loc>
<lastmod>2026-05-09T14:49:11.864Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/fake-openai-repository-on-hugging-face-pushes-infostealer-malware-2026-05-09</loc>
<lastmod>2026-05-09T14:43:40.084Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cpanel-whm-release-fixes-for-three-new-vulnerabilities-patch-now-2026-05-09</loc>
<lastmod>2026-05-09T08:11:15.501Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/kubernetes-v136-moving-volume-group-snapshots-to-ga-2026-05-09</loc>
<lastmod>2026-05-09T04:59:13.751Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/friday-squid-blogging-giant-squid-live-in-the-waters-of-western-australia-2026-05-09</loc>
<lastmod>2026-05-09T00:26:18.222Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-8178-remote-code-execution-via-unsafe-class-loading-in-amazon-redshift-2026-05-08</loc>
<lastmod>2026-05-08T22:41:17.576Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/dsa-6255-1-php82-security-update-2026-05-08</loc>
<lastmod>2026-05-08T20:41:17.626Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/dsa-6257-1-postorius-security-update-2026-05-08</loc>
<lastmod>2026-05-08T20:41:10.457Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/dsa-6253-1-linux-security-update-2026-05-08</loc>
<lastmod>2026-05-08T20:41:10.145Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/dsa-6256-1-php84-security-update-2026-05-08</loc>
<lastmod>2026-05-08T20:41:09.736Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/dsa-6254-1-firefox-esr-security-update-2026-05-08</loc>
<lastmod>2026-05-08T20:41:09.356Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/vu260001-linux-kernel-contains-local-privilege-escalation-vulnerability-copy-fai-2026-05-08</loc>
<lastmod>2026-05-08T20:26:14.573Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/the-record-by-recorded-future-advisory-may-8-2026-2026-05-08-moxbndim</loc>
<lastmod>2026-05-08T19:42:16.330Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/the-record-by-recorded-future-advisory-may-8-2026-2026-05-08-moxbnd9h</loc>
<lastmod>2026-05-08T19:42:15.996Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cisa-adds-one-known-exploited-vulnerability-to-catalog-2026-05-08</loc>
<lastmod>2026-05-08T18:56:09.555Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/tclbanker-banking-trojan-targets-financial-platforms-via-whatsapp-and-outlook-wo-2026-05-08</loc>
<lastmod>2026-05-08T18:41:47.487Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/the-record-by-recorded-future-advisory-may-8-2026-2026-05-08-mox9hl72</loc>
<lastmod>2026-05-08T18:41:47.097Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/insider-betting-on-polymarket-2026-05-08</loc>
<lastmod>2026-05-08T18:26:13.626Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/nvidia-confirms-geforce-now-data-breach-affecting-armenian-users-2026-05-08</loc>
<lastmod>2026-05-08T16:56:20.539Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/fake-call-history-apps-stole-payments-from-users-after-73-million-play-store-dow-2026-05-08</loc>
<lastmod>2026-05-08T16:41:00.711Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/usn-8248-2-nasm-regression-2026-05-08</loc>
<lastmod>2026-05-08T16:25:17.533Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/the-record-by-recorded-future-advisory-may-8-2026-2026-05-08-mox44bwi</loc>
<lastmod>2026-05-08T16:11:30.440Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/in-other-news-train-hacker-arrested-pamdoora-linux-backdoor-new-cisa-director-fr-2026-05-08</loc>
<lastmod>2026-05-08T14:54:50.145Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/why-more-analysts-wont-solve-your-socs-alert-problem-2026-05-08</loc>
<lastmod>2026-05-08T14:54:20.650Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/the-record-by-recorded-future-advisory-may-8-2026-2026-05-08</loc>
<lastmod>2026-05-08T14:09:27.437Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/trellix-source-code-breach-claimed-by-ransomhouse-hackers-2026-05-08</loc>
<lastmod>2026-05-08T13:54:13.422Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/polish-security-agency-reports-ics-breaches-at-five-water-treatment-plants-2026-05-08</loc>
<lastmod>2026-05-08T12:53:34.728Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/ai-firm-braintrust-prompts-api-key-rotation-after-data-breach-2026-05-08</loc>
<lastmod>2026-05-08T12:53:33.640Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cisa-gives-feds-four-days-to-patch-ivanti-flaw-exploited-as-zero-day-2026-05-08</loc>
<lastmod>2026-05-08T12:53:06.070Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/quasar-linux-rat-steals-developer-credentials-for-software-supply-chain-compromi-2026-05-08</loc>
<lastmod>2026-05-08T12:38:35.723Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/usn-8262-1-lua-vulnerability-2026-05-08</loc>
<lastmod>2026-05-08T12:23:21.829Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/zara-data-breach-exposed-personal-information-of-197000-people-2026-05-08</loc>
<lastmod>2026-05-08T11:52:25.817Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cyberattack-hits-canvas-system-used-by-thousands-of-schools-as-finals-loom-2026-05-08</loc>
<lastmod>2026-05-08T10:48:57.008Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/one-missed-threat-per-week-what-25m-alerts-reveal-about-low-severity-risk-2026-05-08</loc>
<lastmod>2026-05-08T10:37:20.492Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/new-linux-pamdoora-backdoor-uses-pam-modules-to-steal-ssh-credentials-2026-05-08</loc>
<lastmod>2026-05-08T10:37:19.622Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/former-govt-contractor-convicted-for-wiping-dozens-of-federal-databases-2026-05-08</loc>
<lastmod>2026-05-08T09:19:54.316Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/sans-internet-storm-center-advisory-may-8-2026-2026-05-08-mownsqe9</loc>
<lastmod>2026-05-08T08:34:35.515Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/pcpjack-worm-removes-teampcp-infections-steals-credentials-2026-05-08</loc>
<lastmod>2026-05-08T08:34:31.696Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/vulnerability-in-claude-extension-for-chrome-exposes-ai-agent-to-takeover-2026-05-08</loc>
<lastmod>2026-05-08T08:34:31.583Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/ransomware-group-takes-credit-for-trellix-hack-2026-05-08</loc>
<lastmod>2026-05-08T08:34:31.580Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/new-linux-dirty-frag-zero-day-gives-root-on-all-major-distros-2026-05-08</loc>
<lastmod>2026-05-08T08:17:52.996Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/linux-kernel-dirty-frag-lpe-exploit-enables-root-access-across-major-distributio-2026-05-08</loc>
<lastmod>2026-05-08T08:17:34.703Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/dirty-frag-and-other-issues-in-amazon-linux-kernels-2026-05-08</loc>
<lastmod>2026-05-08T08:16:42.343Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-31717-ksmbd-validate-owner-of-durable-handle-on-reconnect-2026-05-08</loc>
<lastmod>2026-05-08T08:16:40.282Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-43869-apache-thrift-tssltransportfactoryjava-hostname-verification-2026-05-08</loc>
<lastmod>2026-05-08T08:16:40.199Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-41675-xmldom-xml-node-injection-through-unvalidated-processing-instruct-2026-05-08</loc>
<lastmod>2026-05-08T08:16:40.148Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-25588-redistimeseries-restore-invalid-memory-access-may-allow-remote-co-2026-05-08</loc>
<lastmod>2026-05-08T08:16:38.982Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-25589-redisbloom-restore-invalid-memory-access-may-allow-remote-code-ex-2026-05-08</loc>
<lastmod>2026-05-08T08:16:38.937Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-25243-redis-server-restore-invalid-memory-access-may-allow-remote-code-2026-05-08</loc>
<lastmod>2026-05-08T08:16:38.862Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-41674-xmldom-xml-injection-through-unvalidated-documenttype-serializati-2026-05-08</loc>
<lastmod>2026-05-08T08:16:38.470Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-41672-xmldom-xml-node-injection-through-unvalidated-comment-serializati-2026-05-08</loc>
<lastmod>2026-05-08T08:16:38.443Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-41673-xmldom-denial-of-service-via-uncontrolled-recursion-in-xml-serial-2026-05-08</loc>
<lastmod>2026-05-08T08:16:38.353Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-23479-redis-server-use-after-free-in-unblock-client-flow-may-allow-remo-2026-05-08</loc>
<lastmod>2026-05-08T08:16:36.503Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-23631-redis-server-lua-use-after-free-may-allow-remote-code-execution-2026-05-08</loc>
<lastmod>2026-05-08T08:16:36.350Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-31718-ksmbd-fix-use-after-free-in-ksmbdclosefd-via-durable-scavenger-2026-05-08</loc>
<lastmod>2026-05-08T08:16:36.338Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/ivanti-patches-epmm-zero-day-exploited-in-targeted-attacks-2026-05-08</loc>
<lastmod>2026-05-08T06:21:22.795Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/kubernetes-v136-more-drivers-new-features-and-the-next-era-of-dra-2026-05-08</loc>
<lastmod>2026-05-08T04:20:30.978Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/sans-internet-storm-center-advisory-may-8-2026-2026-05-08</loc>
<lastmod>2026-05-08T02:21:17.936Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/canvas-login-portals-hacked-in-mass-shinyhunters-extortion-campaign-2026-05-07</loc>
<lastmod>2026-05-07T23:34:43.053Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chrome-beta-for-android-update-2026-05-07</loc>
<lastmod>2026-05-07T23:34:32.263Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chrome-dev-for-desktop-update-2026-05-07</loc>
<lastmod>2026-05-07T23:34:32.190Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chrome-dev-for-android-update-2026-05-07</loc>
<lastmod>2026-05-07T23:34:32.158Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/dev-channel-update-for-chromeos-chromeos-flex-2026-05-07</loc>
<lastmod>2026-05-07T23:34:30.963Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/the-record-by-recorded-future-advisory-may-7-2026-2026-05-07-mow2co3i</loc>
<lastmod>2026-05-07T22:34:14.109Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/new-tclbanker-malware-self-spreads-over-whatsapp-and-outlook-2026-05-07</loc>
<lastmod>2026-05-07T22:33:51.169Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7933-out-of-bounds-read-in-webcodecs-2026-05-07</loc>
<lastmod>2026-05-07T22:17:59.425Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7899-out-of-bounds-read-and-write-in-v8-2026-05-07</loc>
<lastmod>2026-05-07T22:17:59.398Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7973-integer-overflow-in-dawn-2026-05-07</loc>
<lastmod>2026-05-07T22:17:59.393Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7976-use-after-free-in-views-2026-05-07</loc>
<lastmod>2026-05-07T22:17:59.254Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7999-inappropriate-implementation-in-v8-2026-05-07</loc>
<lastmod>2026-05-07T22:17:59.188Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7970-use-after-free-in-topchrome-2026-05-07</loc>
<lastmod>2026-05-07T22:17:59.162Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7947-insufficient-validation-of-untrusted-input-in-network-2026-05-07</loc>
<lastmod>2026-05-07T22:17:59.119Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7986-insufficient-policy-enforcement-in-autofill-2026-05-07</loc>
<lastmod>2026-05-07T22:17:59.115Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-8004-insufficient-policy-enforcement-in-devtools-2026-05-07</loc>
<lastmod>2026-05-07T22:17:59.052Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7962-insufficient-policy-enforcement-in-directsockets-2026-05-07</loc>
<lastmod>2026-05-07T22:17:58.983Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7956-use-after-free-in-navigation-2026-05-07</loc>
<lastmod>2026-05-07T22:17:58.915Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-8014-inappropriate-implementation-in-preload-2026-05-07</loc>
<lastmod>2026-05-07T22:17:58.893Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7967-insufficient-validation-of-untrusted-input-in-navigation-2026-05-07</loc>
<lastmod>2026-05-07T22:17:58.869Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7968-insufficient-validation-of-untrusted-input-in-cors-2026-05-07</loc>
<lastmod>2026-05-07T22:17:58.842Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7901-use-after-free-in-angle-2026-05-07</loc>
<lastmod>2026-05-07T22:17:58.797Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-40379-microsoft-enterprise-security-token-service-ests-spoofing-vulnera-2026-05-07</loc>
<lastmod>2026-05-07T22:17:58.731Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7937-insufficient-policy-enforcement-in-devtools-2026-05-07</loc>
<lastmod>2026-05-07T22:17:58.659Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7988-type-confusion-in-webrtc-2026-05-07</loc>
<lastmod>2026-05-07T22:17:58.652Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7945-insufficient-validation-of-untrusted-input-in-coop-2026-05-07</loc>
<lastmod>2026-05-07T22:17:58.571Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-35435-azure-ai-foundry-elevation-of-privilege-vulnerability-2026-05-07</loc>
<lastmod>2026-05-07T22:17:58.551Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7944-insufficient-validation-of-untrusted-input-in-persistent-2026-05-07</loc>
<lastmod>2026-05-07T22:17:58.526Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7951-out-of-bounds-write-in-webrtc-2026-05-07</loc>
<lastmod>2026-05-07T22:17:58.505Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7961-insufficient-validation-of-untrusted-input-in-permissions-2026-05-07</loc>
<lastmod>2026-05-07T22:17:58.496Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7966-insufficient-validation-of-untrusted-input-in-siteisolati-2026-05-07</loc>
<lastmod>2026-05-07T22:17:58.397Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7972-uninitialized-use-in-gpu-2026-05-07</loc>
<lastmod>2026-05-07T22:17:58.382Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7923-out-of-bounds-write-in-skia-2026-05-07</loc>
<lastmod>2026-05-07T22:17:58.325Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7935-inappropriate-implementation-in-speech-2026-05-07</loc>
<lastmod>2026-05-07T22:17:58.315Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-35428-azure-cloud-shell-spoofing-vulnerability-2026-05-07</loc>
<lastmod>2026-05-07T22:17:58.300Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7908-use-after-free-in-fullscreen-2026-05-07</loc>
<lastmod>2026-05-07T22:17:58.279Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-33823-microsoft-team-events-portal-information-disclosure-vulnerability-2026-05-07</loc>
<lastmod>2026-05-07T22:17:58.269Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7927-type-confusion-in-runtime-2026-05-07</loc>
<lastmod>2026-05-07T22:17:58.227Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7954-race-in-shared-storage-2026-05-07</loc>
<lastmod>2026-05-07T22:17:58.170Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7911-use-after-free-in-aura-2026-05-07</loc>
<lastmod>2026-05-07T22:17:58.146Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-8022-inappropriate-implementation-in-mhtml-2026-05-07</loc>
<lastmod>2026-05-07T22:17:58.143Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7926-use-after-free-in-presentationapi-2026-05-07</loc>
<lastmod>2026-05-07T22:17:58.139Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-8005-insufficient-validation-of-untrusted-input-in-cast-2026-05-07</loc>
<lastmod>2026-05-07T22:17:58.131Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7946-insufficient-policy-enforcement-in-webui-2026-05-07</loc>
<lastmod>2026-05-07T22:17:58.085Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-8021-script-injection-in-ui-2026-05-07</loc>
<lastmod>2026-05-07T22:17:58.060Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7919-use-after-free-in-aura-2026-05-07</loc>
<lastmod>2026-05-07T22:17:58.052Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7995-out-of-bounds-read-in-adfilter-2026-05-07</loc>
<lastmod>2026-05-07T22:17:58.047Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7920-use-after-free-in-skia-2026-05-07</loc>
<lastmod>2026-05-07T22:17:58.026Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-8017-side-channel-information-leakage-in-media-2026-05-07</loc>
<lastmod>2026-05-07T22:17:58.017Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-8012-inappropriate-implementation-in-mhtml-2026-05-07</loc>
<lastmod>2026-05-07T22:17:58.014Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7963-inappropriate-implementation-in-serviceworker-2026-05-07</loc>
<lastmod>2026-05-07T22:17:57.941Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-8006-insufficient-policy-enforcement-in-devtools-2026-05-07</loc>
<lastmod>2026-05-07T22:17:57.927Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7971-inappropriate-implementation-in-orb-2026-05-07</loc>
<lastmod>2026-05-07T22:17:57.907Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-41105-azure-monitor-action-group-notification-system-elevation-of-privi-2026-05-07</loc>
<lastmod>2026-05-07T22:17:57.875Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7994-inappropriate-implementation-in-chromoting-2026-05-07</loc>
<lastmod>2026-05-07T22:17:57.850Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-26164-m365-copilot-information-disclosure-vulnerability-2026-05-07</loc>
<lastmod>2026-05-07T22:17:57.844Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-33109-azure-managed-instance-for-apache-cassandra-remote-code-execution-2026-05-07</loc>
<lastmod>2026-05-07T22:17:57.831Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-8010-insufficient-validation-of-untrusted-input-in-siteisolati-2026-05-07</loc>
<lastmod>2026-05-07T22:17:57.824Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7924-uninitialized-use-in-dawn-2026-05-07</loc>
<lastmod>2026-05-07T22:17:57.816Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7958-inappropriate-implementation-in-serviceworker-2026-05-07</loc>
<lastmod>2026-05-07T22:17:57.775Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7952-insufficient-policy-enforcement-in-extensions-2026-05-07</loc>
<lastmod>2026-05-07T22:17:57.761Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7985-use-after-free-in-gpu-2026-05-07</loc>
<lastmod>2026-05-07T22:17:57.752Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-8016-use-after-free-in-webrtc-2026-05-07</loc>
<lastmod>2026-05-07T22:17:57.744Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7932-insufficient-policy-enforcement-in-downloads-2026-05-07</loc>
<lastmod>2026-05-07T22:17:57.730Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7940-use-after-free-in-v8-2026-05-07</loc>
<lastmod>2026-05-07T22:17:57.617Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7916-insufficient-data-validation-in-interestgroups-2026-05-07</loc>
<lastmod>2026-05-07T22:17:57.590Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7918-use-after-free-in-gpu-2026-05-07</loc>
<lastmod>2026-05-07T22:17:57.587Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-8011-insufficient-policy-enforcement-in-search-2026-05-07</loc>
<lastmod>2026-05-07T22:17:57.572Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7953-insufficient-validation-of-untrusted-input-in-omnibox-2026-05-07</loc>
<lastmod>2026-05-07T22:17:57.565Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7959-inappropriate-implementation-in-navigation-2026-05-07</loc>
<lastmod>2026-05-07T22:17:57.564Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7979-inappropriate-implementation-in-media-2026-05-07</loc>
<lastmod>2026-05-07T22:17:57.560Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7914-type-confusion-in-accessibility-2026-05-07</loc>
<lastmod>2026-05-07T22:17:57.541Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7982-uninitialized-use-in-webcodecs-2026-05-07</loc>
<lastmod>2026-05-07T22:17:57.520Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7936-object-lifecycle-issue-in-v8-2026-05-07</loc>
<lastmod>2026-05-07T22:17:57.493Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-33821-microsoft-dynamics-365-customer-insights-elevation-of-privilege-v-2026-05-07</loc>
<lastmod>2026-05-07T22:17:57.487Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7903-integer-overflow-in-angle-2026-05-07</loc>
<lastmod>2026-05-07T22:17:57.478Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-33111-copilot-chat-microsoft-edge-information-disclosure-vulnerability-2026-05-07</loc>
<lastmod>2026-05-07T22:17:57.345Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-26129-m365-copilot-information-disclosure-vulnerability-2026-05-07</loc>
<lastmod>2026-05-07T22:17:57.330Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7969-integer-overflow-in-network-2026-05-07</loc>
<lastmod>2026-05-07T22:17:57.315Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7942-integer-overflow-in-angle-2026-05-07</loc>
<lastmod>2026-05-07T22:17:57.299Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7906-use-after-free-in-svg-2026-05-07</loc>
<lastmod>2026-05-07T22:17:57.291Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7998-insufficient-validation-of-untrusted-input-in-dialog-2026-05-07</loc>
<lastmod>2026-05-07T22:17:57.286Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7917-use-after-free-in-fullscreen-2026-05-07</loc>
<lastmod>2026-05-07T22:17:57.261Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-8009-inappropriate-implementation-in-cast-2026-05-07</loc>
<lastmod>2026-05-07T22:17:57.248Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7943-insufficient-validation-of-untrusted-input-in-angle-2026-05-07</loc>
<lastmod>2026-05-07T22:17:57.245Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7907-use-after-free-in-dom-2026-05-07</loc>
<lastmod>2026-05-07T22:17:57.209Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7904-out-of-bounds-read-in-fonts-2026-05-07</loc>
<lastmod>2026-05-07T22:17:57.209Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-8007-insufficient-validation-of-untrusted-input-in-cast-2026-05-07</loc>
<lastmod>2026-05-07T22:17:57.127Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-8008-inappropriate-implementation-in-devtools-2026-05-07</loc>
<lastmod>2026-05-07T22:17:57.096Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7921-use-after-free-in-passwords-2026-05-07</loc>
<lastmod>2026-05-07T22:17:57.086Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7990-insufficient-validation-of-untrusted-input-in-updater-2026-05-07</loc>
<lastmod>2026-05-07T22:17:57.032Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7964-insufficient-validation-of-untrusted-input-in-filesystem-2026-05-07</loc>
<lastmod>2026-05-07T22:17:57.026Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-8002-use-after-free-in-audio-2026-05-07</loc>
<lastmod>2026-05-07T22:17:57.025Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7997-insufficient-validation-of-untrusted-input-in-updater-2026-05-07</loc>
<lastmod>2026-05-07T22:17:57.022Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7938-use-after-free-in-css-2026-05-07</loc>
<lastmod>2026-05-07T22:17:56.967Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-8019-insufficient-policy-enforcement-in-webapp-2026-05-07</loc>
<lastmod>2026-05-07T22:17:56.963Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7948-race-in-chromoting-2026-05-07</loc>
<lastmod>2026-05-07T22:17:56.938Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7922-use-after-free-in-serviceworker-2026-05-07</loc>
<lastmod>2026-05-07T22:17:56.877Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7996-insufficient-validation-of-untrusted-input-in-ssl-2026-05-07</loc>
<lastmod>2026-05-07T22:17:56.852Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-33844-azure-managed-instance-for-apache-cassandra-remote-code-execution-2026-05-07</loc>
<lastmod>2026-05-07T22:17:56.832Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7898-use-after-free-in-chromoting-2026-05-07</loc>
<lastmod>2026-05-07T22:17:56.798Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7974-use-after-free-in-blink-2026-05-07</loc>
<lastmod>2026-05-07T22:17:56.780Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7977-inappropriate-implementation-in-canvas-2026-05-07</loc>
<lastmod>2026-05-07T22:17:56.757Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7960-race-in-speech-2026-05-07</loc>
<lastmod>2026-05-07T22:17:56.744Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7983-out-of-bounds-read-in-dawn-2026-05-07</loc>
<lastmod>2026-05-07T22:17:56.727Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7965-insufficient-validation-of-untrusted-input-in-devtools-2026-05-07</loc>
<lastmod>2026-05-07T22:17:56.705Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7984-use-after-free-in-readingmode-2026-05-07</loc>
<lastmod>2026-05-07T22:17:56.703Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/chromium-cve-2026-7929-use-after-free-in-mediarecording-2026-05-07</loc>
<lastmod>2026-05-07T22:17:56.685Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://vulnios.com/threats/cve-2026-42826-azure-devops-information-disclosure-vulnerability-2026-05-07</loc>
<lastmod>2026-05-07T22:17:56.639Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
</urlset>
