<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
  <url>
    <loc>https://radar.offseq.com/</loc>
    <changefreq>hourly</changefreq>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://radar.offseq.com/threats</loc>
    <changefreq>hourly</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://radar.offseq.com/map</loc>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://radar.offseq.com/feeds</loc>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://radar.offseq.com/threats?type=vulnerability</loc>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://radar.offseq.com/threats?severity=critical</loc>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://radar.offseq.com/threats?type=malware</loc>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7470-stack-based-buffer-overflow-in-tenda-f207f452</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7470%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%204G300&amp;severity=high&amp;id=69f2c3abcbff5d861080b111</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-thursday-april-30th-2026-httpsis-83f2ff88</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Thursday%2C%20April%2030th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9912%2C%20(Thu%2C%20Apr%2030th)&amp;severity=medium&amp;id=69f2b91ecbff5d86107ca0e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7469-command-injection-in-tenda-4g300-14fe8e3b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7469%3A%20Command%20Injection%20in%20Tenda%204G300&amp;severity=medium&amp;id=69f2b924cbff5d86107ca1b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7468-improper-access-controls-in-1024-lab-cbc052fc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7468%3A%20Improper%20Access%20Controls%20in%201024-lab%20smart-admin&amp;severity=medium&amp;id=69f2b622cbff5d86107b2331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7447-sql-injection-in-sourcecodester-pet--cb1e26e4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7447%3A%20SQL%20Injection%20in%20SourceCodester%20Pet%20Grooming%20Management%20Software&amp;severity=medium&amp;id=69f2b622cbff5d86107b232a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/danger-of-libredtail-x5bguest-diaryx5d-wed-apr-29t-3b9ec76e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Danger%20of%20Libredtail%20%26%23x5b%3BGuest%20Diary%26%23x5d%3B%2C%20(Wed%2C%20Apr%2029th)&amp;severity=medium&amp;id=69f2a0a3cbff5d86105fc814</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7446-os-command-injection-in-vetcoders-mc-59805fc6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7446%3A%20OS%20Command%20Injection%20in%20VetCoders%20mcp-server-semgrep&amp;severity=medium&amp;id=69f29cfecbff5d86105a1f75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7445-path-traversal-in-zachhandley-zmcpto-f957be68</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7445%3A%20Path%20Traversal%20in%20ZachHandley%20ZMCPTools&amp;severity=medium&amp;id=69f29cfecbff5d86105a1f6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7443-os-command-injection-in-burtthecoder-aa04b4f7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7443%3A%20OS%20Command%20Injection%20in%20BurtTheCoder%20mcp-dnstwist&amp;severity=medium&amp;id=69f28eeecbff5d861053269a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7420-buffer-overflow-in-utt-hiper-1250gw-169eee63</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7420%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%201250GW&amp;severity=high&amp;id=69f287e7cbff5d8610509dbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7419-buffer-overflow-in-utt-hiper-1250gw-a0814406</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7419%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%201250GW&amp;severity=high&amp;id=69f287e7cbff5d8610509db7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7381-cwe-200-exposure-of-sensitive-inform-0a9be82b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7381%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20MIYAGAWA%20Plack%3A%3AMiddleware%3A%3AXSendfile&amp;severity=null&amp;id=69f287e7cbff5d8610509db2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7418-buffer-overflow-in-utt-hiper-1250gw-d147e37f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7418%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%201250GW&amp;severity=high&amp;id=69f2849ccbff5d86104f5339</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7417-server-side-request-forgery-in-algov-ba913bc8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7417%3A%20Server-Side%20Request%20Forgery%20in%20Algovate%20xhs-mcp&amp;severity=medium&amp;id=69f2849ccbff5d86104f5331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7416-os-command-injection-in-polarvista-x-16228383</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7416%3A%20OS%20Command%20Injection%20in%20PolarVista%20xcode-mcp-server&amp;severity=medium&amp;id=69f27d5bcbff5d86104ce856</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7410-sql-injection-in-sourcecodester-pizz-53ed71b0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7410%3A%20SQL%20Injection%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f27679cbff5d86104aea45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7409-sql-injection-in-sourcecodester-pizz-57782148</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7409%3A%20SQL%20Injection%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f27679cbff5d86104aea3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7408-sql-injection-in-sourcecodester-pizz-120d70b1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7408%3A%20SQL%20Injection%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f272cecbff5d86104a3aae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7407-sql-injection-in-sourcecodester-pizz-7944d1af</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7407%3A%20SQL%20Injection%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f272cecbff5d86104a3aa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1858-cwe-20-improper-input-validation-in--9814b0ee</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1858%3A%20CWE-20%20Improper%20input%20validation%20in%20gnu%20wget2&amp;severity=medium&amp;id=69f26bc7cbff5d861048aa2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7404-relative-path-traversal-in-getsimple-23e246fe</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7404%3A%20Relative%20Path%20Traversal%20in%20getsimpletool%20mcpo-simple-server&amp;severity=medium&amp;id=69f26bc7cbff5d861048aa35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7403-path-traversal-in-geldata-gel-mcp-45ac9ba3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7403%3A%20Path%20Traversal%20in%20geldata%20gel-mcp&amp;severity=medium&amp;id=69f26bc7cbff5d861048aa2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34965-cwe-94-improper-control-of-generati-ef87ff52</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34965%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Cockpit%20Cockpit%20CMS&amp;severity=high&amp;id=69f264c0cbff5d861045c09a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7401-cross-site-scripting-in-sourcecodest-f9b3eff8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7401%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20CET%20Automated%20Grading%20System%20with%20AI%20Predictive%20Analytics&amp;severity=medium&amp;id=69f25db7cbff5d8610434828</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7400-path-traversal-in-geekgod382-filesys-b90c500a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7400%3A%20Path%20Traversal%20in%20geekgod382%20filesystem-mcp-server&amp;severity=medium&amp;id=69f25db7cbff5d861043481f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7426-cwe-787-out-of-bounds-write-in-aws-f-24eab3ad</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7426%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20AWS%20FreeRTOS-Plus-TCP&amp;severity=high&amp;id=69f25db7cbff5d8610434834</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7425-cwe-125-out-of-bounds-read-in-aws-fr-aefacb3e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7425%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20AWS%20FreeRTOS-Plus-TCP&amp;severity=medium&amp;id=69f25db7cbff5d861043482f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7424-cwe-191-integer-underflow-wrap-or-wr-d91dfd5c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7424%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20AWS%20FreeRTOS-Plus-TCP&amp;severity=high&amp;id=69f256b0cbff5d86103eb491</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7466-cwe-94-improper-control-of-generatio-1d5ea745</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7466%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20berabuddies%20AgentFlow&amp;severity=high&amp;id=69f256b0cbff5d86103eb496</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7423-cwe-191-integer-underflow-wrap-or-wr-bcc174c0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7423%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20AWS%20FreeRTOS-Plus-TCP&amp;severity=medium&amp;id=69f256b0cbff5d86103eb48a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7422-cwe-290-authentication-bypass-by-spo-91934019</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7422%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20AWS%20FreeRTOS-Plus-TCP&amp;severity=medium&amp;id=69f256b0cbff5d86103eb484</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7398-path-traversal-in-florensiawidjaja-b-d0a56e96</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7398%3A%20Path%20Traversal%20in%20florensiawidjaja%20BioinfoMCP&amp;severity=medium&amp;id=69f256b0cbff5d86103eb47d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27105-cwe-59-improper-link-resolution-bef-35e09182</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27105%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Dell%20Dell%2FAlienware%20Purchased%20Apps&amp;severity=medium&amp;id=69f256b0cbff5d86103eb47a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7439-cwe-346-origin-validation-error-in-b-16452b45</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7439%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20berabuddies%20AgentFlow&amp;severity=medium&amp;id=69f24c6ecbff5d86103a5326</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7397-symlink-following-in-nousresearch-he-7f94a293</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7397%3A%20Symlink%20Following%20in%20NousResearch%20hermes-agent&amp;severity=medium&amp;id=69f24c6ecbff5d86103a531c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26015-cwe-77-improper-neutralization-of-s-ba83675d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26015%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20arc53%20DocsGPT&amp;severity=critical&amp;id=69f2451bcbff5d861036cbbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7396-path-traversal-in-nousresearch-herme-04c10dff</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7396%3A%20Path%20Traversal%20in%20NousResearch%20hermes-agent&amp;severity=medium&amp;id=69f2451bcbff5d861036cbcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5712-cwe-863-incorrect-authorization-in-s-bb451392</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5712%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20SailPoint%20Technologies%20IdentityIQ&amp;severity=high&amp;id=69f2451bcbff5d861036cbc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7394-sql-injection-in-sourcecodester-pizz-16a1b2e1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7394%3A%20SQL%20Injection%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f2451bcbff5d861036cbc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7393-unrestricted-upload-in-sourcecodeste-c982553d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7393%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f23e5ccbff5d8610337c5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6915-cwe-1284-improper-validation-of-spec-2dda5bdb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6915%3A%20CWE-1284%20Improper%20validation%20of%20specified%20quantity%20in%20input%20in%20MongoDB%20MongoDB%20Server&amp;severity=medium&amp;id=69f23e5ccbff5d8610337c51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6914-cwe-191-integer-underflow-wrap-or-wr-5f06d954</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6914%3A%20CWE-191%20Integer%20underflow%20(wrap%20or%20wraparound)%20in%20MongoDB%20MongoDB%20Server&amp;severity=high&amp;id=69f23e5ccbff5d8610337c4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7392-sql-injection-in-sourcecodester-phar-7dcbab12</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7392%3A%20SQL%20Injection%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69f23e5ccbff5d8610337c54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0206-cwe-121-stack-based-buffer-overflow--c7248604</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0206%3A%20CWE-121%20Stack-based%20buffer%20overflow%20in%20SonicWall%20SonicOS&amp;severity=medium&amp;id=69f2370ccbff5d861030647b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0205-cwe-35-path-traversal-in-sonicwall-s-e2ccd6ba</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0205%3A%20CWE-35%20Path%20traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20SonicWall%20SonicOS&amp;severity=medium&amp;id=69f2370ccbff5d8610306478</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0204-cwe-1390-weak-authentication-in-soni-7bfc135a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0204%3A%20CWE-1390%20Weak%20Authentication%20in%20SonicWall%20SonicOS&amp;severity=high&amp;id=69f2370ccbff5d8610306475</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7391-sql-injection-in-sourcecodester-phar-3738ac00</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7391%3A%20SQL%20Injection%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69f2370ccbff5d861030647e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7390-cross-site-scripting-in-sourcecodest-973fd07d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7390%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69f22c83cbff5d86102980eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40230-cwe-79-improper-neutralization-of-i-a6b68737</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40230%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20helpyio%20helpy&amp;severity=medium&amp;id=69f22c80cbff5d8610297c5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40229-cwe-79-improper-neutralization-of-i-81f4303d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40229%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20helpyio%20helpy&amp;severity=medium&amp;id=69f22c80cbff5d8610297c59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7389-sql-injection-in-eyoucms-b6a4dbdd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7389%3A%20SQL%20Injection%20in%20EyouCMS&amp;severity=medium&amp;id=69f22c80cbff5d8610297c61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vehicle-based-surveillance-tools-kaspersky-officia-694e5419</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vehicle-based%20surveillance%20tools%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69f225d7cbff5d8610264d98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2810-cwe-125-out-of-bounds-read-in-netsko-9336b47b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2810%3A%20CWE-125%20Out-of-bounds%20read%20in%20Netskope%20Client&amp;severity=medium&amp;id=69f22c80cbff5d8610297c4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7388-code-injection-in-eyoucms-5c52cb60</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7388%3A%20Code%20Injection%20in%20EyouCMS&amp;severity=medium&amp;id=69f256b0cbff5d86103eb49b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41940-cwe-306-missing-authentication-for--3aceec8f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41940%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20cPanel%2C%20L.L.C.%20cPanel%20%26%20WHM&amp;severity=critical&amp;id=69f22c83cbff5d86102980f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7386-path-traversal-in-fatbobman-mail-mcp-b63b8672</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7386%3A%20Path%20Traversal%20in%20fatbobman%20mail-mcp-bridge&amp;severity=medium&amp;id=69f22c83cbff5d8610298105</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6849-cwe-78-improper-neutralization-of-sp-7671f8b8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6849%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20TUBITAK%20BILGEM%20Software%20Technologies%20Research%20Institute%20Pardus%20OS%20My%20Computer&amp;severity=high&amp;id=69f22c83cbff5d8610298102</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5166-cwe-22-improper-limitation-of-a-path-67023af4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5166%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20TUBITAK%20BILGEM%20Software%20Technologies%20Research%20Institute%20Pardus%20Software%20Center&amp;severity=critical&amp;id=69f22c83cbff5d86102980ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7384-path-traversal-in-ezequiroga-mcp-bas-5157d4ba</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7384%3A%20Path%20Traversal%20in%20ezequiroga%20mcp-bases&amp;severity=medium&amp;id=69f2b622cbff5d86107b2344</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5161-cwe-59-improper-link-resolution-befo-30685fe7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5161%3A%20CWE-59%20Improper%20link%20resolution%20before%20file%20access%20(&apos;link%20following&apos;)%20in%20TUBITAK%20BILGEM%20Software%20Technologies%20Research%20Institute%20Pardus%20About&amp;severity=high&amp;id=69f2b622cbff5d86107b2341</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7111-cwe-825-expired-pointer-dereference--eb7d12bb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7111%3A%20CWE-825%20Expired%20Pointer%20Dereference%20in%20HMBRAND%20Text%3A%3ACSV_XS&amp;severity=high&amp;id=69f2370ccbff5d8610306485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5141-cwe-269-improper-privilege-managemen-a6851a94</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5141%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20TUBITAK%20BILGEM%20Software%20Technologies%20Research%20Institute%20Pardus%20Software%20Center&amp;severity=high&amp;id=69f22c83cbff5d86102980fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41220-cwe-787-in-acronis-acronis-devicelo-da8bb959</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41220%3A%20CWE-787%20in%20Acronis%20Acronis%20DeviceLock%20DLP&amp;severity=high&amp;id=69f22c83cbff5d86102980f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41952-cwe-123-in-acronis-acronis-devicelo-5470b5be</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41952%3A%20CWE-123%20in%20Acronis%20Acronis%20DeviceLock%20DLP&amp;severity=high&amp;id=69f2b622cbff5d86107b233e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25852-cwe-427-in-acronis-acronis-devicelo-9477b775</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25852%3A%20CWE-427%20in%20Acronis%20Acronis%20DeviceLock%20DLP&amp;severity=medium&amp;id=69f2b622cbff5d86107b2338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42525-vulnerability-in-jenkins-project-je-9ecf4150</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42525%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Microsoft%20Entra%20ID%20(previously%20Azure%20AD)%20Plugin&amp;severity=medium&amp;id=69f20cdfcbff5d8610181a90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42524-vulnerability-in-jenkins-project-je-e951ec4c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42524%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20HTML%20Publisher%20Plugin&amp;severity=high&amp;id=69f20cdfcbff5d8610181a8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42523-vulnerability-in-jenkins-project-je-d7de8e87</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42523%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20GitHub%20Plugin&amp;severity=critical&amp;id=69f20cdfcbff5d8610181a8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42522-vulnerability-in-jenkins-project-je-fe6b5e9b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42522%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20GitHub%20Branch%20Source%20Plugin&amp;severity=medium&amp;id=69f20cdfcbff5d8610181a87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42521-vulnerability-in-jenkins-project-je-64f5617c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42521%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Matrix%20Authorization%20Strategy%20Plugin&amp;severity=medium&amp;id=69f20cdfcbff5d8610181a84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42520-vulnerability-in-jenkins-project-je-f58d910a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42520%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Credentials%20Binding%20Plugin&amp;severity=high&amp;id=69f20cdfcbff5d8610181a81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42519-vulnerability-in-jenkins-project-je-5da9507b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42519%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Script%20Security%20Plugin&amp;severity=medium&amp;id=69f20cdfcbff5d8610181a7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/todays-odd-web-requests-wed-apr-29th-2b0ae874</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Today&apos;s%20Odd%20Web%20Requests%2C%20(Wed%2C%20Apr%2029th)&amp;severity=medium&amp;id=69f2061ccbff5d861012618b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fresh-litellm-vulnerability-exploited-shortly-afte-9234eff7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fresh%20LiteLLM%20Vulnerability%20Exploited%20Shortly%20After%20Disclosure&amp;severity=low&amp;id=69f2024dcbff5d8610101209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5140-cwe-93-improper-neutralization-of-cr-5a5c2ac6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5140%3A%20CWE-93%20Improper%20neutralization%20of%20CRLF%20sequences%20(&apos;CRLF%20injection&apos;)%20in%20TUBITAK%20BILGEM%20Software%20Technologies%20Research%20Institute%20Pardus%20Update&amp;severity=high&amp;id=69f20cdfcbff5d8610181a93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hundreds-of-internet-facing-vnc-servers-expose-ics-a294c997</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hundreds%20of%20Internet-Facing%20VNC%20Servers%20Expose%20ICS%2FOT&amp;severity=medium&amp;id=69f1f43dcbff5d861005f286</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22745-cwe-400-uncontrolled-resource-consu-a0301f50</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22745%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20VMware%20Spring%20Framework&amp;severity=medium&amp;id=69f1f44acbff5d861005f7f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22741-cwe-524-information-exposure-throug-9a0a3e0c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22741%3A%20CWE-524%20Information%20Exposure%20Through%20Caching%20in%20VMware%20Spring%20Framework&amp;severity=low&amp;id=69f2b622cbff5d86107b2353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2902-cwe-79-improper-neutralization-of-in-3005363c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2902%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aguidrevitch%20WP%20Meteor%20Website%20Speed%20Optimization%20Addon&amp;severity=medium&amp;id=69f1f44acbff5d861005f7f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/checkmarx-confirms-data-stolen-in-supply-chain-att-ea4d4783</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Checkmarx%20Confirms%20Data%20Stolen%20in%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=69f1e62ecbff5d8610fb0e7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/multi-stage-malware-execution-chain-analysis-b060a93b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Multi-Stage%20Malware%20Execution%20Chain%20Analysis&amp;severity=medium&amp;id=69f1e2aacbff5d8610f7a275</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22740-cwe-400-uncontrolled-resource-consu-f8a20f92</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22740%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20VMware%20Spring%20Framework&amp;severity=medium&amp;id=69f2b622cbff5d86107b234f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42641-server-side-request-forgery-ssrf-in-94403813</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42641%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ILLID%20Share%20This%20Image&amp;severity=medium&amp;id=69f1f131cbff5d861004acf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42645-cross-site-request-forgery-csrf-in--8b533942</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42645%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Dmitry%20V.%20(CEO%20of%20%22UKR%20Solution%22)%20Barcode%20Scanner%20with%20Inventory%20%26%20Order%20Manager&amp;severity=medium&amp;id=69f1f131cbff5d861004acfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42648-missing-authorization-in-brainstorm-9ac4bf94</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42648%3A%20Missing%20Authorization%20in%20Brainstorm%20Force%20Spectra&amp;severity=medium&amp;id=69f1f131cbff5d861004ad03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42642-missing-authorization-in-stellarwp--26ce44db</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42642%3A%20Missing%20Authorization%20in%20StellarWP%20GiveWP&amp;severity=medium&amp;id=69f1f131cbff5d861004acf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42646-improper-neutralization-of-special--630cfd15</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42646%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Steve%20Burge%20TaxoPress&amp;severity=high&amp;id=69f1f131cbff5d861004ad00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42643-improper-neutralization-of-input-du-759f1676</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42643%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20StellarWP%20Image%20Widget&amp;severity=medium&amp;id=69f1f131cbff5d861004acf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42644-exposure-of-sensitive-system-inform-aea32505</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42644%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20WPDeveloper%20BetterDocs&amp;severity=medium&amp;id=69f1f131cbff5d861004acfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42652-improper-neutralization-of-input-du-a84dea82</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42652%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpeverest%20User%20Registration&amp;severity=high&amp;id=69f1f131cbff5d861004ad06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-cyber-group-handala-targets-us-troops-in-b-09ec8a91</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20Cyber%20Group%20Handala%20Targets%20US%20Troops%20in%20Bahrain&amp;severity=medium&amp;id=69f1df25cbff5d8610f5814e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/user-interaction-with-a-clickfix-style-phishing-si-8aeab9dd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=User%20interaction%20with%20a%20ClickFix-style%20phishing%20site%20resulted%20in%20execution%20of%20an%20obfuscated%20PowerShell%20command&amp;severity=medium&amp;id=69f1e2aacbff5d8610f7a27f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/38-vulnerabilities-found-in-openemr-medical-softwa-1f54d80c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=38%20Vulnerabilities%20Found%20in%20OpenEMR%20Medical%20Software&amp;severity=medium&amp;id=69f1d81ecbff5d8610efe771</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kycshadow-an-android-banking-malware-exploiting-fa-6f5f80b1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KYCShadow%3A%20An%20Android%20Banking%20Malware%20Exploiting%20Fake%20KYC%20Workflows%20for%20Credential%20and%20OTP%20Theft&amp;severity=medium&amp;id=69f1dbedcbff5d8610f30c01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rebex-based-telegram-rat-targeting-vietnam-8a039205</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Rebex-based%20Telegram%20RAT%20Targeting%20Vietnam&amp;severity=medium&amp;id=69f1dbedcbff5d8610f30bf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kyber-ransomware-is-not-just-post-quantum-name-dro-b58c6bef</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kyber%20ransomware%20is%20not%20just%20post-quantum%20name-dropping&amp;severity=medium&amp;id=69f1dbedcbff5d8610f30be2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-147-firefox-150-security-updates-rolling-ou-587da3ca</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%20147%2C%20Firefox%20150%20Security%20Updates%20Rolling%20Out&amp;severity=critical&amp;id=69f1d115cbff5d8610e83d8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42518-cwe-321-use-of-hard-coded-cryptogra-50b8271b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42518%3A%20CWE-321%20Use%20of%20hard-coded%20cryptographic%20key%20in%20CDAC-Noida%20e-Sushrut%2C%20Hospital%20Management%20Information%20System%20(HMIS)&amp;severity=high&amp;id=69f1cdd8cbff5d8610e56f48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3325-cwe-89-improper-neutralization-of-sp-5f601496</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3325%3A%20CWE-89%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20injection&apos;)%20in%20CRM%20Sistemas%20de%20Fidelizaci%C3%B3n%20MegaCMS&amp;severity=critical&amp;id=69f1cdd8cbff5d8610e56f3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42517-cwe-639-authorization-bypass-throug-9fd1254f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42517%3A%20CWE-639%20Authorization%20bypass%20through%20User-Controlled%20key%20in%20CDAC-Noida%20e-Sushrut%2C%20Hospital%20Management%20Information%20System%20(HMIS)&amp;severity=high&amp;id=69f1cdd8cbff5d8610e56f45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4019-cwe-862-missing-authorization-in-com-0380965b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4019%3A%20CWE-862%20Missing%20Authorization%20in%20complianz%20Complianz%20%E2%80%93%20GDPR%2FCCPA%20Cookie%20Consent&amp;severity=medium&amp;id=69f1cdd8cbff5d8610e56f4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42516-cwe-639-authorization-bypass-throug-09c867b0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42516%3A%20CWE-639%20Authorization%20bypass%20through%20User-Controlled%20key%20in%20CDAC-Noida%20e-Sushrut%2C%20Hospital%20Management%20Information%20System%20(HMIS)&amp;severity=high&amp;id=69f1cdd8cbff5d8610e56f42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42515-cwe-639-authorization-bypass-throug-ffcae9ae</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42515%3A%20CWE-639%20Authorization%20bypass%20through%20User-Controlled%20key%20in%20CDAC-Noida%20e-Sushrut%2C%20Hospital%20Management%20Information%20System%20(HMIS)&amp;severity=high&amp;id=69f1c306cbff5d8610dc362f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42514-cwe-319-cleartext-transmission-of-s-ef582b56</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42514%3A%20CWE-319%20Cleartext%20transmission%20of%20sensitive%20information%20in%20CDAC-Noida%20e-Sushrut%2C%20Hospital%20Management%20Information%20System%20(HMIS)&amp;severity=high&amp;id=69f1c306cbff5d8610dc362c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42513-cwe-287-improper-authentication-in--4bb104e9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42513%3A%20CWE%20287%20Improper%20Authentication%20in%20CDAC-Noida%20e-Sushrut%2C%20Hospital%20Management%20Information%20System%20(HMIS)&amp;severity=high&amp;id=69f1c306cbff5d8610dc3629</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10503-cwe-79-improper-neutralization-of-i-f39da64f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10503%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WSO2%20WSO2%20Identity%20Server&amp;severity=medium&amp;id=69f1c306cbff5d8610dc3623</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42412-cwe-862-missing-authorization-in-we-db7d51b5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42412%3A%20CWE-862%20Missing%20Authorization%20in%20weDevs%20WP%20User%20Frontend&amp;severity=medium&amp;id=69f1c306cbff5d8610dc3626</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42377-cwe-862-missing-authorization-in-br-bc5666a6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42377%3A%20CWE-862%20Missing%20Authorization%20in%20Brainstorm%20Force%20SureForms%20Pro&amp;severity=high&amp;id=69f1b4f6cbff5d8610c35118</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-github-vulnerability-exposed-millions-of--29b3abff</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20GitHub%20Vulnerability%20Exposed%20Millions%20of%20Repositories&amp;severity=critical&amp;id=69f1a6e5cbff5d8610b0fda9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21023-cwe-345-insufficient-verification-o-0ad16dbf</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21023%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69f1f131cbff5d861004ad09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35155-cwe-522-insufficiently-protected-cr-bbbf1a46</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35155%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20Dell%20iDRAC10&amp;severity=high&amp;id=69f1f133cbff5d861004adaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23773-cwe-918-server-side-request-forgery-08701a02</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23773%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Dell%20Disk%20Library%20for%20mainframe%20DLm8700&amp;severity=medium&amp;id=69f1803bcbff5d86106f825a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42615-cwe-79-improper-neutralization-of-i-760a9adb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42615%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GCHQ%20CyberChef&amp;severity=high&amp;id=69f1803bcbff5d86106f825d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gachiloader-adopts-ai-skill-lure-ffed89b4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GachiLoader%20adopts%20AI%20skill%20lure&amp;severity=medium&amp;id=69f1aa6acbff5d8610b46006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-wednesday-april-29th-2026-httpsi-00ba5c0e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Wednesday%2C%20April%2029th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9910%2C%20(Wed%2C%20Apr%2029th)&amp;severity=medium&amp;id=69f1679fcbff5d86104c9397</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38992-na-f6952d1b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38992%3A%20n%2Fa&amp;severity=null&amp;id=69f2b622cbff5d86107b234b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36837-na-cd9ff5e7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36837%3A%20n%2Fa&amp;severity=high&amp;id=69f2b622cbff5d86107b233b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-29-b736825e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-29&amp;severity=medium&amp;id=69f29cf6cbff5d86105a0943</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38993-na-2d47aa11</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38993%3A%20n%2Fa&amp;severity=medium&amp;id=69f26bc7cbff5d861048aa43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38991-na-9df2d0b6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38991%3A%20n%2Fa&amp;severity=high&amp;id=69f26bc7cbff5d861048aa3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36841-na-3e658d19</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36841%3A%20n%2Fa&amp;severity=critical&amp;id=69f26bc7cbff5d861048aa3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50328-na-150ceb4b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50328%3A%20n%2Fa&amp;severity=null&amp;id=69f26bc7cbff5d861048aa27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37555-na-79951ab9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37555%3A%20n%2Fa&amp;severity=high&amp;id=69f22c80cbff5d8610297c55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30769-na-06ff0502</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30769%3A%20n%2Fa&amp;severity=high&amp;id=69f22c80cbff5d8610297c51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56537-na-85afad68</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56537%3A%20n%2Fa&amp;severity=medium&amp;id=69f22c80cbff5d8610297c49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56536-na-e9d95af7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56536%3A%20n%2Fa&amp;severity=medium&amp;id=69f22c80cbff5d8610297c45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56535-na-3606a7f6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56535%3A%20n%2Fa&amp;severity=medium&amp;id=69f22c80cbff5d8610297c41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56534-na-7d725f61</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56534%3A%20n%2Fa&amp;severity=medium&amp;id=69f22c80cbff5d8610297c3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/atlona-atomerx21-authenticated-command-injection-57e18a85</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Atlona%20ATOMERX21%20-%20Authenticated%20Command%20Injection&amp;severity=medium&amp;id=69f1f0fdcbff5d8610047e80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/langchain-core-124-sstirce-851a4282</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LangChain%20Core%201.2.4%20-%20SSTI%2FRCE&amp;severity=critical&amp;id=69f1f0fdcbff5d8610047e7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fedora-local-privilege-escalation-13ae1a26</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fedora%20-%20Local%20Privilege%20Escalation&amp;severity=high&amp;id=69f1f0fdcbff5d8610047e76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/xibo-cms-430-rce-via-ssti-7c5e3cc6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Xibo%20CMS%20%204.3.0%20-%20RCE%20via%20SSTI&amp;severity=critical&amp;id=69f1f0fdcbff5d8610047e71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/facturascripts-202543-xss-d0891411</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FacturaScripts%202025.43%20-%20XSS&amp;severity=medium&amp;id=69f1f0fdcbff5d8610047e62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/juzaweb-cms-342-authenticated-remote-code-executio-c84bb825</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=JuzaWeb%20CMS%203.4.2%20-%20Authenticated%20Remote%20Code%20Execution&amp;severity=critical&amp;id=69f1f0fdcbff5d8610047e5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gunet-openeclass-e-learning-platform-42-remote-cod-4148bd11</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GUnet%20OpenEclass%20E-learning%20platform%20%3C%204.2%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=69f1f0fdcbff5d8610047e58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openkm-6312-multiple-2544ee36</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenKM%206.3.12%20-%20Multiple&amp;severity=medium&amp;id=69f1f0fdcbff5d8610047e53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openwrt-2305-authenticated-remote-code-execution-r-acd4aa25</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenWrt%2023.05%20-%20Authenticated%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=69f1f0fdcbff5d8610047e4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/geographiclib-v251-stack-buffer-overflow-b77f235e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GeographicLib%20v2.5.1%20-%20stack%20buffer%20overflow&amp;severity=medium&amp;id=69f1f0fdcbff5d8610047e49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phpmyfaq-4016-improper-authorization-00acffb2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=phpMyFAQ%20%204.0.16%20-%20Improper%20Authorization&amp;severity=medium&amp;id=69f1f0fdcbff5d8610047e44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gnu-inetutils-26-telnetd-remote-privilege-escalati-59fbb95e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GNU%20InetUtils%202.6%20-%20Telnetd%20Remote%20Privilege%20Escalation&amp;severity=high&amp;id=69f1f0fdcbff5d8610047e3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/craft-cms-5616-rce-18355586</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Craft%20CMS%205.6.16%20-%20RCE&amp;severity=critical&amp;id=69f1f0fdcbff5d8610047e3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hax-cms-24x-stored-cross-site-scripting-xss-9cfb4f44</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HAX%20CMS%2024.x%20-%20Stored%20Cross-Site%20Scripting%20(XSS)&amp;severity=medium&amp;id=69f1f0fdcbff5d8610047e35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-29-bbf6d718</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-29&amp;severity=low&amp;id=69f1bbf6cbff5d8610cdaf93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40560-cwe-444-inconsistent-interpretation-a3001da8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40560%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20MIYAGAWA%20Starman&amp;severity=high&amp;id=69f14b7fcbff5d8610f33f19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7355-use-after-free-in-google-chrome-b15f15fb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7355%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d76cbff5d8610e355d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7340-integer-overflow-in-google-chrome-dbfe7534</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7340%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=medium&amp;id=69f13d70cbff5d8610e35442</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7339-heap-buffer-overflow-in-google-chrom-460e63fe</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7339%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d70cbff5d8610e3543e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7341-use-after-free-in-google-chrome-24412985</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7341%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d70cbff5d8610e35446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7342-use-after-free-in-google-chrome-80fd3be9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7342%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d70cbff5d8610e3544a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7338-use-after-free-in-google-chrome-7ba0e538</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7338%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d70cbff5d8610e3543a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7345-insufficient-validation-of-untrusted-0072543f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7345%3A%20Insufficient%20validation%20of%20untrusted%20input%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d73cbff5d8610e3554a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7346-inappropriate-implementation-in-goog-a40d1ce6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7346%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d73cbff5d8610e3554e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7347-use-after-free-in-google-chrome-85b93522</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7347%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d73cbff5d8610e35552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7337-type-confusion-in-google-chrome-10aceb50</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7337%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d70cbff5d8610e35436</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7336-use-after-free-in-google-chrome-6c0c93bf</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7336%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d70cbff5d8610e35432</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7335-use-after-free-in-google-chrome-cc0ed834</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7335%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d70cbff5d8610e3542e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7348-use-after-free-in-google-chrome-43c8d283</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7348%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d73cbff5d8610e35556</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7349-use-after-free-in-google-chrome-98167a07</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7349%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d73cbff5d8610e3555a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7350-use-after-free-in-google-chrome-4aeffe71</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7350%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d73cbff5d8610e3555e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7351-race-in-google-chrome-4db75acb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7351%3A%20Race%20in%20Google%20Chrome&amp;severity=low&amp;id=69f13d73cbff5d8610e35562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7352-use-after-free-in-google-chrome-f7637a8e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7352%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d73cbff5d8610e35566</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7353-heap-buffer-overflow-in-google-chrom-d89a62e8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7353%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d76cbff5d8610e355cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7354-out-of-bounds-read-and-write-in-goog-4de54db5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7354%3A%20Out%20of%20bounds%20read%20and%20write%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d76cbff5d8610e355cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7356-use-after-free-in-google-chrome-f2efabb3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7356%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d76cbff5d8610e355d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7357-use-after-free-in-google-chrome-02ed97d0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7357%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d76cbff5d8610e355db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7334-use-after-free-in-google-chrome-11241864</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7334%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d70cbff5d8610e3542a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7358-use-after-free-in-google-chrome-7da645fe</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7358%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d76cbff5d8610e355df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7359-use-after-free-in-google-chrome-2c93f484</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7359%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d76cbff5d8610e355e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7360-insufficient-validation-of-untrusted-22afc524</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7360%3A%20Insufficient%20validation%20of%20untrusted%20input%20in%20Google%20Chrome&amp;severity=low&amp;id=69f13d76cbff5d8610e355e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7333-use-after-free-in-google-chrome-9c8ad517</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7333%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=critical&amp;id=69f13d70cbff5d8610e35426</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7343-use-after-free-in-google-chrome-6725c92f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7343%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=critical&amp;id=69f13d73cbff5d8610e35542</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7344-use-after-free-in-google-chrome-1aabf4b9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7344%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d73cbff5d8610e35546</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7361-use-after-free-in-google-chrome-76db2a62</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7361%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d76cbff5d8610e355eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7363-use-after-free-in-google-chrome-7aed2952</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7363%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69f13d76cbff5d8610e355ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33467-cwe-347-improper-verification-of-cr-ea402a3a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33467%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Elastic%20Elastic%20Package%20Registry&amp;severity=medium&amp;id=69f1649ccbff5d861047eb80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41446-cwe-912-hidden-functionality-in-sna-09f17c72</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41446%3A%20CWE-912%20Hidden%20Functionality%20in%20Snap%20One%2C%20LLC%20WattBox%20800&amp;severity=critical&amp;id=69f1649ccbff5d861047eb94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7319-path-traversal-in-elinsky-execution--079a5a55</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7319%3A%20Path%20Traversal%20in%20elinsky%20execution-system-mcp&amp;severity=medium&amp;id=69f1649ccbff5d861047ed05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-a-fake-dhl-campaign-built-to-steal-credenti-42ac68f0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20a%20Fake%20DHL%20Campaign%20Built%20to%20Steal%20Credentials&amp;severity=medium&amp;id=69f1adeecbff5d8610b7f22f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7318-path-traversal-in-elie-mcp-project-486418e4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7318%3A%20Path%20Traversal%20in%20elie%20mcp-project&amp;severity=medium&amp;id=69f1649ccbff5d861047ecff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7317-deserialization-in-grav-cms-501c1526</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7317%3A%20Deserialization%20in%20Grav%20CMS&amp;severity=low&amp;id=69f1649ccbff5d861047ecf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7316-command-injection-in-eiliyaabedini-a-2693f5b9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7316%3A%20Command%20Injection%20in%20eiliyaabedini%20aider-mcp&amp;severity=medium&amp;id=69f1649ccbff5d861047ecf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7315-path-traversal-in-eiceblue-spire-pdf-edd695ea</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7315%3A%20Path%20Traversal%20in%20eiceblue%20spire-pdf-mcp-server&amp;severity=medium&amp;id=69f1649ccbff5d861047ec0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7314-path-traversal-in-eiceblue-spire-doc-6456bd3d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7314%3A%20Path%20Traversal%20in%20eiceblue%20spire-doc-mcp-server&amp;severity=medium&amp;id=69f1649ccbff5d861047ebfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7306-use-of-hard-coded-cryptographic-key--32964878</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7306%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Xuxueli%20xxl-job&amp;severity=medium&amp;id=69f1649ccbff5d861047ebed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7305-server-side-request-forgery-in-xuxue-de572ab7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7305%3A%20Server-Side%20Request%20Forgery%20in%20Xuxueli%20xxl-job&amp;severity=medium&amp;id=69f1649ccbff5d861047ebdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7303-improper-control-of-resource-identif-a34be21a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7303%3A%20Improper%20Control%20of%20Resource%20Identifiers%20in%20Xuxueli%20xxl-job&amp;severity=medium&amp;id=69f1649ccbff5d861047ebcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7297-cross-site-scripting-in-sourcecodest-bf6ed27e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7297%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f1649ccbff5d861047ebb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyber-insurance-data-gives-cisos-new-ammo-for-budg-687e996c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cyber%20Insurance%20Data%20Gives%20CISOs%20New%20Ammo%20for%20Budget%20Talks&amp;severity=medium&amp;id=69f0fe25cbff5d861062d85f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7296-cross-site-scripting-in-sourcecodest-6568942a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7296%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f1649ccbff5d861047eba8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7295-cross-site-scripting-in-sourcecodest-b79ed129</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7295%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f1649fcbff5d861047ef5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7294-cross-site-scripting-in-sourcecodest-cd5e59fe</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7294%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f1649fcbff5d861047eedd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24231-cwe-918-server-side-request-forgery-64e01ed7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24231%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20NVIDIA%20NemoClaw&amp;severity=medium&amp;id=69f1649fcbff5d861047eec1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24222-cwe-497-exposure-of-sensitive-syste-98c62a9d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24222%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20NVIDIA%20NemoClaw&amp;severity=high&amp;id=69f1649fcbff5d861047eebc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24204-cwe-20-improper-input-validation-in-213f6e73</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24204%3A%20CWE-20%20Improper%20Input%20Validation%20in%20NVIDIA%20FLARE%20SDK&amp;severity=medium&amp;id=69f1649fcbff5d861047eeb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24186-cwe-502-deserialization-of-untruste-a3469bdd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24186%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20FLARE%20SDK&amp;severity=high&amp;id=69f1649fcbff5d861047eeb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7293-sql-injection-in-sourcecodester-pizz-6e24f646</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7293%3A%20SQL%20Injection%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f1649fcbff5d861047eed6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24178-cwe-639-authorization-bypass-throug-2c6d438d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24178%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20NVIDIA%20FLARE%20SDK&amp;severity=critical&amp;id=69f1649fcbff5d861047eead</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6807-cwe-611-in-nsa-grassmarlin-7885cf50</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6807%3A%20CWE-611%20in%20NSA%20GRASSMARLIN&amp;severity=medium&amp;id=69f1649fcbff5d861047eecb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3893-cwe-306-in-carlson-software-vasco-b--bccf8b2a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3893%3A%20CWE-306%20in%20Carlson%20Software%20VASCO-B%20GNSS%20Receiver&amp;severity=critical&amp;id=69f1649fcbff5d861047eec6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7292-improper-authorization-in-o2oa-7cdf1fbd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7292%3A%20Improper%20Authorization%20in%20o2oa&amp;severity=medium&amp;id=69f1649fcbff5d861047eecf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7291-server-side-request-forgery-in-o2oa-12949d3a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7291%3A%20Server-Side%20Request%20Forgery%20in%20o2oa&amp;severity=medium&amp;id=69f1649ccbff5d861047ed20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vimeo-confirms-user-and-customer-data-breach-867b581e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vimeo%20Confirms%20User%20and%20Customer%20Data%20Breach&amp;severity=medium&amp;id=69f0ec91cbff5d8610507224</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5794-cwe-694-use-of-multiple-resources-wi-d387600a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5794%3A%20CWE-694%20Use%20of%20multiple%20resources%20with%20duplicate%20identifier%20in%20Ercom%20Cryptobox&amp;severity=medium&amp;id=69f1649ccbff5d861047ed10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6238-cwe-126-buffer-over-read-in-the-gnu--edbd45ec</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6238%3A%20CWE-126%20Buffer%20over-read%20in%20The%20GNU%20C%20Library%20glibc&amp;severity=medium&amp;id=69f1649ccbff5d861047ed13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vect-ransomware-by-design-wiper-by-accident-b77be0ac</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VECT%3A%20Ransomware%20by%20design%2C%20Wiper%20by%20accident&amp;severity=medium&amp;id=69f1adeecbff5d8610b7f21d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7290-sql-injection-in-jeecgboot-44ffcdae</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7290%3A%20SQL%20Injection%20in%20JeecgBoot&amp;severity=medium&amp;id=69f1649ccbff5d861047ed17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-practical-guide-to-secure-vibe-coding-for-small--31147acf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20practical%20guide%20to%20secure%20vibe-coding%20for%20small%20businesses%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69f1f187cbff5d861004fd5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-mythos-moment-enterprises-must-fight-agents-wi-60e10811</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Mythos%20Moment%3A%20Enterprises%20Must%20Fight%20Agents%20with%20Agents&amp;severity=medium&amp;id=69f0d779cbff5d861035325e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/webinar-today-a-step-by-step-approach-to-ai-govern-1e4bf571</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Webinar%20Today%3A%20A%20Step-by-Step%20Approach%20to%20AI%20Governance&amp;severity=medium&amp;id=69f0d3f6cbff5d86102cee14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41873-cwe-444-inconsistent-interpretation-592a2ec3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41873%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Apache%20Software%20Foundation%20Pony%20Mail&amp;severity=critical&amp;id=69f1649ccbff5d861047ed0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7289-buffer-overflow-in-d-link-dir-825m-c9751f35</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7289%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-825M&amp;severity=high&amp;id=69f0d09ecbff5d86102a30e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40969-cwe-209-generation-of-error-message-4c52c0ed</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40969%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Spring%20Spring%20gRPC&amp;severity=low&amp;id=69f0d09ecbff5d86102a30d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/robinhood-vulnerability-exploited-for-phishing-att-c1650404</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Robinhood%20Vulnerability%20Exploited%20for%20Phishing%20Attacks&amp;severity=medium&amp;id=69f0c969cbff5d861023bcf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7288-buffer-overflow-in-d-link-dir-825m-790ca980</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7288%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-825M&amp;severity=high&amp;id=69f0d09ecbff5d86102a30de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7283-sql-injection-in-sourcecodester-phar-cfb7d591</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7283%3A%20SQL%20Injection%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69f0d09ecbff5d86102a30d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40556-cwe-732-incorrect-permission-assign-c931c0a2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40556&amp;severity=null&amp;id=69f0c288cbff5d86101cc9d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7321-vulnerability-in-mozilla-firefox-1855007f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7321%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69f0c288cbff5d86101cc9ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7324-vulnerability-in-mozilla-firefox-f4a866b8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7324%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69f1649ccbff5d861047ed27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7323-vulnerability-in-mozilla-firefox-ec550385</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7323%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69f0c288cbff5d86101cc9f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7322-vulnerability-in-mozilla-firefox-beb624de</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7322%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69f0c288cbff5d86101cc9f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7320-vulnerability-in-mozilla-firefox-046c3b9e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7320%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69f0c288cbff5d86101cc9e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40968-cwe-653-improper-isolation-or-compa-49d1c2fc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40968%3A%20CWE-653%3A%20Improper%20Isolation%20or%20Compartmentalization%20in%20Spring%20Spring%20gRPC&amp;severity=medium&amp;id=69f0c288cbff5d86101cc9df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/alleged-chinese-state-hacker-extradited-to-us-579666a9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Alleged%20Chinese%20State%20Hacker%20Extradited%20to%20US&amp;severity=medium&amp;id=69f0b7d6cbff5d86101429f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7282-sql-injection-in-sourcecodester-phar-69a59036</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7282%3A%20SQL%20Injection%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69f0c288cbff5d86101cc9e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/http-requests-with-x-vercel-set-bypass-cookie-head-da2f8e7a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HTTP%20Requests%20with%20X-Vercel-Set-Bypass-Cookie%20Header%2C%20(Tue%2C%20Apr%2028th)&amp;severity=medium&amp;id=69f0b7e2cbff5d8610142b39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7281-cross-site-scripting-in-sourcecodest-257c9389</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7281%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69f0b827cbff5d8610144410</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40552-cwe-669-incorrect-resource-transfer-7605e272</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40552%3A%20CWE-669%3A%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20BinSoft%20mpGabinet&amp;severity=medium&amp;id=69f0b827cbff5d86101443fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40551-cwe-603-use-of-client-side-authenti-2147c575</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40551%3A%20CWE-603%3A%20Use%20of%20Client-Side%20Authentication%20in%20BinSoft%20mpGabinet&amp;severity=high&amp;id=69f0b827cbff5d86101443f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40550-cwe-250-execution-with-unnecessary--cd433f12</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40550%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20BinSoft%20mpGabinet&amp;severity=medium&amp;id=69f0b827cbff5d86101443f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6706-cwe-862-missing-authorization-in-dev-844794df</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6706%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Devolutions%20Server&amp;severity=medium&amp;id=69f0b827cbff5d8610144405</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5944-cwe-306-missing-authentication-for-c-9c2e28be</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5944%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20Nutanix%20Cisco%20Intersight%20Device%20Connector%20for%20Prism%20Central&amp;severity=medium&amp;id=69f0b827cbff5d8610144400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vect-ransomware-by-design-wiper-by-accident-453aa263</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VECT%3A%20Ransomware%20by%20design%2C%20Wiper%20by%20accident&amp;severity=medium&amp;id=69f1f175cbff5d861004d351</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7272-path-traversal-in-williamcloudqi-mat-89a68a41</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7272%3A%20Path%20Traversal%20in%20WilliamCloudQi%20matlab-mcp-server&amp;severity=medium&amp;id=69f0b827cbff5d8610144408</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dozens-of-open-vsx-extension-clones-linked-to-glas-a7561f2b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dozens%20of%20Open%20VSX%20Extension%20Clones%20Linked%20to%20GlassWorm%20Malware&amp;severity=medium&amp;id=69f0ad4acbff5d86100ca8ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7309-untrusted-search-path-in-red-hat-red-1a33e6b6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7309%3A%20Untrusted%20Search%20Path%20in%20Red%20Hat%20Red%20Hat%20OpenShift%20Container%20Platform%204&amp;severity=medium&amp;id=69f0b132cbff5d86100ea269</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7271-path-traversal-in-dv0x-creative-ad-a-e832cdd5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7271%3A%20Path%20Traversal%20in%20DV0x%20creative-ad-agent&amp;severity=medium&amp;id=69f0b132cbff5d86100ea261</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7269-cross-site-scripting-in-sourcecodest-fbd6595d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7269%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69f0b132cbff5d86100ea259</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5435-cwe-787-out-of-bounds-write-in-the-g-f1e870bd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5435%3A%20CWE-787%20Out-of-bounds%20write%20in%20The%20GNU%20C%20Library%20glibc&amp;severity=high&amp;id=69f0b132cbff5d86100ea24c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/electric-motorcycles-and-scooters-face-hacking-ris-b197840f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Electric%20Motorcycles%20and%20Scooters%20Face%20Hacking%20Risks%20to%20Security%20and%20Rider%20Safety&amp;severity=medium&amp;id=69f0a2bdcbff5d8610071866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5781-cwe-285-improper-authorization-in-mp-d70ee5a7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5781%3A%20CWE-285%20Improper%20Authorization%20in%20MphRx%20Minerva&amp;severity=high&amp;id=69f0b132cbff5d86100ea256</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5780-cwe-284-improper-access-control-in-m-d7854785</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5780%3A%20CWE-284%20Improper%20Access%20Control%20in%20MphRx%20Minerva&amp;severity=high&amp;id=69f0b132cbff5d86100ea253</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5779-cwe-284-improper-access-control-in-m-135a916d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5779%3A%20CWE-284%20Improper%20Access%20Control%20in%20MphRx%20Minerva&amp;severity=critical&amp;id=69f0b132cbff5d86100ea250</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/no-patch-for-new-phantomrpc-privilege-escalation-t-65e5eb4a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=No%20Patch%20for%20New%20PhantomRPC%20Privilege%20Escalation%20Technique%20in%20Windows&amp;severity=high&amp;id=69f09bb5cbff5d861003a307</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7268-sql-injection-in-sourcecodester-pizz-852d66f9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7268%3A%20SQL%20Injection%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f0b136cbff5d86100ea407</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7267-sql-injection-in-sourcecodester-pizz-4fc4bde8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7267%3A%20SQL%20Injection%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f0c288cbff5d86101cc9fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/germany-suspects-russia-is-behind-signal-phishing--c6c064af</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Germany%20Suspects%20Russia%20Is%20Behind%20Signal%20Phishing%20That%20Targeted%20Top%20Officials&amp;severity=medium&amp;id=69f094adcbff5d8610ff87f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7266-sql-injection-in-sourcecodester-pizz-528fff14</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7266%3A%20SQL%20Injection%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f0d09ecbff5d86102a30ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7265-sql-injection-in-sourcecodester-pizz-1ad58425</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7265%3A%20SQL%20Injection%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f0912acbff5d8610facead</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3323-cwe-306-missing-authentication-for-c-7fc2660c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3323%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20VEGA%20Grieshaber%20VEGAPULS%206X%20Two-wire%20PROFINET%2C%20Modbus%20TCP%2C%20OPC%20UA%20(Ethernet-APL)&amp;severity=high&amp;id=69f0912acbff5d8610facea9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7280-cwe-428-unquoted-search-path-or-elem-493f4b61</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7280%3A%20CWE-428%20Unquoted%20search%20path%20or%20element%20in%20eMPIA%20Technology%20AVACAST&amp;severity=high&amp;id=69f086c2cbff5d8610f343d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7279-cwe-427-uncontrolled-search-path-ele-2fa5114d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7279%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20eMPIA%20Technology%20AVACAST&amp;severity=high&amp;id=69f086bfcbff5d8610f3428b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7264-sql-injection-in-sourcecodester-pizz-cadf1164</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7264%3A%20SQL%20Injection%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f086bfcbff5d8610f34284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41636-cwe-674-uncontrolled-recursion-in-a-a7343026</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41636%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20Apache%20Software%20Foundation%20Apache%20Thrift&amp;severity=high&amp;id=69f086bfcbff5d8610f34280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41607-cwe-125-out-of-bounds-read-in-apach-679c921d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41607%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Apache%20Software%20Foundation%20Apache%20Thrift&amp;severity=medium&amp;id=69f086bfcbff5d8610f3427c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41606-cwe-674-uncontrolled-recursion-in-a-d467d0ce</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41606%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20Apache%20Software%20Foundation%20Apache%20Thrift&amp;severity=medium&amp;id=69f086bfcbff5d8610f34278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41605-cwe-190-integer-overflow-or-wraparo-6b02b2fa</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41605%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Apache%20Software%20Foundation%20Apache%20Thrift&amp;severity=high&amp;id=69f086bfcbff5d8610f34274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41604-cwe-125-out-of-bounds-read-in-apach-dc16fb9a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41604%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Apache%20Software%20Foundation%20Apache%20Thrift&amp;severity=high&amp;id=69f086bfcbff5d8610f34270</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41603-cwe-297-improper-validation-of-cert-6578089c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41603%3A%20CWE-297%20Improper%20Validation%20of%20Certificate%20with%20Host%20Mismatch%20in%20Apache%20Software%20Foundation%20Apache%20Thrift&amp;severity=high&amp;id=69f086bfcbff5d8610f3426c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41602-cwe-190-integer-overflow-or-wraparo-27433c8b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41602%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Apache%20Software%20Foundation%20Apache%20Thrift&amp;severity=high&amp;id=69f086bfcbff5d8610f34268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48431-cwe-762-mismatched-memory-managemen-cbe6be14</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48431%3A%20CWE-762%20Mismatched%20Memory%20Management%20Routines%20in%20Apache%20Software%20Foundation%20Apache%20Thrift&amp;severity=high&amp;id=69f086bfcbff5d8610f34264</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7248-buffer-overflow-in-d-link-di-8100-798ac14e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7248%3A%20Buffer%20Overflow%20in%20D-Link%20DI-8100&amp;severity=critical&amp;id=69f0788fcbff5d8610e928f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7247-buffer-overflow-in-d-link-di-8100-97660054</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7247%3A%20Buffer%20Overflow%20in%20D-Link%20DI-8100&amp;severity=high&amp;id=69f0788fcbff5d8610e928ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/spectrum-security-emerges-from-stealth-mode-with-1-15f15493</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Spectrum%20Security%20Emerges%20From%20Stealth%20Mode%20With%20%2419%20Million&amp;severity=medium&amp;id=69f07185cbff5d8610e26cfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7244-os-command-injection-in-totolink-a80-f82a0e92</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7244%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69f0788fcbff5d8610e928e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ot-focused-malware-highlights-emerging-risk-to-wat-3119c9d5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OT-Focused%20Malware%20Highlights%20Emerging%20Risk%20to%20Water%20Infrastructure%20Systems&amp;severity=medium&amp;id=69f0beddcbff5d8610199dfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/attack-activity-analysis-using-sshtor-tunnels-for--d90ac7f5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Attack%20Activity%20Analysis%20Using%20SSH%2BTOR%20Tunnels%20for%20Covert%20Persistence&amp;severity=medium&amp;id=69f1b4f5cbff5d8610c35091</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-third-vultr-seoul-box-60-kimsuky-domains-18-mont-eeb2e008</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20Third%20Vultr%20Seoul%20Box%3A%2060%2B%20Kimsuky%20Domains%2C%2018%20Months%20of%20DDNS%20Rotation%2C%20and%20a%205-Year%20Infrastructure%20Trail&amp;severity=medium&amp;id=69f0c280cbff5d86101cb678</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7243-os-command-injection-in-totolink-a80-73a189fb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7243%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69f0788fcbff5d8610e928df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10539-cwe-295-improper-certificate-valida-f564b146</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10539%3A%20CWE-295%20Improper%20certificate%20validation%20in%20DeskTime%20DeskTime%20Time%20Tracking%20App&amp;severity=medium&amp;id=69f0788fcbff5d8610e928c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7242-os-command-injection-in-totolink-a80-cac9fbc1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7242%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69f0788fcbff5d8610e928d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40980-cwe-400-uncontrolled-resource-consu-175c37aa</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40980%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Spring%20Spring%20AI&amp;severity=medium&amp;id=69f0788fcbff5d8610e928ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40979-cwe-377-insecure-temporary-file-in--f6bd7b67</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40979%3A%20CWE-377%3A%20Insecure%20Temporary%20File%20in%20Spring%20Spring%20AI&amp;severity=medium&amp;id=69f0788fcbff5d8610e928cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7241-os-command-injection-in-totolink-a80-69ec6c50</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7241%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69f0788fcbff5d8610e928d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40978-cwe-89-improper-neutralization-of-s-d943c58c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40978%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Spring%20Spring%20AI&amp;severity=high&amp;id=69f0788fcbff5d8610e928c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7240-os-command-injection-in-totolink-a80-cd808cb1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7240%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69f06034cbff5d8610cfe2d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tall-tales-how-chinese-actors-use-impersonation-an-d6edf126</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tall%20Tales%3A%20How%20Chinese%20Actors%20Use%20Impersonation%20and%20Stolen%20Narratives%20to%20Perpetuate%20Digital%20Transnational%20Repression&amp;severity=medium&amp;id=69f0c280cbff5d86101cb5f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54013-cwe-306-missing-authentication-for--fbf6369a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54013%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20Hanwha%20Vision%20QND-8080R&amp;severity=high&amp;id=69f0602fcbff5d8610cfd2b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54012-cwe-78-improper-neutralization-of-s-2a77bad7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54012%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20Hanwha%20Vision%20QND-8080R&amp;severity=high&amp;id=69f0602fcbff5d8610cfd2b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7238-unrestricted-upload-in-code-projects-64248e9e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7238%3A%20Unrestricted%20Upload%20in%20code-projects%20Online%20Music%20Site&amp;severity=medium&amp;id=69f06034cbff5d8610cfe2ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54011-cwe-20-improper-input-validation-in-afa84b22</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54011%3A%20CWE-20%20Improper%20input%20validation%20in%20Hanwha%20Vision%20QND-8080R&amp;severity=medium&amp;id=69f0602fcbff5d8610cfd2b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4805-cwe-79-improper-neutralization-of-in-258f5315</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4805%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20duongancol%20Woostify&amp;severity=medium&amp;id=69f0602fcbff5d8610cfd2cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4911-cwe-472-external-control-of-assumed--f8c23604</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4911%3A%20CWE-472%20External%20Control%20of%20Assumed-Immutable%20Web%20Parameter%20in%20masaakitanaka%20Booking%20Package&amp;severity=medium&amp;id=69f0602fcbff5d8610cfd2d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7237-path-traversal-in-agiflow-scaffold-m-c930a9b1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7237%3A%20Path%20Traversal%20in%20AgiFlow%20scaffold-mcp&amp;severity=medium&amp;id=69f0602fcbff5d8610cfd2e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40966-cwe-284-improper-access-control-in--e8e38b70</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40966%3A%20CWE-284%20Improper%20Access%20Control%20in%20VMware%20Spring%20AI&amp;severity=medium&amp;id=69f0602fcbff5d8610cfd2bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/medtronic-hack-confirmed-after-shinyhunters-threat-e869d541</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Medtronic%20Hack%20Confirmed%20After%20ShinyHunters%20Threatens%20Data%20Leak&amp;severity=medium&amp;id=69f05565cbff5d8610c8963a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7235-path-traversal-in-erlichliu-claude-a-0e2800d0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7235%3A%20Path%20Traversal%20in%20ErlichLiu%20claude-agent-sdk-master&amp;severity=medium&amp;id=69f0602fcbff5d8610cfd2e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7234-path-traversal-in-browseroperator-br-f785bf12</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7234%3A%20Path%20Traversal%20in%20BrowserOperator%20browser-operator-core&amp;severity=medium&amp;id=69f0521fcbff5d8610c67dcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40967-cwe-94-improper-control-of-generati-2dbb5ab4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40967%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20in%20Spring%20Spring%20AI&amp;severity=high&amp;id=69f0521fcbff5d8610c67db0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7233-out-of-bounds-read-in-artifex-mupdf-8002809c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7233%3A%20Out-of-Bounds%20Read%20in%20Artifex%20MuPDF&amp;severity=medium&amp;id=69f0521fcbff5d8610c67dc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5306-cwe-79-cross-site-scripting-xss-in-c-6b1ca701</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5306%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Check%20%26%20Log%20Email&amp;severity=medium&amp;id=69f0521fcbff5d8610c67db3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7230-cross-site-scripting-in-sourcecodest-adae387e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7230%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Safety%20Anger%20Pad&amp;severity=medium&amp;id=69f0521fcbff5d8610c67dbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7229-sql-injection-in-code-projects-coach-b67f16d1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7229%3A%20SQL%20Injection%20in%20code-projects%20Coaching%20Management%20System&amp;severity=medium&amp;id=69f0521fcbff5d8610c67db6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7228-sql-injection-in-sourcecodester-pizz-2c87f8c6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7228%3A%20SQL%20Injection%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f043f9cbff5d8610b66158</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7227-sql-injection-in-sourcecodester-pizz-7ae8b08f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7227%3A%20SQL%20Injection%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f043f9cbff5d8610b66151</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42510-cwe-829-inclusion-of-functionality--c43618fc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42510%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20OpenStack%20Ironic&amp;severity=medium&amp;id=69f043f9cbff5d8610b66121</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7226-sql-injection-in-sourcecodester-pizz-77d91fd3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7226%3A%20SQL%20Injection%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f043f9cbff5d8610b6614a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7225-sql-injection-in-sourcecodester-pizz-06df2189</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7225%3A%20SQL%20Injection%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f043f9cbff5d8610b66143</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6725-cwe-79-improper-neutralization-of-in-2a05a592</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6725%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpclever%20WPC%20Smart%20Messages%20for%20WooCommerce&amp;severity=medium&amp;id=69f043f9cbff5d8610b6612d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6809-cwe-79-improper-neutralization-of-in-fa6db23b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6809%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dartiss%20Social%20Post%20Embed&amp;severity=medium&amp;id=69f043f9cbff5d8610b66134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6551-cwe-79-improper-neutralization-of-in-01aa0529</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6551%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20techeshta%20Timeline%20Blocks%20for%20Gutenberg&amp;severity=medium&amp;id=69f043f9cbff5d8610b66124</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7224-sql-injection-in-sourcecodester-pizz-c6a6a984</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7224%3A%20SQL%20Injection%20in%20SourceCodester%20Pizzafy%20Ecommerce%20System&amp;severity=medium&amp;id=69f043f9cbff5d8610b6613c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7223-server-side-request-forgery-in-bigsw-12e8532f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7223%3A%20Server-Side%20Request%20Forgery%20in%20BigSweetPotatoStudio%20HyperChat&amp;severity=medium&amp;id=69f035e3cbff5d861094ce49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7222-cross-site-scripting-in-code-project-ea75fafe</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7222%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Coaching%20Management%20System&amp;severity=medium&amp;id=69f035e3cbff5d861094ce42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7221-server-side-request-forgery-in-tence-8bd1026c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7221%3A%20Server-Side%20Request%20Forgery%20in%20TencentCloudBase%20CloudBase-MCP&amp;severity=medium&amp;id=69f035e3cbff5d861094ce38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7220-os-command-injection-in-jackwrichard-21426fb0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7220%3A%20OS%20Command%20Injection%20in%20jackwrichards%20FastlyMCP&amp;severity=medium&amp;id=69f035e3cbff5d861094ce30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7219-buffer-overflow-in-totolink-n300rt-85312476</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7219%3A%20Buffer%20Overflow%20in%20Totolink%20N300RT&amp;severity=high&amp;id=69f035e3cbff5d861094ce29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7218-buffer-overflow-in-totolink-n300rt-9687d471</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7218%3A%20Buffer%20Overflow%20in%20Totolink%20N300RT&amp;severity=high&amp;id=69f020adcbff5d861065204b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7217-absolute-path-traversal-in-deepracti-7fd52c7e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7217%3A%20Absolute%20Path%20Traversal%20in%20Deepractice%20PromptX&amp;severity=medium&amp;id=69f020adcbff5d8610652044</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7216-path-traversal-in-donchelo-processin-091925d1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7216%3A%20Path%20Traversal%20in%20donchelo%20processing-claude-mcp-bridge&amp;severity=medium&amp;id=69f020adcbff5d861065203c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1460-cwe-78-improper-neutralization-of-sp-6c865b02</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1460%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20Zyxel%20DX3301-T0%20firmware&amp;severity=high&amp;id=69f020adcbff5d8610652032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7215-command-injection-in-egtai-gmx-vmd-m-eeb51f56</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7215%3A%20Command%20Injection%20in%20egtai%20gmx-vmd-mcp&amp;severity=medium&amp;id=69f020adcbff5d8610652035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-tuesday-april-28th-2026-httpsisc-b2b14274</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Tuesday%2C%20April%2028th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9908%2C%20(Tue%2C%20Apr%2028th)&amp;severity=medium&amp;id=69f0161fcbff5d86105a42fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0711-cwe-78-improper-neutralization-of-sp-9fff62e9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0711%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20Zyxel%20DX3300-T0%20firmware&amp;severity=medium&amp;id=69f020adcbff5d861065202f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7214-path-traversal-in-eghuzefa-engineer--6ca2c9f0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7214%3A%20Path%20Traversal%20in%20eghuzefa%20engineer-your-data&amp;severity=medium&amp;id=69f015a2cbff5d861059e30a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7213-path-traversal-in-ef10007-mlopsmcp-024a87bb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7213%3A%20Path%20Traversal%20in%20ef10007%20MLOps_MCP&amp;severity=medium&amp;id=69f015a2cbff5d861059e303</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7212-path-traversal-in-edvardlindelof-not-0bce1f64</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7212%3A%20Path%20Traversal%20in%20edvardlindelof%20notes-mcp&amp;severity=medium&amp;id=69f015a2cbff5d861059e2fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7211-command-injection-in-dvladimirov-mcp-a9f308b2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7211%3A%20Command%20Injection%20in%20dvladimirov%20MCP&amp;severity=medium&amp;id=69f008add3d5ab9102728441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7206-sql-injection-in-dubydu-sqlite-mcp-2e443e21</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7206%3A%20SQL%20Injection%20in%20dubydu%20sqlite-mcp&amp;severity=medium&amp;id=69f008add3d5ab9102728438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7205-path-traversal-in-duartium-papers-mc-ac891dff</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7205%3A%20Path%20Traversal%20in%20duartium%20papers-mcp-server&amp;severity=medium&amp;id=69f008add3d5ab9102728431</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7204-os-command-injection-in-totolink-a80-304b8a45</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7204%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69f008add3d5ab910272842a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7203-os-command-injection-in-totolink-a80-b3a02d32</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7203%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69f008add3d5ab9102728423</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60889-na-4e760c61</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60889%3A%20n%2Fa&amp;severity=null&amp;id=69f165e4cbff5d86104b64f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60887-na-bf1f752e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60887%3A%20n%2Fa&amp;severity=medium&amp;id=69f165e4cbff5d86104b64ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38949-na-43782f51</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38949%3A%20n%2Fa&amp;severity=null&amp;id=69f1649fcbff5d861047ef8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38948-na-6b6fa87b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38948%3A%20n%2Fa&amp;severity=medium&amp;id=69f1649fcbff5d861047ef87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38651-na-f476ac9e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38651%3A%20n%2Fa&amp;severity=high&amp;id=69f1649fcbff5d861047ef81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37750-na-cce03552</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37750%3A%20n%2Fa&amp;severity=medium&amp;id=69f1649ccbff5d861047eb88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-28-4ccfa6d9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-28&amp;severity=medium&amp;id=69f14b75cbff5d8610f31302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67223-na-bef1a693</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67223%3A%20n%2Fa&amp;severity=high&amp;id=69f0d09ecbff5d86102a30cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-28-1048392e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-28&amp;severity=low&amp;id=69f09f32cbff5d861004acee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41526-cwe-150-improper-neutralization-of--a6e8dde0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41526%3A%20CWE-150%20Improper%20Neutralization%20of%20Escape%2C%20Meta%2C%20or%20Control%20Sequences%20in%20KDE%20KCoreAddons&amp;severity=medium&amp;id=69f0602fcbff5d8610cfd2c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41525-cwe-669-incorrect-resource-transfer-b6daee56</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41525%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20KDE%20Dolphin&amp;severity=medium&amp;id=69f0602fcbff5d8610cfd2bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40356-cwe-191-integer-underflow-wrap-or-w-d22033d8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40356%3A%20CWE-191%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20MIT%20Kerberos%205&amp;severity=medium&amp;id=69f0521fcbff5d8610c67dab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40355-cwe-476-null-pointer-dereference-in-7c5cdf8c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40355%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20MIT%20Kerberos%205&amp;severity=medium&amp;id=69f043f9cbff5d8610b6611c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20766-cwe-122-in-milesight-ms-cxx63-pd-3f20a1ef</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20766%3A%20CWE-122%20in%20Milesight%20MS-Cxx63-PD&amp;severity=high&amp;id=69f008add3d5ab910272840c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7202-os-command-injection-in-totolink-a80-9229772f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7202%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69f008add3d5ab910272841b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32649-cwe-78-in-milesight-ms-cxx63-pd-d5b116ae</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32649%3A%20CWE-78%20in%20Milesight%20MS-Cxx63-PD&amp;severity=high&amp;id=69f008add3d5ab9102728416</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32644-cwe-321-in-milesight-ms-cxx63-pd-60e79b90</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32644%3A%20CWE-321%20in%20Milesight%20MS-Cxx63-PD&amp;severity=critical&amp;id=69f008add3d5ab9102728411</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27785-cwe-798-in-milesight-ms-cxx63-pd-a47740d0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27785%3A%20CWE-798%20in%20Milesight%20MS-Cxx63-PD&amp;severity=high&amp;id=69f0134ecbff5d861057a5c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40977-cwe-59-improper-link-resolution-bef-280cda4b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40977%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20in%20Spring%20Spring%20Boot&amp;severity=medium&amp;id=69f0134ecbff5d861057a5d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40976-cwe-862-missing-authorization-in-sp-358f8485</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40976%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Spring%20Spring%20Boot&amp;severity=critical&amp;id=69f0134ecbff5d861057a5d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40975-cwe-330-use-of-insufficiently-rando-03815315</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40975%3A%20CWE-330%3A%20Use%20of%20Insufficiently%20Random%20Values%20in%20Spring%20Spring%20Boot&amp;severity=medium&amp;id=69f0134ecbff5d861057a5ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40974-cwe-295-improper-certificate-valida-b9490338</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40974%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Spring%20Spring%20Boot&amp;severity=medium&amp;id=69f0134ecbff5d861057a5cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7200-cross-site-scripting-in-sourcecodest-89c9fa53</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7200%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69f0134ecbff5d861057a5d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40973-cwe-377-insecure-temporary-file-in--ecbb583e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40973%3A%20CWE-377%3A%20Insecure%20Temporary%20File%20in%20Spring%20Spring%20Boot&amp;severity=high&amp;id=69f0134ecbff5d861057a5c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40972-cwe-208-observable-timing-discrepan-0658711e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40972%3A%20CWE-208%3A%20Observable%20Timing%20Discrepancy%20in%20Spring%20Spring%20Boot&amp;severity=high&amp;id=69eff011d3d5ab91023eabf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7199-sql-injection-in-sourcecodester-phar-8085c5cc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7199%3A%20SQL%20Injection%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69eff011d3d5ab91023eabfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7196-sql-injection-in-codeastro-online-cl-5490b32d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7196%3A%20SQL%20Injection%20in%20CodeAstro%20Online%20Classroom&amp;severity=medium&amp;id=69eff011d3d5ab91023eabf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40971-cwe-295-improper-certificate-valida-efdceea9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40971%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Spring%20Spring%20Boot&amp;severity=medium&amp;id=69efec8cd3d5ab91023ba5f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7194-sql-injection-in-sourcecodester-phar-30482406</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7194%3A%20SQL%20Injection%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69efec8cd3d5ab91023ba5f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28747-cwe-639-in-milesight-ms-cxx63-pd-5f25c353</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28747%3A%20CWE-639%20in%20Milesight%20MS-Cxx63-PD&amp;severity=high&amp;id=69efec8cd3d5ab91023ba5ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7183-uncaught-exception-in-aligungr-ueran-46c8f60d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7183%3A%20Uncaught%20Exception%20in%20aligungr%20UERANSIM&amp;severity=medium&amp;id=69efe58fd3d5ab91023219a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7179-path-traversal-in-ospg-binwalk-3fa14598</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7179%3A%20Path%20Traversal%20in%20OSPG%20binwalk&amp;severity=medium&amp;id=69efe58fd3d5ab910232199f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7178-server-side-request-forgery-in-chatg-6d14a4ba</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7178%3A%20Server-Side%20Request%20Forgery%20in%20ChatGPTNextWeb%20NextChat&amp;severity=medium&amp;id=69efdfeaba26a39fba6a0636</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7177-server-side-request-forgery-in-chatg-4c6ac8b8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7177%3A%20Server-Side%20Request%20Forgery%20in%20ChatGPTNextWeb%20NextChat&amp;severity=medium&amp;id=69efdc66ba26a39fba68d653</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7160-command-injection-in-tenda-hg3-d40cdfd6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7160%3A%20Command%20Injection%20in%20Tenda%20HG3&amp;severity=high&amp;id=69efd8e1ba26a39fba67dee1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7159-path-traversal-in-douinc-mkdocs-mcp--3ac8463c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7159%3A%20Path%20Traversal%20in%20douinc%20mkdocs-mcp-plugin&amp;severity=medium&amp;id=69efd8e1ba26a39fba67ded9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7158-server-side-request-forgery-in-dmitr-7b25460e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7158%3A%20Server-Side%20Request%20Forgery%20in%20dmitryglhf%20mcp-url-downloader&amp;severity=medium&amp;id=69efd1e7ba26a39fba655246</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3087-cwe-22-in-python-software-foundation-cf87d6ca</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3087%3A%20CWE-22%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=69efd1e7ba26a39fba655233</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7157-command-injection-in-disler-aider-mc-b20a7960</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7157%3A%20Command%20Injection%20in%20disler%20aider-mcp-server&amp;severity=medium&amp;id=69efd1e7ba26a39fba65523f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7156-os-command-injection-in-totolink-a80-8abcd97a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7156%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69efd1e7ba26a39fba655238</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7155-os-command-injection-in-totolink-a80-1189da9b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7155%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69efc789ba26a39fba6016e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7191-cwe-94-improper-control-of-generatio-bdaccdc6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7191%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20AWS%20QnABot%20on%20AWS&amp;severity=high&amp;id=69efc789ba26a39fba6016ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7154-os-command-injection-in-totolink-a80-26498eb9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7154%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69efc789ba26a39fba6016dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7153-os-command-injection-in-totolink-a80-ebd1ddca</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7153%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69efc04fba26a39fba5c0c38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6741-cwe-269-improper-privilege-managemen-3462c309</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6741%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20latepoint%20LatePoint%20%E2%80%93%20Calendar%20Booking%20Plugin%20for%20Appointments%20and%20Events&amp;severity=high&amp;id=69efc04fba26a39fba5c0c22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7152-os-command-injection-in-totolink-a80-b2761578</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7152%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69efc04fba26a39fba5c0c31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7151-stack-based-buffer-overflow-in-tenda-bc5ad396</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7151%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20HG3&amp;severity=high&amp;id=69efc04fba26a39fba5c0c2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40970-cwe-295-improper-certificate-valida-d8275d91</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40970%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Spring%20Spring%20Boot&amp;severity=medium&amp;id=69efb5d1ba26a39fba55640b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7150-server-side-request-forgery-in-dh101-71f7a36b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7150%3A%20Server-Side%20Request%20Forgery%20in%20dh1011%20auto-favicon&amp;severity=medium&amp;id=69efb5d1ba26a39fba556415</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7149-path-traversal-in-dexhunter-kaggle-m-7a2ee86d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7149%3A%20Path%20Traversal%20in%20dexhunter%20kaggle-mcp&amp;severity=medium&amp;id=69efb5d1ba26a39fba55640e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7148-sql-injection-in-codeastro-online-cl-e8513a58</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7148%3A%20SQL%20Injection%20in%20CodeAstro%20Online%20Classroom&amp;severity=medium&amp;id=69efaeccba26a39fba5319ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7147-server-side-request-forgery-in-joeca-6b5a2679</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7147%3A%20Server-Side%20Request%20Forgery%20in%20JoeCastrom%20mcp-chat-studio&amp;severity=medium&amp;id=69efaeccba26a39fba5319e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32655-cwe-272-least-privilege-violation-i-f7039c68</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32655%3A%20CWE-272%3A%20Least%20Privilege%20Violation%20in%20Dell%20Alienware%20Command%20Center%20(AWCC)&amp;severity=medium&amp;id=69efaeccba26a39fba5319d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25908-cwe-250-execution-with-unnecessary--d2f1849b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25908%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Dell%20Alienware%20Command%20Center%20(AWCC)&amp;severity=medium&amp;id=69efa7b1ba26a39fba50222d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7146-server-side-request-forgery-in-aleja-702eb052</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7146%3A%20Server-Side%20Request%20Forgery%20in%20AlejandroArciniegas%20mcp-data-vis&amp;severity=medium&amp;id=69efa7b1ba26a39fba502230</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7145-authorization-bypass-in-mettle-sendp-42c88490</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7145%3A%20Authorization%20Bypass%20in%20mettle%20sendportal&amp;severity=medium&amp;id=69efa435ba26a39fba4f0c9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7144-authorization-bypass-in-1000-project-3deadf42</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7144%3A%20Authorization%20Bypass%20in%201000%20Projects%20Portfolio%20Management%20System%20MCA&amp;severity=medium&amp;id=69efa435ba26a39fba4f0c94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7143-sql-injection-in-1000-projects-portf-39937c5d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7143%3A%20SQL%20Injection%20in%201000%20Projects%20Portfolio%20Management%20System%20MCA&amp;severity=medium&amp;id=69efa435ba26a39fba4f0c8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7142-improper-authorization-in-wooey-6518edb2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7142%3A%20Improper%20Authorization%20in%20Wooey&amp;severity=medium&amp;id=69ef99a0ba26a39fba48b580</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7141-uninitialized-resource-in-vllm-b1e6fdbd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7141%3A%20Uninitialized%20Resource%20in%20vllm&amp;severity=medium&amp;id=69ef99a0ba26a39fba48b577</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7140-os-command-injection-in-totolink-a80-a2a3f726</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7140%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69efa435ba26a39fba4f0ca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/73-open-vsx-sleeper-extensions-linked-to-malware-s-9cad5c0c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=73%20Open%20VSX%20Sleeper%20Extensions%20Linked%20to%20Malware%20Show%20New%20Activations&amp;severity=medium&amp;id=69ef8f0dba26a39fba414088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-the-bulletproof-hosting-network-behind-1600-56c3bc34</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20the%20Bulletproof%20Hosting%20Network%20Behind%2016%2C000%2B%20Fake%20Shops&amp;severity=medium&amp;id=69ef8f0dba26a39fba41407d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7139-os-command-injection-in-totolink-a80-33aa0c9f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7139%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69efc375ba26a39fba5dc2df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/extortion-in-the-enterprise-defending-against-blac-3436d7f6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Extortion%20in%20the%20Enterprise%3A%20Defending%20Against%20BlackFile%20Attacks&amp;severity=medium&amp;id=69ef8f0dba26a39fba41408f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishing-crypto-wallet-clones-in-the-app-store-and-fd9f5a88</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishing%20crypto-wallet%20clones%20in%20the%20App%20Store%20and%20other%20attacks%20on%20iOS%20and%20macOS%20crypto%20owners%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69ef8c66ba26a39fba3fde0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7138-os-command-injection-in-totolink-a80-9e15fc72</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7138%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69ef8b94ba26a39fba3f69b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7137-os-command-injection-in-totolink-a80-5b52ad7e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7137%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69ef8b94ba26a39fba3f69b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7136-os-command-injection-in-totolink-a80-5d4eb111</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7136%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69ef8b94ba26a39fba3f69aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6970-cwe-842-placement-of-user-into-incor-e26f8061</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6970%3A%20CWE-842%20Placement%20of%20user%20into%20incorrect%20group%20in%20Canonical%20authd&amp;severity=high&amp;id=69ef8b94ba26a39fba3f69a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54505-cwe-1420-exposure-of-sensitive-info-66b28f59</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54505%3A%20CWE-1420%20%20Exposure%20of%20Sensitive%20Information%20during%20Transient%20Execution%20in%20AMD%20AMD%20EPYC%E2%84%A2%207001%20Series%20Processors&amp;severity=low&amp;id=69ef811fba26a39fba3a6d96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7135-out-of-bounds-read-in-gpac-a1c73700</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7135%3A%20Out-of-Bounds%20Read%20in%20GPAC&amp;severity=medium&amp;id=69ef811fba26a39fba3a6dab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7134-unrestricted-upload-in-code-projects-93f887d6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7134%3A%20Unrestricted%20Upload%20in%20code-projects%20Online%20Lot%20Reservation%20System&amp;severity=medium&amp;id=69ef811fba26a39fba3a6da4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7133-unrestricted-upload-in-code-projects-e126e654</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7133%3A%20Unrestricted%20Upload%20in%20code-projects%20Online%20Lot%20Reservation%20System&amp;severity=medium&amp;id=69ef79fcba26a39fba368bbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7132-path-traversal-in-code-projects-onli-f43d2f7e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7132%3A%20Path%20Traversal%20in%20code-projects%20Online%20Lot%20Reservation%20System&amp;severity=medium&amp;id=69ef79fcba26a39fba368bb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40514-cwe-338-use-of-cryptographically-we-40279933</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40514%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20SmarterTools%20Inc.%20SmarterMail&amp;severity=high&amp;id=69ef79fcba26a39fba368ba3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6357-vulnerability-in-pip-maintainers-pip-c9bfaede</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6357%3A%20Vulnerability%20in%20Pip%20maintainers%20pip&amp;severity=medium&amp;id=69ef79fcba26a39fba368ba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7131-sql-injection-in-code-projects-onlin-d8a0922d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7131%3A%20SQL%20Injection%20in%20code-projects%20Online%20Lot%20Reservation%20System&amp;severity=medium&amp;id=69ef79fcba26a39fba368bae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/teampcp-supply-chain-campaign-update-008-26-day-pa-d3a1c9c7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TeamPCP%20Supply%20Chain%20Campaign%3A%20Update%20008%20-%2026-Day%20Pause%20Ends%20with%20Three%20Concurrent%20Compromises%20(Checkmarx%20KICS%2C%20Bitwarden%20CLI%20Cascade%2C%20xinference%20PyPI)%2C%20CanisterSprawl%20npm%20Worm%20Identified%2C%20and%20Tier%201%20Coverage%20Returns%2C%20(Mon%2C%20Apr%2027th)&amp;severity=low&amp;id=69ef6f6aba26a39fba2fe8d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7130-sql-injection-in-sourcecodester-phar-b37da0b2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7130%3A%20SQL%20Injection%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69ef6f96ba26a39fba2ff985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32688-cwe-770-allocation-of-resources-wit-e2617990</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32688%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20elixir-plug%20plug_cowboy&amp;severity=high&amp;id=69ef6f96ba26a39fba2ff971</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7129-cross-site-scripting-in-sourcecodest-f2202ae0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7129%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69ef6f96ba26a39fba2ff97e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7128-sql-injection-in-sourcecodester-phar-dc8f7058</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7128%3A%20SQL%20Injection%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69ef6f96ba26a39fba2ff977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7127-sql-injection-in-sourcecodester-phar-a7924437</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7127%3A%20SQL%20Injection%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69ef64deba26a39fba2863d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40557-cwe-295-improper-certificate-valida-e71177ef</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40557%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20Storm%20Prometheus%20Reporter&amp;severity=null&amp;id=69ef64deba26a39fba2863c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41081-cwe-287-improper-authentication-in--a5917065</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41081%3A%20CWE-287%20Improper%20Authentication%20in%20Apache%20Software%20Foundation%20Apache%20Storm%20Client&amp;severity=medium&amp;id=69ef64deba26a39fba2863cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/incomplete-windows-patch-opens-door-to-zero-click--804ca52f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Incomplete%20Windows%20Patch%20Opens%20Door%20to%20Zero-Click%20Attacks&amp;severity=medium&amp;id=69ef6159ba26a39fba26e288</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7126-sql-injection-in-sourcecodester-phar-3143ff4d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7126%3A%20SQL%20Injection%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69ef64deba26a39fba2863d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6265-cwe-278-insecure-preserved-inherited-4c0ba9b6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6265%3A%20CWE-278%20Insecure%20preserved%20inherited%20permissions%20in%20Cerberus%20Cerberus%20FTP%20Server&amp;severity=high&amp;id=69ef64deba26a39fba2863ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15626-cwe-639-authorization-bypass-throug-75df7060</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15626%3A%20CWE-639%20Authorization%20bypass%20through%20User-Controlled%20key%20in%20Ribblr%20Crotchet%20and%20Knitting&amp;severity=medium&amp;id=69ef64deba26a39fba2863c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7125-os-command-injection-in-totolink-a80-087310f2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7125%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69ef5dd8ba26a39fba258f51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7124-os-command-injection-in-totolink-a80-17dc6981</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7124%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69ef5dd8ba26a39fba258f4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7040-cwe-176-improper-handling-of-unicode-17a88024</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7040%3A%20CWE-176%20Improper%20Handling%20of%20Unicode%20Encoding%20in%20RRWO%20Text%3A%3AMinify%3A%3AXS&amp;severity=high&amp;id=69ef5dd8ba26a39fba258f3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openssh-flaw-allowing-full-root-shell-access-lurke-a32be6bf</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenSSH%20Flaw%20Allowing%20Full%20Root%20Shell%20Access%20Lurked%20for%2015%20Years&amp;severity=low&amp;id=69ef56cdba26a39fba231582</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7123-os-command-injection-in-totolink-a80-634fd53f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7123%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69ef5dd8ba26a39fba258f43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-ai-prompt-injection-attacks-increasing-b-516fa56f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20AI%20Prompt%20Injection%20Attacks%20Increasing%2C%20but%20Sophistication%20Still%20Low%3A%20Google&amp;severity=low&amp;id=69ef5349ba26a39fba2158fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/27th-april-threat-intelligence-report-f1610b0c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=27th%20April%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=69ef53a4ba26a39fba2171ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7122-os-command-injection-in-totolink-a80-98f75eb1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7122%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69ef5358ba26a39fba215e9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7121-os-command-injection-in-totolink-a80-db497ec6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7121%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69ef5358ba26a39fba215e98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/supply-chain-poisoning-via-pypi-repository-comprom-f9defab9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Supply%20Chain%20Poisoning%20via%20PyPI%20Repository%20Compromise&amp;severity=medium&amp;id=69ef4fc5ba26a39fba1ff6bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7119-os-command-injection-in-tenda-hg3-cb5b91c3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7119%3A%20OS%20Command%20Injection%20in%20Tenda%20HG3&amp;severity=high&amp;id=69ef5358ba26a39fba215e91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/energy-and-water-management-firm-itron-hacked-73e29410</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Energy%20and%20Water%20Management%20Firm%20Itron%20Hacked&amp;severity=medium&amp;id=69ef48beba26a39fba1d5c5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7118-sql-injection-in-code-projects-emplo-c6623a17</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7118%3A%20SQL%20Injection%20in%20code-projects%20Employee%20Management%20System&amp;severity=medium&amp;id=69ef48d2ba26a39fba1d6ecf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5937-cwe-248-uncaught-exception-in-foxit--42296023</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5937%3A%20CWE-248%20Uncaught%20exception%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Editor&amp;severity=medium&amp;id=69ef48cfba26a39fba1d6db9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5938-insufficient-control-flow-management-c05a599b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5938%3A%20Insufficient%20Control%20Flow%20Management%20(CWE-691)%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Editor&amp;severity=medium&amp;id=69ef48cfba26a39fba1d6dbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5940-cwe-416-use-after-free-in-foxit-soft-82ad3481</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5940%3A%20CWE-416%20Use%20after%20free%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Editor&amp;severity=high&amp;id=69ef48cfba26a39fba1d6dc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5942-cwe-416-use-after-free-in-foxit-soft-c08799d4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5942%3A%20CWE-416%20Use%20after%20free%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Editor&amp;severity=medium&amp;id=69ef48cfba26a39fba1d6dc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5943-cwe-416-use-after-free-in-foxit-soft-24b539a6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5943%3A%20CWE-416%20Use%20after%20free%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Editor&amp;severity=high&amp;id=69ef48cfba26a39fba1d6dcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5939-cwe-416-use-after-free-in-foxit-soft-c4de69d0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5939%3A%20CWE-416%20Use%20after%20free%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Editor&amp;severity=medium&amp;id=69ef48cfba26a39fba1d6dbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5941-cwe-20-improper-input-validation-in--7fadb872</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5941%3A%20CWE-20%20Improper%20input%20validation%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Editor&amp;severity=high&amp;id=69ef48cfba26a39fba1d6dc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7117-sql-injection-in-code-projects-emplo-b6c07af0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7117%3A%20SQL%20Injection%20in%20code-projects%20Employee%20Management%20System&amp;severity=medium&amp;id=69ef48cfba26a39fba1d6dd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7116-cross-site-scripting-in-code-project-f6007849</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7116%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Employee%20Management%20System&amp;severity=medium&amp;id=69ef48cfba26a39fba1d6dce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unc6692-uses-email-bombing-social-engineering-to-d-6308b083</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UNC6692%20Uses%20Email%20Bombing%2C%20Social%20Engineering%20to%20Deploy%20%E2%80%98Snow%E2%80%99%20Malware&amp;severity=medium&amp;id=69ef3e31ba26a39fba195bf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42410-cwe-79-improper-neutralization-of-i-fa3a5fa2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42410%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CodexThemes%20TheGem%20Theme%20Elements%20(for%20Elementor)&amp;severity=medium&amp;id=69ef48cfba26a39fba1d6db6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22337-cwe-266-incorrect-privilege-assignm-01630852</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22337%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20Directorist%20Directorist%20Social%20Login&amp;severity=critical&amp;id=69ef3e3cba26a39fba196b28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7115-sql-injection-in-code-projects-emplo-840574b2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7115%3A%20SQL%20Injection%20in%20code-projects%20Employee%20Management%20System&amp;severity=medium&amp;id=69ef3e3cba26a39fba196b40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7114-sql-injection-in-code-projects-emplo-9ba13d91</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7114%3A%20SQL%20Injection%20in%20code-projects%20Employee%20Management%20System&amp;severity=medium&amp;id=69ef3e3cba26a39fba196b39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/easily-exploitable-pack2theroot-linux-vulnerabilit-f47ac708</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Easily%20Exploitable%20%E2%80%98Pack2TheRoot%E2%80%99%20Linux%20Vulnerability%20Leads%20to%20Root%20Access&amp;severity=low&amp;id=69ef3729ba26a39fba1635f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7113-missing-authentication-in-nousresear-eac9c7e2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7113%3A%20Missing%20Authentication%20in%20NousResearch%20hermes-agent&amp;severity=medium&amp;id=69ef3e3cba26a39fba196b31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27172-cwe-502-deserialization-of-untruste-0c460851</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27172%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Camel&amp;severity=high&amp;id=69ef3e3cba26a39fba196b2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33453-cwe-915-improperly-controlled-modif-884af63d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33453%3A%20CWE-915%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes%20in%20Apache%20Software%20Foundation%20Apache%20Camel&amp;severity=critical&amp;id=69ef3e3cba26a39fba196b2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7112-improper-authentication-in-nousresea-dc43e89e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7112%3A%20Improper%20Authentication%20in%20NousResearch%20hermes-agent&amp;severity=medium&amp;id=69ef33a6ba26a39fba15414e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33454-cwe-502-deserialization-of-untruste-3b0dba90</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33454%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Camel&amp;severity=critical&amp;id=69ef33a6ba26a39fba154125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40022-cwe-288-authentication-bypass-using-0ecafeba</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40022%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Apache%20Software%20Foundation%20Apache%20Camel%20Platform%20HTTP%20Main&amp;severity=high&amp;id=69ef33a6ba26a39fba15412c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-launches-sweeping-crackdown-on-southeast-asia-c-bad33b40</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Launches%20Sweeping%20Crackdown%20on%20Southeast%20Asia%20Cyberscams%20and%20Sanctions%20Cambodian%20Senator&amp;severity=medium&amp;id=69ef3021ba26a39fba134baa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40858-cwe-502-deserialization-of-untruste-52424157</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40858%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Camel&amp;severity=high&amp;id=69ef33a6ba26a39fba154134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7110-cross-site-scripting-in-code-project-84c188a1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7110%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Invoice%20System%20in%20Laravel&amp;severity=medium&amp;id=69ef33a6ba26a39fba154145</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41409-cwe-502-deserialization-of-untruste-c3d25547</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41409%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20MINA&amp;severity=critical&amp;id=69ef33a6ba26a39fba154139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7109-improper-authorization-in-code-proje-f3638436</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7109%3A%20Improper%20Authorization%20in%20code-projects%20Invoice%20System%20in%20Laravel&amp;severity=medium&amp;id=69ef33a6ba26a39fba15413d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7108-cross-site-request-forgery-in-code-p-16013d28</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7108%3A%20Cross-Site%20Request%20Forgery%20in%20code-projects%20Invoice%20System%20in%20Laravel&amp;severity=medium&amp;id=69ef291eba26a39fba10e2a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41635-cwe-502-deserialization-of-untruste-46beca38</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41635%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20MINA&amp;severity=critical&amp;id=69ef291bba26a39fba10e188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7107-unrestricted-upload-in-code-projects-129d023e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7107%3A%20Unrestricted%20Upload%20in%20code-projects%20Invoice%20System%20in%20Laravel&amp;severity=medium&amp;id=69ef291eba26a39fba10e299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/firefox-vulnerability-allows-tor-user-fingerprinti-624b1087</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Firefox%20Vulnerability%20Allows%20Tor%20User%20Fingerprinting&amp;severity=low&amp;id=69ef2210ba26a39fba0e3f9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7103-use-of-weak-hash-in-code-projects-ch-07788a40</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7103%3A%20Use%20of%20Weak%20Hash%20in%20code-projects%20Chat%20System&amp;severity=medium&amp;id=69ef291eba26a39fba10e292</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42379-cwe-201-insertion-of-sensitive-info-a7a3541e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42379%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20WPDeveloper%20Templately&amp;severity=high&amp;id=69ef291bba26a39fba10e18b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40453-cwe-178-improper-handling-of-case-s-5d887279</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40453%3A%20CWE-178%20Improper%20Handling%20of%20Case%20Sensitivity%20in%20Apache%20Software%20Foundation%20Apache%20Camel%20JMS&amp;severity=critical&amp;id=69ef291bba26a39fba10e17d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7102-command-injection-in-tenda-f456-f693d510</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7102%3A%20Command%20Injection%20in%20Tenda%20F456&amp;severity=medium&amp;id=69ef291eba26a39fba10e28b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40860-cwe-502-deserialization-of-untruste-5ce5b6b9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40860%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Camel&amp;severity=critical&amp;id=69ef291bba26a39fba10e184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7101-buffer-overflow-in-tenda-f456-ccddb581</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7101%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69ef291bba26a39fba10e1a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40048-cwe-502-deserialization-of-untruste-37a09540</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40048%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Camel%20PQC&amp;severity=high&amp;id=69ef291bba26a39fba10e179</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40473-cwe-502-deserialization-of-untruste-350ea403</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40473%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Camel%20Mina&amp;severity=high&amp;id=69ef291bba26a39fba10e180</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7100-buffer-overflow-in-tenda-f456-54363147</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7100%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69ef291bba26a39fba10e19c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7099-buffer-overflow-in-tenda-f456-b9f5b372</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7099%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69ef291bba26a39fba10e195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7098-buffer-overflow-in-tenda-f456-2ba425da</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7098%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69ef291bba26a39fba10e18e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7097-buffer-overflow-in-tenda-f456-8b0e1328</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7097%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69efc375ba26a39fba5dc301</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7096-os-command-injection-in-tenda-hg3-77bd459b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7096%3A%20OS%20Command%20Injection%20in%20Tenda%20HG3&amp;severity=high&amp;id=69ef48d2ba26a39fba1d6ed6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22077-vulnerability-in-oppo-oppo-wallet-a-27737c6e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22077%3A%20Vulnerability%20in%20OPPO%20OPPO%20Wallet%20APP&amp;severity=medium&amp;id=69ef291eba26a39fba10e2a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7095-cross-site-scripting-in-code-project-e5920b3d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7095%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Employee%20Management%20System&amp;severity=medium&amp;id=69ef5dd8ba26a39fba258f58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7094-server-side-request-forgery-in-shado-19f3c488</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7094%3A%20Server-Side%20Request%20Forgery%20in%20ShadowCloneLabs%20GlutamateMCPServers&amp;severity=medium&amp;id=69ef026eba26a39fbafb331e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7093-improper-authorization-in-code-proje-f30b3776</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7093%3A%20Improper%20Authorization%20in%20code-projects%20Invoice%20System%20in%20Laravel&amp;severity=medium&amp;id=69ef026eba26a39fbafb3317</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7092-improper-authorization-in-code-proje-be6e108c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7092%3A%20Improper%20Authorization%20in%20code-projects%20Invoice%20System%20in%20Laravel&amp;severity=medium&amp;id=69ef026eba26a39fbafb3310</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7091-improper-authorization-in-code-proje-c65fc174</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7091%3A%20Improper%20Authorization%20in%20code-projects%20Invoice%20System%20in%20Laravel&amp;severity=medium&amp;id=69ef026eba26a39fbafb3309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7090-cross-site-scripting-in-code-project-94c96ca1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7090%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Chat%20System&amp;severity=medium&amp;id=69eef45eba26a39fbaf26de1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7089-cross-site-scripting-in-code-project-2fa50083</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7089%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Home%20Service%20System&amp;severity=medium&amp;id=69eef45eba26a39fbaf26dda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7088-sql-injection-in-sourcecodester-phar-795088e1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7088%3A%20SQL%20Injection%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69eef45eba26a39fbaf26dd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7087-sql-injection-in-sourcecodester-phar-f2f8e554</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7087%3A%20SQL%20Injection%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69eef45eba26a39fbaf26dcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7086-path-traversal-in-hbai-ltd-toonflow--23d4a937</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7086%3A%20Path%20Traversal%20in%20HBAI-Ltd%20Toonflow-app&amp;severity=medium&amp;id=69eef45eba26a39fbaf26dc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7085-path-traversal-in-hbai-ltd-toonflow--c33ffdf1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7085%3A%20Path%20Traversal%20in%20HBAI-Ltd%20Toonflow-app&amp;severity=low&amp;id=69eee2caba26a39fbaceec8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7084-server-side-request-forgery-in-hbai--2b58605e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7084%3A%20Server-Side%20Request%20Forgery%20in%20HBAI-Ltd%20Toonflow-app&amp;severity=medium&amp;id=69eee2caba26a39fbaceec84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7083-sql-injection-in-likeadmin-likeshop--c59f8cf9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7083%3A%20SQL%20Injection%20in%20likeadmin-likeshop%20likeadmin_php&amp;severity=medium&amp;id=69eee2caba26a39fbaceec7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7082-buffer-overflow-in-tenda-f456-cc536e34</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7082%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69eee2caba26a39fbaceec74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7081-buffer-overflow-in-tenda-f456-d90f75b6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7081%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69eee2caba26a39fbaceec6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3868-cwe-130-improper-handling-of-length--680be2d5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3868%3A%20CWE-130%3A%20Improper%20Handling%20of%20Length%20Parameter%20Inconsistency%20in%20Moxa%20EDR-8010%20Series&amp;severity=high&amp;id=69eee2caba26a39fbaceec65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3867-cwe-282-improper-ownership-managemen-f84bc9d9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3867%3A%20CWE-282%3A%20Improper%20Ownership%20Management%20in%20Moxa%20EDR-8010%20Series&amp;severity=medium&amp;id=69eee2caba26a39fbaceec61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7080-buffer-overflow-in-tenda-f456-6bb8799d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7080%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69eed135ba26a39fbaba83dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7079-buffer-overflow-in-tenda-f456-1842489a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7079%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69eed135ba26a39fbaba83d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7106-cwe-269-improper-privilege-managemen-52554bfa</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7106%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20jgrodgers%20Highland%20Software%20Custom%20Role%20Manager&amp;severity=high&amp;id=69eed135ba26a39fbaba83e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7078-buffer-overflow-in-tenda-f456-8f12c955</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7078%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69eed135ba26a39fbaba83ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7077-sql-injection-in-itsourcecode-courie-4b0cdd45</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7077%3A%20SQL%20Injection%20in%20itsourcecode%20Courier%20Management%20System&amp;severity=medium&amp;id=69eed135ba26a39fbaba83c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7076-sql-injection-in-itsourcecode-courie-cdc662d1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7076%3A%20SQL%20Injection%20in%20itsourcecode%20Courier%20Management%20System&amp;severity=medium&amp;id=69eec325ba26a39fbab1b977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7075-sql-injection-in-itsourcecode-constr-b070b81a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7075%3A%20SQL%20Injection%20in%20itsourcecode%20Construction%20Management%20System&amp;severity=medium&amp;id=69eec325ba26a39fbab1b970</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7074-sql-injection-in-itsourcecode-constr-d86fa550</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7074%3A%20SQL%20Injection%20in%20itsourcecode%20Construction%20Management%20System&amp;severity=medium&amp;id=69eec325ba26a39fbab1b969</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7073-sql-injection-in-itsourcecode-constr-fb1ad131</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7073%3A%20SQL%20Injection%20in%20itsourcecode%20Construction%20Management%20System&amp;severity=medium&amp;id=69eeb89aba26a39fbaa94844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7072-sql-injection-in-codepanda-source-ca-dd721fe0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7072%3A%20SQL%20Injection%20in%20CodePanda%20Source%20canteen_management_system&amp;severity=medium&amp;id=69eeb89aba26a39fbaa9483e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7071-file-and-directory-information-expos-7aa54267</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7071%3A%20File%20and%20Directory%20Information%20Exposure%20in%20CodeAstro%20Online%20Job%20Portal&amp;severity=medium&amp;id=69eeb89aba26a39fbaa94837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7070-sql-injection-in-code-projects-inven-f9f55dfc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7070%3A%20SQL%20Injection%20in%20code-projects%20Inventory%20Management%20System&amp;severity=medium&amp;id=69eeb89aba26a39fbaa94830</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33566-improper-neutralization-of-special--97bed31b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33566%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20Japan%20Computer%20Emergency%20Response%20Team%20Coordination%20Center%20(JPCERT%2FCC)%20LogonTracer&amp;severity=medium&amp;id=69eeaaaaba26a39fba9c68c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33277-improper-neutralization-of-special--31d12542</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33277%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Japan%20Computer%20Emergency%20Response%20Team%20Coordination%20Center%20(JPCERT%2FCC)%20LogonTracer&amp;severity=high&amp;id=69eeaaaaba26a39fba9c68be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7069-buffer-overflow-in-d-link-dir-825-9f93d315</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7069%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-825&amp;severity=high&amp;id=69eeaaaaba26a39fba9c68ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-28-884f580b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-28&amp;severity=medium&amp;id=69f12bd2cbff5d861092e3cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-27-5bc03b71</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-27&amp;severity=low&amp;id=69f04fe3cbff5d8610bdb109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-27-5ae51ca5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-27&amp;severity=medium&amp;id=69effa94d3d5ab910247deaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46636-na-a8490af7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46636%3A%20n%2Fa&amp;severity=critical&amp;id=69efd1e7ba26a39fba65522e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29971-na-a43413e8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29971%3A%20n%2Fa&amp;severity=medium&amp;id=69efc789ba26a39fba6016d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69428-na-681f8327</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69428%3A%20n%2Fa&amp;severity=high&amp;id=69efb5d1ba26a39fba556408</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35903-na-52714e0c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35903%3A%20n%2Fa&amp;severity=critical&amp;id=69efaeccba26a39fba5319e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35902-na-84901bbf</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35902%3A%20n%2Fa&amp;severity=medium&amp;id=69efaeccba26a39fba5319df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35901-na-8bbfd28f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35901%3A%20n%2Fa&amp;severity=medium&amp;id=69efaeccba26a39fba5319dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31256-na-24a2ddee</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31256%3A%20n%2Fa&amp;severity=high&amp;id=69efaeccba26a39fba5319d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31255-na-2e725bca</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31255%3A%20n%2Fa&amp;severity=medium&amp;id=69efaeccba26a39fba5319d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30346-na-c7699a08</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30346%3A%20n%2Fa&amp;severity=medium&amp;id=69efa7b1ba26a39fba502237</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69689-na-5a012bec</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69689%3A%20n%2Fa&amp;severity=high&amp;id=69efa435ba26a39fba4f0c87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38936-na-f2e90d6f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38936%3A%20n%2Fa&amp;severity=medium&amp;id=69ef99a0ba26a39fba48b572</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38935-na-e5a9bb55</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38935%3A%20n%2Fa&amp;severity=medium&amp;id=69ef99a0ba26a39fba48b56d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38934-na-21c6e375</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38934%3A%20n%2Fa&amp;severity=high&amp;id=69ef99a0ba26a39fba48b568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30462-na-8db3ce25</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30462%3A%20n%2Fa&amp;severity=medium&amp;id=69ef99a0ba26a39fba48b562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30352-na-1bc61c5e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30352%3A%20n%2Fa&amp;severity=critical&amp;id=69ef811fba26a39fba3a6d9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30351-na-680c71aa</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30351%3A%20n%2Fa&amp;severity=high&amp;id=69ef811fba26a39fba3a6d99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30350-na-e69a022c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30350%3A%20n%2Fa&amp;severity=high&amp;id=69ef79fcba26a39fba368b9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42363-cwe-656-reliance-on-security-throug-65391bf4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42363%3A%20CWE-656%20-%20Reliance%20on%20Security%20Through%20Obscurity%20in%20GeoVision%20Inc.%20GV-IP%20Device%20Utility&amp;severity=critical&amp;id=69eeaaaaba26a39fba9c68c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7068-buffer-overflow-in-d-link-dir-825-1a940c5e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7068%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-825&amp;severity=high&amp;id=69eea706ba26a39fba9906fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7067-command-injection-in-d-link-dir-822-6f02aaf5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7067%3A%20Command%20Injection%20in%20D-Link%20DIR-822&amp;severity=medium&amp;id=69eea382ba26a39fba976be1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7066-os-command-injection-in-choieastsea--fafc2924</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7066%3A%20OS%20Command%20Injection%20in%20choieastsea%20simple-openstack-mcp&amp;severity=medium&amp;id=69eea002ba26a39fba956ec0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7065-server-side-request-forgery-in-bidin-041b1434</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7065%3A%20Server-Side%20Request%20Forgery%20in%20BidingCC%20BuildingAI&amp;severity=medium&amp;id=69eea002ba26a39fba956eb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7064-os-command-injection-in-agentdeskai--9eadfc8c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7064%3A%20OS%20Command%20Injection%20in%20AgentDeskAI%20browser-tools-mcp&amp;severity=medium&amp;id=69eeadd1ba26a39fbaa2f0e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7063-sql-injection-in-code-projects-emplo-0d2afcee</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7063%3A%20SQL%20Injection%20in%20code-projects%20Employee%20Management%20System&amp;severity=medium&amp;id=69ee9572ba26a39fba8f2ade</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7062-os-command-injection-in-intina47-con-ac80d435</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7062%3A%20OS%20Command%20Injection%20in%20Intina47%20context-sync&amp;severity=medium&amp;id=69ee91eeba26a39fba8cb337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7061-os-command-injection-in-toowiredd-ch-48df32bb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7061%3A%20OS%20Command%20Injection%20in%20Toowiredd%20chatgpt-mcp-server&amp;severity=medium&amp;id=69ee8e6bba26a39fba8975f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7060-sql-injection-in-liyupi-yu-picture-dbdc3180</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7060%3A%20SQL%20Injection%20in%20liyupi%20yu-picture&amp;severity=medium&amp;id=69ee75ceba26a39fba5bc32e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7059-path-traversal-in-666ghj-mirofish-5143a0ca</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7059%3A%20Path%20Traversal%20in%20666ghj%20MiroFish&amp;severity=medium&amp;id=69ee724bba26a39fba567e2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7058-command-injection-in-666ghj-mirofish-6bc975c4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7058%3A%20Command%20Injection%20in%20666ghj%20MiroFish&amp;severity=medium&amp;id=69ee71e2ba26a39fba561eae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7057-buffer-overflow-in-tenda-f456-e219dd08</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7057%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69ee621e87115cfb6856c81f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7056-buffer-overflow-in-tenda-f456-355ff71c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7056%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69ee5b1487115cfb68535b20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7055-buffer-overflow-in-tenda-f456-67b64e39</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7055%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69ee57b087115cfb6851cbb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7054-buffer-overflow-in-tenda-f456-e91360f1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7054%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69ee45fc87115cfb6847c30a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7053-buffer-overflow-in-tenda-f456-5370694f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7053%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69ee37ec87115cfb683e66ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7045-injection-in-baomidou-dynamic-dataso-2afc7b63</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7045%3A%20Injection%20in%20baomidou%20dynamic-datasource&amp;severity=medium&amp;id=69ee6bb668edb0b8f2495f30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7044-unrestricted-upload-in-greencms-52d34c16</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7044%3A%20Unrestricted%20Upload%20in%20GreenCMS&amp;severity=medium&amp;id=69ee6bb668edb0b8f2495f39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7043-unrestricted-upload-in-greencms-c941e9bb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7043%3A%20Unrestricted%20Upload%20in%20GreenCMS&amp;severity=medium&amp;id=69ee14c487115cfb680e0632</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7042-missing-authentication-in-666ghj-mir-8f11be22</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7042%3A%20Missing%20Authentication%20in%20666ghj%20MiroFish&amp;severity=medium&amp;id=69ee14c487115cfb680e062b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7041-information-disclosure-in-666ghj-mir-3b60f7d5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7041%3A%20Information%20Disclosure%20in%20666ghj%20MiroFish&amp;severity=medium&amp;id=69ee0dbc87115cfb680961fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7039-command-injection-in-tufantunc-ssh-m-16dbd528</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7039%3A%20Command%20Injection%20in%20tufantunc%20ssh-mcp&amp;severity=high&amp;id=69ee0dbc87115cfb680961f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7038-insufficiently-protected-credentials-752e881d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7038%3A%20Insufficiently%20Protected%20Credentials%20in%20tufantunc%20ssh-mcp&amp;severity=medium&amp;id=69ee033387115cfb680257b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7037-os-command-injection-in-totolink-a80-052cff94</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7037%3A%20OS%20Command%20Injection%20in%20Totolink%20A8000RU&amp;severity=critical&amp;id=69edffdb87115cfb6800b221</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7036-path-traversal-in-tenda-i9-eba328f9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7036%3A%20Path%20Traversal%20in%20Tenda%20i9&amp;severity=medium&amp;id=69edf8a587115cfb68fcf281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7035-stack-based-buffer-overflow-in-tenda-d6d434e8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7035%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1202&amp;severity=high&amp;id=69edf54187115cfb68fad254</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7034-stack-based-buffer-overflow-in-tenda-6132cf1a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7034%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1202&amp;severity=high&amp;id=69edf54187115cfb68fad24d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7033-buffer-overflow-in-tenda-f456-2b3dae2e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7033%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69ee6bb668edb0b8f2495f3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7032-buffer-overflow-in-tenda-f456-0c01bedd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7032%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69ee6bb668edb0b8f2495f46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7031-buffer-overflow-in-tenda-f456-f28ef6c0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7031%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69ede38b87115cfb68ef539f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7030-buffer-overflow-in-tenda-f456-f9be112a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7030%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69ee6bb668edb0b8f2495f4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7029-buffer-overflow-in-tenda-f456-1c484f6f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7029%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69edd92187115cfb68e9d5d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7028-sql-injection-in-codeastro-online-jo-7d79de51</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7028%3A%20SQL%20Injection%20in%20CodeAstro%20Online%20Job%20Portal&amp;severity=medium&amp;id=69edd1f887115cfb68e48e3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7027-cross-site-scripting-in-d-link-dsl-2-f9973473</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7027%3A%20Cross%20Site%20Scripting%20in%20D-Link%20DSL-2740R&amp;severity=medium&amp;id=69edce7487115cfb68e0e8e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7026-cross-site-scripting-in-d-link-dgs-3-10e9ee49</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7026%3A%20Cross%20Site%20Scripting%20in%20D-Link%20DGS-3420&amp;severity=medium&amp;id=69edbd2687115cfb68d77b18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7025-server-side-request-forgery-in-typec-6c76a6c0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7025%3A%20Server-Side%20Request%20Forgery%20in%20Typecho&amp;severity=medium&amp;id=69edbd2687115cfb68d77b12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7024-path-traversal-in-rawchen-sims-65c58b88</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7024%3A%20Path%20Traversal%20in%20rawchen%20sims&amp;severity=medium&amp;id=69edb5dc87115cfb68d4ecb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7023-sql-injection-in-bytedance-coze-stud-3540e2ed</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7023%3A%20SQL%20Injection%20in%20ByteDance%20coze-studio&amp;severity=medium&amp;id=69edb5dc87115cfb68d4ecab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7022-improper-authentication-in-smythos-s-bad63838</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7022%3A%20Improper%20Authentication%20in%20SmythOS%20sre&amp;severity=medium&amp;id=69edab4b87115cfb68cf682d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7021-information-disclosure-in-smythos-sr-7a3264ff</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7021%3A%20Information%20Disclosure%20in%20SmythOS%20sre&amp;severity=medium&amp;id=69edab4b87115cfb68cf6827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7020-path-traversal-in-ollama-dfbf96db</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7020%3A%20Path%20Traversal%20in%20Ollama&amp;severity=medium&amp;id=69eda0e087115cfb68ca3f1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7019-buffer-overflow-in-tenda-f456-8fc2e156</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7019%3A%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69eda0e087115cfb68ca3f16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7018-use-of-hard-coded-cryptographic-key--acca4acd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7018%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Datavane%20Datavines&amp;severity=medium&amp;id=69ed8f2c87115cfb68a3f653</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7016-cross-site-scripting-in-maxsite-cms-896efbcb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7016%3A%20Cross%20Site%20Scripting%20in%20MaxSite%20CMS&amp;severity=medium&amp;id=69ed8f2c87115cfb68a3f64a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42255-cwe-684-incorrect-provision-of-spec-30347b11</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42255%3A%20CWE-684%20Incorrect%20Provision%20of%20Specified%20Functionality%20in%20Technitium%20DnsServer&amp;severity=high&amp;id=69ed8f2c87115cfb68a3f647</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7015-cross-site-scripting-in-maxsite-cms-49304643</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7015%3A%20Cross%20Site%20Scripting%20in%20MaxSite%20CMS&amp;severity=medium&amp;id=69ed7d9287115cfb68904a2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42254-cwe-706-use-of-incorrectly-resolved-3c76de85</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42254%3A%20CWE-706%20Use%20of%20Incorrectly-Resolved%20Name%20or%20Reference%20in%20Hickory%20Project%20Hickory%20DNS&amp;severity=medium&amp;id=69ed7d9287115cfb68904a19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7014-cross-site-scripting-in-maxsite-cms-221bc3cf</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7014%3A%20Cross%20Site%20Scripting%20in%20MaxSite%20CMS&amp;severity=medium&amp;id=69ed7d9287115cfb68904a25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7013-cross-site-scripting-in-maxsite-cms-01c1b586</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7013%3A%20Cross%20Site%20Scripting%20in%20MaxSite%20CMS&amp;severity=medium&amp;id=69ed7d9287115cfb68904a1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7012-cross-site-scripting-in-maxsite-cms-9c082817</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7012%3A%20Cross%20Site%20Scripting%20in%20MaxSite%20CMS&amp;severity=medium&amp;id=69ed6f8887115cfb687c46f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7011-cross-site-scripting-in-maxsite-cms-5250b75b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7011%3A%20Cross%20Site%20Scripting%20in%20MaxSite%20CMS&amp;severity=medium&amp;id=69ed68a087115cfb6872b091</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-27-bd6d318f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-27&amp;severity=medium&amp;id=69f04fe4cbff5d8610bdb174</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-26-e4006804</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-26&amp;severity=medium&amp;id=69eeaa81ba26a39fba9bce8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-26-c0c72cd5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-26&amp;severity=low&amp;id=69edd1f087115cfb68e465f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7002-sql-injection-in-klik-socialmediaweb-d1184727</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7002%3A%20SQL%20Injection%20in%20KLiK%20SocialMediaWebsite&amp;severity=medium&amp;id=69ed374887115cfb6846976d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7001-cross-site-scripting-in-datacom-dm41-31cb1d88</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7001%3A%20Cross%20Site%20Scripting%20in%20Datacom%20DM4100&amp;severity=medium&amp;id=69ed33c487115cfb68444c0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-7000-cross-site-scripting-in-datacom-dm41-8f3d0752</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-7000%3A%20Cross%20Site%20Scripting%20in%20Datacom%20DM4100&amp;severity=medium&amp;id=69ed306687115cfb6842b9a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6999-cross-site-scripting-in-bivocom-tr32-ba3ee97d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6999%3A%20Cross%20Site%20Scripting%20in%20BIVOCOM%20TR321&amp;severity=medium&amp;id=69ed2cbd87115cfb6840ee4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6998-cross-site-scripting-in-bdcom-p3310d-e7cffb2b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6998%3A%20Cross%20Site%20Scripting%20in%20BDCOM%20P3310D&amp;severity=medium&amp;id=69ed416587115cfb684e5d51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6997-cross-site-scripting-in-bdcom-p3310d-eda1bac3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6997%3A%20Cross%20Site%20Scripting%20in%20BDCOM%20P3310D&amp;severity=medium&amp;id=69ed416587115cfb684e5d5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6996-cross-site-scripting-in-bdcom-p3310d-a27e5bc3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6996%3A%20Cross%20Site%20Scripting%20in%20BDCOM%20P3310D&amp;severity=medium&amp;id=69ed1b2987115cfb6837500b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6995-cross-site-scripting-in-bdcom-p3310d-9755913c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6995%3A%20Cross%20Site%20Scripting%20in%20BDCOM%20P3310D&amp;severity=medium&amp;id=69ed17a487115cfb6834fba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6994-injection-in-envoy-9dad88c5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6994%3A%20Injection%20in%20Envoy&amp;severity=medium&amp;id=69ed146687115cfb6832f109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6993-unintended-intermediary-in-go-kratos-61465598</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6993%3A%20Unintended%20Intermediary%20in%20go-kratos%20kratos&amp;severity=medium&amp;id=69ed0d1987115cfb682ea5c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6992-os-command-injection-in-linksys-mr96-18ae6106</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6992%3A%20OS%20Command%20Injection%20in%20Linksys%20MR9600&amp;severity=high&amp;id=69ed065d87115cfb682a963d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6991-sql-injection-in-colinhacks-zod-78af498c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6991%3A%20SQL%20Injection%20in%20colinhacks%20Zod&amp;severity=medium&amp;id=69ed028c87115cfb682860ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6990-cross-site-scripting-in-projeto-siga-b9e930ee</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6990%3A%20Cross%20Site%20Scripting%20in%20projeto-siga%20siga&amp;severity=medium&amp;id=69ecfb8487115cfb6823da6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6989-command-injection-in-tenda-f453-466759f2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6989%3A%20Command%20Injection%20in%20Tenda%20F453&amp;severity=medium&amp;id=69ecf82f87115cfb6822369c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6988-buffer-overflow-in-tenda-hg10-324a24f1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6988%3A%20Buffer%20Overflow%20in%20Tenda%20HG10&amp;severity=high&amp;id=69ecf82f87115cfb68223695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6987-command-injection-in-picoclaw-3df152f6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6987%3A%20Command%20Injection%20in%20PicoClaw&amp;severity=medium&amp;id=69ecf47c87115cfb68206f11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6986-improper-verification-of-cryptograph-6083b074</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6986%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Cesanta%20Mongoose&amp;severity=medium&amp;id=69ecf11887115cfb681e8335</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6985-infinite-loop-in-cesanta-mongoose-b75a22e5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6985%3A%20Infinite%20Loop%20in%20Cesanta%20Mongoose&amp;severity=medium&amp;id=69ed416587115cfb684e5d6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6984-improper-neutralization-of-special-e-65960fde</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6984%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20AstrBotDevs%20AstrBot&amp;severity=medium&amp;id=69ece2e887115cfb68f279a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6983-server-side-request-forgery-in-pagek-ee0e4a4b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6983%3A%20Server-Side%20Request%20Forgery%20in%20pagekit&amp;severity=medium&amp;id=69ecdf6487115cfb68e623aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6982-sql-injection-in-star7th-showdoc-f8f8a2e0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6982%3A%20SQL%20Injection%20in%20star7th%20ShowDoc&amp;severity=medium&amp;id=69ecd4d987115cfb68ca117c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6981-server-side-request-forgery-in-ihate-0e7916d8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6981%3A%20Server-Side%20Request%20Forgery%20in%20IhateCreatingUserNames2%20AiraHub2&amp;severity=medium&amp;id=69ecd15487115cfb68bf7abf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/token-bingo-dont-let-your-code-be-the-winner-12ab2a46</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Token%20Bingo%3A%20Don&apos;t%20Let%20Your%20Code%20be%20the%20Winner&amp;severity=medium&amp;id=69ef1e8dba26a39fba0bf968</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6980-command-injection-in-divyanshu-hash--4c1bd623</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6980%3A%20Command%20Injection%20in%20Divyanshu-hash%20GitPilot-MCP&amp;severity=medium&amp;id=69ed416587115cfb684e5d7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6979-server-side-request-forgery-in-devli-2bf836ef</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6979%3A%20Server-Side%20Request%20Forgery%20in%20devlikeapro%20WAHA&amp;severity=medium&amp;id=69ecb1da87115cfb685f7fce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6978-sql-injection-in-jizhicms-70505da8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6978%3A%20SQL%20Injection%20in%20JiZhiCMS&amp;severity=medium&amp;id=69ecae2c87115cfb685e0990</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-apt-gopherwhisper-abuses-legitimate-s-b3d27373</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20APT%20GopherWhisper%20Abuses%20Legitimate%20Services%20in%20Government%20Attacks&amp;severity=medium&amp;id=69ec9c9787115cfb68578991</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6977-improper-authorization-in-vanna-ai-v-dc0ac5a4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6977%3A%20Improper%20Authorization%20in%20vanna-ai%20vanna&amp;severity=medium&amp;id=69ec991487115cfb6856948f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6951-remote-code-execution-rce-in-simple--178a7d4e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6951%3A%20Remote%20Code%20Execution%20(RCE)%20in%20simple-git&amp;severity=critical&amp;id=69ec52c387115cfb68273f89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/amos-stealer-delivered-via-cursor-ai-agent-session-1b6f01c8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AMOS%20Stealer%20delivered%20via%20Cursor%20AI%20agent%20session&amp;severity=medium&amp;id=69ef2218ba26a39fba0e588f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-npm-threat-landscape-attack-surface-and-mitiga-a64585bf</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20npm%20Threat%20Landscape%3A%20Attack%20Surface%20and%20Mitigations&amp;severity=medium&amp;id=69ef2218ba26a39fba0e5886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-26-db596018</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-26&amp;severity=medium&amp;id=69edd1f087115cfb68e46617</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-25-17859590</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-25&amp;severity=medium&amp;id=69ed56e387115cfb6859f41c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-25-b6055f05</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-25&amp;severity=low&amp;id=69ec250887115cfb68aa806f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42171-cwe-427-uncontrolled-search-path-el-8bd0ed64</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42171%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Nullsoft%20Nullsoft%20Scriptable%20Install%20System&amp;severity=high&amp;id=69ebe24487115cfb68759c48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41248-cwe-436-interpretation-conflict-in--1e1431c1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41248%3A%20CWE-436%3A%20Interpretation%20Conflict%20in%20clerk%20astro&amp;severity=critical&amp;id=69ebdedf87115cfb6874835e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41488-cwe-918-server-side-request-forgery-b7a78a3a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41488%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20langchain-ai%20langchain-openai&amp;severity=low&amp;id=69ebdedf87115cfb68748364</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41481-cwe-918-server-side-request-forgery-9716de86</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41481%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20langchain-ai%20langchain-text-splitters&amp;severity=medium&amp;id=69ebdedf87115cfb68748361</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41473-cwe-306-missing-authentication-for--b01631b9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41473%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20usmannasir%20cyberpanel&amp;severity=high&amp;id=69ebdb3b87115cfb687367da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41472-cwe-79-improper-neutralization-of-i-85294878</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41472%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20usmannasir%20cyberpanel&amp;severity=medium&amp;id=69ebdb3b87115cfb687367d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/eavesdropping-via-fiber-optic-cables-kaspersky-off-82f0270e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Eavesdropping%20via%20fiber-optic%20cables%20%7C%20Kaspersky%20official%20blog&amp;severity=low&amp;id=69ebd44b87115cfb68707b12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6968-cwe-22-improper-limitation-of-a-path-df28a2c9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6968%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20AWS%20tough&amp;severity=medium&amp;id=69ebcd2c87115cfb686cfc1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6967-cwe-345-insufficient-verification-of-e7059be6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6967%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20AWS%20tough&amp;severity=medium&amp;id=69ebcd2c87115cfb686cfc15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6966-cwe-347-improper-verification-of-cry-2b020c60</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6966%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20AWS%20tough&amp;severity=medium&amp;id=69ebcd2c87115cfb686cfc0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41433-cwe-22-improper-limitation-of-a-pat-9b11eb85</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41433%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20open-telemetry%20opentelemetry-ebpf-instrumentation&amp;severity=high&amp;id=69ebeffb87115cfb687b9d76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41429-cwe-121-stack-based-buffer-overflow-c334fe04</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41429%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20espressif%20arduino-esp32&amp;severity=high&amp;id=69ebeffb87115cfb687b9d71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41244-cwe-208-observable-timing-discrepan-9215300f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41244%3A%20CWE-208%3A%20Observable%20Timing%20Discrepancy%20in%20notamitgamer%20mojic&amp;severity=medium&amp;id=69ebd11387115cfb686f0be5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41894-cwe-22-improper-limitation-of-a-pat-eedfe9e4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41894%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=69ebc30587115cfb68680b13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41421-cwe-78-improper-neutralization-of-s-715daed2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41421%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=69ebc30587115cfb68680b10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41419-cwe-22-improper-limitation-of-a-pat-496faa47</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41419%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20RARgames%204gaBoards&amp;severity=high&amp;id=69ebc30587115cfb68680b0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41418-cwe-208-observable-timing-discrepan-a2526397</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41418%3A%20CWE-208%3A%20Observable%20Timing%20Discrepancy%20in%20RARgames%204gaBoards&amp;severity=medium&amp;id=69ebc30587115cfb68680b0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41416-cwe-190-integer-overflow-or-wraparo-6ad50ff9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41416%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20pjsip%20pjproject&amp;severity=high&amp;id=69ebbba787115cfb68655ccf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41415-cwe-125-out-of-bounds-read-in-pjsip-4b889a16</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41415%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20pjsip%20pjproject&amp;severity=medium&amp;id=69ebbba787115cfb68655ccb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41414-cwe-94-improper-control-of-generati-a3e6d80c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41414%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20skim-rs%20skim&amp;severity=high&amp;id=69ebbba787115cfb68655cc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41492-cwe-200-exposure-of-sensitive-infor-932f1edf</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41492%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20dgraph-io%20dgraph&amp;severity=critical&amp;id=69ebbba787115cfb68655cd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41327-cwe-943-improper-neutralization-of--8885efbe</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41327%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20dgraph-io%20dgraph&amp;severity=critical&amp;id=69ebbba787115cfb68655cc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41328-cwe-943-improper-neutralization-of--c8d19cb1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41328%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20dgraph-io%20dgraph&amp;severity=critical&amp;id=69ebb81d87115cfb68646f73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33666-cwe-190-integer-overflow-or-wraparo-9ce31bd3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33666%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20ndsev%20zserio&amp;severity=high&amp;id=69ebb81d87115cfb68646f70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33524-cwe-789-memory-allocation-with-exce-ead75c69</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33524%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20ndsev%20zserio&amp;severity=high&amp;id=69ebb81d87115cfb68646f6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33662-cwe-190-integer-overflow-or-wraparo-c408c7d4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33662%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20OP-TEE%20optee_os&amp;severity=high&amp;id=69ebb81d87115cfb68646f6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41907-cwe-823-use-of-out-of-range-pointer-92fb380a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41907%3A%20CWE-823%3A%20Use%20of%20Out-of-range%20Pointer%20Offset%20in%20uuidjs%20uuid&amp;severity=high&amp;id=69ebb81d87115cfb68646f76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41680-cwe-400-uncontrolled-resource-consu-1a65f320</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41680%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20markedjs%20marked&amp;severity=high&amp;id=69ebaa0487115cfb685ef42a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41140-cwe-22-improper-limitation-of-a-pat-097bbdaa</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41140%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20python-poetry%20poetry&amp;severity=low&amp;id=69ebaa0487115cfb685ef421</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41322-cwe-525-use-of-web-browser-cache-co-65157ecf</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41322%3A%20CWE-525%3A%20Use%20of%20Web%20Browser%20Cache%20Containing%20Sensitive%20Information%20in%20withastro%20astro&amp;severity=medium&amp;id=69ebaa0487115cfb685ef427</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41321-cwe-918-server-side-request-forgery-e695a4ab</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41321%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20withastro%20%40astrojs%2Fcloudflare&amp;severity=low&amp;id=69ebaa0487115cfb685ef424</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41067-cwe-79-improper-neutralization-of-i-40957d3d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41067%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20withastro%20astro&amp;severity=medium&amp;id=69eba2fd87115cfb68542cd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41079-cwe-125-out-of-bounds-read-in-openp-cad461df</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41079%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20OpenPrinting%20cups&amp;severity=medium&amp;id=69eba2fd87115cfb68542cd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40897-cwe-915-improperly-controlled-modif-3c19a5fe</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40897%3A%20CWE-915%3A%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes%20in%20josdejong%20mathjs&amp;severity=high&amp;id=69eba2fd87115cfb68542cd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6912-cwe-915-improperly-controlled-modifi-2e64f97e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6912%3A%20CWE-915%20Improperly%20controlled%20modification%20of%20Dynamically-Determined%20object%20attributes%20in%20AWS%20AWS%20Ops%20Wheel&amp;severity=high&amp;id=69eba2fd87115cfb68542cdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6911-cwe-347-improper-verification-of-cry-0f0da004</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6911%3A%20CWE-347%20Improper%20verification%20of%20cryptographic%20signature%20in%20AWS%20AWS%20Ops%20Wheel&amp;severity=critical&amp;id=69eb98a187115cfb684afa55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39920-cwe-1188-initialization-of-a-resour-596011eb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39920%3A%20CWE-1188%20Initialization%20of%20a%20Resource%20with%20an%20Insecure%20Default%20in%20BridgeHead%20Software%20FileStore&amp;severity=critical&amp;id=69eb916f87115cfb68470f08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pre-stuxnet-sabotage-malware-fast16-linked-to-us-i-5e800738</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pre-Stuxnet%20Sabotage%20Malware%20%E2%80%98Fast16%E2%80%99%20Linked%20to%20US-Iran%20Cyber%20Tensions&amp;severity=high&amp;id=69eb86db87115cfb6842d52e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-unauthorized-mythos-access-plankey-c-aa30b52f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20Unauthorized%20Mythos%20Access%2C%20Plankey%20CISA%20Nomination%20Ends%2C%20New%20Display%20Security%20Device&amp;severity=medium&amp;id=69eb7fd387115cfb683ff65e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31534-6808856e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31534&amp;severity=null&amp;id=69ec59f587115cfb6837f8ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25660-cwe-290-authentication-bypass-by-sp-881e021f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25660%3A%20CWE-290%20Authentication%20bypass%20by%20spoofing%20in%20Ericsson%20CodeChecker&amp;severity=critical&amp;id=69eb754a87115cfb6838d4fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21515-cwe-200-exposure-of-sensitive-infor-f9f6e427</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21515%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Azure%20IOT%20Central&amp;severity=critical&amp;id=69eb6ac987115cfb68343e68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38743-cwe-1220-insufficient-granularity-o-d949f440</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38743%3A%20CWE-1220%3A%20Insufficient%20Granularity%20of%20Access%20Control%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=medium&amp;id=69eb6ac987115cfb68343e6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40690-cwe-1220-insufficient-granularity-o-88635206</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40690%3A%20CWE-1220%3A%20Insufficient%20Granularity%20of%20Access%20Control%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=medium&amp;id=69eb6ac987115cfb68343e6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/why-cybersecurity-must-rethink-defense-in-the-age--01515f17</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Why%20Cybersecurity%20Must%20Rethink%20Defense%20in%20the%20Age%20of%20Autonomous%20Agents&amp;severity=medium&amp;id=69eb63b387115cfb68316c04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/locked-shields-2026-41-nations-strengthen-cyber-re-bcaeb7ac</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Locked%20Shields%202026%3A%2041%20Nations%20Strengthen%20Cyber%20Resilience%20in%20World%E2%80%99s%20Biggest%20Exercise&amp;severity=medium&amp;id=69eb63b387115cfb68316c07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5265-improper-handling-of-length-paramete-b91961df</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5265%3A%20Improper%20Handling%20of%20Length%20Parameter%20Inconsistency%20in%20Red%20Hat%20Fast%20Datapath%20for%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=medium&amp;id=69eb6ac987115cfb68343e73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5367-improper-handling-of-length-paramete-2c43198d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5367%3A%20Improper%20Handling%20of%20Length%20Parameter%20Inconsistency%20in%20Red%20Hat%20Fast%20Datapath%20for%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=high&amp;id=69eb6ac987115cfb68343e77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-federal-agencys-cisco-firewall-infected-with-fi-b03e6cae</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Federal%20Agency%E2%80%99s%20Cisco%20Firewall%20Infected%20With%20%E2%80%98Firestarter%E2%80%99%20Backdoor&amp;severity=medium&amp;id=69eb55a387115cfb6825d794</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trump-administration-vows-crackdown-on-chinese-com-126adcd3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trump%20Administration%20Vows%20Crackdown%20on%20Chinese%20Companies%20%E2%80%98Exploiting%E2%80%99%20AI%20Models%20Made%20in%20US&amp;severity=medium&amp;id=69eb527a87115cfb68248e56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4313-cwe-79-improper-neutralization-of-in-63c8a389</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4313%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20C%26F%20AdaptiveGRC&amp;severity=low&amp;id=69eb605587115cfb682faffe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6043-cwe-1188-initialization-of-a-resourc-0fa48590</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6043%3A%20CWE-1188%20Initialization%20of%20a%20resource%20with%20an%20insecure%20default%20in%20Perforce%20Helix%20Core%20Server%20(P4D)&amp;severity=high&amp;id=69eb592887115cfb682aba36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23902-cwe-863-incorrect-authorization-in--a9014525</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23902%3A%20CWE-863%20Incorrect%20Authorization%20in%20Apache%20Software%20Foundation%20Apache%20DolphinScheduler&amp;severity=high&amp;id=69eb592887115cfb682aba32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62233-cwe-502-deserialization-of-untruste-dd0afc45</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62233%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20DolphinScheduler&amp;severity=medium&amp;id=69eb4e9b87115cfb6822f45f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41044-cwe-20-improper-input-validation-in-da662a29</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41044%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20ActiveMQ&amp;severity=high&amp;id=69eb479387115cfb681fd011</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41043-cwe-79-improper-neutralization-of-i-c556bffc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41043%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20ActiveMQ&amp;severity=medium&amp;id=69eb479387115cfb681fd00e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40466-cwe-20-improper-input-validation-in-2c6e5a9d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40466%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20ActiveMQ%20Broker&amp;severity=high&amp;id=69eb479387115cfb681fd00b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vulnerabilities-patched-in-crowdstrike-tenable-pro-da7dee84</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vulnerabilities%20Patched%20in%20CrowdStrike%2C%20Tenable%20Products&amp;severity=critical&amp;id=69eb3d0787115cfb6815467d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6272-cwe-306-missing-authentication-for-c-708a5e19</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6272%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Eclipse%20Foundation%20Eclipse%20KUKSA%20-%20Databroker&amp;severity=high&amp;id=69eb2efb87115cfb68096495</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bitwarden-npm-package-hit-in-supply-chain-attack-bdf7147b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bitwarden%20NPM%20Package%20Hit%20in%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=69eb27ef87115cfb68036d3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21728-vulnerability-in-grafana-tempo-7584ca75</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21728%3A%20Vulnerability%20in%20Grafana%20Tempo&amp;severity=high&amp;id=69eb2efb87115cfb68096492</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3569-cwe-862-missing-authorization-in-lia-5a1588b2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3569%3A%20CWE-862%20Missing%20Authorization%20in%20liaison%20Liaison%20Site%20Prober&amp;severity=medium&amp;id=69eb246b87115cfb6801d63b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11762-cwe-862-missing-authorization-in-hu-81cd36ca</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11762%3A%20CWE-862%20Missing%20Authorization%20in%20hubspotdev%20HubSpot%20All-In-One%20Marketing%20%E2%80%93%20Forms%2C%20Popups%2C%20Live%20Chat&amp;severity=medium&amp;id=69eb246b87115cfb6801d636</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1951-cwe-121-stack-based-buffer-overflow--c6177746</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1951%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20DeltaWW%20AS320T&amp;severity=critical&amp;id=69eb0f5487115cfb68f533a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1952-cwe-912-hidden-functionality-in-delt-72d86c2b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1952%3A%20CWE-912%20Hidden%20Functionality%20in%20DeltaWW%20AS320T&amp;severity=critical&amp;id=69eb0f5487115cfb68f533a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1950-cwe-121-stack-based-buffer-overflow--901f4898</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1950%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20DeltaWW%20AS320T&amp;severity=critical&amp;id=69eb0f5487115cfb68f5339f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1949-cwe-131-incorrect-calculation-of-buf-624c285a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1949%3A%20CWE-131%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20DeltaWW%20AS320T&amp;severity=critical&amp;id=69eb095d87115cfb68f0d935</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5428-cwe-79-improper-neutralization-of-in-d9eb2fe2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5428%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wproyal%20Royal%20Addons%20for%20Elementor%20%E2%80%93%20Addons%20and%20Templates%20Kit%20for%20Elementor&amp;severity=medium&amp;id=69eb095d87115cfb68f0d94c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6810-cwe-639-authorization-bypass-through-2c779cfe</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6810%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20codepeople%20Booking%20Calendar%20Contact%20Form&amp;severity=medium&amp;id=69eb095d87115cfb68f0d954</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5347-cwe-862-missing-authorization-in-mhm-97b554ba</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5347%3A%20CWE-862%20Missing%20Authorization%20in%20mhmrajib%20WP%20Books%20Gallery%20%E2%80%93%20Build%20Stunning%20Book%20Showcases%20%26%20Libraries%20in%20Minutes&amp;severity=medium&amp;id=69eb095d87115cfb68f0d938</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5364-cwe-434-unrestricted-upload-of-file--d0fb4c0a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5364%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20addonsorg%20Drag%20and%20Drop%20File%20Upload%20for%20Contact%20Form%207&amp;severity=high&amp;id=69eb095d87115cfb68f0d940</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fast16-mystery-shadowbrokers-reference-reveals-hig-0de02932</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=fast16%20%7C%20Mystery%20ShadowBrokers%20Reference%20Reveals%20High-Precision%20Software%20Sabotage%205%20Years%20Before%20Stuxnet&amp;severity=medium&amp;id=69eb280887115cfb68038e62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-ai-frame-campaign-continues-bff99c05</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20AI%20Frame%20Campaign%20Continues&amp;severity=medium&amp;id=69eb280887115cfb68038e95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6947-cwe-307-improper-restriction-of-exce-ea9fc740</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6947%3A%20CWE-307%20Improper%20restriction%20of%20excessive%20authentication%20attempts%20in%20D-Link%20DWM-222W&amp;severity=high&amp;id=69eaec2d87115cfb68c0d956</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41324-cwe-400-uncontrolled-resource-consu-35173a6c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41324%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20patrickjuchli%20basic-ftp&amp;severity=high&amp;id=69eaec2d87115cfb68c0d93d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2028-cwe-639-authorization-bypass-through-e72d70be</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2028%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20ckp267%20MaxiBlocks%20Builder%20%7C%2017%2C000%2B%20Design%20Assets%2C%20Patterns%2C%20Icons%20%26%20Starter%20Sites&amp;severity=medium&amp;id=69eaec2d87115cfb68c0d92e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5488-cwe-862-missing-authorization-in-smu-08b9e390</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5488%3A%20CWE-862%20Missing%20Authorization%20in%20smub%20ExactMetrics%20%E2%80%93%20Google%20Analytics%20Dashboard%20for%20WordPress%20(Website%20Stats%20Plugin)&amp;severity=medium&amp;id=69eaec2d87115cfb68c0d944</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6393-cwe-862-missing-authorization-in-wpd-09590bba</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6393%3A%20CWE-862%20Missing%20Authorization%20in%20wpdevteam%20BetterDocs%20%E2%80%93%20%20Knowledge%20Base%20Docs%20%26%20FAQ%20Solution%20for%20Elementor%20%26%20Block%20Editor&amp;severity=medium&amp;id=69eaec2d87115cfb68c0d94e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41319-cwe-74-improper-neutralization-of-s-f3044b31</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41319%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20jstedfast%20MailKit&amp;severity=medium&amp;id=69eaec2d87115cfb68c0d93a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41318-cwe-79-improper-neutralization-of-i-62fa196f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41318%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mintplex-Labs%20anything-llm&amp;severity=medium&amp;id=69eaec2d87115cfb68c0d936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41430-cwe-79-improper-neutralization-of-i-7aeea481</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41430%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20frappe%20press&amp;severity=low&amp;id=69eaec2d87115cfb68c0d940</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41317-cwe-352-cross-site-request-forgery--c1bd36c1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41317%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20frappe%20press&amp;severity=medium&amp;id=69eada9887115cfb68a5e99f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41316-cwe-693-protection-mechanism-failur-2253af9c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41316%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20ruby%20erb&amp;severity=high&amp;id=69eada9887115cfb68a5e99c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33317-cwe-125-out-of-bounds-read-in-op-te-a8bc0973</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33317%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20OP-TEE%20optee_os&amp;severity=high&amp;id=69eada9887115cfb68a5e992</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33318-cwe-284-improper-access-control-in--33eb08a3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33318%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20actualbudget%20actual&amp;severity=high&amp;id=69eada9887115cfb68a5e998</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-friday-april-24th-2026-httpsiscs-cf677b51</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Friday%2C%20April%2024th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9906%2C%20(Fri%2C%20Apr%2024th)&amp;severity=medium&amp;id=69ead00c87115cfb689af5ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32952-cwe-190-integer-overflow-or-wraparo-7c7a42ad</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32952%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Azure%20go-ntlmssp&amp;severity=medium&amp;id=69eada9887115cfb68a5e98e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41325-cwe-863-incorrect-authorization-in--38c782c3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41325%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20getkirby%20kirby&amp;severity=high&amp;id=69eac1fc87115cfb688c86f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40099-cwe-863-incorrect-authorization-in--18080aa1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40099%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20getkirby%20kirby&amp;severity=medium&amp;id=69eac1fc87115cfb688c86f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34587-cwe-1336-improper-neutralization-of-edccacb4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34587%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20getkirby%20kirby&amp;severity=high&amp;id=69eac1fc87115cfb688c86ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32870-cwe-91-xml-injection-aka-blind-xpat-0712fce2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32870%3A%20CWE-91%3A%20XML%20Injection%20(aka%20Blind%20XPath%20Injection)%20in%20getkirby%20kirby&amp;severity=medium&amp;id=69eac1fc87115cfb688c86e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31956-cwe-639-authorization-bypass-throug-74ef1c37</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31956%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20xibosignage%20xibo-cms&amp;severity=medium&amp;id=69eac1fc87115cfb688c86e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31955-cwe-918-server-side-request-forgery-f97d366f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31955%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20xibosignage%20xibo-cms&amp;severity=medium&amp;id=69eac1fc87115cfb688c86e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31953-cwe-79-improper-neutralization-of-i-d742715a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31953%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xibosignage%20xibo-cms&amp;severity=medium&amp;id=69eac1fc87115cfb688c86dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25775-cwe-306-missing-authentication-for--773ccfcd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25775%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20SenseLive%20X3050&amp;severity=critical&amp;id=69eab7a187115cfb68850e09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31952-cwe-89-improper-neutralization-of-s-adcc797f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31952%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20xibosignage%20xibo-cms&amp;severity=high&amp;id=69eab7a187115cfb68850e1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35064-cwe-306-missing-authentication-for--7d4c0034</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35064%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20SenseLive%20X3050&amp;severity=high&amp;id=69eab7a187115cfb68850e26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40620-cwe-306-missing-authentication-for--0af2786c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40620%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20SenseLive%20X3050&amp;severity=critical&amp;id=69eab7a387115cfb68850ea8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27841-cwe-352-cross-site-request-forgery--72dc62e9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27841%3A%20CWE-352%20Cross-Site%20request%20forgery%20(CSRF)%20in%20SenseLive%20X3050&amp;severity=high&amp;id=69eab7a187115cfb68850e0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29051-cwe-22-improper-limitation-of-a-pat-31e1dbb6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29051%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20chainguard-dev%20melange&amp;severity=medium&amp;id=69eab7a187115cfb68850e1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-25-f8dd5b34</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-25&amp;severity=medium&amp;id=69ecb52c87115cfb68608f2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-24-2cf5fd4a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-24&amp;severity=medium&amp;id=69ec056387115cfb68817142</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67259-na-4149753f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67259%3A%20n%2Fa&amp;severity=medium&amp;id=69eb9c3d87115cfb684e032b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59308-na-dbc38f63</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59308%3A%20n%2Fa&amp;severity=medium&amp;id=69eb98a187115cfb684afa5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30368-na-de124fcd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30368%3A%20CWE-863%20Incorrect%20Authorization%20in%20Lightspeed%20Lightspeed%20Classroom&amp;severity=medium&amp;id=69eb916f87115cfb68470f04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31052-na-504835fe</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31052%3A%20n%2Fa&amp;severity=medium&amp;id=69eb86f087115cfb6842e45a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31051-na-ef98ba05</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31051%3A%20n%2Fa&amp;severity=low&amp;id=69eb86f087115cfb6842e452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31050-na-65163af5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31050%3A%20n%2Fa&amp;severity=medium&amp;id=69eb86f087115cfb6842e44a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61872-na-0f63272c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61872%3A%20n%2Fa&amp;severity=medium&amp;id=69eb86f087115cfb6842e446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-42095-cwe-306-missing-authentication-for--c3667dc3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-42095%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20KDE%20Arianna&amp;severity=medium&amp;id=69eb7c9b87115cfb683e60a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-24-9aa8fb12</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-24&amp;severity=low&amp;id=69eb0bc787115cfb68f2dff4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40623-cwe-862-missing-authorization-in-se-3624bc83</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40623%3A%20CWE-862%20Missing%20Authorization%20in%20SenseLive%20X3050&amp;severity=high&amp;id=69eab7a387115cfb68850ead</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29050-cwe-22-improper-limitation-of-a-pat-b3665099</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29050%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20chainguard-dev%20melange&amp;severity=medium&amp;id=69eab7a187115cfb68850e18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40431-cwe-319-cleartext-transmission-of-s-9862a146</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40431%3A%20CWE-319%20Cleartext%20transmission%20of%20sensitive%20information%20in%20SenseLive%20X3050&amp;severity=medium&amp;id=69eab7a187115cfb68850e35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27843-cwe-306-missing-authentication-for--e4fcb515</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27843%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20SenseLive%20X3050&amp;severity=critical&amp;id=69eab7a187115cfb68850e13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39462-cwe-522-insufficiently-protected-cr-cedf02e1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39462%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20SenseLive%20X3050&amp;severity=critical&amp;id=69eab7a187115cfb68850e30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35503-cwe-798-use-of-hard-coded-credentia-feae2abb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35503%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20SenseLive%20X3050&amp;severity=critical&amp;id=69eab7a187115cfb68850e2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25720-cwe-613-insufficient-session-expira-e2b83cfa</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25720%3A%20CWE-613%20Insufficient%20session%20expiration%20in%20SenseLive%20X3050&amp;severity=medium&amp;id=69eab07687115cfb687ad29d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40630-cwe-288-authentication-bypass-using-b2eedf7d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40630%3A%20CWE-288%20Authentication%20bypass%20using%20an%20alternate%20path%20or%20channel%20in%20SenseLive%20X3050&amp;severity=critical&amp;id=69eab07687115cfb687ad2a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1789-cwe-807-reliance-on-untrusted-inputs-39295111</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1789%3A%20CWE-807%3A%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20Canon%20Inc.%20imagePRESS%20Series&amp;severity=medium&amp;id=69eab07687115cfb687ad296</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6732-access-of-resource-using-incompatibl-db1e901f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6732%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69ea9ed487115cfb686fffd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2708-inconsistent-interpretation-of-http--7b266904</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2708%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=low&amp;id=69ea97db87115cfb68681ba7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32172-cwe-427-uncontrolled-search-path-el-088a79ce</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32172%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Microsoft%20Microsoft%20Power%20Apps&amp;severity=high&amp;id=69ea97db87115cfb68681bad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35431-cwe-918-server-side-request-forgery-ecd1dd29</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35431%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Microsoft%20Entra&amp;severity=critical&amp;id=69ea97db87115cfb68681bb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24303-cwe-284-improper-access-control-in--460583b0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24303%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20Partner%20Center&amp;severity=critical&amp;id=69ea97db87115cfb68681ba1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26150-cwe-918-server-side-request-forgery-affb6348</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26150%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Microsoft%20Purview%20eDiscovery&amp;severity=high&amp;id=69ea97db87115cfb68681ba4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33819-cwe-502-deserialization-of-untruste-a7ea77f6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33819%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20Bing&amp;severity=critical&amp;id=69ea97db87115cfb68681bb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33102-cwe-601-url-redirection-to-untruste-cf8cfee5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33102%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Microsoft%20Microsoft%20365%20Copilot&amp;severity=critical&amp;id=69ea97db87115cfb68681bb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32210-cwe-918-server-side-request-forgery-92bdf4e9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32210%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Microsoft%20Dynamics%20365%20(online)&amp;severity=critical&amp;id=69ea97db87115cfb68681bb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26210-cwe-502-deserialization-of-untruste-0013131b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26210%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20kvcache-ai%20ktransformers&amp;severity=critical&amp;id=69ea90c487115cfb6861c6b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41274-cwe-943-improper-neutralization-of--1fbbff2e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41274%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20FlowiseAI%20Flowise&amp;severity=critical&amp;id=69ea90c487115cfb6861c6b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28525-cwe-191-integer-underflow-wrap-or-w-1c86680c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28525%3A%20CWE-191%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20sbabic%20swupdate&amp;severity=high&amp;id=69ea8d5f87115cfb685fc9b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6942-improper-neutralization-of-special-e-6e1a54b9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6942%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20radareorg%20radare2&amp;severity=critical&amp;id=69ea8d5f87115cfb685fc9bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6941-cwe-59-improper-link-resolution-befo-54c7eb3f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6941%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20radareorg%20radare2&amp;severity=medium&amp;id=69ea89bd87115cfb685d0b14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6940-cwe-22-improper-limitation-of-a-path-fafc07b4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6940%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20radareorg%20radare2&amp;severity=medium&amp;id=69ea89bd87115cfb685d0b0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6376-cwe-306-missing-authentication-for-c-a38350f6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6376%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20SpiceJet%20Online%20Booking%20System&amp;severity=high&amp;id=69ea89bd87115cfb685d0b0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6375-cwe-639-authorization-bypass-through-bb68022b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6375%3A%20CWE-639%20Authorization%20bypass%20through%20User-Controlled%20key%20in%20SpiceJet%20Online%20Booking%20System&amp;severity=high&amp;id=69ea89bd87115cfb685d0b09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41264-cwe-184-incomplete-list-of-disallow-7f177023</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41264%3A%20CWE-184%3A%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20FlowiseAI%20Flowise&amp;severity=critical&amp;id=69ea9e7887115cfb686fc345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41265-cwe-77-improper-neutralization-of-s-19dd647d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41265%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20FlowiseAI%20Flowise&amp;severity=critical&amp;id=69ea89bd87115cfb685d0b1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41279-cwe-639-authorization-bypass-throug-34d1bb3b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41279%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69ea89bd87115cfb685d0b1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41278-cwe-200-exposure-of-sensitive-infor-bd64edda</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41278%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69ea9e7887115cfb686fc398</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41276-cwe-287-improper-authentication-in--13083407</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41276%3A%20CWE-287%3A%20Improper%20Authentication%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69ea9e7887115cfb686fc367</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41277-cwe-284-improper-access-control-in--9470e14c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41277%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69ea9e7887115cfb686fc38c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25874-cwe-502-deserialization-of-untruste-df0e19a1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25874%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Hugging%20Face%20LeRobot&amp;severity=critical&amp;id=69ea8d5f87115cfb685fc9c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41275-cwe-319-cleartext-transmission-of-s-3b8e81f3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41275%3A%20CWE-319%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69ea782a87115cfb6850f85d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41273-cwe-306-missing-authentication-for--ee0237e2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41273%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69ea782987115cfb6850f83a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/crypto-drainers-as-a-converging-threat-insights-in-b6f47dca</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Crypto%20Drainers%20as%20a%20Converging%20Threat%3A%20Insights%20into%20Emerging%20Hybrid%20Attack%20Ecosystems&amp;severity=medium&amp;id=69eb2ef987115cfb680962cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/snow-flurries-how-unc6692-employed-social-engineer-b41b1549</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Snow%20Flurries%3A%20How%20UNC6692%20Employed%20Social%20Engineering%20to%20Deploy%20a%20Custom%20Malware%20Suite&amp;severity=medium&amp;id=69eb327b87115cfb680bf745</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hold-the-phone-international-revenue-share-fraud-d-def3a767</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hold%20the%20Phone!%20International%20Revenue%20Share%20Fraud%20Driven%20by%20Fake%20CAPTCHAs&amp;severity=medium&amp;id=69eb2b7387115cfb6806c5fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41271-cwe-918-server-side-request-forgery-0022e04f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41271%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69ea782987115cfb6850f834</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41272-cwe-918-server-side-request-forgery-2890a669</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41272%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69ea782987115cfb6850f837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41270-cwe-284-improper-access-control-in--5c95242a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41270%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69ea782987115cfb6850f831</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41269-cwe-434-unrestricted-upload-of-file-420ecc51</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41269%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69ea782987115cfb6850f82d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41268-cwe-20-improper-input-validation-in-20ba4b4c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41268%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69ea782987115cfb6850f82a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41267-cwe-639-authorization-bypass-throug-48d20453</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41267%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69ea782987115cfb6850f827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41266-cwe-200-exposure-of-sensitive-infor-547a4968</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41266%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69ea782987115cfb6850f824</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41137-cwe-94-improper-control-of-generati-e79779d5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41137%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20FlowiseAI%20Flowise&amp;severity=critical&amp;id=69ea782987115cfb6850f81e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41138-cwe-94-improper-control-of-generati-6fce0c16</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41138%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69ea782987115cfb6850f821</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41205-cwe-22-improper-limitation-of-a-pat-754f5f32</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41205%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20sqlalchemy%20mako&amp;severity=high&amp;id=69ea89bd87115cfb685d0b19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41247-cwe-78-improper-neutralization-of-s-a542372d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41247%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Studio-42%20elFinder&amp;severity=high&amp;id=69ea9e7887115cfb686fc3aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41246-cwe-94-improper-control-of-generati-992ab429</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41246%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20projectcontour%20contour&amp;severity=high&amp;id=69ea9e7887115cfb686fc39e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41213-cwe-307-improper-restriction-of-exc-098ec1dc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41213%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20node-oauth%20node-oauth2-server&amp;severity=medium&amp;id=69ea6a1b87115cfb68455bee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41173-cwe-770-allocation-of-resources-wit-c7d0046f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41173%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20open-telemetry%20opentelemetry-dotnet-contrib&amp;severity=medium&amp;id=69ea6a1b87115cfb68455bea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6074-cwe-35-path-traversal-in-intrado-911-771091bc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6074%3A%20CWE-35%20Path%20traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Intrado%20911%20Emergency%20Gateway&amp;severity=critical&amp;id=69ea6a1b87115cfb68455bf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40886-cwe-129-improper-validation-of-arra-e4b6aa6a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40886%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20argoproj%20argo-workflows&amp;severity=high&amp;id=69ea6a1a87115cfb68455b90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33694-cwe-59-improper-link-resolution-bef-dff081f9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33694%3A%20CWE-59%20Improper%20link%20resolution%20before%20file%20access%20(&apos;link%20following&apos;)%20in%20Tenable%2C%20Inc.%20Tenable%20Nessus%2C%20Tenable%20Nessus%20Agent&amp;severity=high&amp;id=69ea6a1a87115cfb68455b8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41078-cwe-770-allocation-of-resources-wit-6ec21a19</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41078%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20open-telemetry%20opentelemetry-dotnet&amp;severity=medium&amp;id=69ea6a1b87115cfb68455be7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40894-cwe-789-memory-allocation-with-exce-72b1ace5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40894%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20open-telemetry%20opentelemetry-dotnet&amp;severity=medium&amp;id=69ea6a1a87115cfb68455b93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40891-cwe-789-memory-allocation-with-exce-ea6273cf</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40891%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20open-telemetry%20opentelemetry-dotnet&amp;severity=medium&amp;id=69ea5fae87115cfb683e85c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40182-cwe-789-memory-allocation-with-exce-ee3f9d35</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40182%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20open-telemetry%20opentelemetry-dotnet&amp;severity=medium&amp;id=69ea5fae87115cfb683e85c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6921-race-in-google-chrome-828e0fe2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6921%3A%20Race%20in%20Google%20Chrome&amp;severity=high&amp;id=69ea5c0887115cfb683ce452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6920-out-of-bounds-read-in-google-chrome-d0bf5523</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6920%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=critical&amp;id=69ea5c0887115cfb683ce44e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6919-use-after-free-in-google-chrome-07f5509c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6919%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=critical&amp;id=69ea9e7887115cfb686fc3bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5039-cwe-1394-use-of-default-cryptographi-93bf2c5f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5039%3A%20CWE-1394%20Use%20of%20default%20cryptographic%20key%20in%20TP-Link%20Systems%20Inc.%20TL-WL841N%20v13&amp;severity=medium&amp;id=69ea5fae87115cfb683e85cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/spam-and-phishing-targeting-taxpayers-kaspersky-of-21018b0d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Spam%20and%20phishing%20targeting%20taxpayers%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69ea437387115cfb682da704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cloudsmith-raises-72-million-in-series-c-funding-596b797b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cloudsmith%20Raises%20%2472%20Million%20in%20Series%20C%20Funding&amp;severity=medium&amp;id=69ea355c87115cfb682493de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40472-cwe-79-improper-neutralization-of-i-2ecaa282</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40472%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)&amp;severity=critical&amp;id=69ea9e7887115cfb686fc410</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40471-cwe-352-cross-site-request-forgery--4ca0bc45</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40471%3A%20CWE-352%20Cross-Site%20request%20forgery%20(CSRF)&amp;severity=critical&amp;id=69ea9e7887115cfb686fc40d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41240-cwe-183-permissive-list-of-allowed--b335c129</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41240%3A%20CWE-183%3A%20Permissive%20List%20of%20Allowed%20Inputs%20in%20cure53%20DOMPurify&amp;severity=medium&amp;id=69ea588387115cfb683b9248</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34003-out-of-bounds-read-in-red-hat-red-h-3a485ffc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34003%3A%20Out-of-bounds%20Read%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=69ea588387115cfb683b9244</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34001-expired-pointer-dereference-in-red--a6236a0e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34001%3A%20Expired%20Pointer%20Dereference%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=69ea9e7887115cfb686fc3ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33999-integer-underflow-wrap-or-wraparoun-ba2406e3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33999%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=69ea9e7887115cfb686fc422</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40470-cwe-79-improper-neutralization-of-i-7e7b9272</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40470%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)&amp;severity=critical&amp;id=69ea9e7887115cfb686fc40a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41239-cwe-79-improper-neutralization-of-i-e42b3ab6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41239%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cure53%20DOMPurify&amp;severity=medium&amp;id=69ea9e7b87115cfb686fc58b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23751-cwe-306-missing-authentication-for--a63016e1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23751%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Tungsten%20Automation%20Kofax%20Capture&amp;severity=critical&amp;id=69ea9e7887115cfb686fc41d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41238-cwe-79-improper-neutralization-of-i-2a57f974</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41238%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cure53%20DOMPurify&amp;severity=medium&amp;id=69ea9e7887115cfb686fc413</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62373-cwe-502-deserialization-of-untruste-cd5dc5f9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62373%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20pipecat-ai%20pipecat&amp;severity=critical&amp;id=69ea6a1b87115cfb68455bf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trigona-affiliates-deploy-custom-exfiltration-tool-38cb885a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trigona%20Affiliates%20Deploy%20Custom%20Exfiltration%20Tool%20to%20Streamline%20Data%20Theft&amp;severity=medium&amp;id=69eb327b87115cfb680bf4ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gopherwhisper-a-burrow-full-of-malware-baa9851f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GopherWhisper%3A%20A%20burrow%20full%20of%20malware&amp;severity=medium&amp;id=69eb327b87115cfb680bf510</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analyzing-a-full-clickfix-attack-chain-part-1-3673b1da</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analyzing%20a%20Full%20ClickFix%20Attack%20Chain%20-%20Part%201&amp;severity=medium&amp;id=69ea31d787115cfb68230e01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dindoor-backdoor-deno-runtime-abuse-and-20-active--23a45870</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DinDoor%20Backdoor%3A%20Deno%20Runtime%20Abuse%20and%2020%20Active%20C2%20Servers&amp;severity=medium&amp;id=69eb361f87115cfb680ef893</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35225-cwe-754-improper-check-for-unusual--e5706d3c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35225%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20CODESYS%20CODESYS%20EtherNetIP&amp;severity=high&amp;id=69ea9e7887115cfb686fc403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-cybersecurity-firms-ai-hacking-claims-draw-5a7b144a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Cybersecurity%20Firm%E2%80%99s%20AI%20Hacking%20Claims%20Draw%20Comparisons%20to%20Claude%20Mythos&amp;severity=medium&amp;id=69ea15b887115cfb681181fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66286-authorization-bypass-through-user-c-c82237e2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66286%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=medium&amp;id=69ea15c187115cfb68118427</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39440-cwe-94-improper-control-of-generati-fce0c635</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39440%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Funnelforms%20LLC%20FunnelFormsPro&amp;severity=critical&amp;id=69ea15c187115cfb6811842c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rilian-raises-175-million-for-ai-native-security-o-1c48bbcf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Rilian%20Raises%20%2417.5%20Million%20for%20AI-Native%20Security%20Orchestration&amp;severity=medium&amp;id=69ea07a887115cfb680b704e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-behavioral-shift-why-trusted-relationships-are-7a6e9a99</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Behavioral%20Shift%3A%20Why%20Trusted%20Relationships%20Are%20the%20Newest%20Attack%20Surface&amp;severity=low&amp;id=69ea011d87115cfb6807e86d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62110-cwe-79-improper-neutralization-of-i-59aa3e13</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62110%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rescue%20Themes%20Rescue%20Shortcodes&amp;severity=medium&amp;id=69ea016587115cfb68083e41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/luxury-cosmetics-giant-rituals-discloses-data-brea-b2ccbdf1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Luxury%20Cosmetics%20Giant%20Rituals%20Discloses%20Data%20Breach&amp;severity=medium&amp;id=69e9fd1c87115cfb68054a5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62104-cwe-862-missing-authorization-in-na-01158fea</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62104%3A%20CWE-862%20Missing%20Authorization%20in%20Navneil%20Naicker%20ACF%20Galerie%204&amp;severity=medium&amp;id=69ea016587115cfb68083e3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28040-cwe-79-improper-neutralization-of-i-691c7a4c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28040%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Magepeople%20inc.%20Taxi%20Booking%20Manager%20for%20WooCommerce&amp;severity=medium&amp;id=69ea016587115cfb68083e44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-patches-exploited-notification-flaw-thu-apr--f24425d5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Patches%20Exploited%20Notification%20Flaw%2C%20(Thu%2C%20Apr%2023rd)&amp;severity=medium&amp;id=69e9f30987115cfb68fefd05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-can-autonomously-hack-cloud-systems-with-minima-16006173</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20Can%20Autonomously%20Hack%20Cloud%20Systems%20With%20Minimal%20Oversight%3A%20Researchers&amp;severity=medium&amp;id=69e9f30487115cfb68fef74f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6903-cwe-22-improper-limitation-of-a-path-74e74900</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6903%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Zurich%20Instruments%20LabOne&amp;severity=high&amp;id=69e9eb8887115cfb68f9fc5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6887-cwe-89-improper-neutralization-of-sp-f0a62364</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6887%3A%20CWE-89%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20injection&apos;)%20in%20BorG%20Technology%20Corporation%20Borg%20SPM%202007&amp;severity=critical&amp;id=69e9eb8887115cfb68f9fc59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6886-cwe-1390-weak-authentication-in-borg-2caa495c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6886%3A%20CWE-1390%20Weak%20Authentication%20in%20BorG%20Technology%20Corporation%20Borg%20SPM%202007&amp;severity=critical&amp;id=69e9eb8887115cfb68f9fc55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6885-cwe-434-unrestricted-upload-of-file--bea8ee1a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6885%3A%20CWE-434%20Unrestricted%20upload%20of%20file%20with%20dangerous%20type%20in%20BorG%20Technology%20Corporation%20Borg%20SPM%202007&amp;severity=critical&amp;id=69e9eb8887115cfb68f9fc51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/foxit-impersonation-fake-pdf-installer-deploys-vnc-8622a185</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Foxit%20Impersonation%3A%20Fake%20PDF%20Installer%20Deploys%20VNC&amp;severity=medium&amp;id=69ea2aee87115cfb681ee463</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/indirect-prompt-injection-in-the-wild-10-ipi-paylo-b1d36285</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Indirect%20Prompt%20Injection%20in%20the%20Wild%3A%2010%20IPI%20Payloads%20Found&amp;severity=medium&amp;id=69ea2aee87115cfb681ee470</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-patches-ios-flaw-allowing-recovery-of-delete-fcb8e108</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Patches%20iOS%20Flaw%20Allowing%20Recovery%20of%20Deleted%20Chats&amp;severity=low&amp;id=69e9dd7a87115cfb68e747d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3960-cwe-94-improper-control-of-generatio-98800b0e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3960%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20in%20h2oai%20h2oai%2Fh2o-3&amp;severity=medium&amp;id=69e9eb8887115cfb68f9fc46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3259-cwe-209-generation-of-error-message--1455facc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3259%3A%20CWE-209%20Generation%20of%20error%20message%20containing%20sensitive%20information%20in%20Google%20Cloud%20BigQuery&amp;severity=high&amp;id=69e9eb8887115cfb68f9fc43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-campaign-deploying-adaptixc2-beacon-and--ce02325b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Campaign%20Deploying%20AdaptixC2%20Beacon%20and%20VS%20Code%20via%20Trojanized%20SumatraPDF&amp;severity=medium&amp;id=69e9e0fb87115cfb68ecdc9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5464-cwe-862-missing-authorization-in-smu-3d3ceddb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5464%3A%20CWE-862%20Missing%20Authorization%20in%20smub%20ExactMetrics%20%E2%80%93%20Google%20Analytics%20Dashboard%20for%20WordPress%20(Website%20Stats%20Plugin)&amp;severity=high&amp;id=69e9eb8887115cfb68f9fc4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishing-attack-via-adobe-themed-lure-delivering-s-6024f2b6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishing%20Attack%20via%20Adobe-Themed%20Lure%20Delivering%20ScreenConnect%20and%20Credential%20Harvesting%20Tools&amp;severity=medium&amp;id=69e9e0fb87115cfb68ecdc91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/recent-microsoft-defender-vulnerability-exploited--49a0cdc5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Recent%20Microsoft%20Defender%20Vulnerability%20Exploited%20as%20Zero-Day&amp;severity=low&amp;id=69e9d2ec87115cfb68d325e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41564-cwe-335-incorrect-usage-of-seeds-in-0949d2a5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41564%3A%20CWE-335%20Incorrect%20Usage%20of%20Seeds%20in%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20MIK%20CryptX&amp;severity=high&amp;id=69e9cfd487115cfb68ce4194</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41040-inefficient-regular-expression-comp-1476ba25</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41040%3A%20Inefficient%20regular%20expression%20complexity%20in%20GROWI%2C%20Inc.%20GROWI&amp;severity=high&amp;id=69e9c86d87115cfb68c533f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10549-cwe-427-uncontrolled-search-path-el-e8e67463</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10549%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20EfficientLab%2C%20LLC%20Controlio&amp;severity=medium&amp;id=69e9c86d87115cfb68c533f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34488-uncontrolled-search-path-element-in-9431a581</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34488%3A%20Uncontrolled%20Search%20Path%20Element%20in%20i-PRO%20Co.%2C%20Ltd.%20IP%20Setting%20Software&amp;severity=high&amp;id=69e9bdd387115cfb68b66bfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4512-cwe-79-cross-site-scripting-xss-in-r-bdf28973</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4512%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20reCaptcha%20by%20WebDesignBy&amp;severity=low&amp;id=69e9bdd387115cfb68b66c03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4106-cwe-200-information-exposure-in-ht-m-c5eea5ac</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4106%3A%20CWE-200%20Information%20Exposure%20in%20HT%20Mega%20Addons%20for%20Elementor&amp;severity=medium&amp;id=69e9bdd387115cfb68b66c00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41990-cwe-787-out-of-bounds-write-in-gnup-648d4b9a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41990%3A%20CWE-787%20Out-of-bounds%20Write%20in%20gnupg%20Libgcrypt&amp;severity=medium&amp;id=69e9a8be87115cfb68a60134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41989-cwe-787-out-of-bounds-write-in-gnup-9e7a9f02</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41989%3A%20CWE-787%20Out-of-bounds%20Write%20in%20gnupg%20Libgcrypt&amp;severity=medium&amp;id=69e9a8be87115cfb68a6012f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40529-improper-neutralization-of-special--f25db596</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40529%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20Injection&apos;)%20in%20KANATA%20Limited%20CMS%20ALAYA&amp;severity=medium&amp;id=69e9a8be87115cfb68a60128</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41988-cwe-670-always-incorrect-control-fl-19277837</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41988%3A%20CWE-670%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20uuidjs%20uuid&amp;severity=low&amp;id=69e9a8be87115cfb68a6012b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unmasking-dprk-cyber-threat-actors-fake-it-worker--485f6111</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unmasking%20DPRK%20Cyber%20Threat%20Actors%3A%20Fake%20IT%20Worker%20Infrastructure&amp;severity=medium&amp;id=69e9e0fb87115cfb68ecdc8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beyond-powershell-analyzing-the-multi-action-click-c8f4b2c0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Beyond%20PowerShell%3A%20Analyzing%20the%20Multi-Action%20ClickFix%20Variant&amp;severity=medium&amp;id=69e9e0fb87115cfb68ecdc87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3361-cwe-79-improper-neutralization-of-in-78924b0f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3361%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tijmensmit%20WP%20Store%20Locator&amp;severity=medium&amp;id=69e99ab387115cfb687fff99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3007-vulnerability-in-three-learning-kool-639937d6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3007%3A%20Vulnerability%20in%20Three%20Learning%20Koollab%20Learning%20Management%20System&amp;severity=medium&amp;id=69e99ab387115cfb687fff96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3844-cwe-434-unrestricted-upload-of-file--8e6074b3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3844%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20cloudways%20Breeze%20Cache&amp;severity=critical&amp;id=69e9891887115cfb6867f663</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2951-cwe-79-improper-neutralization-of-in-1a078f97</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2951%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gutentor%20Gutentor%20%E2%80%93%20Gutenberg%20Blocks%20%E2%80%93%20Page%20Builder%20for%20Gutenberg%20Editor&amp;severity=medium&amp;id=69e9891887115cfb6867f65f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-thursday-april-23rd-2026-httpsis-c187c921</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Thursday%2C%20April%2023rd%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9904%2C%20(Thu%2C%20Apr%2023rd)&amp;severity=medium&amp;id=69e97e8c87115cfb685dbae3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1923-cwe-79-improper-neutralization-of-in-5423a21a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1923%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20socialrocket%20Social%20Rocket%20%E2%80%93%20Social%20Sharing%20Plugin&amp;severity=medium&amp;id=69e97b6f87115cfb685bd761</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41211-cwe-22-improper-limitation-of-a-pat-88fc9487</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41211%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20voidzero-dev%20vite-plus&amp;severity=high&amp;id=69e9707c87115cfb68522147</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41679-cwe-287-improper-authentication-in--09e9d7e4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41679%3A%20CWE-287%3A%20Improper%20Authentication%20in%20paperclipai%20paperclip&amp;severity=critical&amp;id=69e9707c87115cfb6852214e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41208-cwe-78-improper-neutralization-of-s-850f967b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41208%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20paperclipai%20%40paperclipai%2Fserver&amp;severity=high&amp;id=69e9707c87115cfb68522144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41206-cwe-184-incomplete-list-of-disallow-d1a9d658</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41206%3A%20CWE-184%3A%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20ParzivalHack%20PySpector&amp;severity=medium&amp;id=69e9707c87115cfb6852213f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41200-cwe-79-improper-neutralization-of-i-9cafd22a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41200%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NUWCDIVNPT%20stig-manager&amp;severity=high&amp;id=69e9707c87115cfb6852213c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41197-cwe-131-incorrect-calculation-of-bu-282b810c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41197%3A%20CWE-131%3A%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20noir-lang%20noir&amp;severity=critical&amp;id=69e9707c87115cfb68522138</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41196-cwe-94-improper-control-of-generati-70ec6155</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41196%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20luanti-org%20luanti&amp;severity=critical&amp;id=69e9707c87115cfb68522134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41182-cwe-200-exposure-of-sensitive-infor-8e8ca26e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41182%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20langchain-ai%20langsmith-sdk&amp;severity=medium&amp;id=69e9707c87115cfb68522131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41180-cwe-22-improper-limitation-of-a-pat-1ff3f9c8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41180%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20psi-4ward%20psitransfer&amp;severity=high&amp;id=69e9707c87115cfb6852212c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41243-cwe-284-improper-access-control-in--17f3e53b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41243%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20siemvk%20OpenLearn&amp;severity=medium&amp;id=69e9707c87115cfb6852214a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32679-uncontrolled-search-path-element-in-3ff2da85</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32679%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Japan%20Media%20Systems%20Corporation%20Downloader5Installer.exe&amp;severity=high&amp;id=69ea9e7887115cfb686fc3cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40062-improper-limitation-of-a-pathname-t-d9e7ba4c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40062%3A%20Improper%20limitation%20of%20a%20pathname%20to%20a%20restricted%20directory%20(&apos;Path%20Traversal&apos;)%20in%20Ziosoft%2C%20Inc.%20Ziostation2&amp;severity=high&amp;id=69ea9e7887115cfb686fc407</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6878-sandbox-issue-in-bytedance-verl-81afb8d9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6878%3A%20Sandbox%20Issue%20in%20ByteDance%20verl&amp;severity=medium&amp;id=69ea193c87115cfb681377a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-24-3e3ffd10</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-24&amp;severity=medium&amp;id=69ec2f0987115cfb68b8523d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-23-632826cc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-23&amp;severity=medium&amp;id=69eab3e387115cfb687c711c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50229-na-b00595ae</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50229%3A%20n%2Fa&amp;severity=critical&amp;id=69ea9e7887115cfb686fc417</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70994-na-cca94a75</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70994%3A%20n%2Fa&amp;severity=high&amp;id=69ea9e7887115cfb686fc3c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39087-na-befb301f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39087%3A%20n%2Fa&amp;severity=critical&amp;id=69ea9e7887115cfb686fc3b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31173-na-2cc52968</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31173%3A%20n%2Fa&amp;severity=medium&amp;id=69ea6a1a87115cfb68455b89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31169-na-f962979a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31169%3A%20n%2Fa&amp;severity=medium&amp;id=69ea6a1a87115cfb68455b86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31168-na-9bef328b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31168%3A%20n%2Fa&amp;severity=medium&amp;id=69ea6a1a87115cfb68455b83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31167-na-058ab7be</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31167%3A%20n%2Fa&amp;severity=medium&amp;id=69ea6a1a87115cfb68455b80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31166-na-8c86bc42</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31166%3A%20n%2Fa&amp;severity=medium&amp;id=69ea6a1a87115cfb68455b7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31163-na-eaeeee31</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31163%3A%20n%2Fa&amp;severity=medium&amp;id=69ea6a1a87115cfb68455b7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31162-na-30f58b88</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31162%3A%20n%2Fa&amp;severity=medium&amp;id=69ea6a1a87115cfb68455b77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31179-na-1e3eff11</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31179%3A%20n%2Fa&amp;severity=medium&amp;id=69ea5fae87115cfb683e85cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31175-na-8558c681</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31175%3A%20n%2Fa&amp;severity=critical&amp;id=69ea5fae87115cfb683e85be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31174-na-61de1c87</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31174%3A%20n%2Fa&amp;severity=medium&amp;id=69ea5fae87115cfb683e85bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31172-na-7aa971f4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31172%3A%20n%2Fa&amp;severity=medium&amp;id=69ea5fae87115cfb683e85b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31171-na-eae63db6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31171%3A%20n%2Fa&amp;severity=medium&amp;id=69ea5fae87115cfb683e85b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31165-na-daa1c506</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31165%3A%20n%2Fa&amp;severity=medium&amp;id=69ea5c0887115cfb683ce44b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31164-na-6ccadb5d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31164%3A%20n%2Fa&amp;severity=medium&amp;id=69ea5c0887115cfb683ce448</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31160-na-e95be85a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31160%3A%20n%2Fa&amp;severity=medium&amp;id=69ea5c0887115cfb683ce445</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31181-na-e16bbcb2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31181%3A%20n%2Fa&amp;severity=critical&amp;id=69ea588387115cfb683b9241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31178-na-1cc71843</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31178%3A%20n%2Fa&amp;severity=critical&amp;id=69ea588387115cfb683b923e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31177-na-b0ff6662</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31177%3A%20n%2Fa&amp;severity=critical&amp;id=69ea588387115cfb683b923b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31176-na-d8307adf</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31176%3A%20n%2Fa&amp;severity=medium&amp;id=69ea588387115cfb683b9238</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31159-na-c6ec11f7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31159%3A%20n%2Fa&amp;severity=medium&amp;id=69ea588387115cfb683b9235</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-23-c3f3ed20</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-23&amp;severity=low&amp;id=69e9eb7f87115cfb68f9c85e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1726-cwe-269-improper-privilege-managemen-dff16851</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1726%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20IBM%20Guardium%20Key%20Lifecycle%20Manager&amp;severity=medium&amp;id=69e95f0887115cfb6814189c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36074-cwe-434-unrestricted-upload-of-file-ebdda370</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36074%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20IBM%20Security%20Verify%20Directory%20(Container)&amp;severity=medium&amp;id=69e95f0887115cfb68141890</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5926-vulnerability-in-ibm-verify-identity-b2fee278</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5926%3A%20Vulnerability%20in%20IBM%20Verify%20Identity%20Access%20Container&amp;severity=medium&amp;id=69e95f0887115cfb681418a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1352-cwe-1284-improper-validation-of-spec-bff0e4b0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1352%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20IBM%20Db2&amp;severity=medium&amp;id=69e95f0887115cfb68141899</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1272-cwe-613-insufficient-session-expirat-ef765271</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1272%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20IBM%20Guardium%20Data%20Protection&amp;severity=low&amp;id=69e95f0887115cfb68141893</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1274-cwe-840-business-logic-errors-in-ibm-001fd6e5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1274%3A%20CWE-840%20Business%20Logic%20Errors%20in%20IBM%20Guardium%20Data%20Protection&amp;severity=medium&amp;id=69e95f0887115cfb68141896</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6874-reliance-on-reverse-dns-resolution-i-b780d4cc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6874%3A%20Reliance%20on%20Reverse%20DNS%20Resolution%20in%20ericc-ch%20copilot-api&amp;severity=medium&amp;id=69e95f0987115cfb681418a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5935-cwe-78-improper-neutralization-of-sp-2a79deef</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5935%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20IBM%20Total%20Storage%20Service%20Console%20(TSSC)%20%2F%20TS4500%20IMC&amp;severity=high&amp;id=69e95f0987115cfb681418a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4917-cwe-22-improper-limitation-of-a-path-4277155a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4917%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20IBM%20Guardium%20Data%20Protection&amp;severity=medium&amp;id=69e95f0887115cfb6814189f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4918-cwe-79-improper-neutralization-of-in-5d4bd3b4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4918%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Guardium%20Data%20Protection&amp;severity=medium&amp;id=69e95b6487115cfb68ea1883</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4919-cwe-79-improper-neutralization-of-in-cb0da51f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4919%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Guardium%20Data%20Protection&amp;severity=medium&amp;id=69e95b6487115cfb68ea1886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3621-cwe-269-improper-privilege-managemen-c403a841</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3621%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20IBM%20WebSphere%20Application%20Server%20-%20Liberty&amp;severity=high&amp;id=69e95b6487115cfb68ea1880</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-artifacts-found-in-official-kics-docker--8683cb6b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Artifacts%20Found%20in%20Official%20KICS%20Docker%20Repository%20and%20Code%20Extensions&amp;severity=medium&amp;id=69e9e0fb87115cfb68ecdc71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30406-critical-gladinet-centrestack-triofox-vulnerability-exploited-in-the-wild-16aa45</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Untangling%20a%20Linux%20Incident%20With%20an%20OpenAI%20Twist%20(Part%202)&amp;severity=medium&amp;id=682c992c7960f6956616aa45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40517-cwe-78-improper-neutralization-of-s-e9c54683</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40517%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20radareorg%20radare2&amp;severity=high&amp;id=69e9490f19fe3cd2cdf886c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41175-cwe-470-use-of-externally-controlle-757022e7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41175%3A%20CWE-470%3A%20Use%20of%20Externally-Controlled%20Input%20to%20Select%20Classes%20or%20Code%20(&apos;Unsafe%20Reflection&apos;)%20in%20statamic%20cms&amp;severity=high&amp;id=69e9419f19fe3cd2cdf48808</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41314-cwe-789-memory-allocation-with-exce-dd9018a1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41314%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=69e93e1919fe3cd2cdf2afe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41313-cwe-834-excessive-iteration-in-py-p-6924f313</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41313%3A%20CWE-834%3A%20Excessive%20Iteration%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=69e93e1919fe3cd2cdf2afdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41312-cwe-789-memory-allocation-with-exce-2df18452</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41312%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=69e93e1919fe3cd2cdf2afd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41168-cwe-834-excessive-iteration-in-py-p-7c5b58c3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41168%3A%20CWE-834%3A%20Excessive%20Iteration%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=69e9371d19fe3cd2cdefb1f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41167-cwe-89-improper-neutralization-of-s-51b08aed</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41167%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20CyferShepard%20Jellystat&amp;severity=critical&amp;id=69e9371d19fe3cd2cdefb1ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41134-cwe-94-improper-control-of-generati-e0092852</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41134%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20microsoft%20kiota&amp;severity=high&amp;id=69e9338e19fe3cd2cdedf9a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34068-cwe-347-improper-verification-of-cr-faf5604c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34068%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20nimiq%20nimiq-transaction&amp;severity=medium&amp;id=69e92c8e19fe3cd2cdeac9a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34067-cwe-617-reachable-assertion-in-nimi-d41d9655</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34067%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20nimiq%20nimiq-transaction&amp;severity=low&amp;id=69e92c8e19fe3cd2cdeac9a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34066-cwe-20-improper-input-validation-in-1a32bdac</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34066%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20nimiq%20nimiq-blockchain&amp;severity=medium&amp;id=69e9290319fe3cd2cde955ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34065-cwe-252-unchecked-return-value-in-n-b2c2f3d6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34065%3A%20CWE-252%3A%20Unchecked%20Return%20Value%20in%20nimiq%20nimiq-primitives&amp;severity=high&amp;id=69e9290319fe3cd2cde955a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34064-cwe-191-integer-underflow-wrap-or-w-a4237264</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34064%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20nimiq%20nimiq-account&amp;severity=medium&amp;id=69e9290319fe3cd2cde9559f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34063-cwe-617-reachable-assertion-in-nimi-bc442c35</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34063%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20nimiq%20network-libp2p&amp;severity=high&amp;id=69e9290319fe3cd2cde95599</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6019-cwe-150-improper-neutralization-of-e-602e438c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6019%3A%20CWE-150%20Improper%20neutralization%20of%20escape%2C%20meta%2C%20or%20control%20sequences%20in%20Python%20Software%20Foundation%20CPython&amp;severity=low&amp;id=69e9290319fe3cd2cde955b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34062-cwe-770-allocation-of-resources-wit-1356ecd8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34062%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20nimiq%20network-libp2p&amp;severity=medium&amp;id=69e9290319fe3cd2cde95594</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33471-cwe-20-improper-input-validation-in-2bd8708b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33471%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20nimiq%20nimiq-block&amp;severity=critical&amp;id=69e921fb19fe3cd2cde59f65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34413-cwe-497-exposure-of-sensitive-syste-4b21189a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34413%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20thexerteproject%20xerteonlinetoolkits&amp;severity=high&amp;id=69e91af419fe3cd2cde2a8ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34415-cwe-184-incomplete-list-of-disallow-f774ae94</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34415%3A%20CWE-184%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20thexerteproject%20xerteonlinetoolkits&amp;severity=critical&amp;id=69e91af419fe3cd2cde2a8be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34414-cwe-22-improper-limitation-of-a-pat-0a7e813a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34414%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20thexerteproject%20xerteonlinetoolkits&amp;severity=high&amp;id=69e91af419fe3cd2cde2a8b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41459-cwe-497-exposure-of-sensitive-syste-2d4a5aa9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41459%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20thexerteproject%20xerteonlinetoolkits&amp;severity=medium&amp;id=69e91af419fe3cd2cde2a8c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28950-notifications-marked-for-deletion-c-2c06203a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28950%3A%20Notifications%20marked%20for%20deletion%20could%20be%20unexpectedly%20retained%20on%20the%20device%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69e913ed19fe3cd2cddf58dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26354-cwe-121-stack-based-buffer-overflow-0d554218</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26354%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=high&amp;id=69e913ed19fe3cd2cddf58d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41468-cwe-1104-use-of-unmaintained-third--1563ff90</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41468%3A%20CWE-1104%20Use%20of%20Unmaintained%20Third-Party%20Components%20in%20Beghelli%20SicuroWeb%20(Sicuro24)&amp;severity=critical&amp;id=69e913ed19fe3cd2cddf58e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41469-cwe-693-protection-mechanism-failur-ac18e619</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41469%3A%20CWE-693%20Protection%20Mechanism%20Failure%20in%20Beghelli%20SicuroWeb%20(Sicuro24)&amp;severity=medium&amp;id=69e913ed19fe3cd2cddf58e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/npm-packages-hit-with-teampcp-style-canisterworm-m-7d4ed757</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=npm%20Packages%20Hit%20with%20TeamPCP-Style%20CanisterWorm%20Malware&amp;severity=medium&amp;id=69e9e47e87115cfb68f3d15a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/targeting-developers-real-world-cases-tactics-and--0de05a7b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Targeting%20developers%3A%20real-world%20cases%2C%20tactics%2C%20and%20defense%20strategies%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69e8f46c19fe3cd2cdced25c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35381-cwe-684-incorrect-provision-of-spec-02f007c5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35381%3A%20CWE-684%3A%20Incorrect%20Provision%20of%20Specified%20Functionality%20in%20Uutils%20coreutils&amp;severity=low&amp;id=69e8f7d719fe3cd2cdd02535</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35380-cwe-20-improper-input-validation-in-0c5404b6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35380%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d719fe3cd2cdd02531</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35379-cwe-684-incorrect-provision-of-spec-ae05b54f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35379%3A%20CWE-684%3A%20Incorrect%20Provision%20of%20Specified%20Functionality%20in%20Uutils%20coreutils&amp;severity=low&amp;id=69e8f7d719fe3cd2cdd0252d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35378-cwe-768-incorrect-short-circuit-eva-51d9a39d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35378%3A%20CWE-768%3A%20Incorrect%20Short%20Circuit%20Evaluation%20in%20Uutils%20coreutils&amp;severity=low&amp;id=69e8f7d719fe3cd2cdd02529</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35377-cwe-20-improper-input-validation-in-94960f0c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35377%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Uutils%20coreutils&amp;severity=low&amp;id=69e8f7d519fe3cd2cdd00d9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35376-cwe-367-time-of-check-time-of-use-t-2aa7d04d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35376%3A%20CWE-367%3A%20Time-of-Check%20Time-of-Use%20(TOCTOU)%20Race%20Condition%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d519fe3cd2cdd00d98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35375-cwe-176-improper-handling-of-unicod-af2daa2a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35375%3A%20CWE-176%3A%20Improper%20Handling%20of%20Unicode%20Encoding%20in%20Uutils%20coreutils&amp;severity=low&amp;id=69e8f7d519fe3cd2cdd00d94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35374-cwe-367-time-of-check-time-of-use-t-3ad00346</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35374%3A%20CWE-367%3A%20Time-of-Check%20Time-of-Use%20(TOCTOU)%20Race%20Condition%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d519fe3cd2cdd00d91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35373-cwe-176-improper-handling-of-unicod-47ec4bf4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35373%3A%20CWE-176%3A%20Improper%20Handling%20of%20Unicode%20Encoding%20in%20Uutils%20coreutils&amp;severity=low&amp;id=69e8f7d519fe3cd2cdd00d8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35372-cwe-61-unix-symbolic-link-symlink-f-6b0f898e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35372%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d519fe3cd2cdd00d8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35371-cwe-451-user-interface-ui-misrepres-c8dbd129</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35371%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Uutils%20coreutils&amp;severity=low&amp;id=69e8f7d519fe3cd2cdd00d87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35370-cwe-863-incorrect-authorization-in--17f882aa</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35370%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d519fe3cd2cdd00d84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35369-cwe-20-improper-input-validation-in-f4e500ea</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35369%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d519fe3cd2cdd00d80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35368-cwe-426-untrusted-search-path-in-uu-fc8d78ad</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35368%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20Uutils%20coreutils&amp;severity=high&amp;id=69e8f7d519fe3cd2cdd00d7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35367-cwe-732-incorrect-permission-assign-5bf25456</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35367%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Uutils%20coreutils&amp;severity=low&amp;id=69e8f7d319fe3cd2cdd00d10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35366-cwe-754-improper-check-for-unusual--f944d272</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35366%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d319fe3cd2cdd00d0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35365-cwe-59-improper-link-resolution-bef-3ccb2f69</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35365%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d319fe3cd2cdd00d07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35364-cwe-367-time-of-check-time-of-use-t-a7877f35</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35364%3A%20CWE-367%3A%20Time-of-Check%20Time-of-Use%20(TOCTOU)%20Race%20Condition%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d319fe3cd2cdd00d04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35363-cwe-22-improper-limitation-of-a-pat-f3d92ffe</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35363%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d319fe3cd2cdd00d01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35362-cwe-367-time-of-check-time-of-use-t-8d6557dc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35362%3A%20CWE-367%3A%20Time-of-Check%20Time-of-Use%20(TOCTOU)%20Race%20Condition%20in%20Uutils%20coreutils&amp;severity=low&amp;id=69e8f7d319fe3cd2cdd00cfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35361-cwe-281-improper-preservation-of-pe-f6d833a4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35361%3A%20CWE-281%3A%20Improper%20Preservation%20of%20Permissions%20in%20Uutils%20coreutils&amp;severity=low&amp;id=69e8f7d319fe3cd2cdd00cf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35360-cwe-367-time-of-check-time-of-use-t-347ec03e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35360%3A%20CWE-367%3A%20Time-of-Check%20Time-of-Use%20(TOCTOU)%20Race%20Condition%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d319fe3cd2cdd00cf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35359-cwe-367-time-of-check-time-of-use-t-f2d68315</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35359%3A%20CWE-367%3A%20Time-of-Check%20Time-of-Use%20(TOCTOU)%20Race%20Condition%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d319fe3cd2cdd00cf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35358-cwe-706-use-of-incorrectly-resolved-806512e0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35358%3A%20CWE-706%3A%20Use%20of%20Incorrectly-Resolved%20Name%20or%20Reference%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d319fe3cd2cdd00ced</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35357-cwe-367-time-of-check-time-of-use-t-8a74a812</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35357%3A%20CWE-367%3A%20Time-of-Check%20Time-of-Use%20(TOCTOU)%20Race%20Condition%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d019fe3cd2cdd00c82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35356-cwe-367-time-of-check-time-of-use-t-161d31ee</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35356%3A%20CWE-367%3A%20Time-of-Check%20Time-of-Use%20(TOCTOU)%20Race%20Condition%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d019fe3cd2cdd00c7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35355-cwe-367-time-of-check-time-of-use-t-f30b6900</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35355%3A%20CWE-367%3A%20Time-of-Check%20Time-of-Use%20(TOCTOU)%20Race%20Condition%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d019fe3cd2cdd00c7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35354-cwe-367-time-of-check-time-of-use-t-41b623b0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35354%3A%20CWE-367%3A%20Time-of-Check%20Time-of-Use%20(TOCTOU)%20Race%20Condition%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d019fe3cd2cdd00c77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35353-cwe-367-time-of-check-time-of-use-t-ee198c91</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35353%3A%20CWE-367%3A%20Time-of-Check%20Time-of-Use%20(TOCTOU)%20Race%20Condition%20in%20Uutils%20coreutils&amp;severity=low&amp;id=69e8f7d019fe3cd2cdd00c73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35352-cwe-367-time-of-check-time-of-use-t-47bf3c3f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35352%3A%20CWE-367%3A%20Time-of-Check%20Time-of-Use%20(TOCTOU)%20Race%20Condition%20in%20Uutils%20coreutils&amp;severity=high&amp;id=69e8f7d019fe3cd2cdd00c70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35351-cwe-281-improper-preservation-of-pe-0431ef0b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35351%3A%20CWE-281%3A%20Improper%20Preservation%20of%20Permissions%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d019fe3cd2cdd00c6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35350-cwe-281-improper-preservation-of-pe-ee6908b5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35350%3A%20CWE-281%3A%20Improper%20Preservation%20of%20Permissions%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d019fe3cd2cdd00c6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35349-cwe-59-improper-link-resolution-bef-2dbf7ea9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35349%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d019fe3cd2cdd00c66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35348-cwe-248-uncaught-exception-in-uutil-d7ee53a7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35348%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7d019fe3cd2cdd00c63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35347-cwe-20-improper-input-validation-in-49c9e047</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35347%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7ce19fe3cd2cdd00c1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35346-cwe-176-improper-handling-of-unicod-6258c245</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35346%3A%20CWE-176%3A%20Improper%20Handling%20of%20Unicode%20Encoding%20in%20Uutils%20coreutils&amp;severity=low&amp;id=69e8f7ce19fe3cd2cdd00c1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35345-cwe-367-time-of-check-time-of-use-t-cfd4056b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35345%3A%20CWE-367%3A%20Time-of-Check%20Time-of-Use%20(TOCTOU)%20Race%20Condition%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7ce19fe3cd2cdd00c17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35344-cwe-252-unchecked-return-value-in-u-04cf1750</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35344%3A%20CWE-252%3A%20Unchecked%20Return%20Value%20in%20Uutils%20coreutils&amp;severity=low&amp;id=69e8f7ce19fe3cd2cdd00c14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35343-cwe-670-always-incorrect-control-fl-12e9acb5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35343%3A%20CWE-670%3A%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20Uutils%20coreutils&amp;severity=low&amp;id=69e8f7ce19fe3cd2cdd00c10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35342-cwe-377-insecure-temporary-file-in--873d258b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35342%3A%20CWE-377%3A%20Insecure%20Temporary%20File%20in%20Uutils%20coreutils&amp;severity=low&amp;id=69e8f7ce19fe3cd2cdd00c0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35341-cwe-732-incorrect-permission-assign-f0bd459e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35341%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Uutils%20coreutils&amp;severity=high&amp;id=69e8f7ce19fe3cd2cdd00c09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35340-cwe-253-incorrect-check-of-function-640b29cb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35340%3A%20CWE-253%3A%20Incorrect%20Check%20of%20Function%20Return%20Value%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7ce19fe3cd2cdd00c05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35339-cwe-253-incorrect-check-of-function-dd2f7a2e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35339%3A%20CWE-253%3A%20Incorrect%20Check%20of%20Function%20Return%20Value%20in%20Uutils%20coreutils&amp;severity=medium&amp;id=69e8f7ce19fe3cd2cdd00c01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35338-cwe-22-improper-limitation-of-a-pat-0f5ba1fa</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35338%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Uutils%20coreutils&amp;severity=high&amp;id=69e8f7ce19fe3cd2cdd00bfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58922-cwe-352-cross-site-request-forgery--9fb81152</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58922%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ThemeFusion%20Avada&amp;severity=medium&amp;id=69e8f0d819fe3cd2cdcd58b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58344-improper-neutralization-of-input-du-c6bafb31</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58344%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%2094Cb%20Carbon%20Forum&amp;severity=medium&amp;id=69e8e9bb19fe3cd2cdc88f79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/after-bluesky-mastodon-targeted-in-ddos-attack-756f23ef</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=After%20Bluesky%2C%20Mastodon%20Targeted%20in%20DDoS%20Attack&amp;severity=medium&amp;id=69e8dbaa19fe3cd2cdbeb7eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33611-integer-overflow-or-wraparound-in-p-3870a7e8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33611%3A%20Integer%20Overflow%20or%20Wraparound%20in%20PowerDNS%20Authoritative&amp;severity=medium&amp;id=69e8d83619fe3cd2cdbdacaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33610-uncontrolled-resource-consumption-i-013089b1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33610%3A%20Uncontrolled%20Resource%20Consumption%20in%20PowerDNS%20Authoritative&amp;severity=medium&amp;id=69e8d83619fe3cd2cdbdaca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33609-improper-neutralization-of-special--ba687410</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33609%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20LDAP%20Query%20(&apos;LDAP%20Injection&apos;)%20in%20PowerDNS%20Authoritative&amp;severity=medium&amp;id=69e8d83619fe3cd2cdbdaca4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33608-improper-control-of-generation-of-c-947cf7dc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33608%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20PowerDNS%20Authoritative&amp;severity=high&amp;id=69e8d83619fe3cd2cdbdaca1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33593-divide-by-zero-in-powerdns-dnsdist-524fafa6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33593%3A%20Divide%20By%20Zero%20in%20PowerDNS%20DNSdist&amp;severity=high&amp;id=69e8d83319fe3cd2cdbdac07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33594-allocation-of-resources-without-lim-bbf529a2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33594%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20PowerDNS%20DNSdist&amp;severity=medium&amp;id=69e8d83319fe3cd2cdbdac0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33595-allocation-of-resources-without-lim-e15366a7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33595%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20PowerDNS%20DNSdist&amp;severity=medium&amp;id=69e8d83319fe3cd2cdbdac0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33597-improper-encoding-or-escaping-of-ou-1e7009fb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33597%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20PowerDNS%20DNSdist&amp;severity=low&amp;id=69e8d83319fe3cd2cdbdac13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33596-integer-overflow-or-wraparound-in-p-f4d21ff1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33596%3A%20Integer%20Overflow%20or%20Wraparound%20in%20PowerDNS%20DNSdist&amp;severity=low&amp;id=69e8d83319fe3cd2cdbdac10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33598-out-of-bounds-read-in-powerdns-dnsd-c09eb9ab</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33598%3A%20Out-of-bounds%20Read%20in%20PowerDNS%20DNSdist&amp;severity=medium&amp;id=69e8d83319fe3cd2cdbdac16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33599-out-of-bounds-read-in-powerdns-dnsd-684d3aa2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33599%3A%20Out-of-bounds%20Read%20in%20PowerDNS%20DNSdist&amp;severity=low&amp;id=69e8d83319fe3cd2cdbdac19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6862-uncontrolled-recursion-in-red-hat-re-8491e1ef</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6862%3A%20Uncontrolled%20Recursion%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69e8d83619fe3cd2cdbdacb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33602-heap-based-buffer-overflow-in-power-8ad725f1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33602%3A%20Heap-based%20Buffer%20Overflow%20in%20PowerDNS%20DNSdist&amp;severity=medium&amp;id=69e8d83319fe3cd2cdbdac1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33254-allocation-of-resources-without-lim-e90b103c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33254%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20PowerDNS%20DNSdist&amp;severity=medium&amp;id=69e8d83319fe3cd2cdbdac04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6861-off-by-one-error-in-red-hat-red-hat--7a4da0f5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6861%3A%20Off-by-one%20Error%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69e8d83619fe3cd2cdbdacad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6859-inclusion-of-functionality-from-untr-6b02868a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6859%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%20AI%20(RHEL%20AI)%203&amp;severity=high&amp;id=69e8d12119fe3cd2cdb88e3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0539-cwe-276-incorrect-default-permission-bf1a7aff</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0539%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20pcvisit%20pcvisit%20Remote%20Host%20Modul&amp;severity=high&amp;id=69e8d12119fe3cd2cdb88e39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/most-serious-cyberattacks-against-the-uk-now-from--1571ea56</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Most%20Serious%20Cyberattacks%20Against%20the%20UK%20Now%20From%20Russia%2C%20Iran%20and%20China%2C%20Cyber%20Chief%20Says&amp;severity=medium&amp;id=69e8c69219fe3cd2cdaeae95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6857-deserialization-of-untrusted-data-in-5f5d291d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6857%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Apache%20Camel%204%20for%20Quarkus%203&amp;severity=high&amp;id=69e8c6b019fe3cd2cdaed3f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dissecting-fudcrypt-a-real-world-malware-crypting--fcd20fed</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dissecting%20FudCrypt%3A%20A%20Real-World%20Malware%20Crypting%20Service%20Analysis&amp;severity=medium&amp;id=69e8e63519fe3cd2cdc20ae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/formbook-malware-uses-phishing-dll-side-loading-ja-e6840a88</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FormBook%20Malware%20Uses%20Phishing%2C%20DLL%20Side-Loading%2C%20JavaScript&amp;severity=medium&amp;id=69e8e9b919fe3cd2cdc882b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/twizadmin-multi-stage-crypto-clipper-infostealer-r-28b2953c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TwizAdmin%20--%20Multi-Stage%20Crypto%20Clipper%2C%20Infostealer%20%26%20Ransomware%20Operation&amp;severity=medium&amp;id=69e8e9b919fe3cd2cdc8829a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kyber-ransomware-double-trouble-windows-and-esxi-a-e5530819</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kyber%20Ransomware%20Double%20Trouble%3A%20Windows%20and%20ESXi%20Attacks%20Explained&amp;severity=medium&amp;id=69e8e9b919fe3cd2cdc88293</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6855-improper-limitation-of-a-pathname-to-d100c9c9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6855%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%20AI%20(RHEL%20AI)%203&amp;severity=high&amp;id=69e8c30f19fe3cd2cdab6d25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-wiper-malware-targeted-venezuelan-energy-secto-9d79bd8a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Wiper%20Malware%20Targeted%20Venezuelan%20Energy%20Sector%20Prior%20to%20US%20Intervention&amp;severity=medium&amp;id=69e8bc0619fe3cd2cda4a29a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mirai-botnet-targets-flaw-in-discontinued-d-link-r-2d869803</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mirai%20Botnet%20Targets%20Flaw%20in%20Discontinued%20D-Link%20Routers&amp;severity=medium&amp;id=69e8b4fe19fe3cd2cd9de4b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apt-group-expands-toolset-with-new-gogra-linux-bac-b7868bf8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APT%20Group%20Expands%20Toolset%20With%20New%20GoGra%20Linux%20Backdoor&amp;severity=medium&amp;id=69e8e9b919fe3cd2cdc88289</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/are-sboms-failing-supply-chain-attacks-rise-as-sec-0385b359</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Are%20SBOMs%20Failing%3F%20Supply%20Chain%20Attacks%20Rise%20as%20Security%20Teams%20Struggle%20With%20SBOM%20Data&amp;severity=medium&amp;id=69e957ed87115cfb68e5707d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/claude-mythos-finds-271-firefox-vulnerabilities-ae74571f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Claude%20Mythos%20Finds%20271%20Firefox%20Vulnerabilities&amp;severity=medium&amp;id=69e8b17a19fe3cd2cd9b534a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-hackers-use-applescript-clickfix-in-f-8ca1fe25</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20Hackers%20Use%20AppleScript%2C%20ClickFix%20in%20Fresh%20macOS%20Attacks&amp;severity=medium&amp;id=69e8aa7219fe3cd2cd951a29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-antigravity-in-crosshairs-of-security-resea-49e17863</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Antigravity%20in%20Crosshairs%20of%20Security%20Researchers%2C%20Cybercriminals&amp;severity=critical&amp;id=69e89c6219fe3cd2cd8ddf84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33262-null-pointer-dereference-in-powerdn-72a50870</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33262%3A%20NULL%20Pointer%20Dereference%20in%20PowerDNS%20Recursor&amp;severity=medium&amp;id=69e89fe619fe3cd2cd8f5f54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33261-missing-support-for-integrity-check-be8bd4d0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33261%3A%20Missing%20Support%20for%20Integrity%20Check%20in%20PowerDNS%20Recursor&amp;severity=medium&amp;id=69e89fe619fe3cd2cd8f5f51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33260-allocation-of-resources-without-lim-19d1bdb2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33260%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20PowerDNS%20Authoritative&amp;severity=medium&amp;id=69e89fe619fe3cd2cd8f5f4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33259-use-after-free-in-powerdns-recursor-95c1b6d1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33259%3A%20Use%20After%20Free%20in%20PowerDNS%20Recursor&amp;severity=medium&amp;id=69e89fe619fe3cd2cd8f5f49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33258-allocation-of-resources-without-lim-07514143</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33258%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20PowerDNS%20Recursor&amp;severity=medium&amp;id=69e89fe619fe3cd2cd8f5f46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33257-allocation-of-resources-without-lim-9b25e45b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33257%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20PowerDNS%20Authoritative&amp;severity=medium&amp;id=69e89fe619fe3cd2cd8f5f41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33256-allocation-of-resources-without-lim-c592daf9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33256%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20PowerDNS%20Recursor&amp;severity=medium&amp;id=69e89fe619fe3cd2cd8f5f3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33601-null-pointer-dereference-in-powerdn-0f9ceb69</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33601%3A%20NULL%20Pointer%20Dereference%20in%20PowerDNS%20Recursor&amp;severity=medium&amp;id=69e89fe619fe3cd2cd8f5f57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33600-null-pointer-dereference-in-powerdn-c8ce4796</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33600%3A%20NULL%20Pointer%20Dereference%20in%20PowerDNS%20Recursor&amp;severity=medium&amp;id=69e898dd19fe3cd2cd8c392f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1913-cwe-79-improper-neutralization-of-in-235596af</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1913%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gallagherwebsitedesign%20Gallagher%20Website%20Design&amp;severity=medium&amp;id=69e898dd19fe3cd2cd8c3920</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1930-cwe-862-missing-authorization-in-han-23ecaff9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1930%3A%20CWE-862%20Missing%20Authorization%20in%20hanicker%20Emailchef&amp;severity=medium&amp;id=69e898dd19fe3cd2cd8c3927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6848-insufficient-session-expiration-in-r-dfc7c1c4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6848%3A%20Insufficient%20Session%20Expiration%20in%20Red%20Hat%20Red%20Hat%20Quay%203&amp;severity=medium&amp;id=69e898dd19fe3cd2cd8c3932</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/oracle-patches-450-vulnerabilities-with-april-2026-b6816a27</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Oracle%20Patches%20450%20Vulnerabilities%20With%20April%202026%20CPU&amp;severity=medium&amp;id=69e88ace19fe3cd2cd81f365</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6846-heap-based-buffer-overflow-in-red-ha-6c30367e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6846%3A%20Heap-based%20Buffer%20Overflow%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=69e88e5219fe3cd2cd83b858</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6844-uncontrolled-resource-consumption-in-4106dfa8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6844%3A%20Uncontrolled%20Resource%20Consumption%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69e88e5219fe3cd2cd83b854</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6843-use-of-externally-controlled-format--65b65110</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6843%3A%20Use%20of%20Externally-Controlled%20Format%20String%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69e88e5219fe3cd2cd83b850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6845-null-pointer-dereference-in-red-hat--7021dda0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6845%3A%20NULL%20Pointer%20Dereference%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69e8877219fe3cd2cd8093fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4353-cwe-79-improper-neutralization-of-in-0a52d99e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4353%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cihubconnector%20CI%20HUB%20Connector&amp;severity=medium&amp;id=69e8877019fe3cd2cd80901f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4138-cwe-352-cross-site-request-forgery-c-bed04b69</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4138%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20nofearinc%20DX%20Unanswered%20Comments&amp;severity=medium&amp;id=69e8877019fe3cd2cd808fe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6294-cwe-352-cross-site-request-forgery-c-c621007a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6294%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20byybora%20Google%20PageRank%20Display&amp;severity=medium&amp;id=69e8877219fe3cd2cd8093ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6236-cwe-79-improper-neutralization-of-in-a51a39a7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6236%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lucdecri%20Posts%20map&amp;severity=medium&amp;id=69e8877219fe3cd2cd8093de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4117-cwe-862-missing-authorization-in-cal-77f5a788</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4117%3A%20CWE-862%20Missing%20Authorization%20in%20calj%20CalJ%20Shabbat%20Times&amp;severity=medium&amp;id=69e8876e19fe3cd2cd808df5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4119-cwe-862-missing-authorization-in-jpp-12851972</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4119%3A%20CWE-862%20Missing%20Authorization%20in%20jppreus%20Create%20DB%20Tables&amp;severity=critical&amp;id=69e8876e19fe3cd2cd808e36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4132-cwe-73-external-control-of-file-name-ede0442a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4132%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20zinoui%20HTTP%20Headers&amp;severity=high&amp;id=69e8877019fe3cd2cd808fd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2719-cwe-79-improper-neutralization-of-in-64c1f05d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2719%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fpoller%20Private%20WP%20suite&amp;severity=medium&amp;id=69e8876c19fe3cd2cd808cb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4121-cwe-352-cross-site-request-forgery-c-45c1a3d7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4121%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ksolves%20Kcaptcha&amp;severity=medium&amp;id=69e8876e19fe3cd2cd808e46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5748-cwe-79-improper-neutralization-of-in-885a583a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5748%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20snedled%20Text%20Snippets&amp;severity=medium&amp;id=69e8877219fe3cd2cd8093c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4074-cwe-79-improper-neutralization-of-in-701c115c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4074%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20karim42%20Quran%20Live%20Multilanguage&amp;severity=medium&amp;id=69e8876c19fe3cd2cd808cc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4085-cwe-79-improper-neutralization-of-in-3ee50d45</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4085%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20maltathemes%20Easy%20Social%20Photos%20Gallery%20%E2%80%93%20MIF&amp;severity=medium&amp;id=69e8876c19fe3cd2cd808ce9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6246-cwe-79-improper-neutralization-of-in-50f52a53</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6246%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mkerstner%20Simple%20Random%20Posts%20Shortcode&amp;severity=medium&amp;id=69e8877219fe3cd2cd8093e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4142-cwe-79-improper-neutralization-of-in-716de4a4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4142%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eazyserver%20Sentence%20To%20SEO%20(keywords%2C%20description%20and%20tags)&amp;severity=medium&amp;id=69e8877019fe3cd2cd809002</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6235-cwe-862-missing-authorization-in-sen-1e57aff5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6235%3A%20CWE-862%20Missing%20Authorization%20in%20sendmachine%20Sendmachine%20for%20WordPress&amp;severity=critical&amp;id=69e8877219fe3cd2cd8093d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4090-cwe-352-cross-site-request-forgery-c-da9068d4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4090%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ravster%20Inquiry%20cart&amp;severity=medium&amp;id=69e8876e19fe3cd2cd808de2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2717-cwe-93-improper-neutralization-of-cr-71816c3c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2717%3A%20CWE-93%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20zinoui%20HTTP%20Headers&amp;severity=medium&amp;id=69e8876c19fe3cd2cd808cad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4118-cwe-352-cross-site-request-forgery-c-ba11849e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4118%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20tmarek%20Call%20To%20Action%20Plugin&amp;severity=medium&amp;id=69e8876e19fe3cd2cd808e29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4139-cwe-352-cross-site-request-forgery-c-5640d79d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4139%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20chsxf%20mCatFilter&amp;severity=medium&amp;id=69e8877019fe3cd2cd808ff2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4125-cwe-79-improper-neutralization-of-in-426b77f1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4125%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpmkorg%20WPMK%20Block&amp;severity=medium&amp;id=69e8876e19fe3cd2cd808e4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4128-cwe-862-missing-authorization-in-tpl-a47c6cb5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4128%3A%20CWE-862%20Missing%20Authorization%20in%20tplugins%20TP%20Restore%20Categories%20And%20Taxonomies&amp;severity=medium&amp;id=69e8876e19fe3cd2cd808e5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5767-cwe-79-improper-neutralization-of-in-64b4f930</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5767%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20luetkemj%20SlideShowPro%20SC&amp;severity=medium&amp;id=69e8877219fe3cd2cd8093c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4089-cwe-79-improper-neutralization-of-in-434c6e6e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4089%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20johnnie2u%20Twittee%20Text%20Tweet&amp;severity=medium&amp;id=69e8876e19fe3cd2cd808ddb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3362-cwe-79-improper-neutralization-of-in-b499ef92</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3362%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20itsananderson%20Short%20Comment%20Filter&amp;severity=medium&amp;id=69e8876c19fe3cd2cd808cb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6396-cwe-352-cross-site-request-forgery-c-8c92df71</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6396%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20webarea%20Fast%20%26%20Fancy%20Filter%20%E2%80%93%203F&amp;severity=medium&amp;id=69e8877219fe3cd2cd8093f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4280-cwe-22-improper-limitation-of-a-path-40a9b427</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4280%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20doctorwp%20Breaking%20News%20WP&amp;severity=medium&amp;id=69e8877019fe3cd2cd809016</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4140-cwe-352-cross-site-request-forgery-c-408358f1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4140%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20anzia%20Ni%20WooCommerce%20Order%20Export&amp;severity=medium&amp;id=69e8877019fe3cd2cd808ffb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4133-cwe-352-cross-site-request-forgery-c-cdc53135</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4133%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20textp2p%20TextP2P%20Texting%20Widget&amp;severity=medium&amp;id=69e8877019fe3cd2cd808fe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4076-cwe-79-improper-neutralization-of-in-2e43ab74</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4076%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20felipermendes%20Slider%20Bootstrap%20Carousel&amp;severity=medium&amp;id=69e8876c19fe3cd2cd808cd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4126-cwe-200-exposure-of-sensitive-inform-5593e4bd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4126%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20primisdigital%20Table%20Manager&amp;severity=medium&amp;id=69e8876e19fe3cd2cd808e56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2714-cwe-79-improper-neutralization-of-in-aeaf694c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2714%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20weblizar%20Institute%20Management%20%E2%80%93%20Learning%20Management%20System&amp;severity=medium&amp;id=69e8876c19fe3cd2cd808ca8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4088-cwe-79-improper-neutralization-of-in-1f2fc762</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4088%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpshouter%20Switch%20CTA%20Box&amp;severity=medium&amp;id=69e8876e19fe3cd2cd808dd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1845-cwe-79-improper-neutralization-of-in-714efc56</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1845%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bhubbard%20Real%20Estate%20Pro&amp;severity=medium&amp;id=69e8876c19fe3cd2cd808ca4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6041-cwe-79-improper-neutralization-of-in-9819e976</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6041%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mixer2%20Buzz%20Comments&amp;severity=medium&amp;id=69e8877219fe3cd2cd8093d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4131-cwe-352-cross-site-request-forgery-c-70210ccf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4131%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sphex1987%20WP%20Responsive%20Popup%20%2B%20Optin&amp;severity=medium&amp;id=69e8877019fe3cd2cd808fc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4082-cwe-79-improper-neutralization-of-in-3b98007d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4082%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20erithq%20ER%20Swiffy%20Insert&amp;severity=medium&amp;id=69e8876c19fe3cd2cd808ce2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4279-cwe-79-improper-neutralization-of-in-e4682dd8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4279%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20breadbutter%20Bread%20%26%20Butter%3A%20AI-Powered%20Lead%20Intelligence&amp;severity=medium&amp;id=69e8877019fe3cd2cd80900f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1379-cwe-79-improper-neutralization-of-in-1f846bba</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1379%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zinoui%20HTTP%20Headers&amp;severity=medium&amp;id=69e8876c19fe3cd2cd808c9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5820-cwe-79-improper-neutralization-of-in-23a26644</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5820%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sproutient%20Zypento%20Blocks&amp;severity=medium&amp;id=69e8877219fe3cd2cd8093ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6842-incorrect-permission-assignment-for--d9d71f2c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6842%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=low&amp;id=69e87cbe19fe3cd2cd7bf973</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6023-cwe-502-deserialization-of-untrusted-b293ba7b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6023%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Progress%20Software%20Telerik%20UI%20for%20ASP.NET%20AJAX&amp;severity=high&amp;id=69e87cbe19fe3cd2cd7bf970</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6022-cwe-400-uncontrolled-resource-consum-dee17416</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6022%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Progress%20Software%20Telerik%20UI%20for%20ASP.NET%20AJAX&amp;severity=high&amp;id=69e87cbe19fe3cd2cd7bf96d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40542-cwe-304-missing-critical-step-in-au-39bc90aa</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40542%3A%20CWE-304%3A%20Missing%20Critical%20Step%20in%20Authentication%20in%20Apache%20Software%20Foundation%20Apache%20HttpClient&amp;severity=high&amp;id=69e87cbe19fe3cd2cd7bf96a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/march-2026-phishing-email-trends-report-39487dbc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=March%202026%20Phishing%20Email%20Trends%20Report&amp;severity=medium&amp;id=69e8876919fe3cd2cd808c5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6840-cwe-129-improper-validation-of-array-e00e6759</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6840%3A%20CWE-129%20Improper%20validation%20of%20array%20index%20in%20Samsung%20Open%20Source%20ONE&amp;severity=medium&amp;id=69e86b2919fe3cd2cd75aa78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6839-cwe-1284-improper-validation-of-spec-e332e4dd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6839%3A%20CWE-1284%20Improper%20validation%20of%20specified%20quantity%20in%20input%20in%20Samsung%20Open%20Source%20ONE&amp;severity=medium&amp;id=69e86b2919fe3cd2cd75aa75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41667-cwe-190-integer-overflow-or-wraparo-767ef7b5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41667%3A%20CWE-190%20Integer%20overflow%20or%20wraparound%20in%20Samsung%20Open%20Source%20ONE&amp;severity=medium&amp;id=69e86b2919fe3cd2cd75aa72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41666-cwe-190-integer-overflow-or-wraparo-ef409e56</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41666%3A%20CWE-190%20Integer%20overflow%20or%20wraparound%20in%20Samsung%20Open%20Source%20ONE&amp;severity=medium&amp;id=69e86b2919fe3cd2cd75aa6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41665-cwe-190-integer-overflow-or-wraparo-5acdbd90</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41665%3A%20CWE-190%20Integer%20overflow%20or%20wraparound%20in%20Samsung%20Open%20Source%20ONE&amp;severity=medium&amp;id=69e86b2919fe3cd2cd75aa6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41664-cwe-190-integer-overflow-or-wraparo-a27f5e6e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41664%3A%20CWE-190%20Integer%20overflow%20or%20wraparound%20in%20Samsung%20Open%20Source%20ONE&amp;severity=medium&amp;id=69e86b2919fe3cd2cd75aa69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40450-cwe-190-integer-overflow-or-wraparo-f0f40248</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40450%3A%20CWE-190%20Integer%20overflow%20or%20wraparound%20in%20Samsung%20Open%20Source%20ONE&amp;severity=medium&amp;id=69e86b2919fe3cd2cd75aa66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40449-cwe-190-integer-overflow-or-wraparo-610b3f4b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40449%3A%20CWE-190%20Integer%20overflow%20or%20wraparound%20in%20Samsung%20Open%20Source%20ONE&amp;severity=medium&amp;id=69e86b2919fe3cd2cd75aa63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40448-cwe-190-integer-overflow-or-wraparo-5092d529</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40448%3A%20CWE-190%20Integer%20overflow%20or%20wraparound%20in%20Samsung%20Open%20Source%20ONE&amp;severity=medium&amp;id=69e86b2919fe3cd2cd75aa60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22754-vulnerability-in-spring-spring-secu-e2bbf647</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22754%3A%20Vulnerability%20in%20Spring%20Spring%20Security&amp;severity=high&amp;id=69e8609e19fe3cd2cd714520</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22753-vulnerability-in-spring-spring-secu-0e49ffc5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22753%3A%20Vulnerability%20in%20Spring%20Spring%20Security&amp;severity=high&amp;id=69e8609e19fe3cd2cd71451d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22748-vulnerability-in-spring-spring-secu-aa05584e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22748%3A%20Vulnerability%20in%20Spring%20Spring%20Security&amp;severity=medium&amp;id=69e8609e19fe3cd2cd71451a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22747-vulnerability-in-spring-spring-secu-54eefe85</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22747%3A%20Vulnerability%20in%20Spring%20Spring%20Security&amp;severity=medium&amp;id=69e8609e19fe3cd2cd714517</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22746-vulnerability-in-spring-spring-secu-ccb3f5cb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22746%3A%20Vulnerability%20in%20Spring%20Spring%20Security&amp;severity=low&amp;id=69e8609e19fe3cd2cd714513</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40451-cross-site-scripting-xss-in-deepl-c-0dc2de5b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40451%3A%20Cross-site%20scripting%20(XSS)%20in%20DeepL%20Chrome%20browser%20extension&amp;severity=medium&amp;id=69e85dc119fe3cd2cd708088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6835-cwe-434-unrestricted-upload-of-file--64dc3deb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6835%3A%20CWE-434%20Unrestricted%20upload%20of%20file%20with%20dangerous%20type%20in%20aEnrich%20a%2BHCM&amp;severity=medium&amp;id=69e8480219fe3cd2cd4cd5b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6834-cwe-862-missing-authorization-in-aen-34aab48f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6834%3A%20CWE-862%20Missing%20Authorization%20in%20aEnrich%20a%2BHRD&amp;severity=high&amp;id=69e8480219fe3cd2cd4cd5ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6833-cwe-89-improper-neutralization-of-sp-c4644e6c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6833%3A%20CWE-89%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20injection&apos;)%20in%20aEnrich%20a%2BHRD&amp;severity=high&amp;id=69e8480219fe3cd2cd4cd5a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-wednesday-april-22nd-2026-httpsi-dc448848</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Wednesday%2C%20April%2022nd%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9902%2C%20(Wed%2C%20Apr%2022nd)&amp;severity=medium&amp;id=69e82be219fe3cd2cd2e78ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6408-insufficiently-protected-credentials-5ee5cc77</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6408%3A%20Insufficiently%20Protected%20Credentials%20in%20Tanium%20Tanium%20Server&amp;severity=low&amp;id=69e8366d19fe3cd2cd3e6df4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6392-exposure-of-sensitive-information-to-7a7525e9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6392%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Tanium%20Threat%20Response&amp;severity=low&amp;id=69e8366d19fe3cd2cd3e6df1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41458-cwe-362-concurrent-execution-using--d9b20473</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41458%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20owntone%20owntone-server&amp;severity=high&amp;id=69e8366d19fe3cd2cd3e6dec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6416-uncontrolled-resource-consumption-in-6d82babd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6416%3A%20Uncontrolled%20Resource%20Consumption%20in%20Tanium%20Interact&amp;severity=low&amp;id=69e8366d19fe3cd2cd3e6df7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41457-cwe-89-improper-neutralization-of-s-639e77d5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41457%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20owntone%20owntone-server&amp;severity=medium&amp;id=69e8366d19fe3cd2cd3e6de8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/same-packet-different-magic-hits-indias-banking-se-82b03368</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Same%20packet%2C%20different%20magic%3A%20Hits%20India&apos;s%20banking%20sector%20and%20Korea%20geopolitics&amp;severity=medium&amp;id=69e88ad519fe3cd2cd81f4fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mach-o-man-malware-what-cisos-need-to-know-befa2a25</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mach-O%20Man%20Malware%3A%20What%20CISOs%20Need%20to%20Know&amp;severity=medium&amp;id=69e88ad519fe3cd2cd81f509</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41146-cwe-400-uncontrolled-resource-consu-3c0472f6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41146%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20boazsegev%20facil.io&amp;severity=high&amp;id=69e8285d19fe3cd2cd272487</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/x5bguest-diaryx5d-beyond-cryptojacking-telegram-td-95c3a6d7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%26%23x5b%3BGuest%20Diary%26%23x5d%3B%20Beyond%20Cryptojacking%3A%20Telegram%20tdata%20as%20a%20Credential%20Harvesting%20Vector%2C%20Lessons%20from%20a%20Honeypot%20Incident%2C%20(Wed%2C%20Apr%2022nd)&amp;severity=medium&amp;id=69e8134b19fe3cd2cd08f0de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/avast-antivirus-2511-unquoted-service-path-41e04973</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AVAST%20Antivirus%2025.11%20-%20Unquoted%20Service%20Path&amp;severity=medium&amp;id=69ec2f5087115cfb68b9e9dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wordpress-plugin-520-broken-access-control-3ecc7f5e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WordPress%20Plugin%20%205.2.0%20-%20Broken%20Access%20Control&amp;severity=medium&amp;id=69ec2f5087115cfb68b9e9d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/throttlestop-kernel-driver-kernel-out-of-bounds-wr-2241e2d3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Throttlestop%20Kernel%20Driver%20-%20Kernel%20Out-of-Bounds%20Write%20Privilege%20Escalation&amp;severity=high&amp;id=69ec2f5087115cfb68b9e9d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-23-1228cb05</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-23&amp;severity=medium&amp;id=69e9eb7f87115cfb68f9c891</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-22-0db1dee2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-22&amp;severity=medium&amp;id=69e9626387115cfb6817f928</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30139-na-f75ac939</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30139%3A%20n%2Fa&amp;severity=medium&amp;id=69e8e9bb19fe3cd2cdc88f80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35548-na-ba622a4c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35548%3A%20n%2Fa&amp;severity=high&amp;id=69e8e2b519fe3cd2cdc0df55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31192-na-9ab09595</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31192%3A%20n%2Fa&amp;severity=medium&amp;id=69e8d83319fe3cd2cdbdabfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-22-2d71dc32</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-22&amp;severity=low&amp;id=69e83d6d19fe3cd2cd447496</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41136-cwe-440-expected-behavior-violation-583653d1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41136%3A%20CWE-440%3A%20Expected%20Behavior%20Violation%20in%20free5gc%20amf&amp;severity=medium&amp;id=69e8135419fe3cd2cd08f850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41135-cwe-400-uncontrolled-resource-consu-7d3553d9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41135%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20free5gc%20pcf&amp;severity=high&amp;id=69e80fc419fe3cd2cd07fdbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40343-cwe-754-improper-check-for-unusual--89e3a13b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40343%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20free5gc%20udr&amp;severity=medium&amp;id=69e80fc419fe3cd2cd07fdbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41130-cwe-918-server-side-request-forgery-dd054ecd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41130%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20craftcms%20cms&amp;severity=medium&amp;id=69e80c4119fe3cd2cd06bb1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41129-cwe-918-server-side-request-forgery-f671e853</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41129%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20craftcms%20cms&amp;severity=medium&amp;id=69e80c4119fe3cd2cd06bb19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41128-cwe-862-missing-authorization-in-cr-4617a4c3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41128%3A%20CWE-862%3A%20Missing%20Authorization%20in%20craftcms%20cms&amp;severity=medium&amp;id=69e80c4119fe3cd2cd06bb15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41304-cwe-77-improper-neutralization-of-s-2adf3dc4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41304%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69e808b919fe3cd2cd05c6b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41064-cwe-78-improper-neutralization-of-s-446caa6f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41064%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=critical&amp;id=69e808b919fe3cd2cd05c6ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41063-cwe-79-improper-neutralization-of-i-f71f7022</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41063%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69e8053519fe3cd2cd036939</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41062-cwe-22-improper-limitation-of-a-pat-d34d858e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41062%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69e8053519fe3cd2cd036933</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41061-cwe-79-improper-neutralization-of-i-d5bdc732</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41061%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69e8053519fe3cd2cd03692f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41060-cwe-918-server-side-request-forgery-4dd6fe68</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41060%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69e85dc119fe3cd2cd70809d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41058-cwe-22-improper-limitation-of-a-pat-0ca30d9c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41058%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69e85dc119fe3cd2cd708097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5845-cwe-639-authorization-bypass-through-af17f908</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5845%3A%20CWE-639%20Authorization%20bypass%20through%20User-Controlled%20key%20in%20GitHub%20Enterprise%20Server&amp;severity=high&amp;id=69e85dc119fe3cd2cd7080a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41057-cwe-346-origin-validation-error-in--1586919e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41057%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69e85dc119fe3cd2cd708093</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41056-cwe-942-permissive-cross-domain-pol-0bdc9acc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41056%3A%20CWE-942%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69e85dc119fe3cd2cd70808f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41055-cwe-918-server-side-request-forgery-386487f6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41055%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69e7faaa19fe3cd2cd001495</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3307-cwe-639-authorization-bypass-through-79d756ce</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3307%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20GitHub%20Enterprise%20Server&amp;severity=medium&amp;id=69e7faaa19fe3cd2cd00147c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40935-cwe-804-guessable-captcha-in-wwbn-a-c3ef0f78</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40935%3A%20CWE-804%3A%20Guessable%20CAPTCHA%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69e7faaa19fe3cd2cd001491</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40929-cwe-352-cross-site-request-forgery--c54c9475</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40929%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69e7faaa19fe3cd2cd00148d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40928-cwe-352-cross-site-request-forgery--08aee507</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40928%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69e7faaa19fe3cd2cd001489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5512-cwe-201-insertion-of-sensitive-infor-945674e9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5512%3A%20CWE-201%20Insertion%20of%20sensitive%20information%20into%20sent%20data%20in%20GitHub%20Enterprise%20Server&amp;severity=medium&amp;id=69e7faaa19fe3cd2cd0014af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4296-cwe-185-incorrect-regular-expression-05c5a682</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4296%3A%20CWE-185%20Incorrect%20Regular%20Expression%20in%20GitHub%20Enterprise%20Server&amp;severity=high&amp;id=69e7faaa19fe3cd2cd00149b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40926-cwe-352-cross-site-request-forgery--6b4a43fa</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40926%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69e7faaa19fe3cd2cd001485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4821-cwe-78-improper-neutralization-of-sp-1de2eb07</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4821%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20GitHub%20Enterprise%20Server&amp;severity=high&amp;id=69e7faaa19fe3cd2cd0014a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5921-cwe-918-server-side-request-forgery--4913fb27</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5921%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20GitHub%20Enterprise%20Server&amp;severity=high&amp;id=69e7faad19fe3cd2cd001605</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6832-cwe-22-improper-limitation-of-a-path-f71eef8c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6832%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20nesquena%20hermes-webui&amp;severity=high&amp;id=69e7f3aa19fe3cd2cdfdaad3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1354-cwe-322-in-zero-motorcycles-zero-mot-a0abde9a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1354%3A%20CWE-322%20in%20Zero%20Motorcycles%20Zero%20Motorcycles%20firmware&amp;severity=medium&amp;id=69e7f3aa19fe3cd2cdfdaacf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6830-cwe-668-exposure-of-resource-to-wron-99db2e89</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6830%3A%20CWE-668%3A%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20nesquena%20hermes-webui&amp;severity=medium&amp;id=69e7f01d19fe3cd2cdfcab55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40946-cwe-287-improper-authentication-in--d724c488</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40946%3A%20CWE-287%3A%20Improper%20Authentication%20in%20oxia-db%20oxia&amp;severity=critical&amp;id=69e7f01d19fe3cd2cdfcab4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40945-cwe-532-insertion-of-sensitive-info-eeb85fa3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40945%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20oxia-db%20oxia&amp;severity=high&amp;id=69e7f01d19fe3cd2cdfcab4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40944-cwe-295-improper-certificate-valida-a43a96b8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40944%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20oxia-db%20oxia&amp;severity=medium&amp;id=69e7f01d19fe3cd2cdfcab47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40943-cwe-362-concurrent-execution-using--5e16ae68</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40943%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20oxia-db%20oxia&amp;severity=high&amp;id=69e7e91619fe3cd2cdfaec56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6829-cwe-22-improper-limitation-of-a-path-1c81624f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6829%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20nesquena%20hermes-webui&amp;severity=medium&amp;id=69e7e91619fe3cd2cdfaec5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40942-cwe-670-always-incorrect-control-fl-d86330eb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40942%3A%20CWE-670%3A%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20datasharingframework%20dsf&amp;severity=medium&amp;id=69e7e91619fe3cd2cdfaec51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40939-cwe-613-insufficient-session-expira-d36951cc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40939%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20datasharingframework%20dsf&amp;severity=medium&amp;id=69e7e91619fe3cd2cdfaec4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40933-cwe-78-improper-neutralization-of-s-3bdaeff3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40933%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20FlowiseAI%20Flowise&amp;severity=critical&amp;id=69e7e91619fe3cd2cdfaec46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6799-command-injection-in-comfast-cf-n1-s-d58e7057</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6799%3A%20Command%20Injection%20in%20Comfast%20CF-N1-S&amp;severity=medium&amp;id=69e7e91619fe3cd2cdfaec59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40931-cwe-59-improper-link-resolution-bef-1362973b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40931%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20node-modules%20compressing&amp;severity=high&amp;id=69e7e91619fe3cd2cdfaec43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40923-cwe-22-improper-limitation-of-a-pat-14596e0a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40923%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20tektoncd%20pipeline&amp;severity=medium&amp;id=69e7e5b119fe3cd2cdfa01bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40924-cwe-400-uncontrolled-resource-consu-d9d1d16c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40924%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20tektoncd%20pipeline&amp;severity=medium&amp;id=69e7e5b119fe3cd2cdfa01c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40938-cwe-88-improper-neutralization-of-a-83a710cd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40938%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20tektoncd%20pipeline&amp;severity=high&amp;id=69e7e5b119fe3cd2cdfa01c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6797-resource-consumption-in-sanluan-publ-05f04de8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6797%3A%20Resource%20Consumption%20in%20Sanluan%20PublicCMS&amp;severity=medium&amp;id=69e7e5b119fe3cd2cdfa01c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33519-cwe-266-incorrect-privilege-assignm-042ac0c8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33519%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20(4.19.1)%20in%20Esri%20Portal%20for%20ArcGIS&amp;severity=critical&amp;id=69e7e5a019fe3cd2cdf9f736</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33518-cwe-266-incorrect-privilege-assignm-c42454a7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33518%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20(4.19.1)%20in%20Esri%20Portal%20for%20ArcGIS&amp;severity=critical&amp;id=69e7e5a019fe3cd2cdf9f733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6823-cwe-276-incorrect-default-permission-92b68079</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6823%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20HKUDS%20OpenHarness&amp;severity=high&amp;id=69e7e5b119fe3cd2cdfa01ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35252-difficult-to-exploit-vulnerability--f1d78ce3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35252%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTPS%20to%20compromise%20Oracle%20Security%20Service.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Security%20Service%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Security%20Service%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Security%20Service&amp;severity=medium&amp;id=69e7e5b119fe3cd2cdfa01ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35251-difficult-to-exploit-vulnerability--741c5d88</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35251%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=69e7e5b119fe3cd2cdfa01b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35250-easily-exploitable-vulnerability-al-9400abd3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35250%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=low&amp;id=69e7e5b119fe3cd2cdfa01b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35249-easily-exploitable-vulnerability-al-08381c47</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35249%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20VM%20VirtualBox%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=low&amp;id=69e7e5b119fe3cd2cdfa01b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35248-difficult-to-exploit-vulnerability--bcf69cdc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35248%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20VM%20VirtualBox%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20VM%20VirtualBox%20accessible%20data%20and%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=medium&amp;id=69e7e5b119fe3cd2cdfa01ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35247-easily-exploitable-vulnerability-al-dafc7f29</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35247%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20VM%20VirtualBox%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=medium&amp;id=69e7e5af19fe3cd2cdfa017c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35246-difficult-to-exploit-vulnerability--3c3a6a8f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35246%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=69e7e5af19fe3cd2cdfa0178</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35245-easily-exploitable-vulnerability-al-3cd45455</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35245%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20RDP%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=69e7e5af19fe3cd2cdfa0174</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35244-easily-exploitable-vulnerability-al-f55951e3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35244%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Hyperion%20Infrastructure%20Technology.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Hyperion%20Infrastructure%20Technology%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Hyperion%20Infrastructure%20Technology%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Hyperion%20Infrastructure%20Technology&amp;severity=medium&amp;id=69e7e5af19fe3cd2cdfa016f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35243-easily-exploitable-vulnerability-al-bde9ac3d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35243%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20Application%20Development%20Framework%20(ADF)%20executes%20to%20compromise%20Oracle%20Application%20Development%20Framework%20(ADF).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Application%20Development%20Framework%20(ADF).%20in%20Oracle%20Corporation%20Oracle%20Application%20Development%20Framework%20(ADF)&amp;severity=high&amp;id=69e7e5af19fe3cd2cdfa016b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35242-difficult-to-exploit-vulnerability--616450eb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35242%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=69e7e5af19fe3cd2cdfa0164</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35241-easily-exploitable-vulnerability-al-680ee5e4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35241%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20CS%20Student%20Records.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20PeopleSoft%20Enterprise%20CS%20Student%20Records%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20CS%20Student%20Records&amp;severity=medium&amp;id=69e7e5af19fe3cd2cdfa0160</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35240-easily-exploitable-vulnerability-al-1a43e1c3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35240%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e5af19fe3cd2cdfa015c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35239-easily-exploitable-vulnerability-al-ae52294e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35239%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e5af19fe3cd2cdfa0159</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35238-easily-exploitable-vulnerability-al-b0056cbb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35238%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e5af19fe3cd2cdfa0156</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35237-easily-exploitable-vulnerability-al-cb542661</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35237%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e5ad19fe3cd2cdfa00df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35236-easily-exploitable-vulnerability-al-cd31b948</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35236%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e5ad19fe3cd2cdfa00dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35235-easily-exploitable-vulnerability-al-4a1fef17</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35235%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e5ad19fe3cd2cdfa00d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35234-easily-exploitable-vulnerability-al-4cc52e09</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35234%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e5ad19fe3cd2cdfa00d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35232-easily-exploitable-vulnerability-al-c19d6b44</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35232%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Fusion%20Middleware.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Fusion%20Middleware%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Fusion%20Middleware%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Fusion%20Middleware%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Fusion%20Middleware&amp;severity=medium&amp;id=69e7e5ad19fe3cd2cdfa00d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35231-easily-exploitable-vulnerability-al-ca27511c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35231%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Financial%20Services%20Transaction%20Filtering.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Financial%20Services%20Transaction%20Filtering%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Financial%20Services%20Transaction%20Filtering&amp;severity=high&amp;id=69e7e5ad19fe3cd2cdfa00d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35230-difficult-to-exploit-vulnerability--e0211fb0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35230%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=69e7e5ad19fe3cd2cdfa00cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35229-easily-exploitable-vulnerability-al-ee698b4e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35229%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20Oracle%20Net%20to%20compromise%20Java%20VM.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Java%20VM%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Database%20Server&amp;severity=high&amp;id=69e7e5ad19fe3cd2cdfa00ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34325-easily-exploitable-vulnerability-al-abff44fc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34325%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure%20executes%20to%20compromise%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure%20accessible%20data%20as%20well%20as%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure%20accessible%20data%20and%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure.%20in%20Oracle%20Corporation%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure&amp;severity=medium&amp;id=69e7e5ad19fe3cd2cdfa00c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34324-easily-exploitable-vulnerability-al-51d56e29</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34324%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Life%20Sciences%20InForm.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Life%20Sciences%20InForm%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Life%20Sciences%20InForm%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Life%20Sciences%20InForm&amp;severity=medium&amp;id=69e7e5ad19fe3cd2cdfa00c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34323-easily-exploitable-vulnerability-al-6b8cb532</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34323%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Life%20Sciences%20InForm.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Life%20Sciences%20InForm%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Life%20Sciences%20InForm%20accessible%20data%20and%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20Oracle%20Life%20Sciences%20InForm.%20in%20Oracle%20Corporation%20Oracle%20Life%20Sciences%20InForm&amp;severity=medium&amp;id=69e7e5ab19fe3cd2cdf9fa10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34321-difficult-to-exploit-vulnerability--111fb184</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34321%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure&amp;severity=medium&amp;id=69e7e5ab19fe3cd2cdf9fa0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34320-easily-exploitable-vulnerability-al-bda45419</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34320%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Financial%20Services%20Customer%20Screening.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Financial%20Services%20Customer%20Screening%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Financial%20Services%20Customer%20Screening&amp;severity=high&amp;id=69e7e5ab19fe3cd2cdf9fa0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34319-easily-exploitable-vulnerability-al-4e4c2f90</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34319%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20MySQL%20Shell%20executes%20to%20compromise%20MySQL%20Shell.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Shell.%20in%20Oracle%20Corporation%20MySQL%20Shell&amp;severity=medium&amp;id=69e7e5ab19fe3cd2cdf9fa07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34318-difficult-to-exploit-vulnerability--dc47f419</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34318%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Shell.%20%20While%20the%20vulnerability%20is%20in%20MySQL%20Shell%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20MySQL%20Shell%20accessible%20data.%20in%20Oracle%20Corporation%20MySQL%20Shell&amp;severity=medium&amp;id=69e7e5ab19fe3cd2cdf9fa04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34317-easily-exploitable-vulnerability-al-65f524db</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34317%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20MySQL%20Shell%20executes%20to%20compromise%20MySQL%20Shell.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Shell.%20in%20Oracle%20Corporation%20MySQL%20Shell&amp;severity=medium&amp;id=69e7e5ab19fe3cd2cdf9fa01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34315-easily-exploitable-vulnerability-al-68ca386d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34315%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20WebLogic%20Server.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20WebLogic%20Server%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20WebLogic%20Server&amp;severity=medium&amp;id=69e7e5ab19fe3cd2cdf9f9fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34314-difficult-to-exploit-vulnerability--1605401c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34314%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure&amp;severity=medium&amp;id=69e7e5ab19fe3cd2cdf9f9fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34313-easily-exploitable-vulnerability-al-ea2ce21c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34313%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure&amp;severity=medium&amp;id=69e7e5ab19fe3cd2cdf9f9f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34312-easily-exploitable-vulnerability-al-a6403caa</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34312%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20having%20Row%20Access%20Method%20privilege%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20RDBMS.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20RDBMS%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Database%20Server&amp;severity=low&amp;id=69e7e5ab19fe3cd2cdf9f9f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34310-easily-exploitable-vulnerability-al-517f6a28</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34310%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure&amp;severity=high&amp;id=69e7e5a819fe3cd2cdf9f9bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34309-easily-exploitable-vulnerability-al-25188087</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34309%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20PeopleTools.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20PeopleTools&amp;severity=high&amp;id=69e7e5a819fe3cd2cdf9f9b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34308-easily-exploitable-vulnerability-al-6d2ecc90</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34308%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e5a819fe3cd2cdf9f9b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34307-easily-exploitable-vulnerability-al-2ea9f00c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34307%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20PeopleTools.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20PeopleSoft%20Enterprise%20PeopleTools%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20PeopleTools&amp;severity=medium&amp;id=69e7e5a819fe3cd2cdf9f9b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34306-easily-exploitable-vulnerability-al-867314f9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34306%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20FIN%20Project%20Costing.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20PeopleSoft%20Enterprise%20FIN%20Project%20Costing%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20FIN%20Project%20Costing&amp;severity=medium&amp;id=69e7e5a819fe3cd2cdf9f9b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34305-easily-exploitable-vulnerability-al-fba24128</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34305%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20WebLogic%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20WebLogic%20Server%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20WebLogic%20Server&amp;severity=high&amp;id=69e7e5a819fe3cd2cdf9f9ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34304-easily-exploitable-vulnerability-al-5b4cfd00</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34304%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e5a819fe3cd2cdf9f9a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34303-easily-exploitable-vulnerability-al-35d5403d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34303%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e5a819fe3cd2cdf9f9a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34302-easily-exploitable-vulnerability-al-60adad84</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34302%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Workflow.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20Workflow%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Workflow%20accessible%20data%20and%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20Oracle%20Workflow.%20in%20Oracle%20Corporation%20Oracle%20Workflow&amp;severity=medium&amp;id=69e7e5a819fe3cd2cdf9f9a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34301-easily-exploitable-vulnerability-al-9c1caf91</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34301%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20FIN%20Maintenance%20Management.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20PeopleSoft%20Enterprise%20FIN%20Maintenance%20Management%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20FIN%20Maintenance%20Management&amp;severity=medium&amp;id=69e7e5a819fe3cd2cdf9f9a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34300-easily-exploitable-vulnerability-al-43d3b9df</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34300%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20FIN%20Contracts.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20PeopleSoft%20Enterprise%20FIN%20Contracts%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20FIN%20Contracts&amp;severity=medium&amp;id=69e7e5a619fe3cd2cdf9f94d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34299-easily-exploitable-vulnerability-al-34588aa0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34299%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20FIN%20Maintenance%20Management.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20PeopleSoft%20Enterprise%20FIN%20Maintenance%20Management%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20FIN%20Maintenance%20Management&amp;severity=medium&amp;id=69e7e5a619fe3cd2cdf9f94a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34298-easily-exploitable-vulnerability-al-e08eb1ed</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34298%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Applications%20Framework.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Applications%20Framework%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Applications%20Framework%20accessible%20data%20and%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20Oracle%20Applications%20Framework.%20in%20Oracle%20Corporation%20Oracle%20Applications%20Framework&amp;severity=medium&amp;id=69e7e5a619fe3cd2cdf9f947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34297-easily-exploitable-vulnerability-al-c5c480b4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34297%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20HCM%20Common%20Architecture.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20HCM%20Common%20Architecture%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20HCM%20Common%20Architecture&amp;severity=high&amp;id=69e7e5a619fe3cd2cdf9f944</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34296-easily-exploitable-vulnerability-al-b30c9df5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34296%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Agile%20Product%20Lifecycle%20Management%20for%20Process.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Agile%20Product%20Lifecycle%20Management%20for%20Process%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Agile%20Product%20Lifecycle%20Management%20for%20Process&amp;severity=medium&amp;id=69e7e5a619fe3cd2cdf9f941</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34295-easily-exploitable-vulnerability-al-6c672982</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34295%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20SCM%20Purchasing.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20PeopleSoft%20Enterprise%20SCM%20Purchasing%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20SCM%20Purchasing&amp;severity=medium&amp;id=69e7e5a619fe3cd2cdf9f93e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34294-difficult-to-exploit-vulnerability--4500c6f2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34294%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20LDAP%20to%20compromise%20Oracle%20Identity%20Manager%20Connector.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Identity%20Manager%20Connector%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Identity%20Manager%20Connector%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Identity%20Manager%20Connector&amp;severity=medium&amp;id=69e7e5a619fe3cd2cdf9f93b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34293-easily-exploitable-vulnerability-al-1ae4a929</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34293%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e5a619fe3cd2cdf9f938</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34292-easily-exploitable-vulnerability-al-6bf0d821</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34292%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20WebLogic%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20WebLogic%20Server.%20in%20Oracle%20Corporation%20Oracle%20WebLogic%20Server&amp;severity=high&amp;id=69e7e5a619fe3cd2cdf9f935</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34291-difficult-to-exploit-vulnerability--a9179d48</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34291%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20HTTP%20Server.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20HTTP%20Server%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20HTTP%20Server%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20HTTP%20Server%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20HTTP%20Server&amp;severity=high&amp;id=69e7e5a619fe3cd2cdf9f932</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34290-easily-exploitable-vulnerability-al-470c16d1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34290%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20TCP%20to%20compromise%20Oracle%20Identity%20Manager%20Connector.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20Identity%20Manager%20Connector.%20in%20Oracle%20Corporation%20Oracle%20Identity%20Manager%20Connector&amp;severity=high&amp;id=69e7e5a419fe3cd2cdf9f897</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34289-difficult-to-exploit-vulnerability--05decebe</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34289%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTPS%20to%20compromise%20Oracle%20Identity%20Manager%20Connector.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Identity%20Manager%20Connector%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Identity%20Manager%20Connector&amp;severity=medium&amp;id=69e7e5a419fe3cd2cdf9f894</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34288-difficult-to-exploit-vulnerability--203b1528</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34288%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Identity%20Manager%20Connector.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Identity%20Manager%20Connector%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Identity%20Manager%20Connector&amp;severity=medium&amp;id=69e7e5a419fe3cd2cdf9f891</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34287-easily-exploitable-vulnerability-al-550119fe</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34287%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTPS%20to%20compromise%20Oracle%20Identity%20Manager%20Connector.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Identity%20Manager%20Connector%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Identity%20Manager%20Connector%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Identity%20Manager%20Connector&amp;severity=critical&amp;id=69e7e5a419fe3cd2cdf9f88e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34286-easily-exploitable-vulnerability-al-d881b9c0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34286%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTPS%20to%20compromise%20Oracle%20Identity%20Manager%20Connector.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Identity%20Manager%20Connector%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Identity%20Manager%20Connector%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Identity%20Manager%20Connector&amp;severity=critical&amp;id=69e7e5a419fe3cd2cdf9f88b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34285-easily-exploitable-vulnerability-al-35cc1d95</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34285%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTPS%20to%20compromise%20Oracle%20Identity%20Manager%20Connector.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Identity%20Manager%20Connector%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Identity%20Manager%20Connector%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Identity%20Manager%20Connector&amp;severity=critical&amp;id=69e7e5a419fe3cd2cdf9f888</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34284-easily-exploitable-vulnerability-al-4dc75d71</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34284%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Business%20Process%20Management%20Suite.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Business%20Process%20Management%20Suite%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Business%20Process%20Management%20Suite%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Business%20Process%20Management%20Suite%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Business%20Process%20Management%20Suite&amp;severity=medium&amp;id=69e7e5a419fe3cd2cdf9f885</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34283-easily-exploitable-vulnerability-al-5588ac23</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34283%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Identity%20Manager.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Identity%20Manager%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Identity%20Manager%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Identity%20Manager%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Identity%20Manager&amp;severity=medium&amp;id=69e7e5a419fe3cd2cdf9f882</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34282-easily-exploitable-vulnerability-al-3c3041bd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34282%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=high&amp;id=69e7e5a419fe3cd2cdf9f87f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34281-easily-exploitable-vulnerability-al-ba202de7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34281%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20Solaris%20executes%20to%20compromise%20Oracle%20Solaris.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20Solaris%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20Solaris.%20in%20Oracle%20Corporation%20Oracle%20Solaris&amp;severity=medium&amp;id=69e7e5a419fe3cd2cdf9f87c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34280-easily-exploitable-vulnerability-al-5a2fbe50</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34280%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20HCM%20Human%20Resources.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20PeopleSoft%20Enterprise%20HCM%20Human%20Resources%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20PeopleSoft%20Enterprise%20HCM%20Human%20Resources%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20HCM%20Human%20Resources&amp;severity=medium&amp;id=69e7e5a219fe3cd2cdf9f7c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34279-easily-exploitable-vulnerability-al-747999fb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34279%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Enterprise%20Manager%20Base%20Platform.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20Enterprise%20Manager%20Base%20Platform%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Enterprise%20Manager%20Base%20Platform.%20in%20Oracle%20Corporation%20Oracle%20Enterprise%20Manager%20Base%20Platform&amp;severity=critical&amp;id=69e7e5a219fe3cd2cdf9f7c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34278-easily-exploitable-vulnerability-al-a5e5aab1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34278%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e5a219fe3cd2cdf9f7c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34277-easily-exploitable-vulnerability-al-33d3fe45</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34277%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20PeopleTools.%20%20While%20the%20vulnerability%20is%20in%20PeopleSoft%20Enterprise%20PeopleTools%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data%20and%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20PeopleSoft%20Enterprise%20PeopleTools.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20PeopleTools&amp;severity=medium&amp;id=69e7e5a219fe3cd2cdf9f7bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34276-easily-exploitable-vulnerability-al-e6614517</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34276%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e5a219fe3cd2cdf9f7ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34275-easily-exploitable-vulnerability-al-c3b09337</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34275%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Advanced%20Inbound%20Telephony.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Advanced%20Inbound%20Telephony.%20in%20Oracle%20Corporation%20Oracle%20Advanced%20Inbound%20Telephony&amp;severity=critical&amp;id=69e7e5a219fe3cd2cdf9f7b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34274-easily-exploitable-vulnerability-al-ac7ffdd2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34274%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Configurator.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Configurator%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Configurator%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Configurator%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Configurator&amp;severity=medium&amp;id=69e7e5a219fe3cd2cdf9f7b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34273-easily-exploitable-vulnerability-al-e6893b84</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34273%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20GoldenGate.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20GoldenGate%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20GoldenGate&amp;severity=medium&amp;id=69e7e5a219fe3cd2cdf9f7b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34272-easily-exploitable-vulnerability-al-504539ad</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34272%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e5a219fe3cd2cdf9f7ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34271-easily-exploitable-vulnerability-al-e1275dcd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34271%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e5a219fe3cd2cdf9f7ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34270-easily-exploitable-vulnerability-al-52dd5e0e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34270%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e5a019fe3cd2cdf9f746</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34269-easily-exploitable-vulnerability-al-767fe6df</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34269%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20PeopleTools.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20PeopleSoft%20Enterprise%20PeopleTools%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20PeopleTools&amp;severity=medium&amp;id=69e7e5a019fe3cd2cdf9f743</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34268-difficult-to-exploit-vulnerability--fe0f71c5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34268%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20executes%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=low&amp;id=69e7e5a019fe3cd2cdf9f73f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34267-easily-exploitable-vulnerability-al-abc37fab</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34267%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e5a019fe3cd2cdf9f73c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34266-easily-exploitable-vulnerability-al-3a9864e9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34266%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20HCM%20Absence%20Management.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20PeopleSoft%20Enterprise%20HCM%20Absence%20Management%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20PeopleSoft%20Enterprise%20HCM%20Absence%20Management%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20HCM%20Absence%20Management&amp;severity=medium&amp;id=69e7e5a019fe3cd2cdf9f739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22021-easily-exploitable-vulnerability-al-a4ccec3c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22021%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTPS%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=medium&amp;id=69e7e5a019fe3cd2cdf9f730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22019-easily-exploitable-vulnerability-al-954919a7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22019%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20HCM%20Shared%20Components.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20PeopleSoft%20Enterprise%20HCM%20Shared%20Components%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20PeopleSoft%20Enterprise%20HCM%20Shared%20Components%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20PeopleSoft%20Enterprise%20HCM%20Shared%20Components%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20HCM%20Shared%20Components&amp;severity=medium&amp;id=69e7e5a019fe3cd2cdf9f72d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22018-difficult-to-exploit-vulnerability--7e8eda12</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22018%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=low&amp;id=69e7e5a019fe3cd2cdf9f72a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22017-easily-exploitable-vulnerability-al-eff7e52b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22017%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e59e19fe3cd2cdf9f6f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22016-easily-exploitable-vulnerability-al-0284ad33</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22016%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=high&amp;id=69e7e59e19fe3cd2cdf9f6f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22015-easily-exploitable-vulnerability-al-7475e114</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22015%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20MySQL%20Server%20accessible%20data.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e59e19fe3cd2cdf9f6ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22014-easily-exploitable-vulnerability-al-7b8e4ec4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22014%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20User%20Management.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20User%20Management%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20User%20Management%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20User%20Management&amp;severity=low&amp;id=69e7e59e19fe3cd2cdf9f6eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22013-difficult-to-exploit-vulnerability--0c471c87</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22013%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=medium&amp;id=69e7e59e19fe3cd2cdf9f6e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22011-difficult-to-exploit-vulnerability--4aca61a3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22011%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Applications%20DBA.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Applications%20DBA%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Applications%20DBA.%20in%20Oracle%20Corporation%20Oracle%20Applications%20DBA&amp;severity=high&amp;id=69e7e59e19fe3cd2cdf9f6e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22010-easily-exploitable-vulnerability-al-9dc3a036</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22010%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure&amp;severity=high&amp;id=69e7e59e19fe3cd2cdf9f6e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22009-easily-exploitable-vulnerability-al-fe131e6a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22009%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e59e19fe3cd2cdf9f6df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22008-difficult-to-exploit-vulnerability--a130f8c7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22008%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Java%20SE%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=low&amp;id=69e7e59e19fe3cd2cdf9f6dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22007-difficult-to-exploit-vulnerability--2c72cd1d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22007%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20executes%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=low&amp;id=69e7e59e19fe3cd2cdf9f6d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22006-easily-exploitable-vulnerability-al-36a607fb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22006%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20HCM%20Human%20Resources.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20PeopleSoft%20Enterprise%20HCM%20Human%20Resources%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20PeopleSoft%20Enterprise%20HCM%20Human%20Resources%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20PeopleSoft%20Enterprise%20HCM%20Human%20Resources%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20HCM%20Human%20Resources&amp;severity=medium&amp;id=69e7e59b19fe3cd2cdf9f620</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22005-easily-exploitable-vulnerability-al-ae98800c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22005%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e59b19fe3cd2cdf9f61d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22004-easily-exploitable-vulnerability-al-014291e7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22004%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e59b19fe3cd2cdf9f61a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22003-difficult-to-exploit-vulnerability--5c9d19cd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22003%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20low%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20executes%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data%20and%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=medium&amp;id=69e7e59b19fe3cd2cdf9f617</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22002-easily-exploitable-vulnerability-al-c5acb921</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22002%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e59b19fe3cd2cdf9f614</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22001-easily-exploitable-vulnerability-al-efde5d7a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22001%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20MySQL%20Server%20accessible%20data.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=low&amp;id=69e7e59b19fe3cd2cdf9f611</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21999-difficult-to-exploit-vulnerability--fe96ff08</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21999%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTPS%20to%20compromise%20XML%20Database.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20XML%20Database%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Database%20Server&amp;severity=medium&amp;id=69e7e59b19fe3cd2cdf9f60e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21998-easily-exploitable-vulnerability-al-53e27637</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21998%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69e7e59b19fe3cd2cdf9f60b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21997-easily-exploitable-vulnerability-al-824cd0dc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21997%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Life%20Sciences%20Empirica%20Signal.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20Life%20Sciences%20Empirica%20Signal%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Life%20Sciences%20Empirica%20Signal%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Life%20Sciences%20Empirica%20Signal%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Life%20Sciences%20Empirica%20Signal&amp;severity=high&amp;id=69e7e59b19fe3cd2cdf9f608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6796-cleartext-storage-in-a-file-or-on-di-93cd932a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6796%3A%20Cleartext%20Storage%20in%20a%20File%20or%20on%20Disk%20in%20Sanluan%20PublicCMS&amp;severity=medium&amp;id=69e7e20f19fe3cd2cdf8e298</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40910-cwe-287-improper-authentication-in--c0f68c00</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40910%3A%20CWE-287%3A%20Improper%20Authentication%20in%20fatedier%20frp&amp;severity=medium&amp;id=69e7e20f19fe3cd2cdf8e2a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40906-cwe-89-improper-neutralization-of-s-06dc3129</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40906%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20electric-sql%20electric&amp;severity=critical&amp;id=69e85dc119fe3cd2cd7080aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40905-cwe-601-url-redirection-to-untruste-9f74800f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40905%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Kovah%20LinkAce&amp;severity=high&amp;id=69e7e5b319fe3cd2cdfa0215</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40925-cwe-352-cross-site-request-forgery--d3211bbb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40925%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69e7e5b319fe3cd2cdfa0218</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40911-cwe-94-improper-control-of-generati-3a34b5ff</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40911%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=critical&amp;id=69e85dc119fe3cd2cd7080ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40892-cwe-121-stack-based-buffer-overflow-0b664e79</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40892%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20pjsip%20pjproject&amp;severity=high&amp;id=69e7e20f19fe3cd2cdf8e29d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40909-cwe-22-improper-limitation-of-a-pat-cd494b92</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40909%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69e7d78519fe3cd2cdf5b338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40908-cwe-200-exposure-of-sensitive-infor-617b1d07</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40908%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69e7d78519fe3cd2cdf5b335</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40890-cwe-125-out-of-bounds-read-in-gomar-d544ae9a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40890%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20gomarkdown%20markdown&amp;severity=high&amp;id=69e7d78519fe3cd2cdf5b32a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40907-cwe-639-authorization-bypass-throug-6904107b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40907%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69e7d78519fe3cd2cdf5b331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40903-cwe-829-inclusion-of-functionality--b78a4e14</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40903%3A%20CWE-829%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20patrickhener%20goshs&amp;severity=critical&amp;id=69e7d78519fe3cd2cdf5b32e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6819-cwe-276-incorrect-default-permission-bab31088</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6819%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20HKUDS%20OpenHarness&amp;severity=high&amp;id=69e7d78819fe3cd2cdf5b386</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40885-cwe-200-exposure-of-sensitive-infor-a89dd21b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40885%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20patrickhener%20goshs&amp;severity=high&amp;id=69e7d78519fe3cd2cdf5b322</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40884-cwe-306-missing-authentication-for--2f6a8641</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40884%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20patrickhener%20goshs&amp;severity=critical&amp;id=69e7d78519fe3cd2cdf5b31f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40883-cwe-352-cross-site-request-forgery--6def37d5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40883%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20patrickhener%20goshs&amp;severity=medium&amp;id=69e7d78519fe3cd2cdf5b31c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40876-cwe-22-improper-limitation-of-a-pat-b9e7a983</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40876%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20patrickhener%20goshs&amp;severity=high&amp;id=69e7d78519fe3cd2cdf5b319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41320-cwe-89-improper-neutralization-of-s-2bd55248</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41320%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20frappe%20hrms&amp;severity=medium&amp;id=69e7d78819fe3cd2cdf5b383</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40889-cwe-284-improper-access-control-in--64817524</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40889%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20frappe%20hrms&amp;severity=medium&amp;id=69e7d78519fe3cd2cdf5b325</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40888-cwe-284-improper-access-control-in--9ee9be60</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40888%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20frappe%20hrms&amp;severity=medium&amp;id=69e7d08b19fe3cd2cdf3fbb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40887-cwe-89-improper-neutralization-of-s-38303427</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40887%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20vendurehq%20vendure&amp;severity=critical&amp;id=69e7d08b19fe3cd2cdf3fbb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40878-cwe-79-improper-neutralization-of-i-7784261b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40878%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mailcow%20mailcow-dockerized&amp;severity=low&amp;id=69e7d08919fe3cd2cdf3fb22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33812-cwe-789-memory-allocation-with-exce-17d95bcb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33812%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20golang.org%2Fx%2Fimage%20golang.org%2Fx%2Fimage%2Ffont%2Fsfnt&amp;severity=medium&amp;id=69e7d08919fe3cd2cdf3fb05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33813-cwe-190-integer-overflow-or-wraparo-0df99465</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33813%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20golang.org%2Fx%2Fimage%20golang.org%2Fx%2Fimage%2Fwebp&amp;severity=high&amp;id=69e7d08919fe3cd2cdf3fb0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40881-cwe-770-allocation-of-resources-wit-d7ab014b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40881%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20ZcashFoundation%20zebrad&amp;severity=medium&amp;id=69e7d08b19fe3cd2cdf3fbb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40372-cwe-347-improper-verification-of-cr-0bd8d1a9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40372%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Microsoft%20ASP.NET%20Core%2010.0&amp;severity=critical&amp;id=69e7d08919fe3cd2cdf3fb10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40875-cwe-79-improper-neutralization-of-i-9045547c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40875%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mailcow%20mailcow-dockerized&amp;severity=high&amp;id=69e7d08919fe3cd2cdf3fb1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40880-cwe-1025-comparison-using-wrong-fac-76709282</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40880%3A%20CWE-1025%3A%20Comparison%20Using%20Wrong%20Factors%20in%20ZcashFoundation%20zebrad&amp;severity=high&amp;id=69e7d08b19fe3cd2cdf3fbad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40874-cwe-284-improper-access-control-in--d9bb75f4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40874%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20mailcow%20mailcow-dockerized&amp;severity=medium&amp;id=69e7d08919fe3cd2cdf3fb1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40873-cwe-79-improper-neutralization-of-i-33d3fed3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40873%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mailcow%20mailcow-dockerized&amp;severity=high&amp;id=69e7d08919fe3cd2cdf3fb19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40872-cwe-79-improper-neutralization-of-i-ba112c91</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40872%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mailcow%20mailcow-dockerized&amp;severity=critical&amp;id=69e7d08919fe3cd2cdf3fb16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40879-cwe-674-uncontrolled-recursion-in-n-f4701631</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40879%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20nestjs%20nest&amp;severity=high&amp;id=69e7d08919fe3cd2cdf3fb25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40871-cwe-20-improper-input-validation-in-d8f4f9f3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40871%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20mailcow%20mailcow-dockerized&amp;severity=high&amp;id=69e7d08919fe3cd2cdf3fb13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22751-vulnerability-in-spring-spring-secu-5bf72cfe</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22751%3A%20Vulnerability%20in%20Spring%20Spring%20Security&amp;severity=medium&amp;id=69e7c5ee19fe3cd2cdf0babf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6745-cross-site-scripting-in-bagisto-02bed925</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6745%3A%20Cross%20Site%20Scripting%20in%20Bagisto&amp;severity=medium&amp;id=69e7c5ee19fe3cd2cdf0bad5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40867-cwe-284-improper-access-control-in--21cbe18f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40867%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20horilla-opensource%20horilla&amp;severity=high&amp;id=69e7c5ee19fe3cd2cdf0bacc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40866-cwe-284-improper-access-control-in--700fc40a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40866%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20horilla-opensource%20horilla&amp;severity=high&amp;id=69e7c5ee19fe3cd2cdf0bac9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40865-cwe-284-improper-access-control-in--5574dc11</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40865%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20horilla-opensource%20horilla&amp;severity=high&amp;id=69e7c5ee19fe3cd2cdf0bac6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40614-cwe-122-heap-based-buffer-overflow--1e2849e2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40614%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20pjsip%20pjproject&amp;severity=high&amp;id=69e7c5ee19fe3cd2cdf0bac2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6744-server-side-request-forgery-in-bagis-7c5ba74f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6744%3A%20Server-Side%20Request%20Forgery%20in%20Bagisto&amp;severity=medium&amp;id=69e7c5ee19fe3cd2cdf0bacf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40611-cwe-22-improper-limitation-of-a-pat-6f07a5f7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40611%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20go-acme%20lego&amp;severity=high&amp;id=69e7bb7219fe3cd2cdedac91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40608-cwe-770-allocation-of-resources-wit-a616a4f7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40608%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20DayuanJiang%20next-ai-draw-io&amp;severity=medium&amp;id=69e7bb7219fe3cd2cdedac8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40604-cwe-693-protection-mechanism-failur-03a23c53</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40604%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20craigjbass%20clearancekit&amp;severity=high&amp;id=69e7bb7219fe3cd2cdedac8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40602-cwe-94-improper-control-of-generati-0f481d7d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40602%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20home-assistant-ecosystem%20home-assistant-cli&amp;severity=medium&amp;id=69e7bb7219fe3cd2cdedac86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40599-cwe-863-incorrect-authorization-in--53044a58</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40599%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20craigjbass%20clearancekit&amp;severity=high&amp;id=69e7bb7219fe3cd2cdedac83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41194-cwe-352-cross-site-request-forgery--0f8a82fb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41194%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=69e7b7ed19fe3cd2cdec7cd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41193-cwe-22-improper-limitation-of-a-pat-0985c242</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41193%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20freescout-help-desk%20freescout&amp;severity=critical&amp;id=69e7b7ed19fe3cd2cdec7cd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41192-cwe-862-missing-authorization-in-fr-164129b1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41192%3A%20CWE-862%3A%20Missing%20Authorization%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=69e7b7ed19fe3cd2cdec7ccb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40588-cwe-620-unverified-password-change--85d449f2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40588%3A%20CWE-620%3A%20Unverified%20Password%20Change%20in%20blueprintue%20blueprintue-self-hosted-edition&amp;severity=high&amp;id=69e7b7ed19fe3cd2cdec7cc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40587-cwe-613-insufficient-session-expira-f3fe64bf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40587%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20blueprintue%20blueprintue-self-hosted-edition&amp;severity=medium&amp;id=69e7b7ed19fe3cd2cdec7cc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40586-cwe-307-improper-restriction-of-exc-0a194121</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40586%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20blueprintue%20blueprintue-self-hosted-edition&amp;severity=high&amp;id=69e7b0e319fe3cd2cde9a474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41191-cwe-863-incorrect-authorization-in--8ff90e23</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41191%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=69e7b0e619fe3cd2cde9a4e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40585-cwe-640-weak-password-recovery-mech-ef87095c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40585%3A%20CWE-640%3A%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20blueprintue%20blueprintue-self-hosted-edition&amp;severity=high&amp;id=69e7b0e319fe3cd2cde9a471</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41190-cwe-863-incorrect-authorization-in--6a3ccd65</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41190%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=69e7b0e619fe3cd2cde9a4db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41189-cwe-863-incorrect-authorization-in--a66c49d1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41189%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=69e7b0e619fe3cd2cde9a4d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41183-cwe-200-exposure-of-sensitive-infor-45bcd11f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41183%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=69e7b0e619fe3cd2cde9a4d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21571-os-command-injection-in-atlassian-b-ae340b39</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21571%3A%20OS%20Command%20Injection%20in%20Atlassian%20Bamboo%20Data%20Center&amp;severity=critical&amp;id=69e7b0e319fe3cd2cde9a455</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40583-cwe-460-improper-cleanup-on-thrown--e62ad37f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40583%3A%20CWE-460%3A%20Improper%20Cleanup%20on%20Thrown%20Exception%20in%20UltraDAGcom%20core&amp;severity=high&amp;id=69e7b0e319fe3cd2cde9a46c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40592-cwe-862-missing-authorization-in-fr-8688a807</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40592%3A%20CWE-862%3A%20Missing%20Authorization%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=69e7b0e619fe3cd2cde9a4cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40591-cwe-639-authorization-bypass-throug-a6329c29</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40591%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=69e7b0e619fe3cd2cde9a4c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40590-cwe-639-authorization-bypass-throug-4f251147</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40590%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=69e7b0e619fe3cd2cde9a4c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40589-cwe-639-authorization-bypass-throug-73df512f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40589%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=69e7b0e319fe3cd2cde9a477</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40050-cwe-306-missing-authentication-for--9cf60429</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40050%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20CrowdStrike%20LogScale%20Self-Hosted&amp;severity=critical&amp;id=69e7b0e319fe3cd2cde9a45f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40570-cwe-639-authorization-bypass-throug-bdcd0606</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40570%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=69e7b0e319fe3cd2cde9a467</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40569-cwe-284-improper-access-control-in--03df557d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40569%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20freescout-help-desk%20freescout&amp;severity=critical&amp;id=69e7b0e319fe3cd2cde9a462</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40576-cwe-22-improper-limitation-of-a-pat-5a20dab2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40576%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20haris-musa%20excel-mcp-server&amp;severity=critical&amp;id=69e7a9cf19fe3cd2cde6d34d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5652-cwe-639-authorization-bypass-through-99c29aa9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5652%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Arcadia%20Technology%2C%20LLC%20Crafty%20Controller&amp;severity=critical&amp;id=69e7a9cf19fe3cd2cde6d350</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-ngate-variant-hides-in-a-trojanized-nfc-paymen-67781914</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20NGate%20variant%20hides%20in%20a%20trojanized%20NFC%20payment%20app&amp;severity=medium&amp;id=69e8876919fe3cd2cd808c42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6743-cross-site-scripting-in-websystems-w-c738537f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6743%3A%20Cross%20Site%20Scripting%20in%20WebSystems%20WebTOTUM&amp;severity=medium&amp;id=69e7a9cf19fe3cd2cde6d353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40161-cwe-201-insertion-of-sensitive-info-d982eabc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40161%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20tektoncd%20pipeline&amp;severity=high&amp;id=69e7a9cf19fe3cd2cde6d348</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35451-cwe-79-improper-neutralization-of-i-61801c57</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35451%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20twentyhq%20twenty&amp;severity=medium&amp;id=69e7a9cf19fe3cd2cde6d344</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29179-cwe-863-incorrect-authorization-in--0ff5534d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29179%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20octobercms%20october&amp;severity=low&amp;id=69e7a64f19fe3cd2cde569c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24189-cwe-125-out-of-bounds-read-in-nvidi-3d3c5fe9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24189%3A%20CWE-125%20Out-of-bounds%20Read%20in%20NVIDIA%20CUDA-Q&amp;severity=high&amp;id=69e7a64f19fe3cd2cde569b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24177-cwe-306-missing-authentication-for--2939e8de</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24177%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20NVIDIA%20KAI%20Scheduler&amp;severity=high&amp;id=69e7a64f19fe3cd2cde569ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27937-cwe-79-improper-neutralization-of-i-7782ad1c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27937%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20octobercms%20october&amp;severity=low&amp;id=69e7a64f19fe3cd2cde569c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24176-cwe-863-incorrect-authorization-in--8c82f828</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24176%3A%20CWE-863%20Incorrect%20Authorization%20in%20NVIDIA%20KAI%20Scheduler&amp;severity=medium&amp;id=69e7a64f19fe3cd2cde569a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26274-cwe-184-incomplete-list-of-disallow-8bd90ae5</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26274%3A%20CWE-184%3A%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20octobercms%20october&amp;severity=medium&amp;id=69e7a64f19fe3cd2cde569bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26067-cwe-863-incorrect-authorization-in--83ab9d20</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26067%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20octobercms%20october&amp;severity=medium&amp;id=69e7a64f19fe3cd2cde569bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40568-cwe-79-improper-neutralization-of-i-88d3a761</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40568%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=69e7a65119fe3cd2cde569fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40567-cwe-116-improper-encoding-or-escapi-816aa455</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40567%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=69e7a64f19fe3cd2cde569cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25542-cwe-185-incorrect-regular-expressio-f6516f4c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25542%3A%20CWE-185%3A%20Incorrect%20Regular%20Expression%20in%20tektoncd%20pipeline&amp;severity=medium&amp;id=69e7a64f19fe3cd2cde569b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40566-cwe-918-server-side-request-forgery-a36f6f36</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40566%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=69e7a64f19fe3cd2cde569c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40565-cwe-79-improper-neutralization-of-i-5b151c9e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40565%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=69e79f4219fe3cd2cde2398a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15638-cwe-1395-dependency-on-vulnerable-t-9d7fb978</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15638%3A%20CWE-1395%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20ATRODO%20Net%3A%3ADropbear&amp;severity=critical&amp;id=69e79f4219fe3cd2cde23981</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40498-cwe-200-exposure-of-sensitive-infor-522bd98d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40498%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=69e7983919fe3cd2cddfb24b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41029-cwe-89-improper-neutralization-of-s-bd938344</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41029%3A%20CWE-89%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20injection&apos;)%20in%20Zeon%20Global%20Tech%20Zeon%20Academy%20Pro&amp;severity=critical&amp;id=69e7983919fe3cd2cddfb248</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3298-cwe-787-out-of-bounds-write-in-pytho-b8d27af6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3298%3A%20CWE-787%20Out-of-bounds%20write%20in%20Python%20Software%20Foundation%20CPython&amp;severity=high&amp;id=69e7913319fe3cd2cddd4302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/third-us-security-expert-admits-helping-ransomware-74f42e2e</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Third%20US%20Security%20Expert%20Admits%20Helping%20Ransomware%20Gang&amp;severity=medium&amp;id=69e78daf19fe3cd2cddbe9df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31981-cwe-319-cleartext-transmission-of-s-2e6e3d9a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31981%3A%20CWE-319%20Cleartext%20transmission%20of%20sensitive%20information%20in%20HCLSoftware%20BigFix%20Service%20Management%20(SM)&amp;severity=medium&amp;id=69e7913319fe3cd2cddd42f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1089-cwe-74-improper-neutralization-of-sp-8cd96290</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1089%3A%20CWE-74%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Fortra%20GoAnywhere%20MFT&amp;severity=medium&amp;id=69e78a2b19fe3cd2cdda97ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0972-cwe-307-improper-restriction-of-exce-c937cc23</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0972%3A%20CWE-74%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Fortra%20GoAnywhere%20MFT&amp;severity=medium&amp;id=69e78a2b19fe3cd2cdda97eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0971-cwe-613-insufficient-session-expirat-b43043cf</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0971%3A%20CWE-613%20Insufficient%20session%20expiration%20in%20Fortra%20GoAnywhere%20MFT&amp;severity=medium&amp;id=69e78a2b19fe3cd2cdda97e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14362-cwe-307-improper-restriction-of-exc-13ac78f7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14362%3A%20CWE-307%20Improper%20restriction%20of%20excessive%20authentication%20attempts%20in%20Fortra%20GoAnywhere%20MFT&amp;severity=high&amp;id=69e78a2b19fe3cd2cdda97df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1241-cwe-326-inadequate-encryption-streng-4a3e3d6d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1241%3A%20CWE-326%20Inadequate%20Encryption%20Strength%20in%20Fortra%20GoAnywhere%20MFT&amp;severity=medium&amp;id=69e78a2b19fe3cd2cdda97e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dozens-of-malicious-crypto-apps-land-in-apple-app--efc49ec6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dozens%20of%20Malicious%20Crypto%20Apps%20Land%20in%20Apple%20App%20Store&amp;severity=medium&amp;id=69e786a719fe3cd2cdd94797</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31958-cwe-444-inconsistent-interpretation-780bdea3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31958%3A%20CWE-444%20Inconsistent%20interpretation%20of%20HTTP%20requests%20(&apos;HTTP%20Request%2FResponse%20smuggling&apos;)%20in%20HCLSoftware%20BigFix%20Service%20Management%20(SM)&amp;severity=low&amp;id=69e78a2b19fe3cd2cdda97e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6786-vulnerability-in-mozilla-firefox-c7dc35e6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6786%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e778a419fe3cd2cdd1666b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6785-vulnerability-in-mozilla-firefox-6e2b9d34</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6785%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e778a419fe3cd2cdd16665</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6784-vulnerability-in-mozilla-firefox-e6175a94</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6784%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e778a219fe3cd2cdd1662e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6783-vulnerability-in-mozilla-firefox-afc57616</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6783%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69e778a219fe3cd2cdd16629</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6782-vulnerability-in-mozilla-firefox-28f5a500</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6782%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e778a219fe3cd2cdd16625</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6781-vulnerability-in-mozilla-firefox-9197f035</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6781%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e778a219fe3cd2cdd16621</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6780-vulnerability-in-mozilla-firefox-d3eae43f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6780%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e778a219fe3cd2cdd1661d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6779-vulnerability-in-mozilla-firefox-79181267</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6779%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69e778a219fe3cd2cdd16619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6778-vulnerability-in-mozilla-firefox-43480df6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6778%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69e778a219fe3cd2cdd16615</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6777-vulnerability-in-mozilla-firefox-6c2ce61a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6777%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69e778a219fe3cd2cdd16611</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6776-vulnerability-in-mozilla-firefox-f98abd05</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6776%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e778a219fe3cd2cdd1660c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6775-vulnerability-in-mozilla-firefox-5d98590c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6775%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69e778a219fe3cd2cdd16608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6774-vulnerability-in-mozilla-firefox-5199b680</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6774%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69e7789e19fe3cd2cdd164ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6773-vulnerability-in-mozilla-firefox-33037a25</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6773%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e7789e19fe3cd2cdd164c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40520-cwe-78-improper-neutralization-of-s-099f84e5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40520%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20FreePBX%20api&amp;severity=high&amp;id=69e7789819fe3cd2cdd1623b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6772-vulnerability-in-mozilla-firefox-0f432745</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6772%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e7789e19fe3cd2cdd164c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6771-vulnerability-in-mozilla-firefox-18267380</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6771%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69e7789e19fe3cd2cdd164bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6770-vulnerability-in-mozilla-firefox-82935fdd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6770%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69e7789e19fe3cd2cdd164b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6769-vulnerability-in-mozilla-firefox-7d15a9d7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6769%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e7789e19fe3cd2cdd164b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6768-vulnerability-in-mozilla-firefox-55047e0b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6768%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69e7789e19fe3cd2cdd164ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6767-vulnerability-in-mozilla-firefox-4e761dc0</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6767%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69e7789e19fe3cd2cdd164a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6766-vulnerability-in-mozilla-firefox-88974ce9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6766%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e7789e19fe3cd2cdd164a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6765-vulnerability-in-mozilla-firefox-29539157</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6765%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69e7789e19fe3cd2cdd1649d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6764-vulnerability-in-mozilla-firefox-ece1348c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6764%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69e7789c19fe3cd2cdd163f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6763-vulnerability-in-mozilla-firefox-ffe9f141</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6763%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69e7789c19fe3cd2cdd163ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6762-vulnerability-in-mozilla-firefox-6371567f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6762%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69e7789c19fe3cd2cdd163e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6761-vulnerability-in-mozilla-firefox-567e17b7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6761%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e7789c19fe3cd2cdd163e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6760-vulnerability-in-mozilla-firefox-2a44a5a5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6760%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69e7789c19fe3cd2cdd163df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6759-vulnerability-in-mozilla-firefox-c42f7b28</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6759%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e7789c19fe3cd2cdd163da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6758-vulnerability-in-mozilla-firefox-73a7faa7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6758%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e7789c19fe3cd2cdd163d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6757-vulnerability-in-mozilla-firefox-536b8d82</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6757%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69e7789c19fe3cd2cdd163d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6756-vulnerability-in-mozilla-firefox-5a5960e7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6756%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e7789c19fe3cd2cdd163cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6755-vulnerability-in-mozilla-firefox-6af9a412</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6755%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69e7789c19fe3cd2cdd163c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6754-vulnerability-in-mozilla-firefox-cde18b2d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6754%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e7789819fe3cd2cdd1626d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6753-vulnerability-in-mozilla-firefox-ce0c3cfc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6753%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e7789819fe3cd2cdd16268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6752-vulnerability-in-mozilla-firefox-c6833d24</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6752%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e7789819fe3cd2cdd16262</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6751-vulnerability-in-mozilla-firefox-c3bd5d8b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6751%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e7789819fe3cd2cdd1625d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6750-vulnerability-in-mozilla-firefox-be82c19c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6750%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e7789819fe3cd2cdd16257</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6749-vulnerability-in-mozilla-firefox-a12ebed7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6749%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e7789819fe3cd2cdd16251</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6748-vulnerability-in-mozilla-firefox-a414d93c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6748%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69e7789819fe3cd2cdd1624c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6747-vulnerability-in-mozilla-firefox-6911b2ac</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6747%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e7789819fe3cd2cdd16247</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6746-vulnerability-in-mozilla-firefox-7da0070b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6746%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69e7789819fe3cd2cdd16241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unsecured-perforce-servers-expose-sensitive-data-f-f9a1d370</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unsecured%20Perforce%20Servers%20Expose%20Sensitive%20Data%20From%20Major%20Orgs&amp;severity=low&amp;id=69e7718d19fe3cd2cdcf669d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/progress-patches-multiple-vulnerabilities-in-movei-0865d57c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Progress%20Patches%20Multiple%20Vulnerabilities%20in%20MOVEit%20WAF%2C%20LoadMaster&amp;severity=critical&amp;id=69e76a8619fe3cd2cdcd2f76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/highly-destructive-lotus-wiper-used-in-a-targeted--55ae9b6d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Highly%20destructive%20Lotus%20Wiper%20used%20in%20a%20targeted%20attack&amp;severity=medium&amp;id=69e794b519fe3cd2cdde14d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/void-dokkaebi-uses-fake-job-interview-lure-to-spre-e0c358ec</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Void%20Dokkaebi%20Uses%20Fake%20Job%20Interview%20Lure%20to%20Spread%20Malware%20via%20Code%20Repositories&amp;severity=medium&amp;id=69e7983919fe3cd2cddfb206</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32147-cwe-22-improper-limitation-of-a-pat-3bf12671</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32147%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Erlang%20OTP&amp;severity=medium&amp;id=69e76a9219fe3cd2cdcd3204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/organizations-warned-of-exploited-cisco-kentico-zi-bdb1bac9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Organizations%20Warned%20of%20Exploited%20Cisco%2C%20Kentico%2C%20Zimbra%20Vulnerabilities&amp;severity=medium&amp;id=69e75ffc19fe3cd2cdc9da8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/data-breaches-at-healthcare-organizations-in-illin-a2987dbc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Data%20Breaches%20at%20Healthcare%20Organizations%20in%20Illinois%20and%20Texas%20Affect%20600%2C000&amp;severity=medium&amp;id=69e75c7919fe3cd2cdc919ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41039-cwe-306-missing-authentication-for--80836606</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41039%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20Quantum%20Networks%20Router%20QN-I-470&amp;severity=high&amp;id=69e7556d19fe3cd2cdc6eda6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41038-cwe-521-weak-password-requirements--6f560b49</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41038%3A%20CWE-521%20Weak%20password%20requirements%20in%20Quantum%20Networks%20Router%20QN-I-470&amp;severity=high&amp;id=69e7556d19fe3cd2cdc6eda3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41036-cwe-78-improper-neutralization-of-s-3995b27c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41036%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20Quantum%20Networks%20Router%20QN-I-470&amp;severity=high&amp;id=69e74ecd19fe3cd2cdc4b538</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41037-cwe-78-improper-neutralization-of-s-9a175a9d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41037%3A%20CWE-307%20Improper%20restriction%20of%20excessive%20authentication%20attempts%20in%20Quantum%20Networks%20Router%20QN-I-470&amp;severity=high&amp;id=69e74ecd19fe3cd2cdc4b53b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6553-cwe-312-cleartext-storage-of-sensiti-cf5d9eb4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6553%3A%20CWE-312%20Cleartext%20storage%20of%20sensitive%20information%20in%20TYPO3%20TYPO3%20CMS&amp;severity=high&amp;id=69e74ecd19fe3cd2cdc4b53e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/290-million-kelp-dao-crypto-heist-blamed-on-north--c8351c6e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%24290%20Million%20Kelp%20DAO%20Crypto%20Heist%20Blamed%20on%20North%20Korea&amp;severity=medium&amp;id=69e74e6619fe3cd2cdc490b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39467-cwe-502-deserialization-of-untruste-b052f27b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39467%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20MetaSlider%20Responsive%20Slider%20by%20MetaSlider&amp;severity=high&amp;id=69e85dc119fe3cd2cd7080b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3317-cwe-79-improper-neutralization-of-in-bc0d6fff</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3317%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Navigate%20Navigate%20CMS&amp;severity=medium&amp;id=69e77fa019fe3cd2cdd6c936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zero-day-local-privilege-escalation-exploit-7e8bc202</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Zero-Day%20Local%20Privilege%20Escalation%20Exploit&amp;severity=medium&amp;id=69e743d919fe3cd2cdbf5fa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stepdrainer-maas-platform-targeting-multi-chain-cr-8e2c0d64</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=StepDrainer%20MaaS%20Platform%20Targeting%20Multi-Chain%20Crypto%20Wallets%20and%20NFT%20Assets&amp;severity=medium&amp;id=69e743d919fe3cd2cdbf5f9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13826-cwe-20-improper-input-validation-in-e8122402</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13826%3A%20CWE-20%20Improper%20input%20validation%20in%20Zervit%20portable%20HTTP%2FWeb%20server&amp;severity=high&amp;id=69e7405619fe3cd2cdbc7e33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-wav-with-a-payload-tue-apr-21st-23f911ce</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20.WAV%20With%20A%20Payload%2C%20(Tue%2C%20Apr%2021st)&amp;severity=medium&amp;id=69e7243619fe3cd2cdad0936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6711-cwe-79-improper-neutralization-of-in-36876d7f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6711%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ryhowa%20Website%20LLMs.txt&amp;severity=medium&amp;id=69e7244019fe3cd2cdad1062</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6712-cwe-79-improper-neutralization-of-in-d4d456a7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6712%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ryhowa%20Website%20LLMs.txt&amp;severity=medium&amp;id=69e7244019fe3cd2cdad1066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6703-cwe-862-missing-authorization-in-cyb-07334513</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6703%3A%20CWE-862%20Missing%20Authorization%20in%20cyberchimps%20Responsive%20Blocks%20%E2%80%93%20Page%20Builder%20for%20Blocks%20%26%20Patterns&amp;severity=medium&amp;id=69e7244019fe3cd2cdad1058</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31368-vulnerability-in-honor-aiassistant-1df3a7cb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31368%3A%20Vulnerability%20in%20Honor%20AIAssistant&amp;severity=high&amp;id=69e7244019fe3cd2cdad104e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31370-vulnerability-in-honor-honor-e-c66083f6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31370%3A%20Vulnerability%20in%20Honor%20Honor%20E&amp;severity=medium&amp;id=69e7244019fe3cd2cdad1055</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31369-vulnerability-in-honor-pcmanager-613082f0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31369%3A%20Vulnerability%20in%20Honor%20PcManager&amp;severity=low&amp;id=69e7244019fe3cd2cdad1052</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5965-cwe-78-improper-neutralization-of-sp-2ef8e92f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5965%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20NewSoft%20NewSoftOA&amp;severity=critical&amp;id=69e6f68219fe3cd2cd7b7460</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6674-cwe-89-improper-neutralization-of-sp-bfb6e268</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6674%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20tholstkabelbwde%20Plugin%3A%20CMS%20f%C3%BCr%20Motorrad%20Werkst%C3%A4tten&amp;severity=medium&amp;id=69e6e4ee19fe3cd2cd6b0ea8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6675-cwe-20-improper-input-validation-in--4090eec6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6675%3A%20CWE-20%20Improper%20Input%20Validation%20in%20cyberchimps%20Responsive%20Blocks%20%E2%80%93%20Page%20Builder%20for%20Blocks%20%26%20Patterns&amp;severity=medium&amp;id=69e6e4ee19fe3cd2cd6b0eaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/macos-clickfix-campaign-applescript-stealers-new-t-be54c1be</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=macOS%20ClickFix%20Campaign%3A%20AppleScript%20Stealers%20%26%20New%20Terminal%20Protections&amp;severity=medium&amp;id=69e743d919fe3cd2cdbf5f8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-tuesday-april-21st-2026-httpsisc-777f2247</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Tuesday%2C%20April%2021st%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9900%2C%20(Tue%2C%20Apr%2021st)&amp;severity=medium&amp;id=69e6da6219fe3cd2cd678755</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40497-cwe-79-improper-neutralization-of-i-2ec0f6d7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40497%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=69e6e4ee19fe3cd2cd6b0ea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6058-cwe-116-improper-encoding-or-escapin-11e72fb4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6058%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Zyxel%20WRE6505%20v2%20firmware&amp;severity=medium&amp;id=69e6d6dd19fe3cd2cd64f73f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40496-cwe-330-use-of-insufficiently-rando-3f3ecc92</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40496%3A%20CWE-330%3A%20Use%20of%20Insufficiently%20Random%20Values%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=69e6d6dd19fe3cd2cd64f73a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39973-cwe-22-improper-limitation-of-a-pat-c6436e92</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39973%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20iBotPeaches%20Apktool&amp;severity=high&amp;id=69e6d6dd19fe3cd2cd64f727</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40250-cwe-190-integer-overflow-or-wraparo-2b457c47</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40250%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20AcademySoftwareFoundation%20openexr&amp;severity=high&amp;id=69e6d6dd19fe3cd2cd64f734</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40244-cwe-190-integer-overflow-or-wraparo-b0178a70</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40244%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20AcademySoftwareFoundation%20openexr&amp;severity=high&amp;id=69e6d6dd19fe3cd2cd64f72e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39886-cwe-190-integer-overflow-or-wraparo-340b0101</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39886%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20AcademySoftwareFoundation%20openexr&amp;severity=medium&amp;id=69e6d6dd19fe3cd2cd64f723</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39866-cwe-77-improper-neutralization-of-s-81df236e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39866%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20LawnchairLauncher%20lawnchair&amp;severity=high&amp;id=69e6d6dd19fe3cd2cd64f71f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39861-cwe-22-improper-limitation-of-a-pat-fe7bb571</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39861%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20anthropics%20claude-code&amp;severity=high&amp;id=69e70c3119fe3cd2cda1991b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39386-cwe-20-improper-input-validation-in-3dff969c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39386%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20m1k1o%20neko&amp;severity=high&amp;id=69e70c3119fe3cd2cda19916</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39378-cwe-22-improper-limitation-of-a-pat-8ec9e358</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39378%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20jupyter%20nbconvert&amp;severity=medium&amp;id=69e70c3119fe3cd2cda19912</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39377-cwe-22-improper-limitation-of-a-pat-ab7b12da</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39377%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20jupyter%20nbconvert&amp;severity=medium&amp;id=69e70c3119fe3cd2cda1990e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39320-cwe-400-uncontrolled-resource-consu-192a946e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39320%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20SignalK%20signalk-server&amp;severity=high&amp;id=69e70c3119fe3cd2cda19908</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-22-81c87d26</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-22&amp;severity=medium&amp;id=69e95b5c87115cfb68e9a40b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-21-bc5489f3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-21&amp;severity=medium&amp;id=69e8133c19fe3cd2cd08e488</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41527-cwe-670-always-incorrect-control-fl-d691b0ff</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41527%3A%20CWE-670%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20KDE%20Kleopatra&amp;severity=medium&amp;id=69e7f01d19fe3cd2cdfcab50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40706-cwe-122-heap-based-buffer-overflow--1677622f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40706%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Tuxera%20NTFS-3G&amp;severity=high&amp;id=69e7e91619fe3cd2cdfaec3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70420-na-4e0e2207</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70420%3A%20n%2Fa&amp;severity=high&amp;id=69e7e59b19fe3cd2cdf9f604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38835-na-76ac3533</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38835%3A%20n%2Fa&amp;severity=critical&amp;id=69e7b0e319fe3cd2cde9a45c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38834-na-8ec8315b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38834%3A%20n%2Fa&amp;severity=high&amp;id=69e7b0e319fe3cd2cde9a459</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30452-na-063586c3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30452%3A%20n%2Fa&amp;severity=medium&amp;id=69e7a9cf19fe3cd2cde6d340</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37748-na-307786c0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37748%3A%20n%2Fa&amp;severity=high&amp;id=69e79f4219fe3cd2cde23986</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31019-na-95fdcbf8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31019%3A%20n%2Fa&amp;severity=high&amp;id=69e7913319fe3cd2cddd42fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31014-na-5cd81c30</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31014%3A%20n%2Fa&amp;severity=medium&amp;id=69e7913319fe3cd2cddd42fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31013-na-1bff2a7e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31013%3A%20n%2Fa&amp;severity=medium&amp;id=69e7913319fe3cd2cddd42f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31018-na-5cedfc61</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31018%3A%20n%2Fa&amp;severity=high&amp;id=69e78a2b19fe3cd2cdda97f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29644-na-9220de1b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29644%3A%20n%2Fa&amp;severity=medium&amp;id=69e78a2b19fe3cd2cdda97f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-21-67550afc</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-21&amp;severity=low&amp;id=69e720a919fe3cd2cdab8fe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35570-cwe-22-improper-limitation-of-a-pat-9690475b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35570%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Gitlawb%20openclaude&amp;severity=high&amp;id=69e6b73b19fe3cd2cd3f2d17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35588-cwe-89-improper-neutralization-of-s-d5dd4191</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35588%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20nicolargo%20glances&amp;severity=medium&amp;id=69e6b73b19fe3cd2cd3f2d1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35587-cwe-918-server-side-request-forgery-b45389c5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35587%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20nicolargo%20glances&amp;severity=high&amp;id=69e6b73b19fe3cd2cd3f2d1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34839-cwe-200-exposure-of-sensitive-infor-610ff57b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34839%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20nicolargo%20glances&amp;severity=high&amp;id=69e6b73b19fe3cd2cd3f2d13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34082-cwe-863-incorrect-authorization-in--40639301</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34082%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20langgenius%20dify&amp;severity=medium&amp;id=69e6b3b619fe3cd2cd3c6984</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5721-cwe-79-improper-neutralization-of-in-22e6e920</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5721%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdatatables%20wpDataTables%20%E2%80%93%20WordPress%20Data%20Table%2C%20Dynamic%20Tables%20%26%20Table%20Charts%20Plugin&amp;severity=medium&amp;id=69e70c3119fe3cd2cda1991e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6729-improper-authentication-cwe-287-in-h-9f443589</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6729%3A%20Improper%20Authentication%20(CWE-287)%20in%20HKUDS%20OpenHarness&amp;severity=medium&amp;id=69e6a5a619fe3cd2cd37e7bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0930-cwe-126-buffer-over-read-in-wolfssl--45e6df06</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0930%3A%20CWE-126%20Buffer%20over-read%20in%20wolfSSL%20wolfSSH&amp;severity=low&amp;id=69e69e9e19fe3cd2cd35b3c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22051-213-in-netapp-storagegrid-formerly--21cb3eaf</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22051%3A%20213%20in%20NETAPP%20StorageGRID%20(formerly%20StorageGRID%20Webscale)&amp;severity=low&amp;id=69e69e9e19fe3cd2cd35b3cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5450-cwe-122-heap-based-buffer-overflow-i-519d630a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5450%3A%20CWE-122%20Heap-based%20buffer%20overflow%20in%20The%20GNU%20C%20Library%20glibc&amp;severity=critical&amp;id=69e6941f19fe3cd2cd32c4a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5928-cwe-127-buffer-under-read-in-the-gnu-718b9b46</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5928%3A%20CWE-127%20Buffer%20under-read%20in%20The%20GNU%20C%20Library%20glibc&amp;severity=high&amp;id=69e6942119fe3cd2cd32c4c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5358-cwe-120-buffer-copy-without-checking-f66644ca</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5358&amp;severity=null&amp;id=69e6941f19fe3cd2cd32c49d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/abusing-oauth-device-code-flow-47c06045</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Abusing%20OAuth%20Device%20Code%20Flow&amp;severity=medium&amp;id=69e743d919fe3cd2cdbf5f99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33626-cwe-918-server-side-request-forgery-8b34f83e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33626%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20InternLM%20lmdeploy&amp;severity=high&amp;id=69e6941f19fe3cd2cd32c48f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4852-cwe-79-improper-neutralization-of-in-a8bf03ac</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4852%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webzunft%20Image%20Source%20Control%20Lite%20%E2%80%93%20Show%20Image%20Credits%20and%20Captions&amp;severity=medium&amp;id=69e6941f19fe3cd2cd32c499</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34403-cwe-1385-missing-origin-validation--246430aa</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34403%3A%20CWE-1385%3A%20Missing%20Origin%20Validation%20in%20WebSockets%20in%200xJacky%20nginx-ui&amp;severity=medium&amp;id=69e6941f19fe3cd2cd32c495</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33031-cwe-284-improper-access-control-in--72cf9b52</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33031%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%200xJacky%20nginx-ui&amp;severity=high&amp;id=69e6941f19fe3cd2cd32c48c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6249-cwe-434-unrestricted-upload-of-file--37387f6f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6249%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Vvveb%20Vvveb%20CMS&amp;severity=high&amp;id=69e6860319fe3cd2cd2e53c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32311-cwe-78-improper-neutralization-of-s-db639b7a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32311%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20reconurge%20flowsint&amp;severity=critical&amp;id=69e6860319fe3cd2cd2e53c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5478-cwe-22-improper-limitation-of-a-path-efdce342</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5478%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wpeverest%20Everest%20Forms%20%E2%80%93%20Contact%20Form%2C%20Payment%20Form%2C%20Quiz%2C%20Survey%20%26%20Custom%20Form%20Builder&amp;severity=high&amp;id=69e6827f19fe3cd2cd2c9b82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6550-cwe-757-selection-of-less-secure-alg-f7428a18</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6550%3A%20CWE-757%20Selection%20of%20Less-Secure%20algorithm%20during%20negotiation%20(&apos;algorithm%20downgrade&apos;)%20in%20AWS%20AWS%20Encryption%20SDK%20for%20Python&amp;severity=medium&amp;id=69e6827f19fe3cd2cd2c9b8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6257-cwe-434-unrestricted-upload-of-file--a5467518</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6257%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Vvveb%20Vvveb%20CMS&amp;severity=critical&amp;id=69e6827f19fe3cd2cd2c9b89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6248-cwe-22-improper-limitation-of-a-path-6a56cf6f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6248%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20tomdever%20wpForo%20Forum&amp;severity=high&amp;id=69e6746e19fe3cd2cd270d57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6060-cwe-400-uncontrolled-resource-consum-095d4529</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6060%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20OTRS%20AG%20OTRS&amp;severity=medium&amp;id=69e6746e19fe3cd2cd270d54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23753-cwe-79-improper-neutralization-of-i-e0904d43</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23753%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20HelpDesk&amp;severity=medium&amp;id=69e669e219fe3cd2cd1fdd49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23752-cwe-79-improper-neutralization-of-i-bc58662f</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23752%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20HelpDesk&amp;severity=medium&amp;id=69e669e219fe3cd2cd1fdd45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23756-cwe-79-improper-neutralization-of-i-3fda2202</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23756%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20HelpDesk&amp;severity=medium&amp;id=69e6665f19fe3cd2cd1d0af5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23758-cwe-79-improper-neutralization-of-i-2b15cc21</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23758%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20HelpDesk&amp;severity=medium&amp;id=69e6665f19fe3cd2cd1d0af9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23757-cwe-79-improper-neutralization-of-i-cb7aff71</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23757%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20HelpDesk&amp;severity=medium&amp;id=69e669e219fe3cd2cd1fdd4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6662-permissive-cross-domain-policy-with--ecf1bf74</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6662%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20ericc-ch%20copilot-api&amp;severity=medium&amp;id=69e65f5619fe3cd2cd181516</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35154-cwe-269-improper-privilege-manageme-1398659d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35154%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Dell%20PowerProtect%20Data%20Domain%20appliances&amp;severity=medium&amp;id=69e65f5619fe3cd2cd181513</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26951-cwe-121-stack-based-buffer-overflow-b7d3a9fa</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26951%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=medium&amp;id=69e65f5619fe3cd2cd18150b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22761-cwe-78-improper-neutralization-of-s-276732a8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22761%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=medium&amp;id=69e65f5619fe3cd2cd181508</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26942-cwe-78-improper-neutralization-of-s-0c3802de</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26942%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=medium&amp;id=69e6585319fe3cd2cd13fc28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26943-cwe-78-improper-neutralization-of-s-e6401189</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26943%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=high&amp;id=69e6585319fe3cd2cd13fc2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28684-cwe-59-improper-link-resolution-bef-53f39769</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28684%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20theskumar%20python-dotenv&amp;severity=medium&amp;id=69e6585319fe3cd2cd13fc2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40488-cwe-434-unrestricted-upload-of-file-92009658</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40488%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20OpenMage%20magento-lts&amp;severity=high&amp;id=69e6585619fe3cd2cd13fdec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24506-cwe-78-improper-neutralization-of-s-6ab75aac</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24506%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=high&amp;id=69e6585319fe3cd2cd13fc1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40098-cwe-862-missing-authorization-in-op-fd04dcee</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40098%3A%20CWE-862%3A%20Missing%20Authorization%20in%20OpenMage%20magento-lts&amp;severity=medium&amp;id=69e6585619fe3cd2cd13fde8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41445-cwe-190-integer-overflow-or-wraparo-01c0a012</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41445%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20mborgerding%20kissfft&amp;severity=high&amp;id=69e6585619fe3cd2cd13fdef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24505-cwe-20-improper-input-validation-in-c6a9ba55</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24505%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=high&amp;id=69e6585319fe3cd2cd13fc1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25525-cwe-22-improper-limitation-of-a-pat-a9976697</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25525%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20OpenMage%20magento-lts&amp;severity=medium&amp;id=69e6585319fe3cd2cd13fc25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25524-cwe-502-deserialization-of-untruste-3dde7b9a</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25524%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20OpenMage%20magento-lts&amp;severity=high&amp;id=69e6585319fe3cd2cd13fc21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24504-cwe-20-improper-input-validation-in-aaecaf65</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24504%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=high&amp;id=69e6585319fe3cd2cd13fc18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25883-cwe-918-server-side-request-forgery-e4d85caa</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25883%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Vexa-ai%20vexa&amp;severity=medium&amp;id=69e6514819fe3cd2cd0f546a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25058-cwe-306-missing-authentication-for--43e38c98</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25058%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Vexa-ai%20vexa&amp;severity=high&amp;id=69e6514819fe3cd2cd0f5467</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23774-cwe-78-improper-neutralization-of-s-21982f3d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23774%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=high&amp;id=69e6514819fe3cd2cd0f5458</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26944-cwe-306-missing-authentication-for--b54222f7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26944%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=high&amp;id=69e6514819fe3cd2cd0f546d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24468-cwe-204-observable-response-discrep-14e76056</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24468%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20OpenAEV-Platform%20openaev&amp;severity=medium&amp;id=69e6514819fe3cd2cd0f5461</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/serial-to-ip-converter-flaws-expose-ot-and-healthc-418cd40b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Serial-to-IP%20Converter%20Flaws%20Expose%20OT%20and%20Healthcare%20Systems%20to%20Hacking&amp;severity=medium&amp;id=69e64a3d19fe3cd2cd0b92f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24467-cwe-640-weak-password-recovery-mech-f6c2c6a1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24467%3A%20CWE-640%3A%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20OpenAEV-Platform%20openaev&amp;severity=critical&amp;id=69e6514819fe3cd2cd0f545b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6066-cwe-319-cleartext-transmission-of-se-33382bd5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6066%3A%20CWE-319%20Cleartext%20transmission%20of%20sensitive%20information%20in%20ConnectWise%20Automate&amp;severity=high&amp;id=69e64a4819fe3cd2cd0b9550</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40896-cwe-367-time-of-check-time-of-use-t-00e246fb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40896%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20opf%20openproject&amp;severity=medium&amp;id=69e64a4819fe3cd2cd0b954c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-gentlemen-systembc-a-sneak-peek-behind-the-pro-8855cd3b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Gentlemen%20%26%20SystemBC%3A%20A%20Sneak%20Peek%20Behind%20the%20Proxy&amp;severity=medium&amp;id=69e654cd19fe3cd2cd11382a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6652-improper-neutralization-of-directive-fc5b0bb7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6652%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20in%20Pagekit%20CMS&amp;severity=medium&amp;id=69e6433a19fe3cd2cd0895a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3219-vulnerability-in-python-packaging-au-c2c2a79a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3219%3A%20Vulnerability%20in%20Python%20Packaging%20Authority%20pip&amp;severity=medium&amp;id=69e6433a19fe3cd2cd089595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39918-cwe-94-improper-control-of-generati-40adcadb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39918%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20givanz%20Vvveb&amp;severity=critical&amp;id=69e6433a19fe3cd2cd089590</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6651-cross-site-scripting-in-erponlinexyz-2be03bc3</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6651%3A%20Cross%20Site%20Scripting%20in%20erponline.xyz%20ERP%20Online&amp;severity=medium&amp;id=69e6433a19fe3cd2cd08959e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6650-unrestricted-upload-in-z-blogphp-5877ecba</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6650%3A%20Unrestricted%20Upload%20in%20Z-BlogPHP&amp;severity=medium&amp;id=69e6433a19fe3cd2cd089598</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/20th-april-threat-intelligence-report-cca5eb65</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=20th%20April%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=69e7196619fe3cd2cda7fa5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34428-cwe-918-server-side-request-forgery-d80a5e6f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34428%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20givanz%20Vvveb&amp;severity=high&amp;id=69e6390b19fe3cd2cd032865</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34427-cwe-915-improperly-controlled-modif-93e46d07</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34427%3A%20CWE-915%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes%20in%20givanz%20Vvveb&amp;severity=high&amp;id=69e6390b19fe3cd2cd032860</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34429-cwe-79-improper-neutralization-of-i-98ae1cc2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34429%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20givanz%20Vvveb&amp;severity=medium&amp;id=69e6390b19fe3cd2cd03286a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6369-cwe-306-missing-authentication-for-c-433fed26</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6369%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20Canonical%20canonical-livepatch&amp;severity=medium&amp;id=69e631a519fe3cd2cdff2615</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4048-cwe-77-in-progress-software-loadmast-147ff8ce</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4048%3A%20CWE-77%20in%20Progress%20Software%20LoadMaster&amp;severity=high&amp;id=69e631a519fe3cd2cdff2612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3519-cwe-77-in-progress-software-loadmast-bb82ec04</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3519%3A%20CWE-77%20in%20Progress%20Software%20LoadMaster&amp;severity=high&amp;id=69e631a519fe3cd2cdff260f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6649-server-side-request-forgery-in-qibo--08a5f1b3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6649%3A%20Server-Side%20Request%20Forgery%20in%20Qibo%20CMS&amp;severity=medium&amp;id=69e631a519fe3cd2cdff2618</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3518-cwe-77-in-progress-software-loadmast-bd0fbf2f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3518%3A%20CWE-77%20in%20Progress%20Software%20LoadMaster&amp;severity=high&amp;id=69e631a519fe3cd2cdff260c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33557-cwe-1285-improper-validation-of-spe-1e576c60</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33557%3A%20CWE-1285%20Improper%20Validation%20of%20Specified%20Index%2C%20Position%2C%20or%20Offset%20in%20Input%20in%20Apache%20Software%20Foundation%20Apache%20Kafka&amp;severity=critical&amp;id=69e631a519fe3cd2cdff25ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66335-cwe-89-improper-neutralization-of-s-9d5744c2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66335%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Doris%20MCP%20Server&amp;severity=medium&amp;id=69e631a519fe3cd2cdff25fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3517-cwe-77-in-progress-software-loadmast-5d7a71cc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3517%3A%20CWE-77%20in%20Progress%20Software%20LoadMaster&amp;severity=high&amp;id=69e631a519fe3cd2cdff2609</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33558-cwe-533-deprecated-information-expo-cc938213</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33558%3A%20CWE-533%20DEPRECATED%3A%20Information%20Exposure%20Through%20Server%20Log%20Files%20in%20Apache%20Software%20Foundation%20Apache%20Kafka&amp;severity=medium&amp;id=69e631a519fe3cd2cdff2604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/flowerstorm-phishing-kit-targeting-microsoft-crede-9e17756a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FlowerStorm%20Phishing%20Kit%20Targeting%20Microsoft%20Credentials%20via%20Cloudflare-Backed%20Infrastructure&amp;severity=medium&amp;id=69e62e1d19fe3cd2cdfced09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6648-cross-site-scripting-in-qibo-cms-269e177a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6648%3A%20Cross%20Site%20Scripting%20in%20Qibo%20CMS&amp;severity=medium&amp;id=69e6271719fe3cd2cdf8df91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dfir-report-the-gentlemen-systembc-a-sneak-peek-be-e15f14f2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DFIR%20Report%20%E2%80%93%20The%20Gentlemen%20%26%20SystemBC%3A%20A%20Sneak%20Peek%20Behind%20the%20Proxy&amp;severity=medium&amp;id=69e7196619fe3cd2cda7fa61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/british-scattered-spider-hacker-pleads-guilty-in-t-e1fa3b76</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=British%20Scattered%20Spider%20Hacker%20Pleads%20Guilty%20in%20the%20US&amp;severity=medium&amp;id=69e61c8a19fe3cd2cdefb19e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6636-path-traversal-in-p2r3-convert-d00184c9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6636%3A%20Path%20Traversal%20in%20p2r3%20convert&amp;severity=medium&amp;id=69e6190619fe3cd2cdecc9d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5958-cwe-367-time-of-check-time-of-use-to-e65de13f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5958%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20GNU%20Sed&amp;severity=low&amp;id=69e6190619fe3cd2cdecc9cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6635-improper-authentication-in-rowboatla-9b05aca8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6635%3A%20Improper%20Authentication%20in%20rowboatlabs%20rowboat&amp;severity=medium&amp;id=69e631a719fe3cd2cdff2662</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-abuse-qemu-for-defense-evasion-673cbf51</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Abuse%20QEMU%20for%20Defense%20Evasion&amp;severity=medium&amp;id=69e611fe19fe3cd2cde6140f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6634-improper-authorization-in-usememos-m-7b131960</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6634%3A%20Improper%20Authorization%20in%20usememos%20memos&amp;severity=medium&amp;id=69e64a4819fe3cd2cd0b9562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6633-cross-site-scripting-in-yifang-cms-e0555989</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6633%3A%20Cross%20Site%20Scripting%20in%20Yifang%20CMS&amp;severity=medium&amp;id=69e6271719fe3cd2cdf8df97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bluesky-disrupted-by-sophisticated-ddos-attack-2013c9dd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bluesky%20Disrupted%20by%20Sophisticated%20DDoS%20Attack&amp;severity=medium&amp;id=69e60af619fe3cd2cde01c24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6632-buffer-overflow-in-tenda-f451-bee9b5ea</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6632%3A%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69e60aff19fe3cd2cde02e4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6631-buffer-overflow-in-tenda-f451-8a352ca6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6631%3A%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69e60aff19fe3cd2cde02e47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/senate-extends-surveillance-powers-until-april-30--2b6753d8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Senate%20Extends%20Surveillance%20Powers%20Until%20April%2030%20After%20Chaotic%20Votes%20in%20House&amp;severity=medium&amp;id=69e603ee19fe3cd2cdd9697f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6630-buffer-overflow-in-tenda-f451-1cedec4e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6630%3A%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69e603f619fe3cd2cdd9a5d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fakewallet-crypto-stealer-spreading-in-the-app-sto-5237263b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FakeWallet%20crypto%20stealer%20spreading%20in%20the%20App%20Store&amp;severity=medium&amp;id=69e60e8319fe3cd2cde3130b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6629-sql-injection-in-metasoft-metacrm-f3e54b0d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6629%3A%20SQL%20Injection%20in%20Metasoft%20%E7%BE%8E%E7%89%B9%E8%BD%AF%E4%BB%B6%20MetaCRM&amp;severity=medium&amp;id=69e603f619fe3cd2cdd9a5ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6654-vulnerability-in-mozilla-thin-vec-bd2ecbfa</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6654%3A%20Vulnerability%20in%20Mozilla%20thin-vec&amp;severity=medium&amp;id=69e603f619fe3cd2cdd9a5d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6628-sql-injection-in-phili67-ecclesia-cr-e229716e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6628%3A%20SQL%20Injection%20in%20phili67%20Ecclesia%20CRM&amp;severity=medium&amp;id=69e5fce519fe3cd2cdd0602e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6626-improper-neutralization-of-special-e-f2e20b81</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6626%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20Cockpit-HQ%20Cockpit&amp;severity=medium&amp;id=69e5fce519fe3cd2cdd06028</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/half-of-the-6-million-internet-facing-ftp-servers--79509a68</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Half%20of%20the%206%20Million%20Internet-Facing%20FTP%20Servers%20Lack%20Encryption&amp;severity=medium&amp;id=69e5f5de19fe3cd2cdc89678</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6625-server-side-request-forgery-in-moxi6-e3814803</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6625%3A%20Server-Side%20Request%20Forgery%20in%20moxi624%20Mogu%20Blog%20v2&amp;severity=medium&amp;id=69e5fce519fe3cd2cdd06022</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6624-cross-site-scripting-in-bichitrogan--354d0f6e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6624%3A%20Cross%20Site%20Scripting%20in%20BichitroGan%20ISP%20Billing%20Software&amp;severity=medium&amp;id=69e5f25919fe3cd2cdc4c104</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6623-cross-site-scripting-in-bichitrogan--8ea58ada</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6623%3A%20Cross%20Site%20Scripting%20in%20BichitroGan%20ISP%20Billing%20Software&amp;severity=medium&amp;id=69e5f25919fe3cd2cdc4c0fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13480-cwe-863-incorrect-authorization-in--3f01e592</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13480%3A%20CWE-863%20Incorrect%20Authorization%20in%20Fudo%20Security%20Fudo%20Enterprise&amp;severity=medium&amp;id=69e5f25919fe3cd2cdc4c0f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6622-cross-site-scripting-in-bichitrogan--c25daae2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6622%3A%20Cross%20Site%20Scripting%20in%20BichitroGan%20ISP%20Billing%20Software&amp;severity=medium&amp;id=69e5f25919fe3cd2cdc4c0f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6621-improperly-controlled-modification-o-7c91d3f8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6621%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20in%201024bit%20extend-deep&amp;severity=medium&amp;id=69e64a4819fe3cd2cd0b955c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nextjs-creator-vercel-hacked-e4246dae</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Next.js%20Creator%20Vercel%20Hacked&amp;severity=medium&amp;id=69e5e44a19fe3cd2cdb517b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6620-path-traversal-in-soniccloudorg-soni-febe8664</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6620%3A%20Path%20Traversal%20in%20SonicCloudOrg%20sonic-server&amp;severity=medium&amp;id=69e64a4819fe3cd2cd0b9556</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39454-incorrect-default-permissions-in-sk-929f8394</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39454%3A%20Incorrect%20default%20permissions%20in%20Sky%20Co.%2CLTD.%20SKYSEA%20Client%20View&amp;severity=high&amp;id=69e631a519fe3cd2cdff261e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6619-cross-site-scripting-in-langgenius-d-65fd59e1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6619%3A%20Cross%20Site%20Scripting%20in%20langgenius%20dify&amp;severity=medium&amp;id=69e631a719fe3cd2cdff265c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-fail-to-exploit-flaw-in-discontinued-tp-li-e1fa8e2a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Fail%20to%20Exploit%20Flaw%20in%20Discontinued%20TP-Link%20Routers&amp;severity=medium&amp;id=69e5dd5619fe3cd2cdad2cae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6618-server-side-request-forgery-in-langg-3b12c24f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6618%3A%20Server-Side%20Request%20Forgery%20in%20langgenius%20dify&amp;severity=medium&amp;id=69e6585619fe3cd2cd13fdf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5967-cwe-78-improper-neutralization-of-sp-375a9a75</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5967%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20TeamT5%20ThreatSonar%20Anti-Ransomware&amp;severity=high&amp;id=69e631a719fe3cd2cdff2658</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5966-cwe-23-relative-path-traversal-in-te-c8f3e690</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5966%3A%20CWE-23%20Relative%20path%20traversal%20in%20TeamT5%20ThreatSonar%20Anti-Ransomware&amp;severity=high&amp;id=69e5d9d119fe3cd2cda9cb41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5964-cwe-89-improper-neutralization-of-sp-398bc6f6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5964%3A%20CWE-89%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20injection&apos;)%20in%20Digiwin%20EasyFlow%20.NET&amp;severity=critical&amp;id=69e5d9d119fe3cd2cda9cb3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5963-cwe-89-improper-neutralization-of-sp-69f9977c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5963%3A%20CWE-89%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20injection&apos;)%20in%20Digiwin%20EasyFlow%20.NET&amp;severity=critical&amp;id=69e5d9d119fe3cd2cda9cb39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6617-server-side-request-forgery-in-langg-75bf2804</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6617%3A%20Server-Side%20Request%20Forgery%20in%20langgenius%20dify&amp;severity=medium&amp;id=69e5d9d119fe3cd2cda9cb51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6616-server-side-request-forgery-in-trans-20d98e02</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6616%3A%20Server-Side%20Request%20Forgery%20in%20TransformerOptimus%20SuperAGI&amp;severity=medium&amp;id=69e5d9d119fe3cd2cda9cb4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41282-cwe-94-improper-control-of-generati-446e408b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41282%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ProjectDiscovery%20Nuclei&amp;severity=medium&amp;id=69e5d9d119fe3cd2cda9cb32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6615-path-traversal-in-transformeroptimus-9ba57721</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6615%3A%20Path%20Traversal%20in%20TransformerOptimus%20SuperAGI&amp;severity=medium&amp;id=69e5d9d119fe3cd2cda9cb45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6644-cwe-78-improper-neutralization-of-sp-fee0276d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6644%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20ASUSTOR%20Inc.%20ADM&amp;severity=critical&amp;id=69e5cf3219fe3cd2cda1169c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6614-authorization-bypass-in-transformero-c24b9dcf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6614%3A%20Authorization%20Bypass%20in%20TransformerOptimus%20SuperAGI&amp;severity=medium&amp;id=69e5cf3219fe3cd2cda11693</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/handling-the-cve-flood-with-epss-mon-apr-20th-3cd777cb</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Handling%20the%20CVE%20Flood%20With%20EPSS%2C%20(Mon%2C%20Apr%2020th)&amp;severity=medium&amp;id=69e5cbad19fe3cd2cd9ed738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6643-cwe-121-stack-based-buffer-overflow--b118ebfd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6643%3A%20CWE-121%20Stack-based%20buffer%20overflow%20in%20ASUSTOR%20Inc.%20ADM&amp;severity=high&amp;id=69e5cf3219fe3cd2cda11699</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6613-authorization-bypass-in-transformero-89a74328</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6613%3A%20Authorization%20Bypass%20in%20TransformerOptimus%20SuperAGI&amp;severity=medium&amp;id=69e5cf3219fe3cd2cda1168d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6612-authorization-bypass-in-transformero-9d91632f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6612%3A%20Authorization%20Bypass%20in%20TransformerOptimus%20SuperAGI&amp;severity=medium&amp;id=69e5cf3219fe3cd2cda11687</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6611-use-of-hard-coded-cryptographic-key--a0a79e86</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6611%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20liangliangyy%20DjangoBlog&amp;severity=low&amp;id=69e5cf3219fe3cd2cda11681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7083-cwe-79-cross-site-scripting-xss-in-e-63ce6c06</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7083%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Email%20Encoder&amp;severity=low&amp;id=69e5cf3219fe3cd2cda1167e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6610-hard-coded-credentials-in-liangliang-a2b730a6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6610%3A%20Hard-coded%20Credentials%20in%20liangliangyy%20DjangoBlog&amp;severity=medium&amp;id=69e5c14919fe3cd2cd962e83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6609-improper-authorization-in-liangliang-a15a7437</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6609%3A%20Improper%20Authorization%20in%20liangliangyy%20DjangoBlog&amp;severity=medium&amp;id=69e5c14919fe3cd2cd962e7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6608-incorrect-control-flow-in-lm-sys-fas-aa6c9d8b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6608%3A%20Incorrect%20Control%20Flow%20in%20lm-sys%20fastchat&amp;severity=medium&amp;id=69e5c14919fe3cd2cd962e75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6607-resource-consumption-in-lm-sys-fastc-4da4a4dc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6607%3A%20Resource%20Consumption%20in%20lm-sys%20fastchat&amp;severity=medium&amp;id=69e5b69619fe3cd2cd8e69b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6606-server-side-request-forgery-in-model-695ac09a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6606%3A%20Server-Side%20Request%20Forgery%20in%20modelscope%20agentscope&amp;severity=medium&amp;id=69e5b69619fe3cd2cd8e69b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6605-server-side-request-forgery-in-model-6fb273db</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6605%3A%20Server-Side%20Request%20Forgery%20in%20modelscope%20agentscope&amp;severity=medium&amp;id=69e5b69619fe3cd2cd8e69aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6604-server-side-request-forgery-in-model-881679f1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6604%3A%20Server-Side%20Request%20Forgery%20in%20modelscope%20agentscope&amp;severity=medium&amp;id=69e5b69619fe3cd2cd8e69a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6603-code-injection-in-modelscope-agentsc-3170df70</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6603%3A%20Code%20Injection%20in%20modelscope%20agentscope&amp;severity=medium&amp;id=69e5b69619fe3cd2cd8e699b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6602-unrestricted-upload-in-rickxy-hospit-45f45410</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6602%3A%20Unrestricted%20Upload%20in%20rickxy%20Hospital%20Management%20System&amp;severity=medium&amp;id=69e5a50519fe3cd2cd673708</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6601-resource-consumption-in-lagom-whmcs--f4276070</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6601%3A%20Resource%20Consumption%20in%20Lagom%20WHMCS%20Template&amp;severity=medium&amp;id=69e5a50519fe3cd2cd673702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32956-heap-based-buffer-overflow-in-silex-2da79db9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32956%3A%20Heap-based%20buffer%20overflow%20in%20silex%20technology%2C%20Inc.%20SD-330AC&amp;severity=critical&amp;id=69e5a50219fe3cd2cd673633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32955-stack-based-buffer-overflow-in-sile-b2529213</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32955%3A%20Stack-based%20buffer%20overflow%20in%20silex%20technology%2C%20Inc.%20SD-330AC&amp;severity=high&amp;id=69e5a50219fe3cd2cd67362c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32957-missing-authentication-for-critical-9dcf34bb</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32957%3A%20Missing%20authentication%20for%20critical%20function%20in%20silex%20technology%2C%20Inc.%20SD-330AC&amp;severity=medium&amp;id=69e5a50219fe3cd2cd673638</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32958-use-of-hard-coded-cryptographic-key-805cec1d</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32958%3A%20Use%20of%20hard-coded%20cryptographic%20key%20in%20silex%20technology%2C%20Inc.%20SD-330AC&amp;severity=medium&amp;id=69e5a50219fe3cd2cd673640</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32959-use-of-a-broken-or-risky-cryptograp-82a33d15</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32959%3A%20Use%20of%20a%20broken%20or%20risky%20cryptographic%20algorithm%20in%20silex%20technology%2C%20Inc.%20SD-330AC&amp;severity=medium&amp;id=69e5a50219fe3cd2cd673656</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32960-sensitive-information-in-resource-n-8d82b9fa</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32960%3A%20Sensitive%20information%20in%20resource%20not%20removed%20before%20reuse%20in%20silex%20technology%2C%20Inc.%20SD-330AC&amp;severity=medium&amp;id=69e5a50219fe3cd2cd67365c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32961-heap-based-buffer-overflow-in-silex-cb51ce4d</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32961%3A%20Heap-based%20buffer%20overflow%20in%20silex%20technology%2C%20Inc.%20SD-330AC&amp;severity=medium&amp;id=69e5a50219fe3cd2cd673661</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32962-missing-authentication-for-critical-c133ad14</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32962%3A%20Missing%20authentication%20for%20critical%20function%20in%20silex%20technology%2C%20Inc.%20SD-330AC&amp;severity=medium&amp;id=69e5a50219fe3cd2cd673666</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32963-cross-site-scripting-xss-in-silex-t-81271128</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32963%3A%20Cross-site%20scripting%20(XSS)%20in%20silex%20technology%2C%20Inc.%20SD-330AC&amp;severity=medium&amp;id=69e5a50219fe3cd2cd67366b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32964-improper-neutralization-of-crlf-seq-0a04f4b8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32964%3A%20Improper%20neutralization%20of%20CRLF%20sequences%20(&apos;CRLF%20Injection&apos;)%20in%20silex%20technology%2C%20Inc.%20SD-330AC&amp;severity=medium&amp;id=69e5a50219fe3cd2cd673671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32965-initialization-of-a-resource-with-a-addb8b09</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32965%3A%20Initialization%20of%20a%20resource%20with%20an%20insecure%20default%20in%20silex%20technology%2C%20Inc.%20SD-330AC&amp;severity=high&amp;id=69e5a50519fe3cd2cd6736eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6600-cross-site-scripting-in-langflow-ai--78b00a64</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6600%3A%20Cross%20Site%20Scripting%20in%20langflow-ai%20langflow&amp;severity=medium&amp;id=69e5a50519fe3cd2cd6736fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6599-injection-in-langflow-ai-langflow-bac58919</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6599%3A%20Injection%20in%20langflow-ai%20langflow&amp;severity=medium&amp;id=69e5a50519fe3cd2cd6736f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6598-cleartext-storage-in-a-file-or-on-di-48f0305d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6598%3A%20Cleartext%20Storage%20in%20a%20File%20or%20on%20Disk%20in%20langflow-ai%20langflow&amp;severity=medium&amp;id=69e5a50519fe3cd2cd6736f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6597-unprotected-storage-of-credentials-i-fc1cbce7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6597%3A%20Unprotected%20Storage%20of%20Credentials%20in%20langflow-ai%20langflow&amp;severity=medium&amp;id=69e5936f19fe3cd2cd4fde16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6596-unrestricted-upload-in-langflow-ai-l-b4176c6e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6596%3A%20Unrestricted%20Upload%20in%20langflow-ai%20langflow&amp;severity=medium&amp;id=69e5936f19fe3cd2cd4fde10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6595-sql-injection-in-projectsandprograms-5088e0c9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6595%3A%20SQL%20Injection%20in%20ProjectsAndPrograms%20School%20Management%20System&amp;severity=medium&amp;id=69e5936f19fe3cd2cd4fde0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-monday-april-20th-2026-httpsiscs-97618251</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Monday%2C%20April%2020th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9898%2C%20(Mon%2C%20Apr%2020th)&amp;severity=medium&amp;id=69e588e319fe3cd2cd49d321</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6594-improperly-controlled-modification-o-3776681f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6594%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20in%20brikcss%20merge&amp;severity=medium&amp;id=69e5badb19fe3cd2cd92727a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6593-cross-site-scripting-in-comfyui-b35dbf78</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6593%3A%20Cross%20Site%20Scripting%20in%20ComfyUI&amp;severity=medium&amp;id=69e5badb19fe3cd2cd927274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6592-cross-site-scripting-in-comfyui-80457360</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6592%3A%20Cross%20Site%20Scripting%20in%20ComfyUI&amp;severity=medium&amp;id=69e5badb19fe3cd2cd92726e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6591-path-traversal-in-comfyui-480d807d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6591%3A%20Path%20Traversal%20in%20ComfyUI&amp;severity=medium&amp;id=69e57e5719fe3cd2cd43e17a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6590-path-traversal-in-comfyui-c208732b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6590%3A%20Path%20Traversal%20in%20ComfyUI&amp;severity=medium&amp;id=69e57e5719fe3cd2cd43e174</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6589-cross-site-request-forgery-in-comfyu-7a448fff</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6589%3A%20Cross-Site%20Request%20Forgery%20in%20ComfyUI&amp;severity=medium&amp;id=69e57e5719fe3cd2cd43e16e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6588-missing-authentication-in-serge-chat-2fbbea1e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6588%3A%20Missing%20Authentication%20in%20serge-chat%20serge&amp;severity=medium&amp;id=69e57e5719fe3cd2cd43e168</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6587-server-side-request-forgery-in-vibra-e572bea3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6587%3A%20Server-Side%20Request%20Forgery%20in%20vibrantlabsai%20RAGAS&amp;severity=medium&amp;id=69e5704619fe3cd2cd3006c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-21-462c7584</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-21&amp;severity=medium&amp;id=69e720a919fe3cd2cdab8fdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-20-e7e0f2d2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-20&amp;severity=medium&amp;id=69e6c1bc19fe3cd2cd41d874</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41285-na-02530dbb</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41285%3A%20n%2Fa&amp;severity=medium&amp;id=69e6b73b19fe3cd2cd3f2d24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29643-na-27c40415</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29643%3A%20n%2Fa&amp;severity=high&amp;id=69e69e9e19fe3cd2cd35b3cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29648-na-7f29b57d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29648%3A%20n%2Fa&amp;severity=high&amp;id=69e6941f19fe3cd2cd32c487</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29647-na-52884ff4</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29647%3A%20n%2Fa&amp;severity=medium&amp;id=69e6941f19fe3cd2cd32c482</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29646-na-03a49919</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29646%3A%20n%2Fa&amp;severity=critical&amp;id=69e6941f19fe3cd2cd32c479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29642-na-9942bec8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29642%3A%20n%2Fa&amp;severity=high&amp;id=69e6941f19fe3cd2cd32c473</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29649-na-3ea96a6c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29649%3A%20n%2Fa&amp;severity=critical&amp;id=69e6860319fe3cd2cd2e53bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29645-na-31235a89</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29645%3A%20n%2Fa&amp;severity=high&amp;id=69e6827f19fe3cd2cd2c9b7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39112-na-d492f597</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39112%3A%20n%2Fa&amp;severity=medium&amp;id=69e6665f19fe3cd2cd1d0b10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39111-na-19ab1b65</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39111%3A%20n%2Fa&amp;severity=high&amp;id=69e6665f19fe3cd2cd1d0b0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39110-na-e8d4396c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39110%3A%20n%2Fa&amp;severity=high&amp;id=69e6665f19fe3cd2cd1d0b06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39109-na-15450aee</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39109%3A%20n%2Fa&amp;severity=critical&amp;id=69e6665f19fe3cd2cd1d0b01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26399-na-50a687f9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26399%3A%20n%2Fa&amp;severity=medium&amp;id=69e6665f19fe3cd2cd1d0afd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30266-na-35614bad</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30266%3A%20n%2Fa&amp;severity=high&amp;id=69e65f5619fe3cd2cd18150e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30269-na-bedba322</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30269%3A%20n%2Fa&amp;severity=critical&amp;id=69e6585319fe3cd2cd13fc33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66954-na-9252c01a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66954%3A%20n%2Fa&amp;severity=medium&amp;id=69e6585319fe3cd2cd13fc15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-20-3025abad</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-20&amp;severity=low&amp;id=69e573c219fe3cd2cd351de2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6586-authorization-bypass-in-transformero-53bfb267</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6586%3A%20Authorization%20Bypass%20in%20TransformerOptimus%20SuperAGI&amp;severity=medium&amp;id=69e56cc819fe3cd2cd2de213</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6585-authorization-bypass-in-transformero-ce26c4a1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6585%3A%20Authorization%20Bypass%20in%20TransformerOptimus%20SuperAGI&amp;severity=medium&amp;id=69e5693e19fe3cd2cd2c6f58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6584-authorization-bypass-in-transformero-6aead21f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6584%3A%20Authorization%20Bypass%20in%20TransformerOptimus%20SuperAGI&amp;severity=medium&amp;id=69e565b919fe3cd2cd2a8db5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6583-authorization-bypass-in-transformero-c549fd31</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6583%3A%20Authorization%20Bypass%20in%20TransformerOptimus%20SuperAGI&amp;severity=medium&amp;id=69e5624119fe3cd2cd287964</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6582-missing-authentication-in-transforme-149e0106</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6582%3A%20Missing%20Authentication%20in%20TransformerOptimus%20SuperAGI&amp;severity=medium&amp;id=69e55ec119fe3cd2cd267291</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6581-buffer-overflow-in-h3c-magic-b1-6a61fe35</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6581%3A%20Buffer%20Overflow%20in%20H3C%20Magic%20B1&amp;severity=high&amp;id=69e55b2e19fe3cd2cd24f831</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6580-use-of-hard-coded-cryptographic-key--825a2bad</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6580%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20liangliangyy%20DjangoBlog&amp;severity=medium&amp;id=69e557a919fe3cd2cd19a331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6579-missing-authentication-in-liangliang-d5252b3e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6579%3A%20Missing%20Authentication%20in%20liangliangyy%20DjangoBlog&amp;severity=medium&amp;id=69e5542619fe3cd2cd0cb4fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6578-hard-coded-credentials-in-liangliang-58ec81a5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6578%3A%20Hard-coded%20Credentials%20in%20liangliangyy%20DjangoBlog&amp;severity=medium&amp;id=69e5499d19fe3cd2cde78631</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6577-missing-authentication-in-liangliang-d57330cf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6577%3A%20Missing%20Authentication%20in%20liangliangyy%20DjangoBlog&amp;severity=medium&amp;id=69e5badb19fe3cd2cd927280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6576-command-injection-in-liangliangyy-dj-9d686e18</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6576%3A%20Command%20Injection%20in%20liangliangyy%20DjangoBlog&amp;severity=medium&amp;id=69e529f619fe3cd2cd68c633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6574-hard-coded-credentials-in-osuuu-ligh-b66f67a8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6574%3A%20Hard-coded%20Credentials%20in%20osuuu%20LightPicture&amp;severity=medium&amp;id=69e4dc9d19fe3cd2cd590f0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6573-server-side-request-forgery-in-phpem-e98897b9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6573%3A%20Server-Side%20Request%20Forgery%20in%20PHPEMS&amp;severity=medium&amp;id=69e4d59519fe3cd2cd54e679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6572-improper-authorization-in-collabora--c07f449a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6572%3A%20Improper%20Authorization%20in%20Collabora%20KodExplorer&amp;severity=medium&amp;id=69e4cb0a19fe3cd2cd4ea455</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6571-authorization-bypass-in-kodcloud-kod-e6ff1cbb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6571%3A%20Authorization%20Bypass%20in%20kodcloud%20KodExplorer&amp;severity=medium&amp;id=69e4c78619fe3cd2cd4d1d6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6570-authorization-bypass-in-kodcloud-kod-786c22b7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6570%3A%20Authorization%20Bypass%20in%20kodcloud%20KodExplorer&amp;severity=medium&amp;id=69e4bcf919fe3cd2cd48691d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6569-improper-authentication-in-kodcloud--0db7b657</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6569%3A%20Improper%20Authentication%20in%20kodcloud%20KodExplorer&amp;severity=medium&amp;id=69e4aee819fe3cd2cd406c94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6568-path-traversal-in-kodcloud-kodexplor-1b477f95</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6568%3A%20Path%20Traversal%20in%20kodcloud%20KodExplorer&amp;severity=medium&amp;id=69e4ab6519fe3cd2cd3e5cc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6564-improper-authorization-in-emq-emqx-e-50d714fd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6564%3A%20Improper%20Authorization%20in%20EMQ%20EMQX%20Enterprise&amp;severity=medium&amp;id=69e4a45d19fe3cd2cd38c81c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6563-buffer-overflow-in-h3c-magic-b1-2ad2f98e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6563%3A%20Buffer%20Overflow%20in%20H3C%20Magic%20B1&amp;severity=high&amp;id=69e4964d19fe3cd2cd310932</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6562-sql-injection-in-dameng100-muucmf-c09ef714</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6562%3A%20SQL%20Injection%20in%20dameng100%20muucmf&amp;severity=medium&amp;id=69e4964d19fe3cd2cd31092c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6561-unrestricted-upload-in-eyoucms-280f408b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6561%3A%20Unrestricted%20Upload%20in%20EyouCMS&amp;severity=medium&amp;id=69e484bd19fe3cd2cd25f971</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6560-buffer-overflow-in-h3c-magic-b0-f38a59da</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6560%3A%20Buffer%20Overflow%20in%20H3C%20Magic%20B0&amp;severity=high&amp;id=69e47db819fe3cd2cd0ae874</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6559-cross-site-scripting-in-wavlink-wl-w-3f20100a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6559%3A%20Cross%20Site%20Scripting%20in%20Wavlink%20WL-WN579A3&amp;severity=medium&amp;id=69e46c1d19fe3cd2cde78368</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0868-cwe-79-improper-neutralization-of-in-3458e49a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0868%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20turn2honey%20EMC%20%E2%80%93%20Easily%20Embed%20Calendly%20Scheduling&amp;severity=medium&amp;id=69e45526bdfbbecc5954aa8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-20-d4ceb546</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-20&amp;severity=medium&amp;id=69e6006119fe3cd2cdd3a36d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-19-f8492fcf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-19&amp;severity=medium&amp;id=69e5703c19fe3cd2cd2fe55e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-19-e2614695</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-19&amp;severity=low&amp;id=69e4551ebdfbbecc5954a64f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41242-cwe-94-improper-control-of-generati-3ca40985</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41242%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20protobufjs%20protobuf.js&amp;severity=critical&amp;id=69e46a7a19fe3cd2cde33d17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-phantomclr-stealth-execution-via-appdoma-bca267b0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20PhantomCLR%3A%20Stealth%20Execution%20via%20AppDomain%20Hijacking%20and%20In-Memory%20.NET%20Abuse&amp;severity=medium&amp;id=69e603f419fe3cd2cdd9a2ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40948-cwe-352-cross-site-request-forgery--1d13b30e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40948%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Apache%20Software%20Foundation%20Apache%20Airflow%20Providers%20Keycloak&amp;severity=medium&amp;id=69e38cc4bdfbbecc5977d883</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2986-cwe-79-improper-neutralization-of-in-55e6dfdd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2986%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ajay%20Contextual%20Related%20Posts&amp;severity=medium&amp;id=69e3699bbdfbbecc5948ef72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tycoon-2fa-loses-phishing-kit-crown-amid-surge-in--4fc6dca0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tycoon%202FA%20Loses%20Phishing%20Kit%20Crown%20Amid%20Surge%20in%20Attacks&amp;severity=low&amp;id=69e35f0fbdfbbecc593a5dd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2505-cwe-79-improper-neutralization-of-in-ce86bd04</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2505%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20elzahlan%20Categories%20Images&amp;severity=medium&amp;id=69e350febdfbbecc5928ea79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0894-cwe-79-improper-neutralization-of-in-d357c715</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0894%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vanderwijk%20Content%20Blocks%20(Custom%20Post%20Widget)&amp;severity=medium&amp;id=69e350febdfbbecc5928ea75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41254-cwe-696-incorrect-behavior-order-in-c1167541</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41254%3A%20CWE-696%20Incorrect%20Behavior%20Order%20in%20littlecms%20little%20cms%20color%20engine&amp;severity=medium&amp;id=69e32a52bdfbbecc59fc2b96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32690-cwe-668-exposure-of-resource-to-wro-f351e5c3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32690%3A%20CWE-668%3A%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=low&amp;id=69e32a52bdfbbecc59fc2b91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30898-cwe-77-improper-neutralization-of-s-51fb13b8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30898%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=high&amp;id=69e32a52bdfbbecc59fc2b82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30912-cwe-668-exposure-of-resource-to-wro-513606f5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30912%3A%20CWE-668%3A%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=high&amp;id=69e32a52bdfbbecc59fc2b87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25917-cwe-502-deserialization-of-untruste-00460742</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25917%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=high&amp;id=69e32a52bdfbbecc59fc2b7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32228-cwe-863-incorrect-authorization-in--de69187e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32228%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=high&amp;id=69e32a52bdfbbecc59fc2b8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6048-cwe-79-improper-neutralization-of-in-68a26ee3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6048%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dragwyb%20Flipbox%20Addon%20for%20Elementor&amp;severity=medium&amp;id=69e30ab8bdfbbecc59e84c2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6518-cwe-434-unrestricted-upload-of-file--f3d41796</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6518%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20niteo%20CMP%20%E2%80%93%20Coming%20Soon%20%26%20Maintenance%20Plugin%20by%20NiteoThemes&amp;severity=high&amp;id=69e30ab8bdfbbecc59e84c33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4801-cwe-79-improper-neutralization-of-in-4fb83809</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4801%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20godaddy%20Page%20Builder%20Gutenberg%20Blocks%20%E2%80%93%20CoBlocks&amp;severity=medium&amp;id=69e30ab8bdfbbecc59e84c1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40494-cwe-787-out-of-bounds-write-in-happ-d7181ae5</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40494%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20HappySeaFox%20sail&amp;severity=critical&amp;id=69e2ee8ebdfbbecc59cda5df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40493-cwe-787-out-of-bounds-write-in-happ-da0d28a1</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40493%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20HappySeaFox%20sail&amp;severity=critical&amp;id=69e2ee8ebdfbbecc59cda5db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40492-cwe-787-out-of-bounds-write-in-happ-780830ff</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40492%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20HappySeaFox%20sail&amp;severity=critical&amp;id=69e2ee8ebdfbbecc59cda5d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40491-cwe-22-improper-limitation-of-a-pat-8fb3f370</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40491%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wkentaro%20gdown&amp;severity=medium&amp;id=69e2ee8ebdfbbecc59cda5d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40490-cwe-200-exposure-of-sensitive-infor-4c645570</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40490%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20AsyncHttpClient%20async-http-client&amp;severity=medium&amp;id=69e2e080bdfbbecc59c723b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1559-cwe-79-improper-neutralization-of-in-ac5deafd</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1559%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20youzify%20Youzify%20%E2%80%93%20BuddyPress%20Community%2C%20User%20Profile%2C%20Social%20Network%20%26%20Membership%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=69e2e080bdfbbecc59c72393</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1838-cwe-79-improper-neutralization-of-in-b0d19334</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1838%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20prasunsen%20Hostel&amp;severity=medium&amp;id=69e2e080bdfbbecc59c7239c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40489-cwe-121-stack-based-buffer-overflow-63bc89f7</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40489%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20editorconfig%20editorconfig-core-c&amp;severity=high&amp;id=69e2e080bdfbbecc59c723af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40487-cwe-79-improper-neutralization-of-i-d95bc08f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40487%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gitroomhq%20postiz-app&amp;severity=high&amp;id=69e2e080bdfbbecc59c723ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35582-cwe-78-improper-neutralization-of-s-8a32499e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35582%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20NationalSecurityAgency%20emissary&amp;severity=high&amp;id=69e2e080bdfbbecc59c723a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35465-cwe-73-external-control-of-file-nam-276a142e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35465%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20freedomofpress%20securedrop-client&amp;severity=high&amp;id=69e2d977bdfbbecc59bbf816</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40572-cwe-269-improper-privilege-manageme-6ff979fd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40572%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20MinecAnton209%20NovumOS&amp;severity=critical&amp;id=69e2d977bdfbbecc59bbf825</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40317-cwe-269-improper-privilege-manageme-d4098dd0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40317%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20MinecAnton209%20NovumOS&amp;severity=critical&amp;id=69e2d977bdfbbecc59bbf81b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40350-cwe-863-incorrect-authorization-in--410a207f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40350%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20leepeuker%20movary&amp;severity=high&amp;id=69e2d977bdfbbecc59bbf81f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40349-cwe-862-missing-authorization-in-le-02f722bd</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40349%3A%20CWE-862%3A%20Missing%20Authorization%20in%20leepeuker%20movary&amp;severity=high&amp;id=69e389f6bdfbbecc5976511a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40593-cwe-79-improper-neutralization-of-i-66d417db</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40593%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=medium&amp;id=69e389f6bdfbbecc59765137</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40348-cwe-918-server-side-request-forgery-d56b3db1</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40348%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20leepeuker%20movary&amp;severity=high&amp;id=69e389f6bdfbbecc597650fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-19-fb6aae4d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-19&amp;severity=medium&amp;id=69e4e39d19fe3cd2cd5beb5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-18-260f1eb3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-18&amp;severity=medium&amp;id=69e41cddbdfbbecc59f94a17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-18-674dd18f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-18&amp;severity=low&amp;id=69e3385abdfbbecc5904514a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40347-cwe-400-uncontrolled-resource-consu-dd3e1813</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40347%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Kludex%20python-multipart&amp;severity=medium&amp;id=69e389f6bdfbbecc597650d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40346-cwe-918-server-side-request-forgery-4c00a4d3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40346%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20nocobase%20%40nocobase%2Fplugin-workflow-request&amp;severity=medium&amp;id=69e389f6bdfbbecc597650b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40581-cwe-352-cross-site-request-forgery--655587d2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40581%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69e389f6bdfbbecc5976522a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40337-cwe-283-unverified-ownership-in-cam-9fdaee9d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40337%3A%20CWE-283%3A%20Unverified%20Ownership%20in%20camelot-os%20sentry-kernel&amp;severity=medium&amp;id=69e389f6bdfbbecc59765143</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40341-cwe-126-buffer-over-read-in-gphoto--d243331d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40341%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20gphoto%20libgphoto2&amp;severity=low&amp;id=69e389f6bdfbbecc59765178</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40340-cwe-125-out-of-bounds-read-in-gphot-5cade0b0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40340%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20gphoto%20libgphoto2&amp;severity=medium&amp;id=69e389f6bdfbbecc5976516c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40339-cwe-125-out-of-bounds-read-in-gphot-ed5c11f7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40339%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20gphoto%20libgphoto2&amp;severity=medium&amp;id=69e389f6bdfbbecc59765160</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40338-cwe-125-out-of-bounds-read-in-gphot-6a685a62</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40338%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20gphoto%20libgphoto2&amp;severity=medium&amp;id=69e389f6bdfbbecc59765158</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40485-cwe-307-improper-restriction-of-exc-cf6d1aaa</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40485%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20ChurchCRM%20CRM&amp;severity=medium&amp;id=69e2c47fbdfbbecc59a12f9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40336-cwe-401-missing-release-of-memory-a-a2494142</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40336%3A%20CWE-401%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20gphoto%20libgphoto2&amp;severity=low&amp;id=69e2c47fbdfbbecc59a12f90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2262-cwe-200-exposure-of-sensitive-inform-bf4d032f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2262%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20easyappointments%20Easy%20Appointments&amp;severity=high&amp;id=69e2c47fbdfbbecc59a12f83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40484-cwe-269-improper-privilege-manageme-9bb4be14</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40484%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20ChurchCRM%20CRM&amp;severity=critical&amp;id=69e2c47fbdfbbecc59a12f99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40483-cwe-79-improper-neutralization-of-i-cb8800e1</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40483%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=medium&amp;id=69e2c47fbdfbbecc59a12f94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40335-cwe-125-out-of-bounds-read-in-gphot-7d4c84a2</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40335%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20gphoto%20libgphoto2&amp;severity=medium&amp;id=69e2c47fbdfbbecc59a12f8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40334-cwe-170-improper-null-termination-i-ecdcb16f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40334%3A%20CWE-170%3A%20Improper%20Null%20Termination%20in%20gphoto%20libgphoto2&amp;severity=low&amp;id=69e2c0dabdfbbecc599fc050</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40582-cwe-288-authentication-bypass-using-58dc9576</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40582%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20ChurchCRM%20CRM&amp;severity=critical&amp;id=69e2c0dabdfbbecc599fc05f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40333-cwe-125-out-of-bounds-read-in-gphot-d0b9db38</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40333%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20gphoto%20libgphoto2&amp;severity=medium&amp;id=69e2c0dabdfbbecc599fc04c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40480-cwe-639-authorization-bypass-throug-7ebb7a44</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40480%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69e2c0dabdfbbecc599fc054</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40324-cwe-674-uncontrolled-recursion-in-c-0796aaf1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40324%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20ChilliCream%20graphql-platform&amp;severity=critical&amp;id=69e2c0dabdfbbecc599fc03e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40482-cwe-89-improper-neutralization-of-s-efd3f903</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40482%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69e2c0dabdfbbecc599fc05a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40323-cwe-345-insufficient-verification-o-ab02000f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40323%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20succinctlabs%20sp1&amp;severity=high&amp;id=69e2c0dabdfbbecc599fc03a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2434-cwe-79-improper-neutralization-of-in-459b3fb2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2434%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20poporon%20Pz-LinkCard&amp;severity=medium&amp;id=69e389f6bdfbbecc5976522f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40476-cwe-407-inefficient-algorithmic-com-930c0f33</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40476%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20webonyx%20graphql-php&amp;severity=medium&amp;id=69e2af46bdfbbecc59986553</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5720-cwe-191-integer-underflow-wrap-or-wr-5076503c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5720%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20miniupnp%20project%20miniupnpd&amp;severity=high&amp;id=69e2abc2bdfbbecc5996b9fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40474-cwe-284-improper-access-control-in--3a8ced96</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40474%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20wger-project%20wger&amp;severity=high&amp;id=69e2abc2bdfbbecc5996b9f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40353-cwe-79-improper-neutralization-of-i-32ce955d</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40353%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wger-project%20wger&amp;severity=medium&amp;id=69e2a83ebdfbbecc5994f14e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40258-cwe-22-improper-limitation-of-a-pat-00f841f8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40258%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20gramps-project%20gramps-web-api&amp;severity=critical&amp;id=69e2a83ebdfbbecc5994f12f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40321-cwe-87-improper-neutralization-of-a-2d570284</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40321%3A%20CWE-87%3A%20Improper%20Neutralization%20of%20Alternate%20XSS%20Syntax%20in%20dnnsoftware%20Dnn.Platform&amp;severity=high&amp;id=69e2a83ebdfbbecc5994f140</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40352-cwe-943-improper-neutralization-of--85ada05a</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40352%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20labring%20FastGPT&amp;severity=high&amp;id=69e2a83ebdfbbecc5994f149</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40306-cwe-330-use-of-insufficiently-rando-0a094187</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40306%3A%20CWE-330%3A%20Use%20of%20Insufficiently%20Random%20Values%20in%20dnnsoftware%20Dnn.Platform&amp;severity=medium&amp;id=69e2a83ebdfbbecc5994f13c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40305-cwe-285-improper-authorization-in-d-259f7178</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40305%3A%20CWE-285%3A%20Improper%20Authorization%20in%20dnnsoftware%20Dnn.Platform&amp;severity=medium&amp;id=69e2a83ebdfbbecc5994f138</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40351-cwe-943-improper-neutralization-of--9a2571c7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40351%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20labring%20FastGPT&amp;severity=critical&amp;id=69e2a83ebdfbbecc5994f144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40304-cwe-284-improper-access-control-in--69c6782f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40304%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20openziti%20zrok&amp;severity=medium&amp;id=69e2a83ebdfbbecc5994f134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40303-cwe-400-uncontrolled-resource-consu-a3ee6743</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40303%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20openziti%20zrok&amp;severity=high&amp;id=69e2a136bdfbbecc5990836b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40196-cwe-708-incorrect-ownership-assignm-e4b4344c</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40196%3A%20CWE-708%3A%20Incorrect%20Ownership%20Assignment%20in%20sysadminsmedia%20homebox&amp;severity=high&amp;id=69e2a136bdfbbecc59908358</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40302-cwe-79-improper-neutralization-of-i-859f7360</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40302%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20openziti%20zrok&amp;severity=medium&amp;id=69e2a136bdfbbecc59908367</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40155-cwe-863-incorrect-authorization-in--178dd218</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40155%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20auth0%20nextjs-auth0&amp;severity=medium&amp;id=69e2a136bdfbbecc59908353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40301-cwe-79-improper-neutralization-of-i-bf3bd796</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40301%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rhukster%20dom-sanitizer&amp;severity=medium&amp;id=69e2a136bdfbbecc59908362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40299-cwe-601-url-redirection-to-untruste-c7560376</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40299%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20amannn%20next-intl&amp;severity=medium&amp;id=69e2a136bdfbbecc5990835c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35603-cwe-426-untrusted-search-path-in-an-d7db04c3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35603%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20anthropics%20claude-code&amp;severity=medium&amp;id=69e29db8bdfbbecc598ee1bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35402-cwe-284-improper-access-control-in--3725f4c7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35402%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20neo4j-contrib%20mcp-neo4j&amp;severity=low&amp;id=69e29db8bdfbbecc598ee1b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33436-cwe-20-improper-input-validation-in-995166fd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33436%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Stirling-Tools%20Stirling-PDF&amp;severity=low&amp;id=69e29db8bdfbbecc598ee1b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40286-cwe-79-improper-neutralization-of-i-b05f9ace</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40286%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=69e29db8bdfbbecc598ee1c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40285-cwe-89-improper-neutralization-of-s-36595b32</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40285%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=69e29db8bdfbbecc598ee1c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40527-cwe-78-improper-neutralization-of-s-8835a9bd</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40527%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20radareorg%20radare2&amp;severity=high&amp;id=69e29db8bdfbbecc598ee1c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40284-cwe-79-improper-neutralization-of-i-a78ebb3c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40284%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=69e29db8bdfbbecc598ee1bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35512-cwe-122-heap-based-buffer-overflow--c91ef269</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35512%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20neutrinolabs%20xrdp&amp;severity=high&amp;id=69e29a32bdfbbecc598cc5df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40282-cwe-79-improper-neutralization-of-i-a407d8de</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40282%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=69e29a32bdfbbecc598cc5e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33689-cwe-125-out-of-bounds-read-in-neutr-038fd12f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33689%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20neutrinolabs%20xrdp&amp;severity=high&amp;id=69e29a32bdfbbecc598cc5db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33145-cwe-78-improper-neutralization-of-s-356aab43</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33145%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20neutrinolabs%20xrdp&amp;severity=medium&amp;id=69e29a32bdfbbecc598cc5d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40283-cwe-79-improper-neutralization-of-i-881385d3</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40283%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=69e29327bdfbbecc59895032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32624-cwe-122-heap-based-buffer-overflow--cb3226cc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32624%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20neutrinolabs%20xrdp&amp;severity=medium&amp;id=69e29327bdfbbecc5989501f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33516-cwe-125-out-of-bounds-read-in-neutr-043d919d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33516%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20neutrinolabs%20xrdp&amp;severity=high&amp;id=69e29327bdfbbecc59895028</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32650-cwe-757-in-anviz-anviz-crosschex-st-9f992419</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32650%3A%20CWE-757%20in%20Anviz%20Anviz%20CrossChex%20Standard&amp;severity=high&amp;id=69e29327bdfbbecc59895023</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40434-cwe-940-in-anviz-anviz-crosschex-st-bb1f864a</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40434%3A%20CWE-940%20in%20Anviz%20Anviz%20CrossChex%20Standard&amp;severity=high&amp;id=69e29327bdfbbecc59895035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35682-cwe-77-in-anviz-anviz-cx2-lite-firm-73192145</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35682%3A%20CWE-77%20in%20Anviz%20Anviz%20CX2%20Lite%20Firmware&amp;severity=high&amp;id=69e29327bdfbbecc5989502c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32623-cwe-122-heap-based-buffer-overflow--e8ed9695</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32623%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20neutrinolabs%20xrdp&amp;severity=high&amp;id=69e29327bdfbbecc5989501b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40066-cwe-494-in-anviz-anviz-cx7-firmware-8338be60</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40066%3A%20CWE-494%20in%20Anviz%20Anviz%20CX7%20Firmware&amp;severity=high&amp;id=69e28fa4bdfbbecc59867cbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35546-cwe-306-in-anviz-anviz-cx7-firmware-147e04a2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35546%3A%20CWE-306%20in%20Anviz%20Anviz%20CX7%20Firmware&amp;severity=critical&amp;id=69e28fa4bdfbbecc59867cb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40461-cwe-306-in-anviz-anviz-cx7-firmware-c1966de7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40461%3A%20CWE-306%20in%20Anviz%20Anviz%20CX7%20Firmware&amp;severity=high&amp;id=69e28fa7bdfbbecc59867d53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32648-cwe-862-in-anviz-anviz-cx7-firmware-aaa03fdc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32648%3A%20CWE-862%20in%20Anviz%20Anviz%20CX7%20Firmware&amp;severity=medium&amp;id=69e28fa3bdfbbecc59867ca8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33569-cwe-319-in-anviz-anviz-cx7-firmware-b7940a80</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33569%3A%20CWE-319%20in%20Anviz%20Anviz%20CX7%20Firmware&amp;severity=medium&amp;id=69e28fa3bdfbbecc59867cad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32105-cwe-354-improper-validation-of-inte-71bf3dd4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32105%3A%20CWE-354%3A%20Improper%20Validation%20of%20Integrity%20Check%20Value%20in%20neutrinolabs%20xrdp&amp;severity=critical&amp;id=69e28fa3bdfbbecc59867c9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32107-cwe-273-improper-check-for-dropped--30bf230c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32107%3A%20CWE-273%3A%20Improper%20Check%20for%20Dropped%20Privileges%20in%20neutrinolabs%20xrdp&amp;severity=high&amp;id=69e28fa3bdfbbecc59867c9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31927-cwe-23-in-anviz-anviz-cx7-firmware-64eea7cb</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31927%3A%20CWE-23%20in%20Anviz%20Anviz%20CX7%20Firmware&amp;severity=medium&amp;id=69e28fa3bdfbbecc59867c96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40342-cwe-22-improper-limitation-of-a-pat-aa1db711</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40342%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20FirebirdSQL%20firebird&amp;severity=critical&amp;id=69e28fa4bdfbbecc59867cc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32324-cwe-321-use-of-hard-coded-cryptogra-6037edd2</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32324%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Anviz%20Anviz%20CX7%20Firmware&amp;severity=high&amp;id=69e28fa3bdfbbecc59867ca3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35061-cwe-862-in-anviz-anviz-cx7-firmware-3ac096cd</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35061%3A%20CWE-862%20in%20Anviz%20Anviz%20CX7%20Firmware&amp;severity=medium&amp;id=69e28fa3bdfbbecc59867cb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33093-cwe-862-in-anviz-anviz-cx7-firmware-d552bc73</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33093%3A%20CWE-862%20in%20Anviz%20Anviz%20CX7%20Firmware&amp;severity=medium&amp;id=69e2889bbdfbbecc59818af3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/white-house-chief-of-staff-to-meet-with-anthropic--a17193c8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=White%20House%20Chief%20of%20Staff%20to%20Meet%20With%20Anthropic%20CEO%20Over%20Its%20New%20AI%20Technology&amp;severity=medium&amp;id=69e39ad9bdfbbecc59850336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35215-cwe-369-divide-by-zero-in-firebirds-3a7b530a</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35215%3A%20CWE-369%3A%20Divide%20By%20Zero%20in%20FirebirdSQL%20firebird&amp;severity=high&amp;id=69e2889bbdfbbecc59818afe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/using-kata-and-kedr-to-detect-the-adaptixc2-agent-9d6969c9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Using%20KATA%20and%20KEDR%20to%20detect%20the%20AdaptixC2%20agent&amp;severity=medium&amp;id=69e603f419fe3cd2cdd9a2a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34232-cwe-228-improper-handling-of-syntac-b5b28669</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34232%3A%20CWE-228%3A%20Improper%20Handling%20of%20Syntactically%20Invalid%20Structure%20in%20FirebirdSQL%20firebird&amp;severity=high&amp;id=69e2889bbdfbbecc59818af8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33337-cwe-120-buffer-copy-without-checkin-5abedb12</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33337%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20FirebirdSQL%20firebird&amp;severity=high&amp;id=69e28194bdfbbecc597b95dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6437-cwe-88-improper-neutralization-of-ar-9d56e73b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6437%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Amazon%20AWS%20EFS%20CSI%20Driver&amp;severity=medium&amp;id=69e28194bdfbbecc597b95e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28224-cwe-476-null-pointer-dereference-in-bc196dc8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28224%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20FirebirdSQL%20firebird&amp;severity=high&amp;id=69e28194bdfbbecc597b95d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28214-cwe-190-integer-overflow-or-wraparo-2b0bca7e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28214%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20FirebirdSQL%20firebird&amp;severity=medium&amp;id=69e28194bdfbbecc597b95d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40525-cwe-636-not-failing-securely-fail-o-ce5e8d5f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40525%3A%20CWE-636%20Not%20Failing%20Securely%20(&apos;Fail%20Open&apos;)%20in%20volcengine%20OpenViking&amp;severity=critical&amp;id=69e27e0fbdfbbecc5978c959</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27890-cwe-119-improper-restriction-of-ope-87051bc6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27890%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20FirebirdSQL%20firebird&amp;severity=high&amp;id=69e27e0fbdfbbecc5978c94a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28212-cwe-476-null-pointer-dereference-in-d3281e4a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28212%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20FirebirdSQL%20firebird&amp;severity=high&amp;id=69e27e0fbdfbbecc5978c953</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65104-cwe-200-exposure-of-sensitive-infor-818cb5d8</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65104%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20FirebirdSQL%20firebird&amp;severity=high&amp;id=69e27e0fbdfbbecc5978c95e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5718-cwe-434-unrestricted-upload-of-file--1133bfad</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5718%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20glenwpcoder%20Drag%20and%20Drop%20Multiple%20File%20Upload%20for%20Contact%20Form%207&amp;severity=high&amp;id=69e273aebdfbbecc5970e963</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5710-cwe-22-improper-limitation-of-a-path-1345068b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5710%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20glenwpcoder%20Drag%20and%20Drop%20Multiple%20File%20Upload%20for%20Contact%20Form%207&amp;severity=high&amp;id=69e273aebdfbbecc5970e95c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40320-cwe-1336-improper-neutralization-of-7c3e97b3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40320%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20Giskard-AI%20giskard-oss&amp;severity=medium&amp;id=69e273aebdfbbecc5970e958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40319-cwe-1333-inefficient-regular-expres-c4bed657</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40319%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20Giskard-AI%20giskard-oss&amp;severity=low&amp;id=69e26ffebdfbbecc596e17be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40518-cwe-22-improper-limitation-of-a-pat-95c4c5a3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40518%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20bytedance%20deer-flow&amp;severity=high&amp;id=69e26909bdfbbecc5968fd22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3464-cwe-22-improper-limitation-of-a-path-16d32bc0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3464%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20aguilatechnologies%20WP%20Customer%20Area&amp;severity=high&amp;id=69e28194bdfbbecc597b95e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21733-cwe-280-improper-handling-of-insuff-ad2adca4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21733%3A%20Vulnerability%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=high&amp;id=69e25e76bdfbbecc595f3fb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40516-cwe-918-server-side-request-forgery-74d5147e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40516%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20HKUDS%20OpenHarness&amp;severity=high&amp;id=69e25e76bdfbbecc595f3fbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40515-cwe-863-incorrect-authorization-in--67f24981</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40515%3A%20CWE-863%20Incorrect%20Authorization%20in%20HKUDS%20OpenHarness&amp;severity=high&amp;id=69e25e76bdfbbecc595f3fba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21709-cwe-77-command-injection-generic-in-3efaa943</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21709%3A%20CWE-77%20Command%20Injection%20-%20Generic%20in%20Veeam%20Backup%20and%20Replication&amp;severity=medium&amp;id=69e253e3bdfbbecc593fb259</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6497-server-side-request-forgery-in-prasa-47b23fe1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6497%3A%20Server-Side%20Request%20Forgery%20in%20prasathmani%20TinyFileManager&amp;severity=medium&amp;id=69e253e3bdfbbecc593fb262</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6284-cwe-521-in-horner-automation-cscape-17ab7886</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6284%3A%20CWE-521%20in%20Horner%20Automation%20Cscape&amp;severity=critical&amp;id=69e253e3bdfbbecc593fb25d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cochat-launches-ai-collaboration-platform-to-comba-be9f2b7f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CoChat%20Launches%20AI%20Collaboration%20Platform%20to%20Combat%20Shadow%20AI&amp;severity=medium&amp;id=69e24cd8bdfbbecc5936df5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6496-path-traversal-in-prasathmani-tinyfi-efd352ab</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6496%3A%20Path%20Traversal%20in%20prasathmani%20TinyFileManager&amp;severity=medium&amp;id=69e2495cbdfbbecc5932f325</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41153-cwe-77-in-jetbrains-junie-621e3a60</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41153%3A%20CWE-77%20in%20JetBrains%20Junie&amp;severity=medium&amp;id=69e2495cbdfbbecc5932f319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-apt-seedworm-targets-global-organizations--329f9990</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20APT%20Seedworm%20Targets%20Global%20Organizations%20via%20Microsoft%20Teams&amp;severity=medium&amp;id=69e60afe19fe3cd2cde02d2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6493-cross-site-scripting-in-lukevella-ra-55aea1e3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6493%3A%20Cross%20Site%20Scripting%20in%20lukevella%20rallly&amp;severity=medium&amp;id=69e2495cbdfbbecc5932f31c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6492-information-disclosure-in-arnobt78-h-8be294ba</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6492%3A%20Information%20Disclosure%20in%20arnobt78%20Hotel%20Booking%20Management%20System&amp;severity=medium&amp;id=69e2424ebdfbbecc592bf52a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6491-heap-based-buffer-overflow-in-libvip-10e77d09</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6491%3A%20Heap-based%20Buffer%20Overflow%20in%20libvips&amp;severity=medium&amp;id=69e2424ebdfbbecc592bf521</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6490-sql-injection-in-querymine-sms-bc581eac</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6490%3A%20SQL%20Injection%20in%20QueryMine%20sms&amp;severity=medium&amp;id=69e2424ebdfbbecc592bf531</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-leverage-leaked-government-intelligence-to-b4f7d6c6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20leverage%20leaked%20government%20intelligence%20tools%20to%20target%20everyday%20iOS%20users%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69e232d082d89c981ff8363c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6489-unrestricted-upload-in-querymine-sms-e4c4a996</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6489%3A%20Unrestricted%20Upload%20in%20QueryMine%20sms&amp;severity=medium&amp;id=69e232c582d89c981ff828a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6488-sql-injection-in-querymine-sms-fe0ba541</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6488%3A%20SQL%20Injection%20in%20QueryMine%20sms&amp;severity=medium&amp;id=69e232c582d89c981ff828a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6487-path-traversal-in-qihui-jtbc5-cms-3548fc5d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6487%3A%20Path%20Traversal%20in%20Qihui%20jtbc5%20CMS&amp;severity=medium&amp;id=69e22bbf82d89c981ff3d63a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6507-out-of-bounds-write-in-red-hat-red-h-280b3ba7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6507%3A%20Out-of-bounds%20Write%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=69e22bbf82d89c981ff3d640</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6486-cross-site-scripting-in-classroomboo-de02e171</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6486%3A%20Cross%20Site%20Scripting%20in%20classroombookings&amp;severity=medium&amp;id=69e22bbf82d89c981ff3d630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-satellite-cybersecurity-act-90k-chro-613e8ad0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20Satellite%20Cybersecurity%20Act%2C%20%2490K%20Chrome%20Flaw%2C%20Teen%20Hacker%20Arrested&amp;severity=medium&amp;id=69e2213282d89c981fe4aa72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23777-cwe-200-exposure-of-sensitive-infor-cd82fbb5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23777%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=medium&amp;id=69e2213882d89c981fe4b085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28263-cwe-79-improper-neutralization-of-i-1acafaea</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28263%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=medium&amp;id=69e2213882d89c981fe4b088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46606-cwe-307-improper-restriction-of-exc-307f50dc</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46606%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=medium&amp;id=69e2213882d89c981fe4b082</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46605-cwe-384-session-fixation-in-dell-po-5b99807b</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46605%3A%20CWE-384%3A%20Session%20Fixation%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=medium&amp;id=69e21daf82d89c981fdb2544</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46641-cwe-287-improper-authentication-in--c16ae6fc</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46641%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=medium&amp;id=69e21daf82d89c981fdb254a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46607-cwe-287-improper-authentication-in--00ff1038</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46607%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=medium&amp;id=69e21daf82d89c981fdb2547</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35073-cwe-78-improper-neutralization-of-s-c1ee811f</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35073%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=medium&amp;id=69e216a682d89c981fce5844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35074-cwe-78-improper-neutralization-of-s-c4f8a7e5</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35074%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=medium&amp;id=69e216a682d89c981fce5847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35072-cwe-78-improper-neutralization-of-s-8793ed88</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35072%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=medium&amp;id=69e216a682d89c981fce5841</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5131-cwe-918-server-side-request-forgery--eefe7b1a</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5131%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Nomios%20Poland%20GREENmod&amp;severity=medium&amp;id=69e216a682d89c981fce584a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/another-draftkings-hacker-sentenced-to-prison-6dbd7bd3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Another%20DraftKings%20Hacker%20Sentenced%20to%20Prison&amp;severity=medium&amp;id=69e20f9d82d89c981fc9fc9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35153-cwe-88-improper-neutralization-of-a-7210f906</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35153%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=medium&amp;id=69e20fa682d89c981fca00e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6483-os-command-injection-in-wavlink-wl-w-2cff4fef</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6483%3A%20OS%20Command%20Injection%20in%20Wavlink%20WL-WN530H4&amp;severity=high&amp;id=69e20fa682d89c981fca00eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lawmakers-gathered-quietly-to-talk-about-ai-angst--ccf87bec</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lawmakers%20Gathered%20Quietly%20to%20Talk%20About%20AI.%20Angst%20and%20Fears%20of%20%E2%80%98Destruction%E2%80%99%20Followed&amp;severity=low&amp;id=69e2089582d89c981fc3e568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/recent-apache-activemq-vulnerability-exploited-in--98176e07</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Recent%20Apache%20ActiveMQ%20Vulnerability%20Exploited%20in%20the%20Wild&amp;severity=critical&amp;id=69e2051182d89c981fbef2df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/direct-sys-loader-and-cgrabber-stealer-five-stage--50867bbc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Direct-Sys%20Loader%20and%20CGrabber%20Stealer%20Five-Stage%20Malware%20Chain&amp;severity=medium&amp;id=69e20c1982d89c981fc7230c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/two-north-korean-it-worker-scheme-facilitators-jai-6bb45449</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Two%20North%20Korean%20IT%20Worker%20Scheme%20Facilitators%20Jailed%20in%20the%20US&amp;severity=medium&amp;id=69e1fe0982d89c981fb5bea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23779-cwe-77-improper-neutralization-of-s-9bc42051</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23779%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=medium&amp;id=69e2142082d89c981fcd7c1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23776-cwe-295-improper-certificate-valida-1a2a1c1a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23776%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=high&amp;id=69e2142082d89c981fcd7c1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15625-cwe-89-improper-neutralization-of-s-bf191582</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15625%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Sparx%20Systems%20Pty%20Ltd.%20Sparx%20Pro%20Cloud%20Server&amp;severity=critical&amp;id=69e1f70182d89c981fb0d48f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15624-cwe-256-plaintext-storage-of-a-pass-907ae5f0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15624%3A%20CWE-256%3A%20Plaintext%20Storage%20of%20a%20Password%20in%20Sparx%20Systems%20Pty%20Ltd.%20Sparx%20Pro%20Cloud%20Server&amp;severity=critical&amp;id=69e1f70182d89c981fb0d48c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dissecting-macos-intrusion-from-lure-to-compromise-3c857763</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dissecting%20macOS%20intrusion%20from%20lure%20to%20compromise&amp;severity=medium&amp;id=69e20c1982d89c981fc722f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15623-cwe-359-exposure-of-private-persona-24f01d16</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15623%3A%20CWE-359%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20Sparx%20Systems%20Pty%20Ltd.%20Sparx%20Pro%20Cloud%20Server&amp;severity=critical&amp;id=69e1f70182d89c981fb0d489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/takes-aim-at-the-ransomware-throne-f043d8a6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Takes%20Aim%20at%20the%20Ransomware%20Throne&amp;severity=medium&amp;id=69e216a482d89c981fce57d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/joomla-seo-spam-injector-obfuscated-php-backdoor-h-3d3ff1e9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Joomla%20SEO%20Spam%20Injector%3A%20Obfuscated%20PHP%20Backdoor%20Hijacking%20Site%20Visitors&amp;severity=medium&amp;id=69e20c1982d89c981fc722ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15622-cwe-522-insufficiently-protected-cr-996dbedb</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15622%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20Sparx%20Systems%20Pty%20Ltd.%20Sparx%20Enterprise%20Architect&amp;severity=medium&amp;id=69e1f70182d89c981fb0d486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23778-cwe-77-improper-neutralization-of-s-56720612</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23778%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=high&amp;id=69e1f70182d89c981fb0d498</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zionsiphon-malware-targets-ics-in-water-facilities-233fe40a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ZionSiphon%20Malware%20Targets%20ICS%20in%20Water%20Facilities&amp;severity=medium&amp;id=69e1eff982d89c981faac8e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6439-cwe-79-improper-neutralization-of-in-d245a58b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6439%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jconti%20VideoZen&amp;severity=medium&amp;id=69e1f70182d89c981fb0d49b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23775-cwe-532-insertion-of-sensitive-info-d2230f77</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23775%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Dell%20PowerProtect%20Data%20Domain%20appliances&amp;severity=high&amp;id=69e1f70182d89c981fb0d495</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6494-improper-output-neutralization-for-l-4b481af2</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6494%3A%20Improper%20Output%20Neutralization%20for%20Logs%20in%20Red%20Hat%20Red%20Hat%20Ansible%20Automation%20Platform%202&amp;severity=medium&amp;id=69e1f70182d89c981fb0d4a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36568-cwe-522-insufficiently-protected-cr-2289d391</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36568%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20Dell%20PowerProtect%20Data%20Domain%20BoostFS&amp;severity=high&amp;id=69e1f70182d89c981fb0d492</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33392-cwe-1336-in-jetbrains-youtrack-3a31f8ef</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33392%3A%20CWE-1336%20in%20JetBrains%20YouTrack&amp;severity=high&amp;id=69e1ec7982d89c981fa85cb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6451-cwe-352-cross-site-request-forgery-c-12074053</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6451%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20tholstkabelbwde%20Plugin%3A%20CMS%20f%C3%BCr%20Motorrad%20Werkst%C3%A4tten&amp;severity=medium&amp;id=69e1ec7982d89c981fa85cc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40002-cwe-269-improper-privilege-manageme-d0b7c01c</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40002%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20ZTE%20Red%20Magic%2011%20Pro%20(NX809J)&amp;severity=medium&amp;id=69e1ec7982d89c981fa85cbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cursor-ai-vulnerability-exposed-developer-devices-fd612bab</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cursor%20AI%20Vulnerability%20Exposed%20Developer%20Devices&amp;severity=medium&amp;id=69e1e1ea82d89c981fa15800</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23853-cwe-1391-use-of-weak-credentials-in-0ee220b0</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23853%3A%20CWE-1391%3A%20Use%20of%20Weak%20Credentials%20in%20Dell%20PowerProtect%20Data%20Domain&amp;severity=high&amp;id=69e1e1f282d89c981fa18deb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6441-cwe-862-missing-authorization-in-fli-d2f596ab</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6441%3A%20CWE-862%20Missing%20Authorization%20in%20flightbycanto%20Canto&amp;severity=medium&amp;id=69e1dae182d89c981f9ddccb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4659-cwe-22-improper-limitation-of-a-path-b8b0c25b</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4659%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20unitecms%20Unlimited%20Elements%20For%20Elementor&amp;severity=high&amp;id=69e1dae182d89c981f9ddcbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6443-cwe-506-embedded-malicious-code-in-e-b2b69859</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6443%3A%20CWE-506%20Embedded%20Malicious%20Code%20in%20essentialplugin%20Accordion%20and%20Accordion%20Slider&amp;severity=critical&amp;id=69e1dae182d89c981f9ddcd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/53-ddos-domains-taken-down-by-law-enforcement-27effe64</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=53%20DDoS%20Domains%20Taken%20Down%20by%20Law%20Enforcement&amp;severity=medium&amp;id=69e1d75d82d89c981f9c927a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6421-uncontrolled-search-path-in-mobatek--798d08a0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6421%3A%20Uncontrolled%20Search%20Path%20in%20Mobatek%20MobaXterm%20Home%20Edition&amp;severity=high&amp;id=69e1d07582d89c981f98f522</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5797-cwe-74-improper-neutralization-of-sp-6841ef43</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5797%3A%20CWE-74%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20expresstech%20Quiz%20and%20Survey%20Master%20(QSM)%20%E2%80%93%20Easy%20Quiz%20and%20Survey%20Maker&amp;severity=medium&amp;id=69e1d07582d89c981f98f516</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6482-cwe-829-inclusion-of-functionality-f-9df924df</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6482%3A%20CWE-829%20Inclusion%20of%20functionality%20from%20untrusted%20control%20sphere%20in%20Rapid7%20Insight%20Agent&amp;severity=high&amp;id=69e1d07582d89c981f98f52a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35496-improper-limitation-of-a-pathname-t-248f1cf1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35496%3A%20Improper%20limitation%20of%20a%20pathname%20to%20a%20restricted%20directory%20(&apos;Path%20Traversal&apos;)%20in%20CubeCart%20Limited%20CubeCart&amp;severity=low&amp;id=69e1c5c782d89c981f8f173b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34018-improper-neutralization-of-special--6f9210ef</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34018%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20Injection&apos;)%20in%20CubeCart%20Limited%20CubeCart&amp;severity=medium&amp;id=69e1c5c782d89c981f8f1737</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21719-improper-neutralization-of-special--543f1327</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21719%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20CubeCart%20Limited%20CubeCart&amp;severity=high&amp;id=69e1c5c782d89c981f8f1733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5502-cwe-862-missing-authorization-in-the-6f6eb17c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5502%3A%20CWE-862%20Missing%20Authorization%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=medium&amp;id=69e1b7b882d89c981f6ce761</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5427-cwe-862-missing-authorization-in-ext-b61f377a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5427%3A%20CWE-862%20Missing%20Authorization%20in%20extendthemes%20Kubio%20AI%20Page%20Builder&amp;severity=medium&amp;id=69e1b7b882d89c981f6ce757</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5234-cwe-639-authorization-bypass-through-f0db2f8c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5234%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20latepoint%20LatePoint%20%E2%80%93%20Calendar%20Booking%20Plugin%20for%20Appointments%20and%20Events&amp;severity=medium&amp;id=69e1b7b882d89c981f6ce74b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6080-cwe-89-improper-neutralization-of-sp-ec35d5cc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6080%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=medium&amp;id=69e1b7b882d89c981f6ce76c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3330-cwe-89-improper-neutralization-of-sp-fc732859</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3330%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%2010web%20Form%20Maker%20by%2010Web%20%E2%80%93%20Mobile-Friendly%20Drag%20%26%20Drop%20Contact%20Form%20Builder&amp;severity=medium&amp;id=69e1b7b882d89c981f6ce736</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4853-cwe-22-improper-limitation-of-a-path-b235121a</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4853%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20backupguard%20JetBackup%20%E2%80%93%20Backup%2C%20Restore%20%26%20Migrate&amp;severity=medium&amp;id=69e1b7b882d89c981f6ce741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5807-cwe-770-allocation-of-resources-with-1203bc9f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5807%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20HashiCorp%20Vault&amp;severity=high&amp;id=69e1b7b882d89c981f6ce769</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4525-cwe-201-insertion-of-sensitive-infor-f43b0959</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4525%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20HashiCorp%20Vault&amp;severity=high&amp;id=69e2142082d89c981fcd7c24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5052-cwe-918-server-side-request-forgery--f41ab259</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5052%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20HashiCorp%20Vault&amp;severity=medium&amp;id=69e2142082d89c981fcd7c31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3605-cwe-288-authentication-bypass-using--3597885d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3605%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20HashiCorp%20Vault&amp;severity=high&amp;id=69e2142082d89c981fcd7c21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4666-cwe-862-missing-authorization-in-tom-a89a54e6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4666%3A%20CWE-862%20Missing%20Authorization%20in%20tomdever%20wpForo%20Forum&amp;severity=medium&amp;id=69e2142082d89c981fcd7c27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-friday-april-17th-2026-httpsiscs-6ec453ea</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Friday%2C%20April%2017th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9896%2C%20(Fri%2C%20Apr%2017th)&amp;severity=medium&amp;id=69e1948f82d89c981f187ecc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3488-cwe-862-missing-authorization-in-ver-4c95e6b2</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3488%3A%20CWE-862%20Missing%20Authorization%20in%20veronalabs%20WP%20Statistics%20%E2%80%93%20Simple%2C%20privacy-friendly%20Google%20Analytics%20alternative&amp;severity=medium&amp;id=69e2142082d89c981fcd7c34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5231-cwe-79-improper-neutralization-of-in-a4f49703</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5231%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20veronalabs%20WP%20Statistics%20%E2%80%93%20Simple%2C%20privacy-friendly%20Google%20Analytics%20alternative&amp;severity=high&amp;id=69e2142082d89c981fcd7c54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4817-cwe-89-improper-neutralization-of-sp-15c87136</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4817%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20stylemix%20MasterStudy%20LMS%20WordPress%20Plugin%20%E2%80%93%20for%20Online%20Courses%20and%20Education&amp;severity=medium&amp;id=69e2142082d89c981fcd7c3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5162-cwe-79-improper-neutralization-of-in-2911a812</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5162%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wproyal%20Royal%20Addons%20for%20Elementor%20%E2%80%93%20Addons%20and%20Templates%20Kit%20for%20Elementor&amp;severity=medium&amp;id=69e2142082d89c981fcd7c4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lumma-stealer-infection-with-sectop-rat-arechclien-841ddb7c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lumma%20Stealer%20infection%20with%20Sectop%20RAT%20(ArechClient2)%2C%20(Fri%2C%20Apr%2017th)&amp;severity=medium&amp;id=69e228ca82d89c981fea5e62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-18-8df3d9b1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-18&amp;severity=medium&amp;id=69e3385abdfbbecc59045186</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-17-13b60f86</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-17&amp;severity=medium&amp;id=69e2cb5dbdfbbecc59a38896</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37749-na-c4c6e5dc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37749%3A%20n%2Fa&amp;severity=critical&amp;id=69e24cdfbdfbbecc5936e931</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31317-na-298e2b28</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31317%3A%20n%2Fa&amp;severity=high&amp;id=69e2424ebdfbbecc592bf51c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70795-na-3b058274</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70795%3A%20n%2Fa&amp;severity=medium&amp;id=69e2424ebdfbbecc592bf513</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-17-3b7ad22d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-17&amp;severity=low&amp;id=69e189fb82d89c981f03051b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40265-cwe-862-missing-authorization-in-en-645b045f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40265%3A%20CWE-862%3A%20Missing%20Authorization%20in%20enchant97%20note-mark&amp;severity=medium&amp;id=69e1786e82d89c981fe335c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40263-cwe-208-observable-timing-discrepan-cfedb65e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40263%3A%20CWE-208%3A%20Observable%20Timing%20Discrepancy%20in%20enchant97%20note-mark&amp;severity=low&amp;id=69e1786e82d89c981fe335c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40262-cwe-79-improper-neutralization-of-i-795a0901</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40262%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20enchant97%20note-mark&amp;severity=high&amp;id=69e1786e82d89c981fe335c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22734-cwe-290-authentication-bypass-by-sp-5e7666ae</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22734%3A%20CWE-290%20Authentication%20bypass%20by%20spoofing%20in%20Cloud%20Foundry%20UUA&amp;severity=high&amp;id=69e174eb82d89c981fe07a78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40260-cwe-776-improper-restriction-of-rec-0042eef4</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40260%3A%20CWE-776%3A%20Improper%20Restriction%20of%20Recursive%20Entity%20References%20in%20DTDs%20(&apos;XML%20Entity%20Expansion&apos;)%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=69e1716682d89c981fde6ff3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40922-cwe-79-improper-neutralization-of-i-4ec62a5e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40922%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=69e1716682d89c981fde6ff9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40322-cwe-79-improper-neutralization-of-i-7309fd84</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40322%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=critical&amp;id=69e2142282d89c981fcd7cf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40318-cwe-24-path-traversal-filedir-in-si-705041eb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40318%3A%20CWE-24%3A%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=69e2142282d89c981fcd7cf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40259-cwe-285-improper-authorization-in-s-895cf1a6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40259%3A%20CWE-285%3A%20Improper%20Authorization%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=69e2142282d89c981fcd7ced</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58343-cwe-425-direct-request-forced-brows-9cba515d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58343%3A%20CWE-425%20Direct%20Request%20(&apos;Forced%20Browsing&apos;)%20in%20Vision%20Helpdesk&amp;severity=medium&amp;id=69e166dc82d89c981fd8594b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40255-cwe-601-url-redirection-to-untruste-2655ea65</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40255%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20adonisjs%20http-server&amp;severity=medium&amp;id=69e166dc82d89c981fd8594f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41113-cwe-78-improper-neutralization-of-s-94bbf1c0</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41113%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20sagredo%20qmail&amp;severity=high&amp;id=69e15fdc82d89c981fd52eb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40308-cwe-639-authorization-bypass-throug-2a3d8569</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40308%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20joedolson%20my-calendar&amp;severity=high&amp;id=69e158cb82d89c981fcfb81d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39313-cwe-770-allocation-of-resources-wit-d82a0598</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39313%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20QuantGeekDev%20mcp-framework&amp;severity=high&amp;id=69e1554682d89c981fce0d83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35469-cwe-770-allocation-of-resources-wit-42aeeefc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35469%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20moby%20spdystream&amp;severity=high&amp;id=69e1554682d89c981fce0d7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34164-cwe-532-insertion-of-sensitive-info-7422ab0f</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34164%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20valtimo-platform%20valtimo&amp;severity=medium&amp;id=69e1554682d89c981fce0d78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/x5bguest-diaryx5d-compromised-dvrs-and-finding-the-90c96254</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%26%23x5b%3BGuest%20Diary%26%23x5d%3B%20Compromised%20DVRs%20and%20Finding%20Them%20in%20the%20Wild%2C%20(Thu%2C%20Apr%2016th)&amp;severity=medium&amp;id=69e026f282d89c981fac32b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54502-cwe-668-exposure-of-resource-to-wro-81812557</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54502%3A%20CWE-668%20%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20AMD%20AMD%20EPYC%E2%84%A2%209004%20Series%20Processors&amp;severity=high&amp;id=69e135ad82d89c981fbaa760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54510-cwe-414-missing-lock-check-in-amd-a-02b6fcae</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54510%3A%20CWE-414%20%20Missing%20Lock%20Check%20in%20AMD%20AMD%20EPYC%E2%84%A2%209004%20Series%20Processors&amp;severity=medium&amp;id=69e135ad82d89c981fbaa767</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6442-improper-validation-of-syntactic-cor-5ef413e4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6442%3A%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20Snowflake%20Cortex%20Code%20CLI&amp;severity=high&amp;id=69e135ad82d89c981fbaa76a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43937-cwe-532-insertion-of-sensitive-info-e934c167</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43937%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=69e12b2c82d89c981fb4018a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43935-cwe-404-improper-resource-shutdown--7a666ab7</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43935%3A%20CWE-404%3A%20Improper%20Resource%20Shutdown%20or%20Release%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=69e12b2c82d89c981fb40187</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43883-cwe-754-improper-check-for-unusual--f3e6c01f</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43883%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=69e1241082d89c981fafb50f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41082-cwe-24-path-traversal-filedir-in-oc-bd86f374</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41082%3A%20CWE-24%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20OCaml%20opam&amp;severity=high&amp;id=69e1241082d89c981fafb517</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27820-cwe-120-buffer-copy-without-checkin-64d72ec9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27820%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20ruby%20zlib&amp;severity=low&amp;id=69e1241082d89c981fafb513</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24749-cwe-863-incorrect-authorization-in--5b90cce9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24749%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20silverstripe%20silverstripe-assets&amp;severity=medium&amp;id=69e11d0782d89c981fabdc64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2336-cwe-331-insufficient-entropy-in-micr-ec06bd07</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2336%3A%20CWE-331%20Insufficient%20entropy%20in%20Microchip%20IStaX&amp;severity=high&amp;id=69e11d0782d89c981fabdc68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/government-cant-win-the-cyber-war-without-the-priv-64dfa608</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Government%20Can%E2%80%99t%20Win%20the%20Cyber%20War%20Without%20the%20Private%20Sector&amp;severity=medium&amp;id=69e2289d82d89c981fe9c065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41080-cwe-331-insufficient-entropy-in-lib-c31d4d69</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41080%3A%20CWE-331%20Insufficient%20Entropy%20in%20libexpat%20project%20libexpat&amp;severity=low&amp;id=69e1160082d89c981fa7a67f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36579-cwe-640-weak-password-recovery-mech-2b6472cb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36579%3A%20CWE-640%3A%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20Dell%20Dell%20Pro%2014%20Essential%20PV14250&amp;severity=medium&amp;id=69e10ef782d89c981fa32a50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5426-cwe-321-use-of-hard-coded-cryptograp-c04eb03f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5426%3A%20CWE-321%20Use%20of%20hard-coded%20cryptographic%20key%20in%20Digital%20Knowledge%20KnowledgeDeliver&amp;severity=high&amp;id=69e107ef82d89c981f9dd1af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3324-cwe-288-authentication-bypass-using--8de21145</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3324%3A%20CWE-288%20Authentication%20bypass%20using%20an%20alternate%20path%20or%20channel%20in%20Zohocorp%20ManageEngine%20Log360&amp;severity=high&amp;id=69e0fd6982d89c981f97e31f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6409-cwe-20-improper-input-validation-in--22b0fb12</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6409%3A%20CWE-20%20Improper%20input%20validation%20in%20Protocol%20Buffers%20Protobuf-php%20(Pecl)&amp;severity=high&amp;id=69e0fd6982d89c981f97e325</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openai-widens-access-to-cybersecurity-model-after--1f8de97c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenAI%20Widens%20Access%20to%20Cybersecurity%20Model%20After%20Anthropic%E2%80%99s%20Mythos%20Reveal&amp;severity=low&amp;id=69e0f2d882d89c981f918a58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2840-cwe-79-improper-neutralization-of-in-a5c9240c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2840%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20onlineoptimisation%20Email%20Encoder%20%E2%80%93%20Protect%20Email%20Addresses%20and%20Phone%20Numbers&amp;severity=medium&amp;id=69e0f2f482d89c981f91994c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5785-cwe-89-improper-neutralization-of-sp-0f41a3b7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5785%3A%20CWE-89%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20injection&apos;)%20in%20Zohocorp%20ManageEngine%20PAM360&amp;severity=high&amp;id=69e0ebd382d89c981f8ceb90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31987-cwe-532-insertion-of-sensitive-info-033f814f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31987%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=high&amp;id=69e0ebd382d89c981f8ceb86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4160-cwe-639-authorization-bypass-through-737667b3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4160%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20techjewel%20Fluent%20Forms%20%E2%80%93%20Customizable%20Contact%20Forms%2C%20Survey%2C%20Quiz%2C%20%26%20Conversational%20Form%20Builder&amp;severity=medium&amp;id=69e0ebd382d89c981f8ceb8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31843-cwe-284-improper-access-control-lea-f84d8bc9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31843%3A%20CWE-284%20Improper%20Access%20Control%20leading%20to%20unauthorized%20modification%20of%20executable%20application%20files%20in%20goodoneuz%20pay-uz&amp;severity=critical&amp;id=69e0e14482d89c981f87fef2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beyond-the-breach-inside-a-cargo-theft-actors-post-8348f717</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Beyond%20the%20breach%3A%20inside%20a%20cargo%20theft%20actor&apos;s%20post-compromise%20playbook&amp;severity=medium&amp;id=69e0fd6282d89c981f97da61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/data-breach-at-tennessee-hospital-affects-337000-2215ef61</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Data%20Breach%20at%20Tennessee%20Hospital%20Affects%20337%2C000&amp;severity=medium&amp;id=69e0da3c82d89c981f841d6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15621-cwe-522-insufficiently-protected-cr-9776e2a7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15621%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20Sparx%20Systems%20Pty%20Ltd.%20Sparx%20Enterprise%20Architect&amp;severity=medium&amp;id=69e0dabc82d89c981f8468d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/artemis-emerges-from-stealth-with-70-million-in-fu-27c08fc2</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Artemis%20Emerges%20From%20Stealth%20With%20%2470%20Million%20in%20Funding&amp;severity=medium&amp;id=69e0d5b782d89c981f81d0fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/splunk-enterprise-update-patches-code-execution-vu-33e172b1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Splunk%20Enterprise%20Update%20Patches%20Code%20Execution%20Vulnerability&amp;severity=critical&amp;id=69e0cfb082d89c981f7e8c93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-paid-out-23-million-at-zero-day-quest-20-e0e428a4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Paid%20Out%20%242.3%20Million%20at%20Zero%20Day%20Quest%202026%20Hacking%20Contest&amp;severity=high&amp;id=69e0c8a882d89c981f7bc401</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3155-cwe-862-missing-authorization-in-one-0aec828d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3155%3A%20CWE-862%20Missing%20Authorization%20in%20onesignal%20OneSignal%20%E2%80%93%20Web%20Push%20Notifications&amp;severity=low&amp;id=69e0cc2b82d89c981f7cd61c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3369-cwe-79-improper-neutralization-of-in-c1a5e10f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3369%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codesolz%20Better%20Find%20and%20Replace%20%E2%80%93%20AI-Powered%20Suggestions&amp;severity=medium&amp;id=69e0cc2b82d89c981f7cd620</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3489-cwe-89-improper-neutralization-of-sp-65d3fe0f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3489%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20designinvento%20DirectoryPress%20%E2%80%93%20Business%20Directory%20And%20Classified%20Ad%20Listing&amp;severity=high&amp;id=69e0cc2b82d89c981f7cd625</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nist-prioritizes-nvd-enrichment-for-cves-in-cisa-k-99bc1f23</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NIST%20Prioritizes%20NVD%20Enrichment%20for%20CVEs%20in%20CISA%20KEV%2C%20Critical%20Software&amp;severity=critical&amp;id=69e0c1a082d89c981f784255</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12624-cwe-613-insufficient-session-expira-f9b47282</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12624%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20WSO2%20WSO2%20Identity%20Server&amp;severity=medium&amp;id=69e0be2882d89c981f771dd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-patches-critical-vulnerabilities-in-webex-is-37a04699</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Patches%20Critical%20Vulnerabilities%20in%20Webex%2C%20ISE&amp;severity=critical&amp;id=69e0b71482d89c981f73ee5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6024-cwe-79-improper-neutralization-of-in-7fcbb74f</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6024%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WSO2%20WSO2%20API%20Manager&amp;severity=medium&amp;id=69e0c29882d89c981f78d921</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10242-cwe-79-improper-neutralization-of-i-2529889f</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10242%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WSO2%20WSO2%20API%20Manager&amp;severity=medium&amp;id=69e0c29882d89c981f78d917</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8010-cwe-611-improper-restriction-of-xml--bce8385c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8010%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20(&apos;XXE&apos;)%20in%20WSO2%20WSO2%20API%20Manager&amp;severity=low&amp;id=69e0c29882d89c981f78d91e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4867-cwe-79-improper-neutralization-of-in-2c045398</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4867%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WSO2%20WSO2%20API%20Manager&amp;severity=medium&amp;id=69e0c29882d89c981f78d91b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomware-hits-automotive-data-expert-autovista-cfd6d3fc</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware%20Hits%20Automotive%20Data%20Expert%20Autovista&amp;severity=medium&amp;id=69e0ac8882d89c981f7004c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39987-update-how-attackers-weaponized-mar-14d626d1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39987%20update%3A%20How%20attackers%20weaponized%20marimo%20to%20deploy%20a%20blockchain%20botnet%20via%20HuggingFace&amp;severity=medium&amp;id=69e0be2682d89c981f771daa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/claude-code-gemini-cli-github-copilot-agents-vulne-9c48456f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Claude%20Code%2C%20Gemini%20CLI%2C%20GitHub%20Copilot%20Agents%20Vulnerable%20to%20Prompt%20Injection%20via%20Comments&amp;severity=medium&amp;id=69e0a1fc82d89c981f6a5fbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23772-cwe-269-improper-privilege-manageme-a3c398f9</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23772%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Dell%20Storage%20Manager&amp;severity=high&amp;id=69e0a58082d89c981f6c48ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2374-cwe-611-improper-restriction-of-xml--936e0b78</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2374%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20(&apos;XXE&apos;)%20in%20WSO2%20WSO2%20API%20Manager&amp;severity=high&amp;id=69e09e7782d89c981f68cc36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0718-cwe-862-missing-authorization-in-wpx-3e9ed909</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0718%3A%20CWE-862%20Missing%20Authorization%20in%20wpxpo%20Post%20Grid%20Gutenberg%20Blocks%20for%20News%2C%20Magazines%2C%20Blog%20Websites%20%E2%80%93%20PostX&amp;severity=medium&amp;id=69e093ed82d89c981f63c7d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14868-cwe-22-improper-limitation-of-a-pat-9bfe3656</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14868%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20shahinurislam%20Career%20Section&amp;severity=high&amp;id=69e093ed82d89c981f63c7cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41035-cwe-130-improper-handling-of-length-bf643584</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41035%3A%20CWE-130%20Improper%20Handling%20of%20Length%20Parameter%20Inconsistency%20in%20Samba%20rsync&amp;severity=high&amp;id=69e08ce482d89c981f5edf33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3876-cwe-79-improper-neutralization-of-in-8cfb67a6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3876%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20specialk%20Prismatic&amp;severity=high&amp;id=69e08ce482d89c981f5edf24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3355-cwe-79-improper-neutralization-of-in-af9beb0d</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3355%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ivole%20Customer%20Reviews%20for%20WooCommerce&amp;severity=medium&amp;id=69e08ce482d89c981f5edf1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13364-cwe-79-improper-neutralization-of-i-fce87c81</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13364%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20flippercode%20WP%20Maps%20%E2%80%93%20Store%20Locator%2CGoogle%20Maps%2COpenStreetMap%2CMapbox%2CListing%2CDirectory%20%26%20Filters&amp;severity=medium&amp;id=69e08ce482d89c981f5edf06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3875-cwe-79-improper-neutralization-of-in-5cd448ae</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3875%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20BetterDocs%20%E2%80%93%20%20Knowledge%20Base%20Docs%20%26%20FAQ%20Solution%20for%20Elementor%20%26%20Block%20Editor&amp;severity=medium&amp;id=69e08ce482d89c981f5edf20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3995-cwe-79-improper-neutralization-of-in-936a3d6f</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3995%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20faridsaniee%20OPEN-BRAIN&amp;severity=medium&amp;id=69e08ce482d89c981f5edf28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1572-cwe-79-improper-neutralization-of-in-ca6fef49</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1572%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20livemesh%20Livemesh%20Addons%20by%20Elementor&amp;severity=medium&amp;id=69e08ce482d89c981f5edf0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1620-cwe-98-improper-control-of-filename--b5a6957f</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1620%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20livemesh%20Livemesh%20Addons%20by%20Elementor&amp;severity=high&amp;id=69e08ce482d89c981f5edf15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41034-cwe-125-out-of-bounds-read-in-ascen-1f86e56a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41034%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Ascensio%20ONLYOFFICE%20DocumentServer&amp;severity=medium&amp;id=69e0825782d89c981f59691a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3861-na-in-line-corporation-line-client-f-6f37bce9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3861%3A%20na%20in%20LINE%20Corporation%20LINE%20client%20for%20iOS&amp;severity=medium&amp;id=69e0825782d89c981f596914</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41030-cwe-669-incorrect-resource-transfer-c35faeb6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41030%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20Ascensio%20ONLYOFFICE%20DesktopEditors&amp;severity=medium&amp;id=69e0825782d89c981f596917</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3581-cwe-862-missing-authorization-in-ian-14ed62cf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3581%3A%20CWE-862%20Missing%20Authorization%20in%20iandunn%20Basic%20Google%20Maps%20Placemarks&amp;severity=medium&amp;id=69e077cc82d89c981f4f924c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3773-cwe-89-improper-neutralization-of-sp-7b7b79ff</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3773%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20onlineada%20Accessibility%20Suite%20by%20Ability%2C%20Inc&amp;severity=medium&amp;id=69e077cc82d89c981f4f9278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3614-cwe-862-missing-authorization-in-acy-936592c5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3614%3A%20CWE-862%20Missing%20Authorization%20in%20acyba%20AcyMailing%20%E2%80%93%20An%20Ultimate%20Newsletter%20Plugin%20and%20Marketing%20Automation%20Solution%20for%20WordPress&amp;severity=high&amp;id=69e077cc82d89c981f4f926f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3599-cwe-89-improper-neutralization-of-sp-80174081</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3599%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20imprintnext%20Riaxe%20Product%20Customizer&amp;severity=high&amp;id=69e077cc82d89c981f4f9266</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5050-cwe-347-improper-verification-of-cry-f44f9812</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5050%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20jconti%20Payment%20Gateway%20for%20Redsys%20%26%20WooCommerce%20Lite&amp;severity=high&amp;id=69e077cf82d89c981f4f92a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3551-cwe-79-improper-neutralization-of-in-6127ed29</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3551%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rafasashi%20Custom%20New%20User%20Notification&amp;severity=medium&amp;id=69e077cc82d89c981f4f9239</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3595-cwe-862-missing-authorization-in-imp-ae1beb14</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3595%3A%20CWE-862%20Missing%20Authorization%20in%20imprintnext%20Riaxe%20Product%20Customizer&amp;severity=medium&amp;id=69e077cc82d89c981f4f9250</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3596-cwe-862-missing-authorization-in-imp-80944579</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3596%3A%20CWE-862%20Missing%20Authorization%20in%20imprintnext%20Riaxe%20Product%20Customizer&amp;severity=critical&amp;id=69e077cc82d89c981f4f9259</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22619-vulnerability-in-eaton-ipp-software-16180eb8</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22619%3A%20Vulnerability%20in%20Eaton%20IPP%20software&amp;severity=high&amp;id=69e077cc82d89c981f4f9236</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22618-cwe-358-improperly-implemented-secu-cf580bd1</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22618%3A%20CWE-358%20Improperly%20implemented%20security%20check%20for%20standard%20in%20Eaton%20IPP%20software&amp;severity=medium&amp;id=69e077cc82d89c981f4f9233</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22617-cwe-614-sensitive-cookie-in-https-s-c480a253</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22617%3A%20CWE-614%20Sensitive%20cookie%20in%20HTTPS%20session%20without%20&apos;secure&apos;%20attribute%20in%20Eaton%20IPP%20Software&amp;severity=medium&amp;id=69e077cc82d89c981f4f9230</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22616-cwe-307-improper-restriction-of-exc-cae52f06</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22616%3A%20CWE-307%20Improper%20restriction%20of%20excessive%20authentication%20attempts%20in%20Eaton%20IPP%20Software&amp;severity=medium&amp;id=69e06d5282d89c981f32f34e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22615-cwe-20-improper-input-validation-in-d8d9bd6d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22615%3A%20CWE-20%20Improper%20input%20validation%20in%20Eaton%20IPP%20Software&amp;severity=medium&amp;id=69e06d5282d89c981f32f34b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40118-incorrectly-specified-destination-i-7da8b7a7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40118%3A%20Incorrectly%20specified%20destination%20in%20a%20communication%20channel%20in%20Arcserve%20UDP%20Console&amp;severity=medium&amp;id=69e06d5282d89c981f32f352</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5070-cwe-79-improper-neutralization-of-in-86851c8e</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5070%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siteorigin%20Vantage&amp;severity=medium&amp;id=69e05f2f82d89c981f1f01cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3878-cwe-79-improper-neutralization-of-in-fb75070d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3878%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fahadmahmood%20WP%20Docs&amp;severity=medium&amp;id=69e05f2f82d89c981f1f01c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4032-cwe-79-improper-neutralization-of-in-838a1846</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4032%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kpumuk%20CodeColorer&amp;severity=medium&amp;id=69e05f2f82d89c981f1f01c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6351-cwe-93-improper-neutralization-of-cr-9661b33d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6351%3A%20CWE-93%20Improper%20neutralization%20of%20CRLF%20sequences%20(&apos;CRLF%20injection&apos;)%20in%20Openfind%20MailGates&amp;severity=high&amp;id=69e04d9c82d89c981f080c31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-41015-cwe-78-improper-neutralization-of-s-9268043e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-41015%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20radare%20radare2&amp;severity=high&amp;id=69e04d9c82d89c981f080c1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6350-cwe-121-stack-based-buffer-overflow--d51a62db</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6350%3A%20CWE-121%20Stack-based%20buffer%20overflow%20in%20Openfind%20MailGates&amp;severity=critical&amp;id=69e04d9c82d89c981f080c2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3885-cwe-79-improper-neutralization-of-in-e174da38</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3885%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gn_themes%20WP%20Shortcodes%20Plugin%20%E2%80%94%20Shortcodes%20Ultimate&amp;severity=medium&amp;id=69e04d9c82d89c981f080c1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6349-cwe-78-improper-neutralization-of-sp-76bba57a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6349%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20HGiga%20iSherlock-base-4.5&amp;severity=critical&amp;id=69e04d9c82d89c981f080c29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3428-cwe-494-download-of-code-without-int-26258474</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3428%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20ASUS%20Member%20Center(%E5%8D%8E%E7%A1%95%E5%A4%A7%E5%8E%85)&amp;severity=medium&amp;id=69e04d9c82d89c981f080c0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1880-cwe-367-time-of-check-time-of-use-to-1419a365</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1880%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20ASUS%20DriverHub&amp;severity=medium&amp;id=69e04d9c82d89c981f080c00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-thursday-april-16th-2026-httpsis-4e785520</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Thursday%2C%20April%2016th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9894%2C%20(Thu%2C%20Apr%2016th)&amp;severity=medium&amp;id=69e0431082d89c981f00a466</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6348-cwe-306-missing-authentication-for-c-2cb15b3d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6348%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20Simopro%20Technology%20WinMatrix&amp;severity=critical&amp;id=69e04d9c82d89c981f080c25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3299-cwe-79-improper-neutralization-of-in-00f10b35</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3299%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20futtta%20WP%20YouTube%20Lyte&amp;severity=medium&amp;id=69e03f8c82d89c981fff3a5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40505-cwe-150-improper-neutralization-of--b7f1cec7</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40505%3A%20CWE-150%20Improper%20Neutralization%20of%20Escape%2C%20Meta%2C%20or%20Control%20Sequences%20in%20Artifex%20Software%20Inc.%20MuPDF&amp;severity=medium&amp;id=69e03f8c82d89c981fff3a67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40504-cwe-122-heap-based-buffer-overflow--7b35deb9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40504%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20marcobambini%20gravity&amp;severity=critical&amp;id=69e03f8c82d89c981fff3a61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40502-cwe-862-missing-authorization-in-hk-1a5016b6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40502%3A%20CWE-862%20Missing%20Authorization%20in%20HKUDS%20OpenHarness&amp;severity=high&amp;id=69e0388582d89c981fe55b1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40503-cwe-22-improper-limitation-of-a-pat-3b442db8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40503%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20HKUDS%20OpenHarness&amp;severity=high&amp;id=69e0388582d89c981fe55b24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-17-acac79e1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-17&amp;severity=medium&amp;id=69e21a1f82d89c981fcfb12f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-16-957528d6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-16&amp;severity=medium&amp;id=69e17bea82d89c981fe59751</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37100-na-83e19342</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37100%3A%20n%2Fa&amp;severity=medium&amp;id=69e107ef82d89c981f9dd1ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37347-na-0e02ab98</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37347%3A%20n%2Fa&amp;severity=critical&amp;id=69e0fd6982d89c981f97e31c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37346-na-f05890a1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37346%3A%20n%2Fa&amp;severity=medium&amp;id=69e0fd6982d89c981f97e318</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37345-na-9f6b0dc7</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37345%3A%20n%2Fa&amp;severity=critical&amp;id=69e0fd6982d89c981f97e313</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37344-na-260a4c1a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37344%3A%20n%2Fa&amp;severity=high&amp;id=69e0fd6682d89c981f97e2aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37343-na-f53e37eb</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37343%3A%20n%2Fa&amp;severity=high&amp;id=69e0fd6682d89c981f97e2a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37342-na-2ee2645c</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37342%3A%20n%2Fa&amp;severity=high&amp;id=69e0fd6682d89c981f97e2a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37341-na-f0dfe489</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37341%3A%20n%2Fa&amp;severity=high&amp;id=69e0fd6682d89c981f97e2a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37340-na-a90f9964</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37340%3A%20n%2Fa&amp;severity=critical&amp;id=69e0fd6682d89c981f97e29e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37339-na-e993110f</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37339%3A%20n%2Fa&amp;severity=critical&amp;id=69e0fd6682d89c981f97e29b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37338-na-4930560d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37338%3A%20n%2Fa&amp;severity=critical&amp;id=69e0fd6682d89c981f97e298</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37337-na-30fec7c9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37337%3A%20n%2Fa&amp;severity=high&amp;id=69e0fd6682d89c981f97e295</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37336-na-8799e560</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37336%3A%20n%2Fa&amp;severity=high&amp;id=69e0fd6682d89c981f97e292</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30656-na-0ee1621e</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30656%3A%20n%2Fa&amp;severity=high&amp;id=69e0fd6682d89c981f97e28e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30459-na-928f9818</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30459%3A%20n%2Fa&amp;severity=high&amp;id=69e0f2f482d89c981f919951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-16-211f6192</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-16&amp;severity=low&amp;id=69e06d3782d89c981f3256c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5363-cwe-326-inadequate-encryption-streng-e67227b1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5363%3A%20CWE-326%3A%20Inadequate%20Encryption%20Strength%20in%20TP-Link%20Systems%20Inc.%20Archer%20C7%20v5%20and%20v5.8&amp;severity=medium&amp;id=69e0271282d89c981fac389c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4880-cwe-269-improper-privilege-managemen-a28ccef6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4880%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20ukrsolution%20Barcode%20Scanner%20(%2BMobile%20App)%20%E2%80%93%20Inventory%20manager%2C%20Order%20fulfillment%20system%2C%20POS%20(Point%20of%20Sale)&amp;severity=critical&amp;id=69e01ffb82d89c981fa83038</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40193-cwe-90-improper-neutralization-of-s-daa16910</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40193%3A%20CWE-90%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20LDAP%20Query%20(&apos;LDAP%20Injection&apos;)%20in%20foxcpp%20maddy&amp;severity=high&amp;id=69e01ffb82d89c981fa83030</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40947-cwe-426-untrusted-search-path-in-yu-5b9a0d86</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40947%3A%20CWE-426%20Untrusted%20Search%20Path%20in%20Yubico%20libfido2&amp;severity=low&amp;id=69e01ffb82d89c981fa83035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40192-cwe-770-allocation-of-resources-wit-c6717f27</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40192%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20python-pillow%20Pillow&amp;severity=high&amp;id=69e01c6582d89c981fa691af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40316-cwe-94-improper-control-of-generati-262d4fe9</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40316%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20OWASP-BLT%20BLT&amp;severity=high&amp;id=69e018e182d89c981fa55552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4949-cwe-862-missing-authorization-in-pro-c72eecd1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4949%3A%20CWE-862%20Missing%20Authorization%20in%20properfraction%20Paid%20Membership%20Plugin%2C%20Ecommerce%2C%20User%20Registration%20Form%2C%20Login%20Form%2C%20User%20Profile%20%26%20Restrict%20Content%20%E2%80%93%20ProfilePress&amp;severity=medium&amp;id=69e0c29882d89c981f78d924</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6388-insufficient-granularity-of-access-c-fbeba818</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6388%3A%20Insufficient%20Granularity%20of%20Access%20Control%20in%20Red%20Hat%20Red%20Hat%20OpenShift%20GitOps&amp;severity=critical&amp;id=69e00aeb82d89c981f9f944b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1711-cwe-79-improper-neutralization-of-in-a6f1d39f</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1711%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pegasystems%20Pega%20Infinity&amp;severity=medium&amp;id=69e0074d82d89c981f9e1a3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1564-cwe-80-improper-neutralization-of-sc-141c02ac</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1564%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script%20Related%20HTML%20Tags%20in%20a%20Web%20Page%20in%20Pegasystems%20Pega%20Infinity&amp;severity=medium&amp;id=69e0074d82d89c981f9e1a3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22676-cwe-732-incorrect-permission-assign-a3f7b3d2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22676%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Barracuda%20Networks%20RMM&amp;severity=high&amp;id=69dffcc482d89c981f9a5a0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40173-cwe-200-exposure-of-sensitive-infor-65dfad21</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40173%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20dgraph-io%20dgraph&amp;severity=critical&amp;id=69dffcc482d89c981f9a5a10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40186-cwe-79-improper-neutralization-of-i-da6eb63e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40186%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20apostrophecms%20apostrophe&amp;severity=medium&amp;id=69dff5b982d89c981f9734d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39857-cwe-200-exposure-of-sensitive-infor-77d7fde2</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39857%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20apostrophecms%20apostrophe&amp;severity=medium&amp;id=69dfeeb382d89c981f942281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35569-cwe-79-improper-neutralization-of-i-cf7e3ec0</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35569%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20apostrophecms%20apostrophe&amp;severity=high&amp;id=69dfeeb382d89c981f94227d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33889-cwe-79-improper-neutralization-of-i-6ee4b412</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33889%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20apostrophecms%20apostrophe&amp;severity=medium&amp;id=69dfeeb382d89c981f942279</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33888-cwe-863-incorrect-authorization-in--35d4ea2d</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33888%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20apostrophecms%20apostrophe&amp;severity=medium&amp;id=69dfeeb382d89c981f942274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21726-vulnerability-in-grafana-loki-8cebd2e0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21726%3A%20Vulnerability%20in%20Grafana%20Loki&amp;severity=medium&amp;id=69dfeeb382d89c981f942271</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6385-integer-overflow-or-wraparound-in-re-80c34cf6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6385%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Red%20Hat%20Lightspeed%20Core&amp;severity=medium&amp;id=69dfe7c182d89c981f913eff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41118-vulnerability-in-grafana-pyroscope-a9a6cd4c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41118%3A%20Vulnerability%20in%20Grafana%20Pyroscope&amp;severity=critical&amp;id=69dfe7b682d89c981f913c3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33877-cwe-208-observable-timing-discrepan-455d361c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33877%3A%20CWE-208%3A%20Observable%20Timing%20Discrepancy%20in%20apostrophecms%20apostrophe&amp;severity=low&amp;id=69dfe7b682d89c981f913c42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6384-buffer-copy-without-checking-size-of-180df722</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6384%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=high&amp;id=69dfe7be82d89c981f913e6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6364-out-of-bounds-read-in-google-chrome-ee9b22e8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6364%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=medium&amp;id=69dfe7be82d89c981f913e67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6319-use-after-free-in-google-chrome-70128cb4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6319%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7be82d89c981f913e4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6318-use-after-free-in-google-chrome-647ef04f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6318%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7be82d89c981f913e47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6363-type-confusion-in-google-chrome-778cc2b4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6363%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7be82d89c981f913e63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6317-use-after-free-in-google-chrome-6551e6e4</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6317%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7bc82d89c981f913df9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6362-use-after-free-in-google-chrome-418d3b95</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6362%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=medium&amp;id=69dfe7be82d89c981f913e5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6361-heap-buffer-overflow-in-google-chrom-ed6c176c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6361%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7be82d89c981f913e5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6316-use-after-free-in-google-chrome-cc03a7ca</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6316%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7bc82d89c981f913df5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6315-use-after-free-in-google-chrome-50d74272</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6315%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7bc82d89c981f913df1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6314-out-of-bounds-write-in-google-chrome-2215667b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6314%3A%20Out%20of%20bounds%20write%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7bc82d89c981f913ded</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6313-insufficient-policy-enforcement-in-g-06ed9486</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6313%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=low&amp;id=69dfe7bc82d89c981f913de9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6312-insufficient-policy-enforcement-in-g-6255dea0</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6312%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=low&amp;id=69dfe7bc82d89c981f913de5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6311-uninitialized-use-in-google-chrome-2d3a856f</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6311%3A%20Uninitialized%20Use%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7bc82d89c981f913de0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6310-use-after-free-in-google-chrome-484f6da9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6310%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7bc82d89c981f913ddc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6360-use-after-free-in-google-chrome-d3ebcedf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6360%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7be82d89c981f913e57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6309-use-after-free-in-google-chrome-d73ce66a</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6309%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7bc82d89c981f913dd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6308-out-of-bounds-read-in-google-chrome-168f3bc3</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6308%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7bc82d89c981f913dd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6307-type-confusion-in-google-chrome-57982440</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6307%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7b982d89c981f913cd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6306-heap-buffer-overflow-in-google-chrom-06f9de62</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6306%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7b982d89c981f913cd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6305-heap-buffer-overflow-in-google-chrom-df697c78</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6305%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7b982d89c981f913ccc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6304-use-after-free-in-google-chrome-2d9bad9b</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6304%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7b982d89c981f913cc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6303-use-after-free-in-google-chrome-c3150b44</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6303%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7b982d89c981f913cc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6302-use-after-free-in-google-chrome-df0b9544</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6302%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7b982d89c981f913cc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6301-type-confusion-in-google-chrome-6e9014de</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6301%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7b982d89c981f913cbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6300-use-after-free-in-google-chrome-d818b9fe</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6300%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7b982d89c981f913cb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6359-use-after-free-in-google-chrome-b470779c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6359%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7be82d89c981f913e53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6358-use-after-free-in-google-chrome-d445e92b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6358%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7be82d89c981f913e4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6299-use-after-free-in-google-chrome-b43675e1</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6299%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7b982d89c981f913cb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6298-heap-buffer-overflow-in-google-chrom-4814b240</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6298%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=medium&amp;id=69dfe7b982d89c981f913cb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6297-use-after-free-in-google-chrome-aec32456</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6297%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69dfe7b682d89c981f913c5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6296-heap-buffer-overflow-in-google-chrom-7fb66fda</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6296%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=critical&amp;id=69dfe7b682d89c981f913c5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40919-out-of-bounds-write-in-red-hat-red--99c9240b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40919%3A%20Out-of-bounds%20Write%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=medium&amp;id=69dfe7b682d89c981f913c56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40918-incorrect-calculation-of-buffer-siz-7e419a48</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40918%3A%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=medium&amp;id=69dfe7b682d89c981f913c52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40917-out-of-bounds-read-in-red-hat-red-h-b32d4ab9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40917%3A%20Out-of-bounds%20Read%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=medium&amp;id=69dfe7b682d89c981f913c4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40916-out-of-bounds-write-in-red-hat-red--f6a28f76</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40916%3A%20Out-of-bounds%20Write%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=medium&amp;id=69dfe7b682d89c981f913c4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40915-integer-overflow-or-wraparound-in-r-da9bffb8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40915%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=medium&amp;id=69dfe7b682d89c981f913c46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21727-vulnerability-in-grafana-grafana-co-e8f95c9c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21727%3A%20Vulnerability%20in%20Grafana%20Grafana%20Correlations&amp;severity=low&amp;id=69dfe7b682d89c981f913c3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5189-cwe-798-use-of-hard-coded-credential-1496b711</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5189%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Sonatype%20Nexus%20Repository&amp;severity=critical&amp;id=69dfe0a382d89c981f8dffa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33667-cwe-307-improper-restriction-of-exc-7202229d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33667%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20opf%20openproject&amp;severity=high&amp;id=69dfe0a382d89c981f8dff94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40256-cwe-22-improper-limitation-of-a-pat-021af117</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40256%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WeblateOrg%20weblate&amp;severity=medium&amp;id=69dfe0a382d89c981f8dff9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34632-cwe-427-uncontrolled-search-path-el-f84269c1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34632%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Adobe%20Adobe%20Photoshop%20Installer&amp;severity=high&amp;id=69dfe0a382d89c981f8dff97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6245-buffer-access-with-incorrect-length--3f4db62e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6245%3A%20Buffer%20Access%20with%20Incorrect%20Length%20Value%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69dfe0a382d89c981f8dffa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39845-cwe-918-server-side-request-forgery-d91487e0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39845%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WeblateOrg%20weblate&amp;severity=medium&amp;id=69dfe0a382d89c981f8dff9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34393-cwe-269-improper-privilege-manageme-05526187</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34393%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20WeblateOrg%20weblate&amp;severity=high&amp;id=69dfd9a582d89c981f8a79e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34244-cwe-200-exposure-of-sensitive-infor-a0c0c367</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34244%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20WeblateOrg%20weblate&amp;severity=medium&amp;id=69dfd9a582d89c981f8a79e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6383-incorrect-authorization-in-red-hat-r-194df434</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6383%3A%20Incorrect%20Authorization%20in%20Red%20Hat%20Red%20Hat%20OpenShift%20Virtualization%204&amp;severity=medium&amp;id=69dfd9a582d89c981f8a79ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34242-cwe-22-improper-limitation-of-a-pat-6f9f4f5e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34242%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WeblateOrg%20weblate&amp;severity=high&amp;id=69dfd9a582d89c981f8a79df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33440-cwe-918-server-side-request-forgery-7310feef</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33440%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WeblateOrg%20weblate&amp;severity=medium&amp;id=69dfd9a582d89c981f8a79db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33435-cwe-23-relative-path-traversal-in-w-8a812be9</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33435%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20WeblateOrg%20weblate&amp;severity=high&amp;id=69dfd9a582d89c981f8a79d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4857-cwe-863-incorrect-authorization-in-s-b29d7e7e</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4857%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20SailPoint%20Technologies%20IdentityIQ&amp;severity=high&amp;id=69dfd9a582d89c981f8a79eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33220-cwe-22-improper-limitation-of-a-pat-206cb2f6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33220%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WeblateOrg%20weblate&amp;severity=medium&amp;id=69dfd9a582d89c981f8a79d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33214-cwe-862-missing-authorization-in-we-09b74691</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33214%3A%20CWE-862%3A%20Missing%20Authorization%20in%20WeblateOrg%20weblate&amp;severity=medium&amp;id=69dfd29182d89c981f86fbb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33212-cwe-284-improper-access-control-in--d4da3688</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33212%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20WeblateOrg%20weblate&amp;severity=low&amp;id=69dfd29182d89c981f86fbb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/spotting-cyberthreats-a-guide-for-blind-and-low-vi-a2afe435</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Spotting%20cyberthreats%3A%20a%20guide%20for%20blind%20and%20low-vision%20users%20%7C%20Kaspersky%20official%20blog&amp;severity=low&amp;id=69dfcf2182d89c981f8542bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6290-cwe-863-in-rapid7-velociraptor-16ce8299</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6290%3A%20CWE-863%20in%20Rapid7%20Velociraptor&amp;severity=high&amp;id=69dfcf1982d89c981f85412e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32631-cwe-200-exposure-of-sensitive-infor-535ad14c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32631%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20git-for-windows%20git&amp;severity=high&amp;id=69dfcf1982d89c981f854123</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5758-cwe-200-exposure-of-sensitive-inform-05642342</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5758%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Mafintosh%20Protocol-buffers-schema%20parser&amp;severity=medium&amp;id=69dfcf1982d89c981f85412a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/silent-crypto-wallet-takeover-unlimited-usdt-appro-80de48d7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Silent%20Crypto%20Wallet%20Takeover%20Unlimited%20USDT%20Approval%20Exploitation%20via%20Trust%20Wallet%20QR%20Code%20Phishing&amp;severity=medium&amp;id=69dfcba782d89c981f83460d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-youtube-copyright-notices-can-steal-your-goog-4259ffad</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20YouTube%20copyright%20notices%20can%20steal%20your%20Google%20login&amp;severity=medium&amp;id=69dfc80282d89c981f7dd9c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sweden-blames-pro-russian-group-for-cyberattack-la-83236afa</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sweden%20Blames%20Pro-Russian%20Group%20for%20Cyberattack%20Last%20Year%20on%20Its%20Energy%20Infrastructure&amp;severity=medium&amp;id=69dfc0fc82d89c981f74ea7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15610-cwe-502-deserialization-of-untruste-8e29d51c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15610%3A%20CWE-502%20Deserialization%20of%20untrusted%20data%20in%20OpenText%2C%20Inc%20RightFax&amp;severity=critical&amp;id=69dfc10382d89c981f750b2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63029-cwe-89-improper-neutralization-of-s-00805d70</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63029%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WC%20Lovers%20WCFM%20Marketplace&amp;severity=high&amp;id=69dfc10382d89c981f750b2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6372-cwe-862-missing-authorization-in-pli-a5a0a62f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6372%3A%20CWE-862%20Missing%20Authorization%20in%20Plisio%20Accept%20Cryptocurrencies%20with%20Plisio&amp;severity=high&amp;id=69dfc10382d89c981f750b35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-fake-proton-vpn-sites-to-gaming-mods-this-win-37383ac0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20fake%20Proton%20VPN%20sites%20to%20gaming%20mods%2C%20this%20Windows%20infostealer%20is%20everywhere&amp;severity=medium&amp;id=69dfcba782d89c981f834603</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20136-improper-encoding-or-escaping-of-ou-f5759eaa</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20136%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=medium&amp;id=69dfb9f682d89c981f6ee684</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20059-improper-neutralization-of-input-du-294c602d</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20059%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Unity%20Connection&amp;severity=medium&amp;id=69dfb9f682d89c981f6ee671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20061-improper-neutralization-of-special--d2f61c7d</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20061%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Cisco%20Cisco%20Unity%20Connection&amp;severity=medium&amp;id=69dfb9f682d89c981f6ee678</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20060-url-redirection-to-untrusted-site-o-28f4102f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20060%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Cisco%20Cisco%20Unity%20Connection&amp;severity=medium&amp;id=69dfb9f682d89c981f6ee674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20170-improper-neutralization-of-script-r-0491a1ae</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20170%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Cisco%20Cisco%20Webex%20Contact%20Center&amp;severity=medium&amp;id=69dfb9f882d89c981f6ee6b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20184-improper-certificate-validation-in--c47eb2ce</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20184%3A%20Improper%20Certificate%20Validation%20in%20Cisco%20Cisco%20Webex%20Meetings&amp;severity=critical&amp;id=69dfb9f882d89c981f6ee6bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20180-improper-limitation-of-a-pathname-t-7c0f2b38</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20180%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=critical&amp;id=69dfb9f882d89c981f6ee6b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20152-authentication-bypass-by-primary-we-7ab53c44</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20152%3A%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20Cisco%20Cisco%20Secure%20Web%20Appliance&amp;severity=medium&amp;id=69dfb9f882d89c981f6ee6ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20161-improper-link-resolution-before-fil-285f4f28</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20161%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Cisco%20Cisco%20ThousandEyes%20Enterprise%20Agent&amp;severity=medium&amp;id=69dfb9f882d89c981f6ee6b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20186-improper-neutralization-of-special--fe838f1c</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20186%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=critical&amp;id=69dfb9f882d89c981f6ee6be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20148-improper-limitation-of-a-pathname-t-77613593</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20148%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=medium&amp;id=69dfb9f882d89c981f6ee6ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20147-improper-neutralization-of-special--69d7d44e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20147%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=critical&amp;id=69dfb9f682d89c981f6ee687</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20081-relative-path-traversal-in-cisco-ci-ca9c26bb</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20081%3A%20Relative%20Path%20Traversal%20in%20Cisco%20Cisco%20Unity%20Connection&amp;severity=medium&amp;id=69dfb9f682d89c981f6ee67e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20078-relative-path-traversal-in-cisco-ci-32eb30c8</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20078%3A%20Relative%20Path%20Traversal%20in%20Cisco%20Cisco%20Unity%20Connection&amp;severity=medium&amp;id=69dfb9f682d89c981f6ee67b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20132-improper-neutralization-of-input-du-851bc956</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20132%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=medium&amp;id=69dfb9f682d89c981f6ee681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6370-cwe-79-improper-neutralization-of-in-d5a504fe</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6370%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20HashThemes%20Mini%20Ajax%20Cart%20for%20WooCommerce&amp;severity=medium&amp;id=69dfb9f882d89c981f6ee6c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15636-cwe-79-improper-neutralization-of-i-88c38273</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15636%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20emarket-design%20YouTube%20Showcase&amp;severity=medium&amp;id=69dfb9f682d89c981f6ee66e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15635-cwe-352-cross-site-request-forgery--3a3da392</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15635%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ZAYTECH%20Smart%20Online%20Order%20for%20Clover&amp;severity=medium&amp;id=69dfb9f682d89c981f6ee66b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53444-cwe-352-cross-site-request-forgery--55989ef9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53444%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20DeluxeThemes%20Userpro&amp;severity=medium&amp;id=69dfb67782d89c981f6a459c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5387-cwe-862-in-aveva-pipeline-simulation-929b8708</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5387%3A%20CWE-862%20in%20AVEVA%20Pipeline%20Simulation%202025&amp;severity=critical&amp;id=69dfb67782d89c981f6a45a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20205-information-written-to-log-files-ca-c01d3c95</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20205%3A%20Information%20written%20to%20log%20files%20can%20be%20of%20a%20sensitive%20nature%20and%20give%20valuable%20guidance%20to%20an%20attacker%20or%20expose%20sensitive%20user%20information.%20in%20Splunk%20Splunk%20MCP%20Server&amp;severity=high&amp;id=69dfaf6882d89c981f612b78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20203-the-software-does-not-restrict-or-i-356224a3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20203%3A%20The%20software%20does%20not%20restrict%20or%20incorrectly%20restricts%20access%20to%20a%20resource%20from%20an%20unauthorized%20actor.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=69dfaf6882d89c981f612b72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20204-creating-and-using-insecure-tempora-f5cdc3ec</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20204%3A%20Creating%20and%20using%20insecure%20temporary%20files%20can%20leave%20application%20and%20system%20data%20vulnerable%20to%20attack.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=high&amp;id=69dfaf6882d89c981f612b75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20202-the-software-does-not-properly-hand-a86b1619</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20202%3A%20The%20software%20does%20not%20properly%20handle%20when%20an%20input%20contains%20Unicode%20encoding.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=69dfaf6882d89c981f612b6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-n8n-n8mare-how-threat-actors-are-misusing-ai-w-78030375</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20n8n%20n8mare%3A%20How%20threat%20actors%20are%20misusing%20AI%20workflow%20automation&amp;severity=medium&amp;id=69dfcba782d89c981f8345f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-ransomware-targets-turkey-via-adwind-rat-840bf63c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20ransomware%20targets%20Turkey%20via%20Adwind%20RAT&amp;severity=medium&amp;id=69dfb66f82d89c981f6a420e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12141-cwe-200-information-disclosure-in-g-8996e2d9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12141%3A%20CWE-200%3A%20Information%20Disclosure%20in%20Grafana%20Grafana%20Alerting&amp;severity=low&amp;id=69dfaf6882d89c981f612b6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-new-mac-stealer-targeting-10k-crypto-wallets-2027ccd4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20new%20Mac%20stealer%20targeting%20%2410K%2B%20crypto%20wallets&amp;severity=medium&amp;id=69dfb2ea82d89c981f6662d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exploited-vulnerability-exposes-nginx-servers-to-h-33c1d10c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exploited%20Vulnerability%20Exposes%20Nginx%20Servers%20to%20Hacking&amp;severity=critical&amp;id=69dfa4dc82d89c981f4d965c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4682-cwe-121-stack-based-buffer-overflow--e9f0af64</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4682%3A%20CWE-121%20Stack-based%20buffer%20overflow%20in%20HP%20Inc%20HP%20DeskJet%202800e%20All-in-One%20Printer%20series&amp;severity=high&amp;id=69dfa86082d89c981f539bdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4667-cwe-250-execution-with-unnecessary-p-749e3fc7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4667%3A%20CWE-250%20Execution%20with%20unnecessary%20privileges%20in%20HP%20Inc.%20OMEN%20Gaming%20Hub&amp;severity=high&amp;id=69dfa86082d89c981f539bd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/capsule-security-emerges-from-stealth-with-7-milli-2250a1fb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Capsule%20Security%20Emerges%20From%20Stealth%20With%20%247%20Million%20in%20Funding&amp;severity=medium&amp;id=69df9a5082d89c981f38985c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/by-design-flaw-in-mcp-could-enable-widespread-ai-s-5fc67ebf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%98By%20Design%E2%80%99%20Flaw%20in%20MCP%20Could%20Enable%20Widespread%20AI%20Supply%20Chain%20Attacks&amp;severity=low&amp;id=69df96cc82d89c981f30469f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/100-chrome-extensions-steal-user-data-create-backd-7c4e8817</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=100%20Chrome%20Extensions%20Steal%20User%20Data%2C%20Create%20Backdoor&amp;severity=medium&amp;id=69df934882d89c981f291bbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ciso-conversations-ross-mckerchar-ciso-at-sophos-d4cf0ac2</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISO%20Conversations%3A%20Ross%20McKerchar%2C%20CISO%20at%20Sophos&amp;severity=medium&amp;id=69dfb6c182d89c981f6adf90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25219-cwe-200-exposure-of-sensitive-infor-fd73ca6d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25219%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=medium&amp;id=69df88bc82d89c981f17bd58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4145-cwe-88-improper-neutralization-of-ar-2139207c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4145%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Lenovo%20Software%20Fix&amp;severity=high&amp;id=69df88bc82d89c981f17bd63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4135-cwe-59-improper-link-resolution-befo-04d17efd</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4135%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Lenovo%20Software%20Fix&amp;severity=medium&amp;id=69df88bc82d89c981f17bd60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4134-cwe-427-uncontrolled-search-path-ele-29084f0b</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4134%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Lenovo%20Software%20Fix&amp;severity=high&amp;id=69df88bc82d89c981f17bd5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1636-cwe-427-uncontrolled-search-path-ele-54c44a16</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1636%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Lenovo%20Service%20Bridge&amp;severity=medium&amp;id=69df88bc82d89c981f17bd55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0827-cwe-59-improper-link-resolution-befo-2f40ea17</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0827%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Lenovo%20Diagnostics&amp;severity=medium&amp;id=69df88bc82d89c981f17bd52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mirax-rat-targeting-android-users-in-europe-af1aa70b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mirax%20RAT%20Targeting%20Android%20Users%20in%20Europe&amp;severity=medium&amp;id=69df81b482d89c981f0e2b53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/two-vulnerabilities-patched-in-ivanti-neurons-for--9bbfd3ef</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Two%20Vulnerabilities%20Patched%20in%20Ivanti%20Neurons%20for%20ITSM&amp;severity=low&amp;id=69df7aac82d89c981ffeb537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1852-cwe-352-cross-site-request-forgery-c-da2bdb61</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1852%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20woobeewoo%20Product%20Pricing%20Table%20by%20WooBeWoo&amp;severity=medium&amp;id=69df7ad282d89c981fff5f91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/10-domain-could-have-handed-hackers-25k-endpoints--8d5021f7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%2410%20Domain%20Could%20Have%20Handed%20Hackers%2025k%20Endpoints%2C%20Including%20in%20OT%20and%20Gov%20Networks&amp;severity=medium&amp;id=69df702082d89c981feb85ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30778-cwe-202-exposure-of-sensitive-infor-b8fdce1f</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30778%3A%20CWE-202%20Exposure%20of%20Sensitive%20Information%20Through%20Data%20Queries%20in%20Apache%20Software%20Foundation%20Apache%20SkyWalking&amp;severity=high&amp;id=69df703082d89c981fec17be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trump-urges-extending-foreign-surveillance-program-b2cdc3b8</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trump%20Urges%20Extending%20Foreign%20Surveillance%20Program%20as%20Some%20Lawmakers%20Push%20for%20US%20Privacy%20Protections&amp;severity=medium&amp;id=69df691882d89c981fdff00a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40786-missing-authorization-in-long-watch-21ffcda2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40786%3A%20Missing%20Authorization%20in%20Long%20Watch%20Studio%20MyRewards&amp;severity=medium&amp;id=69df6ca082d89c981fe573b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40784-authorization-bypass-through-user-c-0d8e9d5d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40784%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Mahmudul%20Hasan%20Arif%20FluentBoards&amp;severity=high&amp;id=69df6ca082d89c981fe573b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40764-cross-site-request-forgery-csrf-in--fe9b06a5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40764%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Syed%20Balkhi%20Contact%20Form%20by%20WPForms&amp;severity=high&amp;id=69df6c9d82d89c981fe572fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40763-missing-authorization-in-wp-royal-r-ec477ac2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40763%3A%20Missing%20Authorization%20in%20WP%20Royal%20Royal%20Elementor%20Addons&amp;severity=medium&amp;id=69df6c9d82d89c981fe572f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40745-improper-neutralization-of-special--dc1439ea</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40745%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20bdthemes%20Element%20Pack%20Elementor%20Addons&amp;severity=high&amp;id=69df6c9d82d89c981fe572f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40742-missing-authorization-in-nelio-soft-356877bd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40742%3A%20Missing%20Authorization%20in%20Nelio%20Software%20Nelio%20AB%20Testing&amp;severity=medium&amp;id=69df6c9d82d89c981fe572f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40740-missing-authorization-in-themeum-tu-ca37fc88</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40740%3A%20Missing%20Authorization%20in%20Themeum%20Tutor%20LMS&amp;severity=medium&amp;id=69df6c9d82d89c981fe572f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40737-authorization-bypass-through-user-c-1c7de437</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40737%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20VillaTheme%20COMPE&amp;severity=medium&amp;id=69df6c9d82d89c981fe572ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40734-improper-neutralization-of-input-du-5fd327d0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40734%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Zahlan%20Categories%20Images&amp;severity=medium&amp;id=69df6c9d82d89c981fe572ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40730-missing-authorization-in-themegrill-046aebce</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40730%3A%20Missing%20Authorization%20in%20ThemeGrill%20ThemeGrill%20Demo%20Importer&amp;severity=medium&amp;id=69df6c9d82d89c981fe572e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40729-missing-authorization-in-bplugins-3-72f54865</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40729%3A%20Missing%20Authorization%20in%20bPlugins%203D%20viewer%20%E2%80%93%20Embed%203D%20Models&amp;severity=medium&amp;id=69df6c9d82d89c981fe572e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40728-missing-authorization-in-blockart-m-cc1c2b87</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40728%3A%20Missing%20Authorization%20in%20BlockArt%20Magazine%20Blocks&amp;severity=medium&amp;id=69df6c9d82d89c981fe572e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33807-cwe-436-interpretation-conflict-in--e2fb5055</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33807%3A%20CWE-436%3A%20Interpretation%20Conflict%20in%20fastify%20%40fastify%2Fexpress&amp;severity=critical&amp;id=69df621082d89c981fd4ed1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33618-cwe-400-uncontrolled-resource-consu-7254c62d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33618%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Bosch%20BVMS&amp;severity=high&amp;id=69df621082d89c981fd4ed18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-patches-critical-fortisandbox-vulnerabili-634b7980</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20Patches%20Critical%20FortiSandbox%20Vulnerabilities&amp;severity=critical&amp;id=69df5e8c82d89c981fce644e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33808-cwe-436-interpretation-conflict-in--328b2649</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33808%3A%20CWE-436%3A%20Interpretation%20Conflict%20in%20fastify%20%40fastify%2Fexpress&amp;severity=critical&amp;id=69df621082d89c981fd4ed20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chasing-an-angry-spark-3c7d252d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chasing%20an%20Angry%20Spark&amp;severity=medium&amp;id=69dfcba782d89c981f8345df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3505-cwe-770-allocation-of-resources-with-d473995c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3505%3A%20CWE-770%20Allocation%20of%20resources%20without%20limits%20or%20throttling%20in%20Legion%20of%20the%20Bouncy%20Castle%20Inc.%20BC-JAVA&amp;severity=high&amp;id=69df5b0f82d89c981fca1f49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5588-cwe-327-use-of-a-broken-or-risky-cry-873364df</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5588%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Legion%20of%20the%20Bouncy%20Castle%20Inc.%20BC-JAVA&amp;severity=medium&amp;id=69df5b0f82d89c981fca1f4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5598-cwe-385-covert-timing-channel-in-leg-bc1f0a9b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5598%3A%20CWE-385%20Covert%20timing%20channel%20in%20Legion%20of%20the%20Bouncy%20Castle%20Inc.%20BC-JAVA&amp;severity=high&amp;id=69df5b0f82d89c981fca1f50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0636-cwe-90-improper-neutralization-of-sp-cfb737a7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0636%3A%20CWE-90%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20LDAP%20query%20(&apos;LDAP%20injection&apos;)%20in%20Legion%20of%20the%20Bouncy%20Castle%20Inc.%20BC-JAVA&amp;severity=medium&amp;id=69df5b0f82d89c981fca1f46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14813-cwe-327-use-of-a-broken-or-risky-cr-dcd827cc</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14813%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Legion%20of%20the%20Bouncy%20Castle%20Inc.%20BC-JAVA&amp;severity=critical&amp;id=69df5b0f82d89c981fca1f43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52641-vulnerability-in-hcl-aion-64bbe7c4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52641%3A%20Vulnerability%20in%20HCL%20AION&amp;severity=low&amp;id=69df540182d89c981fbdb3cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3643-cwe-79-improper-neutralization-of-in-68c05e6e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3643%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20onthemapmarketing%20Accessibly%20%E2%80%93%20WordPress%20Website%20Accessibility&amp;severity=high&amp;id=69df540182d89c981fbdb3e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4011-cwe-79-improper-neutralization-of-in-7e0088fa</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4011%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dgwyer%20Power%20Charts%20%E2%80%93%20Responsive%20Beautiful%20Charts%20%26%20Graphs&amp;severity=medium&amp;id=69df540482d89c981fbdb58e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3998-cwe-79-improper-neutralization-of-in-c6990476</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3998%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webmindpt%20WM%20JqMath&amp;severity=medium&amp;id=69df540182d89c981fbdb400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1782-cwe-20-improper-input-validation-in--eeab536b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1782%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Wpmet%20MetForm%20Pro&amp;severity=medium&amp;id=69df540182d89c981fbdb3d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3649-cwe-862-missing-authorization-in-col-aa0e913c</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3649%3A%20CWE-862%20Missing%20Authorization%20in%20colbeinformatik%20Katalogportal-pdf-sync%20Widget&amp;severity=medium&amp;id=69df540182d89c981fbdb3ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4091-cwe-352-cross-site-request-forgery-c-040ecd99</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4091%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20faridsaniee%20OPEN-BRAIN&amp;severity=medium&amp;id=69df540482d89c981fbdb595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3461-cwe-288-authentication-bypass-using--9f822f26</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3461%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20visaacceptancesolutions%20Visa%20Acceptance%20Solutions&amp;severity=critical&amp;id=69df540182d89c981fbdb3d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3642-cwe-862-missing-authorization-in-for-b375c293</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3642%3A%20CWE-862%20Missing%20Authorization%20in%20forfront%20e-shot&amp;severity=medium&amp;id=69df540182d89c981fbdb3dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4005-cwe-79-improper-neutralization-of-in-e039b1ad</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4005%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20coachific%20Coachific%20Shortcode&amp;severity=medium&amp;id=69df540482d89c981fbdb587</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4002-cwe-352-cross-site-request-forgery-c-5683203e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4002%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20petjeaf%20Petje.af&amp;severity=medium&amp;id=69df540482d89c981fbdb57e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3659-cwe-79-improper-neutralization-of-in-ae3b6448</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3659%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bappidgreat%20WP%20Circliful&amp;severity=medium&amp;id=69df540182d89c981fbdb3f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40899-cwe-79-improper-neutralization-of-i-1ebcb453</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40899%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Nozomi%20Networks%20Guardian&amp;severity=high&amp;id=69df540182d89c981fbdb3ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40897-cwe-863-incorrect-authorization-in--1c69b20c</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40897%3A%20CWE-863%20Incorrect%20Authorization%20in%20Nozomi%20Networks%20Guardian&amp;severity=high&amp;id=69df540182d89c981fbdb3c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5694-cwe-79-improper-neutralization-of-in-5e6ec16b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5694%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aerin%20Quick%20Interest%20Slider&amp;severity=high&amp;id=69df733482d89c981ff25ccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5617-cwe-639-authorization-bypass-through-c449e74b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5617%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20royalnavneet%20Login%20as%20User%20%E2%80%93%20Switch%20User%20%26%20WooCommerce%20Login%20as%20Customer&amp;severity=high&amp;id=69df733482d89c981ff25cc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5717-cwe-79-improper-neutralization-of-in-46aa3ef6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5717%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20knighthawk%20VI%3A%20Include%20Post%20By&amp;severity=medium&amp;id=69df733482d89c981ff25cd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ics-patch-tuesday-8-industrial-giants-publish-new--d3308aef</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ICS%20Patch%20Tuesday%3A%208%20Industrial%20Giants%20Publish%20New%20Security%20Advisories&amp;severity=medium&amp;id=69df3b6482d89c981f8eec0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5088-cwe-338-use-of-cryptographically-wea-16c9eece</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5088%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20in%20JDEGUEST%20Apache%3A%3AAPI%3A%3APassword&amp;severity=high&amp;id=69df426b82d89c981f9c89ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6293-cwe-352-cross-site-request-forgery-c-8623502d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6293%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20udamadu%20Inquiry%20form%20to%20posts%20or%20pages&amp;severity=medium&amp;id=69df37e082d89c981f89f024</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5160-cross-site-scripting-xss-in-githubco-45eede9b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5160%3A%20Cross-site%20Scripting%20(XSS)%20in%20github.com%2Fyuin%2Fgoldmark%2Frenderer%2Fhtml&amp;severity=medium&amp;id=69df264b82d89c981f697e7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26291-cross-site-scripting-xss-in-growi-i-00b9c4e6</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26291%3A%20Cross-site%20scripting%20(XSS)%20in%20GROWI%2C%20Inc.%20GROWI&amp;severity=medium&amp;id=69df1bce82d89c981f4dca69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5397-cwe-427-uncontrolled-search-path-ele-1f281f99</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5397%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20OMRON%20SOCIAL%20SOLUTIONS%20CO.%2C%20Ltd.%20PowerAttendant%20Standard%20Edition&amp;severity=high&amp;id=69df1bce82d89c981f4dca6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1555-cwe-434-unrestricted-upload-of-file--be10bbcf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1555%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Owen%20WebStack&amp;severity=critical&amp;id=69df0daf82d89c981f2a19ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6328-cwe-20-improper-input-validation-in--ad367d4d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6328%3A%20CWE-20%20Improper%20input%20validation%20in%20XQUIC%20Project%20XQUIC&amp;severity=high&amp;id=69df0daf82d89c981f2a19d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40499-cwe-78-improper-neutralization-of-s-c450c02e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40499%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20radareorg%20radare2&amp;severity=high&amp;id=69defc3b82d89c981ff96336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-wednesday-april-15th-2026-httpsi-ba6ef2fb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Wednesday%2C%20April%2015th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9892%2C%20(Wed%2C%20Apr%2015th)&amp;severity=medium&amp;id=69def19182d89c981fe564ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1509-cwe-94-improper-control-of-generatio-77599009</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1509%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20themefusion%20Avada%20(Fusion)%20Builder&amp;severity=medium&amp;id=69deee0b82d89c981fde9f1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1541-cwe-639-authorization-bypass-through-426c90f5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1541%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20themefusion%20Avada%20(Fusion)%20Builder&amp;severity=medium&amp;id=69deee0b82d89c981fde9f24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4812-cwe-862-missing-authorization-in-wpe-838ccd66</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4812%3A%20CWE-862%20Missing%20Authorization%20in%20wpengine%20Advanced%20Custom%20Fields%20(ACF%C2%AE)&amp;severity=medium&amp;id=69deee0b82d89c981fde9f2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2834-cwe-79-improper-neutralization-of-in-ddccbea9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2834%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tokenoftrust%20Age%20Verification%20%26%20Identity%20Verification%20by%20Token%20of%20Trust&amp;severity=high&amp;id=69deee0b82d89c981fde9f28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54550-cwe-94-improper-control-of-generati-3a6749d9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54550%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=high&amp;id=69dee70482d89c981fce52d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scanning-for-ai-models-tue-apr-14th-f0af681b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scanning%20for%20AI%20Models%2C%20(Tue%2C%20Apr%2014th)&amp;severity=medium&amp;id=69dedc7882d89c981f4f4c19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40105-cwe-80-improper-neutralization-of-s-7ff39b0b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40105%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=69dee70482d89c981fce52d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40104-cwe-770-allocation-of-resources-wit-de9859be</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40104%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20xwiki%20org.xwiki.platform%3Axwiki-platform-oldcore&amp;severity=medium&amp;id=69ded8f482d89c981f22eddb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-16-f3d2223b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-16&amp;severity=medium&amp;id=69e2285782d89c981fe85812</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-15-a05f99ea</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-15&amp;severity=medium&amp;id=69e02a6a82d89c981fad373c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30993-na-5eef5dae</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30993%3A%20n%2Fa&amp;severity=critical&amp;id=69dfcf1982d89c981f85411f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30995-na-594a4b29</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30995%3A%20n%2Fa&amp;severity=high&amp;id=69dfc80582d89c981f7ddbe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30994-na-059d58d7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30994%3A%20n%2Fa&amp;severity=high&amp;id=69dfc80582d89c981f7ddbe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30996-na-7d1dfe4a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30996%3A%20n%2Fa&amp;severity=high&amp;id=69dfc10382d89c981f750b31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30461-na-2320544e</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30461%3A%20n%2Fa&amp;severity=high&amp;id=69dfb67782d89c981f6a45a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67841-na-90086889</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67841%3A%20n%2Fa&amp;severity=high&amp;id=69dfb67782d89c981f6a459f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30625-na-5f09f954</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30625%3A%20n%2Fa&amp;severity=critical&amp;id=69dfaf6882d89c981f612b87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30624-na-874e93a6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30624%3A%20n%2Fa&amp;severity=high&amp;id=69dfaf6882d89c981f612b84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30617-na-a6d25840</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30617%3A%20n%2Fa&amp;severity=high&amp;id=69dfaf6882d89c981f612b81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30616-na-6a957f7b</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30616%3A%20n%2Fa&amp;severity=high&amp;id=69dfaf6882d89c981f612b7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30615-na-cfcaae0f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30615%3A%20n%2Fa&amp;severity=high&amp;id=69dfaf6882d89c981f612b7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30364-na-d86929a4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30364%3A%20n%2Fa&amp;severity=high&amp;id=69dfa86082d89c981f539bd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53412-na-b7eb1768</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53412%3A%20n%2Fa&amp;severity=high&amp;id=69dfa86082d89c981f539bd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-15-80bc2060</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-15&amp;severity=low&amp;id=69df507382d89c981fb85c4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40096-cwe-79-improper-neutralization-of-i-9694f3f4</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40096%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20immich-app%20immich&amp;severity=medium&amp;id=69ded8f482d89c981f22edd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40091-cwe-532-insertion-of-sensitive-info-ee619b09</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40091%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20authzed%20spicedb&amp;severity=medium&amp;id=69ded8f482d89c981f22edd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40090-cwe-22-improper-limitation-of-a-pat-c8ab49a7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40090%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20zarf-dev%20zarf&amp;severity=high&amp;id=69ded57682d89c981f20b4b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39984-cwe-295-improper-certificate-valida-1bc99de0</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39984%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20sigstore%20timestamp-authority&amp;severity=medium&amp;id=69ded57682d89c981f20b4ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39971-cwe-113-improper-neutralization-of--47ba53ee</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39971%3A%20CWE-113%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20in%20HTTP%20Headers%20(&apos;HTTP%20Request%2FResponse%20Splitting&apos;)%20in%20s9y%20Serendipity&amp;severity=high&amp;id=69ded57682d89c981f20b4a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39963-cwe-565-reliance-on-cookies-without-d37d563e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39963%3A%20CWE-565%3A%20Reliance%20on%20Cookies%20without%20Validation%20and%20Integrity%20Checking%20in%20s9y%20Serendipity&amp;severity=medium&amp;id=69ded57682d89c981f20b4a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1314-cwe-862-missing-authorization-in-ibe-155c7412</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1314%3A%20CWE-862%20Missing%20Authorization%20in%20iberezansky%203D%20FlipBook%20%E2%80%93%20PDF%20Embedder%2C%20PDF%20Flipbook%20Viewer%2C%20Flipbook%20Image%20Gallery&amp;severity=medium&amp;id=69dece6882d89c981f1bf9d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2396-cwe-79-improper-neutralization-of-in-cb40c8a9</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2396%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kimipooh%20List%20View%20Google%20Calendar&amp;severity=medium&amp;id=69dece6882d89c981f1bf9dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15470-cwe-22-improper-limitation-of-a-pat-f1f9ed0c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15470%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20DesigningMedia%20Eleganzo&amp;severity=medium&amp;id=69dece6882d89c981f1bf9d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39884-cwe-88-improper-neutralization-of-a-0e46c7ee</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39884%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Flux159%20mcp-server-kubernetes&amp;severity=high&amp;id=69dece6882d89c981f1bf9e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39399-cwe-20-improper-input-validation-in-f5d85126</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39399%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20NuGet%20NuGetGallery&amp;severity=critical&amp;id=69decae882d89c981f18b33e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27297-integer-underflow-wrap-or-wraparoun-b9acb282</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27297%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20(CWE-191)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=69decae582d89c981f18b2f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27300-access-of-uninitialized-pointer-cwe-304f0a0a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27300%3A%20Access%20of%20Uninitialized%20Pointer%20(CWE-824)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=medium&amp;id=69decae582d89c981f18b2fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27296-integer-underflow-wrap-or-wraparoun-992b6cdb</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27296%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20(CWE-191)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=69decae582d89c981f18b2ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27290-untrusted-search-path-cwe-426-in-ad-f194852f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27290%3A%20Untrusted%20Search%20Path%20(CWE-426)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=69decae582d89c981f18b2df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27298-access-of-resource-using-incompatib-860e7c92</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27298%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20(CWE-843)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=69decae582d89c981f18b2f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27294-out-of-bounds-read-cwe-125-in-adobe-e15e9d93</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27294%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=69decae582d89c981f18b2e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27295-out-of-bounds-write-cwe-787-in-adob-53061293</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27295%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=69decae582d89c981f18b2eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27301-heap-based-buffer-overflow-cwe-122--828495a7</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27301%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=medium&amp;id=69decae882d89c981f18b33b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27299-improper-input-validation-cwe-20-in-d362f7f2</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27299%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=medium&amp;id=69decae582d89c981f18b2f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27293-heap-based-buffer-overflow-cwe-122--2afa605c</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27293%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=69decae582d89c981f18b2e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27292-use-after-free-cwe-416-in-adobe-ado-2db526ee</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27292%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=69decae582d89c981f18b2e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35589-cwe-1385-missing-origin-validation--cb68aa18</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35589%3A%20CWE-1385%3A%20Missing%20Origin%20Validation%20in%20WebSockets%20in%20HKUDS%20nanobot&amp;severity=high&amp;id=69dec76b82d89c981f15e829</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33414-cwe-78-improper-neutralization-of-s-cc0c50f6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33414%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20containers%20podman&amp;severity=medium&amp;id=69dec76b82d89c981f15e825</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40688-execute-unauthorized-code-or-comman-bd6906da</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40688%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiWeb&amp;severity=medium&amp;id=69dec76b82d89c981f15e82d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33023-cwe-416-use-after-free-in-saitoha-l-125281c7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33023%3A%20CWE-416%3A%20Use%20After%20Free%20in%20saitoha%20libsixel&amp;severity=high&amp;id=69debcd482d89c981f0dfd18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33021-cwe-416-use-after-free-in-saitoha-l-76a24acb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33021%3A%20CWE-416%3A%20Use%20After%20Free%20in%20saitoha%20libsixel&amp;severity=high&amp;id=69debcd482d89c981f0dfd14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34619-improper-limitation-of-a-pathname-t-f76b20d7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34619%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20(CWE-22)%20in%20Adobe%20ColdFusion&amp;severity=high&amp;id=69deb96d82d89c981f0b1a15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27308-uncontrolled-resource-consumption-c-bfe4703f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27308%3A%20Uncontrolled%20Resource%20Consumption%20(CWE-400)%20in%20Adobe%20ColdFusion&amp;severity=low&amp;id=69deb96d82d89c981f0b1a06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27282-improper-input-validation-cwe-20-in-bd70f457</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27282%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20ColdFusion&amp;severity=high&amp;id=69deb96d82d89c981f0b19f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27305-improper-limitation-of-a-pathname-t-1553d8cb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27305%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20(CWE-22)%20in%20Adobe%20ColdFusion&amp;severity=high&amp;id=69deb96d82d89c981f0b19fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27304-improper-input-validation-cwe-20-in-1237c730</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27304%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20ColdFusion&amp;severity=critical&amp;id=69deb96d82d89c981f0b19fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27306-improper-input-validation-cwe-20-in-a1295e82</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27306%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20ColdFusion&amp;severity=high&amp;id=69deb96d82d89c981f0b1a00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27307-uncontrolled-resource-consumption-c-0de89358</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27307%3A%20Uncontrolled%20Resource%20Consumption%20(CWE-400)%20in%20Adobe%20ColdFusion&amp;severity=low&amp;id=69deb96d82d89c981f0b1a03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33020-cwe-122-heap-based-buffer-overflow--12ac4054</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33020%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20saitoha%20libsixel&amp;severity=high&amp;id=69deb96d82d89c981f0b1a11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33019-cwe-125-out-of-bounds-read-in-saito-51d22ad7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33019%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20saitoha%20libsixel&amp;severity=high&amp;id=69deb96d82d89c981f0b1a0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33018-cwe-416-use-after-free-in-saitoha-l-56970cc6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33018%3A%20CWE-416%3A%20Use%20After%20Free%20in%20saitoha%20libsixel&amp;severity=high&amp;id=69deb96d82d89c981f0b1a09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40291-cwe-269-improper-privilege-manageme-2c622c0b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40291%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69deb97082d89c981f0b1a56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35196-cwe-78-improper-neutralization-of-s-ff921618</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35196%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69deb5cc82d89c981f06f4d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34602-cwe-639-authorization-bypass-throug-a0532f99</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34602%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69deb5cc82d89c981f06f4c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15565-cwe-862-missing-authorization-in-ca-8c9d9668</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15565%3A%20CWE-862%20Missing%20Authorization%20in%20cartasi%20Nexi%20XPay&amp;severity=medium&amp;id=69deb5cc82d89c981f06f4c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34370-cwe-285-improper-authorization-in-c-f70cafa6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34370%3A%20CWE-285%3A%20Improper%20Authorization%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69deb5cc82d89c981f06f4c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39907-cwe-73-external-control-of-file-nam-baea18b5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39907%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Unisys%20WebPerfect%20Image%20Suite&amp;severity=high&amp;id=69deb5cc82d89c981f06f4db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39906-cwe-441-unintended-proxy-or-interme-ff8fdb0c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39906%3A%20CWE-441%20Unintended%20Proxy%20or%20Intermediary%20(&apos;Confused%20Deputy&apos;)%20in%20Unisys%20WebPerfect%20Image%20Suite&amp;severity=high&amp;id=69deb5cc82d89c981f06f4d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34631-out-of-bounds-write-cwe-787-in-adob-a620ceb9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34631%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InCopy&amp;severity=high&amp;id=69deb5cc82d89c981f06f4cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34161-cwe-79-improper-neutralization-of-i-b1414ebb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34161%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69deaedd82d89c981f01938a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34160-cwe-306-missing-authentication-for--293e1607</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34160%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69deaedd82d89c981f019385</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33715-cwe-306-missing-authentication-for--8c8fe980</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33715%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69deaedd82d89c981f019381</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33714-cwe-89-improper-neutralization-of-s-ac72effa</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33714%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69deaedd82d89c981f01937d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27287-out-of-bounds-read-cwe-125-in-adobe-6398376a</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27287%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20InCopy&amp;severity=high&amp;id=69deab4182d89c981ffdeb89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25133-cwe-79-improper-neutralization-of-i-aa387956</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25133%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20octobercms%20october&amp;severity=medium&amp;id=69deab4182d89c981ffdeb86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25125-cwe-200-exposure-of-sensitive-infor-e22a1d73</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25125%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20octobercms%20october&amp;severity=medium&amp;id=69deab4182d89c981ffdeb83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40683-cwe-843-access-of-resource-using-in-9348968e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40683%3A%20CWE-843%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20OpenStack%20Keystone&amp;severity=high&amp;id=69dea0b582d89c981ff4544a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34630-heap-based-buffer-overflow-cwe-122--453b983d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34630%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Bridge&amp;severity=high&amp;id=69dea0b582d89c981ff45447</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27312-heap-based-buffer-overflow-cwe-122--d2990c18</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27312%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Bridge&amp;severity=high&amp;id=69dea0b582d89c981ff45441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27222-divide-by-zero-cwe-369-in-adobe-bri-14b1e4dc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27222%3A%20Divide%20By%20Zero%20(CWE-369)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=69dea0b582d89c981ff45438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27310-heap-based-buffer-overflow-cwe-122--3fb0f672</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27310%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Bridge&amp;severity=high&amp;id=69dea0b582d89c981ff4543b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27311-heap-based-buffer-overflow-cwe-122--4e7b3f13</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27311%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Bridge&amp;severity=high&amp;id=69dea0b582d89c981ff4543e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27313-heap-based-buffer-overflow-cwe-122--c75d6669</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27313%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Bridge&amp;severity=high&amp;id=69dea0b582d89c981ff45444</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27289-out-of-bounds-read-cwe-125-in-adobe-94754a4d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27289%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Photoshop%20Desktop&amp;severity=high&amp;id=69de99bf82d89c981fef099d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34618-out-of-bounds-write-cwe-787-in-adob-e1917b6d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34618%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=69de99bf82d89c981fef09a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34625-cross-site-scripting-dom-based-xss--f94b9c5f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34625%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69de8b9f82d89c981fe4811d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34623-cross-site-scripting-dom-based-xss--e68699eb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34623%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69de8b9f82d89c981fe48117</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34624-cross-site-scripting-dom-based-xss--d894ffd1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34624%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69de8b9f82d89c981fe4811a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-patches-exploited-sharepoint-zero-day-an-c39d9142</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Patches%20Exploited%20SharePoint%20Zero-Day%20and%20160%20Other%20Vulnerabilities&amp;severity=medium&amp;id=69de849482d89c981fdf4394</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27288-cross-site-scripting-stored-xss-cwe-2673fa14</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27288%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69de849e82d89c981fdf5f79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0207-cwe-532-insertion-of-sensitive-infor-85e65230</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0207%3A%20CWE-532%20Insertion%20of%20sensitive%20information%20into%20log%20file%20in%20PureStorage%20FlashBlade&amp;severity=high&amp;id=69de849e82d89c981fdf5f73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5752-cwe-94-improper-control-of-generatio-b7af0b75</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5752%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Cohere%20cohere-terrarium&amp;severity=critical&amp;id=69de849e82d89c981fdf5f7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0209-cwe-783-operator-precedence-logic-er-43d7927d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0209%3A%20CWE-783%20Operator%20precedence%20logic%20error%20in%20PureStorage%20FlashArray&amp;severity=medium&amp;id=69de849e82d89c981fdf5f76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5756-cwe-306-missing-authentication-for-c-3ed63c52</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5756%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Data%20Recognition%20Corporation%20Central%20Office%20Services%20-%20Content%20Hosting%20Component&amp;severity=high&amp;id=69de849e82d89c981fdf5f83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5754-cwe-79-improper-neutralization-of-in-1f4c1272</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5754%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Radware%20Alteon%20vADC&amp;severity=medium&amp;id=69de849e82d89c981fdf5f80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-patch-tuesday-april-2026-tue-apr-14th-ed4dfe0d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Patch%20Tuesday%20April%202026.%2C%20(Tue%2C%20Apr%2014th)&amp;severity=medium&amp;id=69dfb6ec82d89c981f6b43d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/three-rowhammer-attacks-targeting-gddr6-kaspersky--5f662a36</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Three%20Rowhammer%20attacks%20targeting%20GDDR6%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69de7db882d89c981fd91337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24907-cwe-79-improper-neutralization-of-i-2ab6df42</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24907%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20octobercms%20october&amp;severity=medium&amp;id=69de99bf82d89c981fef09a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27303-deserialization-of-untrusted-data-c-dbcf2de2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27303%3A%20Deserialization%20of%20Untrusted%20Data%20(CWE-502)%20in%20Adobe%20Adobe%20Connect&amp;severity=critical&amp;id=69de8b9f82d89c981fe48123</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34617-cross-site-scripting-xss-cwe-79-in--9611df67</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34617%3A%20Cross-site%20Scripting%20(XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Connect&amp;severity=high&amp;id=69de92a582d89c981fe9f16a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21331-cross-site-scripting-reflected-xss--73045699</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21331%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Connect&amp;severity=medium&amp;id=69de8b9f82d89c981fe48120</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27246-cross-site-scripting-dom-based-xss--d488fcd6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27246%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Connect&amp;severity=critical&amp;id=69de849e82d89c981fdf5f86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34614-cross-site-scripting-reflected-xss--c45222b2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34614%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Connect&amp;severity=medium&amp;id=69de99bf82d89c981fef09a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27245-cross-site-scripting-reflected-xss--e445a643</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27245%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Connect&amp;severity=critical&amp;id=69de99bf82d89c981fef09a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34615-deserialization-of-untrusted-data-c-e3f24a99</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34615%3A%20Deserialization%20of%20Untrusted%20Data%20(CWE-502)%20in%20Adobe%20Adobe%20Connect&amp;severity=critical&amp;id=69de8b9f82d89c981fe48126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27243-cross-site-scripting-reflected-xss--039e8e2c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27243%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Connect&amp;severity=critical&amp;id=69de92a582d89c981fe9f167</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24906-cwe-79-improper-neutralization-of-i-7323d364</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24906%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20octobercms%20october&amp;severity=medium&amp;id=69df733482d89c981ff25cd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34628-heap-based-buffer-overflow-cwe-122--823d92b1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34628%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=69de7a3b82d89c981fd6cf54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34629-heap-based-buffer-overflow-cwe-122--3bf0ac91</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34629%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=69de7a3b82d89c981fd6cf57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34627-heap-based-buffer-overflow-cwe-122--f3bc7c57</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34627%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=69de7a3b82d89c981fd6cf51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27258-out-of-bounds-write-cwe-787-in-adob-f0f6cfde</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27258%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20DNG%20SDK&amp;severity=medium&amp;id=69de7a1d82d89c981fd6a728</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32214-cwe-284-improper-access-control-in--487e8f7c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32214%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a3682d89c981fd6bd46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33829-cwe-200-exposure-of-sensitive-infor-437402c3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33829%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a3b82d89c981fd6cf4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33824-cwe-415-double-free-in-microsoft-wi-87d9fb32</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33824%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=critical&amp;id=69de7a3b82d89c981fd6cf42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33827-cwe-362-concurrent-execution-using--233b55bc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33827%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a3b82d89c981fd6cf4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33115-cwe-416-use-after-free-in-microsoft-7e929fae</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33115%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69de7a3a82d89c981fd6cf2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33114-cwe-822-untrusted-pointer-dereferen-23fb5e26</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33114%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69de7a3a82d89c981fd6cf29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33104-cwe-362-concurrent-execution-using--813cfc41</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33104%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a3a82d89c981fd6cf26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33103-cwe-284-improper-access-control-in--7d25ac01</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33103%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20Dynamics%20365%20(on-premises)%20version%209.0&amp;severity=medium&amp;id=69de7a3a82d89c981fd6cf23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33101-cwe-416-use-after-free-in-microsoft-f7043ff8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33101%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69de7a3a82d89c981fd6cf20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33100-cwe-416-use-after-free-in-microsoft-3cedc0f4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33100%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a3a82d89c981fd6cf1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33099-cwe-416-use-after-free-in-microsoft-b8b53f34</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33099%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a3a82d89c981fd6cf1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32225-cwe-693-protection-mechanism-failur-c89d948c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32225%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a3882d89c981fd6cef3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32203-cwe-121-stack-based-buffer-overflow-e50458b0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32203%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Microsoft%20.NET%2010.0&amp;severity=high&amp;id=69de7a3682d89c981fd6bd40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26171-cwe-400-uncontrolled-resource-consu-35b472ec</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26171%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20.NET%2010.0&amp;severity=high&amp;id=69de7a1b82d89c981fd6a6c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32201-cwe-20-improper-input-validation-in-2c06b3ef</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32201%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=medium&amp;id=69de7a3682d89c981fd6bd3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32200-cwe-416-use-after-free-in-microsoft-8c849f94</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32200%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69de7a3482d89c981fd6bce5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32199-cwe-416-use-after-free-in-microsoft-02ca380a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32199%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69de7a3482d89c981fd6bce2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32198-cwe-416-use-after-free-in-microsoft-f8733311</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32198%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69de7a3482d89c981fd6bcdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32197-cwe-416-use-after-free-in-microsoft-f71c4eb2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32197%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69de7a3482d89c981fd6bcdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32196-cwe-79-improper-neutralization-of-i-59478f29</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32196%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Windows%20Admin%20Center&amp;severity=medium&amp;id=69de7a3482d89c981fd6bcd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32190-cwe-416-use-after-free-in-microsoft-cabcfa42</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32190%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69de7a3482d89c981fd6bcd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32176-cwe-89-improper-neutralization-of-s-2b96a9fb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32176%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Microsoft%20Microsoft%20SQL%20Server%202016%20Service%20Pack%203%20(GDR)&amp;severity=medium&amp;id=69de7a3282d89c981fd6bcb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32171-cwe-522-insufficiently-protected-cr-cbd219b7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32171%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20Microsoft%20Azure%20Logic%20Apps&amp;severity=high&amp;id=69de7a3282d89c981fd6bcae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32164-cwe-362-concurrent-execution-using--1208c733</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32164%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a3282d89c981fd6bca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32163-cwe-362-concurrent-execution-using--7bc136e9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32163%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a3082d89c981fd6bc95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32162-cwe-349-acceptance-of-extraneous-un-4d597109</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32162%3A%20CWE-349%3A%20Acceptance%20of%20Extraneous%20Untrusted%20Data%20With%20Trusted%20Data%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a3082d89c981fd6bc92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32155-cwe-416-use-after-free-in-microsoft-170d6614</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32155%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=69de7a3082d89c981fd6bc80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32153-cwe-416-use-after-free-in-microsoft-864a1c45</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32153%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a3082d89c981fd6bc7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32151-cwe-200-exposure-of-sensitive-infor-733dc983</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32151%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a2e82d89c981fd6bc42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32150-cwe-362-concurrent-execution-using--895cb39d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32150%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2e82d89c981fd6bc3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32149-cwe-20-improper-input-validation-in-6d462a7c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32149%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2e82d89c981fd6bc3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32091-cwe-362-concurrent-execution-using--ca8b3dbb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32091%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2e82d89c981fd6bc36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32088-cwe-362-concurrent-execution-using--98704c94</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32088%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=69de7a2e82d89c981fd6bc2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32086-cwe-362-concurrent-execution-using--8fa5cd49</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32086%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2b82d89c981fd6bbb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32084-cwe-200-exposure-of-sensitive-infor-e73a4b1e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32084%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a2b82d89c981fd6bbb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32080-cwe-416-use-after-free-in-microsoft-a3c0dea3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32080%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%20Server%202016&amp;severity=high&amp;id=69de7a2b82d89c981fd6bba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32079-cwe-200-exposure-of-sensitive-infor-9d61e560</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32079%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a2a82d89c981fd6bba3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32078-cwe-416-use-after-free-in-microsoft-9e05253d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32078%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a2a82d89c981fd6bba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32077-cwe-822-untrusted-pointer-dereferen-4a7c3005</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32077%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2a82d89c981fd6bb9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32076-cwe-125-out-of-bounds-read-in-micro-e50ab91b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32076%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=69de7a2782d89c981fd6ba71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32074-cwe-415-double-free-in-microsoft-wi-6993a728</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32074%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a2782d89c981fd6ba6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32072-cwe-287-improper-authentication-in--cb921f80</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32072%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a2782d89c981fd6ba65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32070-cwe-416-use-after-free-in-microsoft-c2a86ecf</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32070%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2782d89c981fd6ba5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32069-cwe-415-double-free-in-microsoft-wi-052e17b7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32069%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a2782d89c981fd6ba5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32068-cwe-362-concurrent-execution-using--8fa9958c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32068%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2782d89c981fd6ba59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27930-cwe-125-out-of-bounds-read-in-micro-a028a6ba</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27930%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a2482d89c981fd6ba0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27928-cwe-20-improper-input-validation-in-3af173ba</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27928%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%20Server%202016&amp;severity=high&amp;id=69de7a2482d89c981fd6ba05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27925-cwe-416-use-after-free-in-microsoft-b2af4507</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27925%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a2482d89c981fd6b9fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27923-cwe-416-use-after-free-in-microsoft-a1d83d45</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27923%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2482d89c981fd6b9f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27922-cwe-416-use-after-free-in-microsoft-9e17349b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27922%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2482d89c981fd6b9f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27920-cwe-822-untrusted-pointer-dereferen-41e8c3a2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27920%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2182d89c981fd6a7dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27916-cwe-416-use-after-free-in-microsoft-8199ddd9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27916%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2182d89c981fd6a7d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27914-cwe-284-improper-access-control-in--0c3c451b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27914%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2182d89c981fd6a7ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27913-cwe-20-improper-input-validation-in-4fef816e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27913%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%20Server%202012&amp;severity=high&amp;id=69de7a2182d89c981fd6a7c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27912-cwe-285-improper-authorization-in-m-4d0501e2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27912%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Windows%20Server%202012&amp;severity=high&amp;id=69de7a2182d89c981fd6a7c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27911-cwe-362-concurrent-execution-using--5f29327a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27911%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2182d89c981fd6a7c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27910-cwe-280-improper-handling-of-insuff-924af22b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27910%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1d82d89c981fd6a737</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27909-cwe-416-use-after-free-in-microsoft-5fd4b2ca</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27909%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1d82d89c981fd6a734</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26184-cwe-126-buffer-over-read-in-microso-ad60a26c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26184%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a1d82d89c981fd6a725</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26182-cwe-416-use-after-free-in-microsoft-dc67948f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26182%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1d82d89c981fd6a71f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26178-cwe-681-incorrect-conversion-betwee-60374287</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26178%3A%20CWE-681%3A%20Incorrect%20Conversion%20between%20Numeric%20Types%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1b82d89c981fd6a6dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26177-cwe-416-use-after-free-in-microsoft-4466664b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26177%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1b82d89c981fd6a6d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26176-cwe-122-heap-based-buffer-overflow--3555ecfe</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26176%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1b82d89c981fd6a6d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26173-cwe-362-concurrent-execution-using--bc17a212</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26173%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1b82d89c981fd6a6cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26172-cwe-362-concurrent-execution-using--d4bfead1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26172%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=69de7a1b82d89c981fd6a6ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26170-cwe-20-improper-input-validation-in-bd46df79</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26170%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1882d89c981fd6a68c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26169-cwe-126-buffer-over-read-in-microso-d0ca5e4d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26169%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a1882d89c981fd6a689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26168-cwe-362-concurrent-execution-using--7b02765b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26168%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1882d89c981fd6a686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26163-cwe-415-double-free-in-microsoft-wi-830867f1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26163%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1882d89c981fd6a67a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26159-cwe-306-missing-authentication-for--ad6e8baf</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26159%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1682d89c981fd6a63c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26156-cwe-122-heap-based-buffer-overflow--6a57a6f9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26156%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1682d89c981fd6a639</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26153-cwe-125-out-of-bounds-read-in-micro-36bba8cc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26153%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a1682d89c981fd6a630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26152-cwe-922-insecure-storage-of-sensiti-68f2db89</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26152%3A%20CWE-922%3A%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1682d89c981fd6a62d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26143-cwe-20-improper-input-validation-in-08916d7b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26143%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20PowerShell%207.4&amp;severity=high&amp;id=69de7a1682d89c981fd6a624</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23666-cwe-755-improper-handling-of-except-c8599af8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23666%3A%20CWE-755%3A%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20Microsoft%20Microsoft%20.NET%20Framework%203.5&amp;severity=high&amp;id=69de7a1482d89c981fd6a5f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23657-cwe-416-use-after-free-in-microsoft-172fe6dc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23657%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69de7a1482d89c981fd6a5ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20806-cwe-843-access-of-resource-using-in-2db342f6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20806%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=69de7a1482d89c981fd6a5e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20928-cwe-212-improper-removal-of-sensiti-d55f0b35</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20928%3A%20CWE-212%3A%20Improper%20Removal%20of%20Sensitive%20Information%20Before%20Storage%20or%20Transfer%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a1482d89c981fd6a5e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32212-cwe-59-improper-link-resolution-bef-a8315ee6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32212%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a3682d89c981fd6bd43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33826-cwe-20-improper-input-validation-in-ed85b68e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33826%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%20Server%202012%20R2&amp;severity=high&amp;id=69de7a3b82d89c981fd6cf48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33825-cwe-1220-insufficient-granularity-o-73be6db2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33825%3A%20CWE-1220%3A%20Insufficient%20Granularity%20of%20Access%20Control%20in%20Microsoft%20Microsoft%20Defender%20Antimalware%20Platform&amp;severity=high&amp;id=69de7a3b82d89c981fd6cf45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33822-cwe-125-out-of-bounds-read-in-micro-97400ae0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33822%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=medium&amp;id=69de7a3a82d89c981fd6cf35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33120-cwe-822-untrusted-pointer-dereferen-338cc6ab</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33120%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Microsoft%20SQL%20Server%202022%20(GDR)&amp;severity=high&amp;id=69de7a3a82d89c981fd6cf32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33116-cwe-835-loop-with-unreachable-exit--6d2e9668</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33116%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Microsoft%20.NET%2010.0&amp;severity=high&amp;id=69de7a3a82d89c981fd6cf2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33098-cwe-416-use-after-free-in-microsoft-14fa30d5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33098%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a3882d89c981fd6ceff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33096-cwe-125-out-of-bounds-read-in-micro-f99fbaaa</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33096%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=69de7a3882d89c981fd6cefc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33095-cwe-416-use-after-free-in-microsoft-72848262</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33095%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69de7a3882d89c981fd6cef9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32226-cwe-362-concurrent-execution-using--694f061d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32226%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Microsoft%20.NET%20Framework%203.5%20AND%204.7.2&amp;severity=medium&amp;id=69de7a3882d89c981fd6cef6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32224-cwe-416-use-after-free-in-microsoft-b1f0a247</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32224%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20version%2026H1&amp;severity=high&amp;id=69de7a3882d89c981fd6cef0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32223-cwe-122-heap-based-buffer-overflow--3c007cd2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32223%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=medium&amp;id=69de7a3882d89c981fd6ceed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32222-cwe-822-untrusted-pointer-dereferen-e2689638</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32222%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69de7a3882d89c981fd6ceea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32221-cwe-122-heap-based-buffer-overflow--473ffa00</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32221%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69de7a3882d89c981fd6cee7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32220-cwe-284-improper-access-control-in--a2aa9aa4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32220%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=medium&amp;id=69de7a3882d89c981fd6cee4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32219-cwe-415-double-free-in-microsoft-wi-31dc6599</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32219%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69de7a3682d89c981fd6bd55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32218-cwe-532-insertion-of-sensitive-info-269049f7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32218%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=medium&amp;id=69de7a3682d89c981fd6bd52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32217-cwe-532-insertion-of-sensitive-info-8c9fae6c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32217%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a3682d89c981fd6bd4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32216-cwe-476-null-pointer-dereference-in-37c0ed57</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32216%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2011%20version%2026H1&amp;severity=medium&amp;id=69de7a3682d89c981fd6bd4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32215-cwe-532-insertion-of-sensitive-info-fd4d1ad6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32215%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=69de7a3682d89c981fd6bd49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32202-cwe-693-protection-mechanism-failur-2f0cf818</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32202%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a3682d89c981fd6bd3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32195-cwe-121-stack-based-buffer-overflow-9606beb6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32195%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2011%20version%2026H1&amp;severity=high&amp;id=69de7a3482d89c981fd6bcd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32192-cwe-502-deserialization-of-untruste-07ba7463</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32192%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Azure%20Monitor&amp;severity=high&amp;id=69de7a3482d89c981fd6bcd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32189-cwe-416-use-after-free-in-microsoft-b211091f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32189%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69de7a3482d89c981fd6bccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32188-cwe-125-out-of-bounds-read-in-micro-9b236598</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32188%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69de7a3482d89c981fd6bcca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32184-cwe-502-deserialization-of-untruste-a3c0ec1f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32184%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20HPC%20Pack%202019&amp;severity=high&amp;id=69de7a3282d89c981fd6bcbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32183-cwe-77-improper-neutralization-of-s-4b6f9ccb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32183%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a3282d89c981fd6bcba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32181-cwe-269-improper-privilege-manageme-16c18e6f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32181%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=medium&amp;id=69de7a3282d89c981fd6bcb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32178-cwe-138-improper-neutralization-of--1098599a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32178%3A%20CWE-138%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Microsoft%20.NET%2010.0&amp;severity=high&amp;id=69de7a3282d89c981fd6bcb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32168-cwe-20-improper-input-validation-in-d5b2309c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32168%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Azure%20Monitor&amp;severity=high&amp;id=69de7a3282d89c981fd6bcab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32167-cwe-89-improper-neutralization-of-s-4dfb3470</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32167%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Microsoft%20Microsoft%20SQL%20Server%202016%20Service%20Pack%203%20(GDR)&amp;severity=medium&amp;id=69de7a3282d89c981fd6bca8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32165-cwe-416-use-after-free-in-microsoft-c826ca80</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32165%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a3282d89c981fd6bca5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0390-cwe-807-reliance-on-untrusted-inputs-645ada93</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0390%3A%20CWE-807%3A%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a1482d89c981fd6a5dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32160-cwe-362-concurrent-execution-using--b0e2a872</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32160%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a3082d89c981fd6bc8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32159-cwe-362-concurrent-execution-using--f1bafff5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32159%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a3082d89c981fd6bc8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32158-cwe-362-concurrent-execution-using--9e8e2131</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32158%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a3082d89c981fd6bc89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32157-cwe-416-use-after-free-in-microsoft-c1ea29fc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32157%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Remote%20Desktop%20client%20for%20Windows%20Desktop&amp;severity=high&amp;id=69de7a3082d89c981fd6bc86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32156-cwe-416-use-after-free-in-microsoft-1ff5b5c0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32156%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a3082d89c981fd6bc83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32154-cwe-416-use-after-free-in-microsoft-69fdc6d1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32154%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a3082d89c981fd6bc7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32152-cwe-416-use-after-free-in-microsoft-5e3440ee</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32152%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=69de7a2e82d89c981fd6bc45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32093-cwe-362-concurrent-execution-using--ec561814</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32093%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2e82d89c981fd6bc39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32090-cwe-362-concurrent-execution-using--cdda107b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32090%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2e82d89c981fd6bc33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32089-cwe-416-use-after-free-in-microsoft-257d5db1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32089%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2e82d89c981fd6bc30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32087-cwe-122-heap-based-buffer-overflow--46a63183</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32087%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2e82d89c981fd6bc2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32085-cwe-200-exposure-of-sensitive-infor-41cb0b72</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32085%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a2b82d89c981fd6bbb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32083-cwe-362-concurrent-execution-using--66cd44bc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32083%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2b82d89c981fd6bbaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32082-cwe-362-concurrent-execution-using--ed659fd9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32082%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2b82d89c981fd6bbac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32081-cwe-200-exposure-of-sensitive-infor-eaa6be22</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32081%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a2b82d89c981fd6bba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32075-cwe-416-use-after-free-in-microsoft-f193305b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32075%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2782d89c981fd6ba6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32073-cwe-416-use-after-free-in-microsoft-3211bff7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32073%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2782d89c981fd6ba68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32071-cwe-476-null-pointer-dereference-in-f3c1af73</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32071%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2782d89c981fd6ba62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27931-cwe-125-out-of-bounds-read-in-micro-9cddb35d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27931%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=medium&amp;id=69de7a2782d89c981fd6ba56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27929-cwe-367-time-of-check-time-of-use-t-7832f9c5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27929%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2482d89c981fd6ba08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27927-cwe-362-concurrent-execution-using--2bc68001</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27927%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a2482d89c981fd6ba02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27926-cwe-362-concurrent-execution-using--e10b68a2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27926%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a2482d89c981fd6b9ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27924-cwe-416-use-after-free-in-microsoft-377a37ef</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27924%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=69de7a2482d89c981fd6b9f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27921-cwe-362-concurrent-execution-using--62fdd6b4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27921%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2482d89c981fd6b9f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27919-cwe-822-untrusted-pointer-dereferen-87fe2437</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27919%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2182d89c981fd6a7d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27918-cwe-362-concurrent-execution-using--0668203c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27918%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a2182d89c981fd6a7d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27917-cwe-416-use-after-free-in-microsoft-7740877c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27917%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2182d89c981fd6a7d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27915-cwe-416-use-after-free-in-microsoft-71e31363</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27915%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a2182d89c981fd6a7cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27908-cwe-416-use-after-free-in-microsoft-9fbfd6e5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27908%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1d82d89c981fd6a731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27907-cwe-191-integer-underflow-wrap-or-w-3c6fcbdb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27907%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=69de7a1d82d89c981fd6a72e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27906-cwe-20-improper-input-validation-in-15b1add6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27906%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=medium&amp;id=69de7a1d82d89c981fd6a72b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26183-cwe-284-improper-access-control-in--e52fa728</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26183%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%20Server%202012&amp;severity=high&amp;id=69de7a1d82d89c981fd6a722</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26181-cwe-416-use-after-free-in-microsoft-0ec1d3f4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26181%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=69de7a1d82d89c981fd6a71c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26180-cwe-122-heap-based-buffer-overflow--9ff59786</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26180%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1b82d89c981fd6a6e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26179-cwe-415-double-free-in-microsoft-wi-eef77c20</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26179%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=69de7a1b82d89c981fd6a6df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26175-cwe-908-use-of-uninitialized-resour-152461da</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26175%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a1b82d89c981fd6a6d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26174-cwe-362-concurrent-execution-using--28417f6f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26174%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1b82d89c981fd6a6d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26167-cwe-362-concurrent-execution-using--55e636ec</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26167%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1882d89c981fd6a683</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26166-cwe-415-double-free-in-microsoft-wi-9232decb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26166%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=69de7a1882d89c981fd6a680</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26165-cwe-416-use-after-free-in-microsoft-abfbc4b8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26165%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=69de7a1882d89c981fd6a67d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26162-cwe-843-access-of-resource-using-in-db050af1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26162%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1882d89c981fd6a677</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26161-cwe-822-untrusted-pointer-dereferen-41499af6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26161%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a1882d89c981fd6a674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26160-cwe-306-missing-authentication-for--0ab417a0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26160%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1882d89c981fd6a671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26155-cwe-126-buffer-over-read-in-microso-490c3d1f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26155%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a1682d89c981fd6a636</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26154-cwe-20-improper-input-validation-in-68836085</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26154%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%20Server%202012&amp;severity=high&amp;id=69de7a1682d89c981fd6a633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26151-cwe-357-insufficient-ui-warning-of--baf70412</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26151%3A%20CWE-357%3A%20Insufficient%20UI%20Warning%20of%20Dangerous%20Operations%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69de7a1682d89c981fd6a62a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26149-cwe-150-improper-neutralization-of--adf80a1e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26149%3A%20CWE-150%3A%20Improper%20Neutralization%20of%20Escape%2C%20Meta%2C%20or%20Control%20Sequences%20in%20Microsoft%20Microsoft%20Power%20Apps%20Desktop%20Client&amp;severity=critical&amp;id=69de7a1682d89c981fd6a627</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23670-cwe-822-untrusted-pointer-dereferen-0022d68e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23670%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69de7a1482d89c981fd6a5f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20945-cwe-79-improper-neutralization-of-i-ac52a74d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20945%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=medium&amp;id=69de7a1482d89c981fd6a5e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25184-cwe-362-concurrent-execution-using--2773ff78</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25184%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=69de7a1682d89c981fd6a621</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23653-cwe-77-improper-neutralization-of-s-a7104260</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23653%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20Visual%20Studio%20Code%20CoPilot%20Chat%20Extension&amp;severity=medium&amp;id=69de7a1482d89c981fd6a5ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20930-cwe-362-concurrent-execution-using--d0dc4957</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20930%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69de7a1482d89c981fd6a5e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22692-cwe-693-protection-mechanism-failur-9f968e3e</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22692%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20octobercms%20october&amp;severity=medium&amp;id=69de731682d89c981fcd5a00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/adobe-patches-55-vulnerabilities-across-11-product-19dbeb63</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Adobe%20Patches%2055%20Vulnerabilities%20Across%2011%20Products&amp;severity=critical&amp;id=69de730182d89c981fcd5435</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27284-out-of-bounds-read-cwe-125-in-adobe-7d74c03d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27284%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=69de731682d89c981fcd5a09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27285-heap-based-buffer-overflow-cwe-122--d9d30173</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27285%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=medium&amp;id=69de731682d89c981fcd5a0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27286-heap-based-buffer-overflow-cwe-122--4630805d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27286%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=medium&amp;id=69de731682d89c981fcd5a0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27283-use-after-free-cwe-416-in-adobe-ind-6947ba14</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27283%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=69de731682d89c981fcd5a06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27238-heap-based-buffer-overflow-cwe-122--f7fd79e9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27238%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=69de731682d89c981fcd5a03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27291-out-of-bounds-write-cwe-787-in-adob-27b71255</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27291%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=69de731682d89c981fcd5a12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34622-improperly-controlled-modification--0326b95e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34622%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20(CWE-1321)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=69de6c0582d89c981fc4d748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34626-improperly-controlled-modification--bd4cf4c2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34626%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20(CWE-1321)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=69de6c0582d89c981fc4d74b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61624-escalation-of-privilege-in-fortinet-171166f7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61624%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiOS&amp;severity=medium&amp;id=69de650582d89c981fbed4df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68649-escalation-of-privilege-in-fortinet-a0698cd6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68649%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiManager%20Cloud&amp;severity=medium&amp;id=69de650582d89c981fbed4e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21741-execute-unauthorized-code-or-comman-0f7a52d6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21741%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiNAC-F&amp;severity=low&amp;id=69de650582d89c981fbed4eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39813-escalation-of-privilege-in-fortinet-082bcf5d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39813%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiSandbox&amp;severity=critical&amp;id=69de650a82d89c981fbf0910</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61848-execute-unauthorized-code-or-comman-458240a1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61848%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiManager&amp;severity=medium&amp;id=69de650582d89c981fbed4e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22828-escalation-of-privilege-in-fortinet-0564d74b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22828%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiAnalyzer%20Cloud&amp;severity=high&amp;id=69de650782d89c981fbf0855</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39815-execute-unauthorized-code-or-comman-d6a1fcb6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39815%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiDDoS-F&amp;severity=high&amp;id=69de650a82d89c981fbf0916</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22573-information-disclosure-in-fortinet--07902490</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22573%3A%20Information%20disclosure%20in%20Fortinet%20FortiSOAR%20on-premise&amp;severity=medium&amp;id=69de650782d89c981fbf084c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61886-execute-unauthorized-code-or-comman-5a3555e5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61886%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSandbox%20PaaS&amp;severity=medium&amp;id=69de650582d89c981fbed4e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39810-information-disclosure-in-fortinet--75ea6d30</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39810%3A%20Information%20disclosure%20in%20Fortinet%20FortiClientEMS&amp;severity=medium&amp;id=69de650782d89c981fbf0864</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39811-denial-of-service-in-fortinet-forti-2563cace</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39811%3A%20Denial%20of%20service%20in%20Fortinet%20FortiWeb&amp;severity=medium&amp;id=69de650a82d89c981fbf090a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23104-information-disclosure-in-fortinet--1b48f58e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23104%3A%20Information%20disclosure%20in%20Fortinet%20FortiVoice&amp;severity=medium&amp;id=69de650582d89c981fbed4d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39812-execute-unauthorized-code-or-comman-5b024998</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39812%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSandbox&amp;severity=medium&amp;id=69de650a82d89c981fbf090d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23708-escalation-of-privilege-in-fortinet-4da37711</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23708%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiSOAR%20PaaS&amp;severity=medium&amp;id=69de650782d89c981fbf0858</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39814-execute-unauthorized-code-or-comman-c67b5e5c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39814%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiWeb&amp;severity=medium&amp;id=69de650a82d89c981fbf0913</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25691-execute-unauthorized-code-or-comman-ba5ba8c1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25691%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSandbox%20PaaS&amp;severity=medium&amp;id=69de650782d89c981fbf085b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59809-information-disclosure-in-fortinet--f1b923ab</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59809%3A%20Information%20disclosure%20in%20Fortinet%20FortiSOAR%20on-premise&amp;severity=medium&amp;id=69de650582d89c981fbed4dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22155-information-disclosure-in-fortinet--32ef1497</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22155%3A%20Information%20disclosure%20in%20Fortinet%20FortiSOAR%20on-premise&amp;severity=medium&amp;id=69de650782d89c981fbf0849</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21742-information-disclosure-in-fortinet--5a5a88a8</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21742%3A%20Information%20disclosure%20in%20Fortinet%20FortiSOAR%20PaaS&amp;severity=medium&amp;id=69de650582d89c981fbed4ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/108-chrome-extensions-linked-to-data-exfiltration--8c012474</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=108%20Chrome%20Extensions%20Linked%20to%20Data%20Exfiltration%20and%20Session%20Theft%20via%20Shared%20C2%20Infrastructure&amp;severity=medium&amp;id=69de616b82d89c981fbc694d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22574-information-disclosure-in-fortinet--7c8cd4e8</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22574%3A%20Information%20disclosure%20in%20Fortinet%20FortiSOAR%20PaaS&amp;severity=medium&amp;id=69de650782d89c981fbf084f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22154-escalation-of-privilege-in-fortinet-67e3b19b</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22154%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiSOAR%20PaaS&amp;severity=medium&amp;id=69de650582d89c981fbed4f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53847-execute-unauthorized-code-or-comman-5f90cc02</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53847%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiOS&amp;severity=medium&amp;id=69de650582d89c981fbed4d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22576-information-disclosure-in-fortinet--eccd0793</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22576%3A%20Information%20disclosure%20in%20Fortinet%20FortiSOAR%20PaaS&amp;severity=medium&amp;id=69de650782d89c981fbf0852</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27316-information-disclosure-in-fortinet--23983c6d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27316%3A%20Information%20disclosure%20in%20Fortinet%20FortiSandbox&amp;severity=low&amp;id=69de650782d89c981fbf085e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39808-execute-unauthorized-code-or-comman-af629bfe</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39808%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSandbox&amp;severity=critical&amp;id=69de650782d89c981fbf0861</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2401-cwe-532-insertion-of-sensitive-infor-d453bf47</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2401%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Schneider%20Electric%20PowerChute%E2%84%A2%20Serial%20Shutdown&amp;severity=low&amp;id=69de5dec82d89c981fb97446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2400-cwe-93-improper-neutralization-of-cr-d42f5774</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2400%3A%20CWE-93%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20Schneider%20Electric%20PowerChute%E2%84%A2%20Serial%20Shutdown&amp;severity=medium&amp;id=69de5dec82d89c981fb97443</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2403-cwe-1284-improper-validation-of-spec-9964a9ca</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2403%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20Schneider%20Electric%20PowerChute%E2%84%A2%20Serial%20Shutdown&amp;severity=medium&amp;id=69de5def82d89c981fb974be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2405-cwe-400-uncontrolled-resource-consum-f72b6df0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2405%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Schneider%20Electric%20PowerChute%E2%84%A2%20Serial%20Shutdown&amp;severity=medium&amp;id=69de5def82d89c981fb974c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2402-cwe-307-improper-restriction-of-exce-64f33449</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2402%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Schneider%20Electric%20PowerChute%E2%84%A2%20Serial%20Shutdown&amp;severity=medium&amp;id=69de5dec82d89c981fb97449</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2404-cwe-116-improper-encoding-or-escapin-b02daa7f</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2404%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Schneider%20Electric%20PowerChute%E2%84%A2%20Serial%20Shutdown&amp;severity=medium&amp;id=69de5def82d89c981fb974c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5713-cwe-121-stack-based-buffer-overflow--f68faa6f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5713%3A%20CWE-121%20Stack-based%20buffer%20overflow%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=69de5df182d89c981fb975c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2399-cwe-22-improper-limitation-of-a-path-c929fbb7</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2399%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Schneider%20Electric%20PowerChute%E2%84%A2%20Serial%20Shutdown&amp;severity=medium&amp;id=69de5dec82d89c981fb97440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39809-execute-unauthorized-code-or-comman-ed3cd125</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39809%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiClientEMS&amp;severity=medium&amp;id=69de5df182d89c981fb975ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4832-cwe-798-use-of-hard-coded-credential-ebfe7271</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4832%3A%20CWE-798%20Use%20of%20Hard-Coded%20Credentials%20in%20Schneider%20Electric%20Easergy%20MiCOM%20P14x&amp;severity=medium&amp;id=69de5df182d89c981fb975bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37980-improper-neutralization-of-input-du-20974fc9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37980%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Red%20Hat%20Red%20Hat%20Build%20of%20Keycloak&amp;severity=medium&amp;id=69de56e582d89c981fb1904d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4914-cwe-79-improper-neutralization-of-in-71edc76f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4914%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Ivanti%20Neurons%20for%20ITSM%20(On-Premise)&amp;severity=medium&amp;id=69de4ff282d89c981fa84ca1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4913-cwe-424-improper-protection-of-alter-48b0cd1c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4913%3A%20CWE-424%3A%20Improper%20Protection%20of%20Alternate%20Path%20in%20Ivanti%20Neurons%20for%20ITSM%20(On-Premise)&amp;severity=medium&amp;id=69de4ff282d89c981fa84c9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/59-victims-zero-authentication-a-clickfix-campaign-64ad7f8a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=59%20Victims%2C%20Zero%20Authentication%3A%20A%20ClickFix%20Campaign%20Force-Installs%20a%20Chrome%20Extension%20Banking%20Stealer%20and%20Leaves%20the%20Entire%20C2%20Wide%20Open&amp;severity=medium&amp;id=69de4c5382d89c981fa44b81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4344-cwe-79-cross-site-scripting-xss-stor-9662e895</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4344%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20-%20Stored%20in%20Autodesk%20Fusion&amp;severity=high&amp;id=69de4ff282d89c981fa84c8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4345-cwe-79-cross-site-scripting-xss-stor-de128268</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4345%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20-%20Stored%20in%20Autodesk%20Fusion&amp;severity=high&amp;id=69de4ff282d89c981fa84c94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4369-cwe-79-cross-site-scripting-xss-stor-c9a1cc3b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4369%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20-%20Stored%20in%20Autodesk%20Fusion&amp;severity=high&amp;id=69de4ff282d89c981fa84c99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8095-cwe-257-in-progress-software-corpora-f20f50ae</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8095%3A%20CWE-257%20in%20Progress%20Software%20Corporation%20OpenEdge&amp;severity=critical&amp;id=69de455082d89c981f9c8aa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7389-cwe-552-in-progress-software-corpora-c6476335</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7389%3A%20CWE-552%20in%20Progress%20Software%20Corporation%20OpenEdge&amp;severity=high&amp;id=69de455082d89c981f9c8a9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mythos-ready-security-csa-urges-cisos-to-prepare-f-bf8a68c8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%98Mythos-Ready%E2%80%99%20Security%3A%20CSA%20Urges%20CISOs%20to%20Prepare%20for%20Accelerated%20AI%20Threats&amp;severity=high&amp;id=69de3ac082d89c981f8db41d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/europes-largest-gym-chain-says-data-breach-impacts-d650bf86</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Europe%E2%80%99s%20Largest%20Gym%20Chain%20Says%20Data%20Breach%20Impacts%201%20Million%20Members&amp;severity=medium&amp;id=69de373c82d89c981f5ace10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2450-cwe-520-net-misconfiguration-use-of--335f73f7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2450%3A%20CWE-520%20.NET%20misconfiguration%3A%20use%20of%20impersonation%20in%20upKeeper%20Solutions%20upKeeper%20Instant%20Privilege%20Access&amp;severity=high&amp;id=69de374582d89c981f5b1485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2449-cwe-88-improper-neutralization-of-ar-cd196faa</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2449%3A%20CWE-88%20Improper%20neutralization%20of%20argument%20delimiters%20in%20a%20command%20(&apos;argument%20injection&apos;)%20in%20upKeeper%20Solutions%20upKeeper%20Instant%20Privilege%20Access&amp;severity=critical&amp;id=69de303282d89c981f2e25f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24069-cwe-863-incorrect-authorization-in--a08b3733</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24069%3A%20CWE-863%20Incorrect%20Authorization%20in%20Kiuwan%20SAST&amp;severity=medium&amp;id=69de292b82d89c981f2a390c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sap-patches-critical-abap-vulnerability-a01b2740</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SAP%20Patches%20Critical%20ABAP%20Vulnerability&amp;severity=critical&amp;id=69de25a882d89c981f28f984</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2332-cwe-444-inconsistent-interpretation--174fc831</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2332%3A%20CWE-444%20Inconsistent%20interpretation%20of%20HTTP%20requests%20(&apos;HTTP%20Request%2FResponse%20smuggling&apos;)%20in%20Eclipse%20Foundation%20Eclipse%20Jetty&amp;severity=high&amp;id=69de25ad82d89c981f28fd41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/triad-nexus-evades-sanctions-to-fuel-cybercrime-14f3246a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Triad%20Nexus%20Evades%20Sanctions%20to%20Fuel%20Cybercrime&amp;severity=medium&amp;id=69de1e9f82d89c981f23508f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-adds-rust-dns-parser-to-pixel-phones-for-be-4f83f373</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Adds%20Rust%20DNS%20Parser%20to%20Pixel%20Phones%20for%20Better%20Security&amp;severity=low&amp;id=69de179782d89c981f1f8f75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nightclub-giant-rci-hospitality-reports-data-breac-bed7c779</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nightclub%20Giant%20RCI%20Hospitality%20Reports%20Data%20Breach&amp;severity=medium&amp;id=69de0d0c82d89c981f1a3e14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/organizations-warned-of-exploited-windows-adobe-ac-ff246528</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Organizations%20Warned%20of%20Exploited%20Windows%2C%20Adobe%20Acrobat%20Vulnerabilities&amp;severity=low&amp;id=69de028082d89c981f1493f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pretexting-based-targeted-intrusion-analysis-of-fa-f57a71c9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pretexting-Based%20Targeted%20Intrusion%3A%20Analysis%20of%20Facebook%20Reconnaissance%20and%20Software%20Tampering%20Attacks&amp;severity=medium&amp;id=69de099282d89c981f185723</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/q1-2026-malware-statistics-report-for-linux-ssh-se-45d5088d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Q1%202026%20Malware%20Statistics%20Report%20for%20Linux%20SSH%20Servers&amp;severity=medium&amp;id=69de099282d89c981f18573a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/q1-2026-malware-statistics-report-for-windows-data-beb6a9fd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Q1%202026%20Malware%20Statistics%20Report%20for%20Windows%20Database%20Servers&amp;severity=medium&amp;id=69de099282d89c981f18573e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33892-cwe-305-authentication-bypass-by-pr-d1d1565e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33892%3A%20CWE-305%3A%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20Siemens%20Industrial%20Edge%20Management%20Pro%20V1&amp;severity=high&amp;id=69de028682d89c981f14951c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27668-cwe-266-incorrect-privilege-assignm-3966ad74</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27668%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Siemens%20RUGGEDCOM%20CROSSBOW%20Secure%20Access%20Manager%20Primary%20(SAM-P)&amp;severity=high&amp;id=69de028682d89c981f149516</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25654-cwe-639-authorization-bypass-throug-94590bb2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25654%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Siemens%20SINEC%20NMS&amp;severity=high&amp;id=69de028682d89c981f149513</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24032-cwe-347-improper-verification-of-cr-59b40820</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24032%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Siemens%20SINEC%20NMS&amp;severity=high&amp;id=69de028682d89c981f149510</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40745-cwe-295-improper-certificate-valida-40b15c00</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40745%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Siemens%20Siemens%20Software%20Center&amp;severity=low&amp;id=69de028682d89c981f14950d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31923-cwe-319-cleartext-transmission-of-s-568d8687</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31923%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Apache%20Software%20Foundation%20Apache%20APISIX&amp;severity=high&amp;id=69de028682d89c981f149519</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33929-cwe-22-improper-limitation-of-a-pat-2d3fd231</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33929%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20PDFBox%20Examples&amp;severity=medium&amp;id=69ddf7fa82d89c981f0815e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31924-cwe-319-cleartext-transmission-of-s-194e8ae1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31924%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Apache%20Software%20Foundation%20Apache%20APISIX&amp;severity=medium&amp;id=69ddf7fa82d89c981f0815e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31908-cwe-75-failure-to-sanitize-special--741cc648</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31908%3A%20CWE-75%20Failure%20to%20Sanitize%20Special%20Elements%20into%20a%20Different%20Plane%20(Special%20Element%20Injection)%20in%20Apache%20Software%20Foundation%20Apache%20APISIX&amp;severity=critical&amp;id=69ddf7fa82d89c981f0815e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4109-cwe-862-missing-authorization-in-arr-dc2bacc4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4109%3A%20CWE-862%20Missing%20Authorization%20in%20arraytics%20Eventin%20%E2%80%93%20Event%20Calendar%2C%20Event%20Registration%2C%20Tickets%20%26%20Booking%20(AI%20Powered)&amp;severity=medium&amp;id=69ddf7fa82d89c981f0815eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2582-cwe-94-improper-control-of-generatio-55d074f6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2582%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20vendidero%20Germanized%20for%20WooCommerce&amp;severity=medium&amp;id=69dde66a82d89c981ffc957b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3017-cwe-502-deserialization-of-untrusted-13c099d1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3017%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20shapedplugin%20Smart%20Post%20Show%20%E2%80%93%20Post%20Grid%2C%20Post%20Carousel%20%26%20Slider%2C%20and%20List%20Category%20Posts&amp;severity=high&amp;id=69ddd4cb82d89c981fef0e8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4059-cwe-79-improper-neutralization-of-in-714c11b5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4059%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devitemsllc%20ShopLentor%20%E2%80%93%20All-in-One%20WooCommerce%20Growth%20%26%20Store%20Enhancement%20Plugin&amp;severity=medium&amp;id=69ddbc3182d89c981fc24dde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4479-cwe-79-improper-neutralization-of-in-f0bfaad2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4479%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpcodefactory%20WholeSale%20Products%20Dynamic%20Pricing%20Management%20WooCommerce&amp;severity=medium&amp;id=69ddbc3182d89c981fc24de7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1607-cwe-79-improper-neutralization-of-in-0a460d9b</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1607%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20surbma%20Surbma%20%7C%20Booking.com%20Shortcode&amp;severity=medium&amp;id=69ddbc3182d89c981fc24dc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40313-cwe-829-inclusion-of-functionality--2d33a73b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40313%3A%20CWE-829%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20MervinPraison%20PraisonAI&amp;severity=critical&amp;id=69ddbc3182d89c981fc24dd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40289-cwe-306-missing-authentication-for--874e515b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40289%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20MervinPraison%20PraisonAI&amp;severity=critical&amp;id=69ddbc3182d89c981fc24dd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40288-cwe-78-improper-neutralization-of-s-06bb92e7</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40288%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=critical&amp;id=69ddbc3182d89c981fc24dcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40287-cwe-94-improper-control-of-generati-5261cfa0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40287%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69ddbc3182d89c981fc24dcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40315-cwe-89-improper-neutralization-of-s-999a7473</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40315%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69ddbc3182d89c981fc24dda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4388-cwe-79-improper-neutralization-of-in-167b94fc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4388%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%2010web%20Form%20Maker%20by%2010Web%20%E2%80%93%20Mobile-Friendly%20Drag%20%26%20Drop%20Contact%20Form%20Builder&amp;severity=high&amp;id=69ddaa9d82d89c981fae6a3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6227-cwe-22-improper-limitation-of-a-path-032a5e88</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6227%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wp_media%20BackWPup%20%E2%80%93%20WordPress%20Backup%20%26%20Restore%20Plugin&amp;severity=high&amp;id=69ddaa9d82d89c981fae6a45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-tuesday-april-14th-2026-httpsisc-7c596c94</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Tuesday%2C%20April%2014th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9890%2C%20(Tue%2C%20Apr%2014th)&amp;severity=medium&amp;id=69dda00f82d89c981fa6090a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6264-cwe-306-missing-authentication-for-c-26a424cb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6264%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Talend%20Talend%20JobServer&amp;severity=critical&amp;id=69ddaa9d82d89c981fae6a4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39426-cwe-79-improper-neutralization-of-i-9106c343</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39426%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=69dd9c8b82d89c981fa1192c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4352-cwe-89-improper-neutralization-of-sp-cdc75f12</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4352%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Crocoblock%20JetEngine&amp;severity=high&amp;id=69dd9c8b82d89c981fa11930</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4365-cwe-862-missing-authorization-in-thi-8046e47d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4365%3A%20CWE-862%20Missing%20Authorization%20in%20thimpress%20LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin%20for%20Create%20and%20Sell%20Online%20Courses&amp;severity=critical&amp;id=69dd9c8b82d89c981fa11934</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39425-cwe-80-improper-neutralization-of-s-7656d9e4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39425%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=69dd9c8b82d89c981fa11928</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39419-cwe-74-improper-neutralization-of-s-734f4c72</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39419%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%201Panel-dev%20MaxKB&amp;severity=low&amp;id=69dd9c8b82d89c981fa11923</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39424-cwe-1236-improper-neutralization-of-e6ee8a15</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39424%3A%20CWE-1236%3A%20Improper%20Neutralization%20of%20Formula%20Elements%20in%20a%20CSV%20File%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=69dd958b82d89c981f9c58a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39423-cwe-79-improper-neutralization-of-i-4b9705b2</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39423%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=69dd958882d89c981f9c582f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39422-cwe-79-improper-neutralization-of-i-0c702d0b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39422%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=69dd958882d89c981f9c582a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39421-cwe-693-protection-mechanism-failur-b21ad8fb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39421%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=69dd958882d89c981f9c5825</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39420-cwe-693-protection-mechanism-failur-44d68598</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39420%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=69dd958882d89c981f9c5820</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34264-cwe-204-observable-response-discrep-8e45814a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34264%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20SAP_SE%20SAP%20Human%20Capital%20Management%20for%20SAP%20S%2F4HANA&amp;severity=medium&amp;id=69dd958882d89c981f9c5817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34262-cwe-522-insufficiently-protected-cr-cde26fc9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34262%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20SAP_SE%20SAP%20HANA%20Cockpit%20and%20HANA%20Database%20Explorer&amp;severity=medium&amp;id=69dd958882d89c981f9c5813</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34261-cwe-862-missing-authorization-in-sa-c726a93c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34261%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20Business%20Analytics%20and%20SAP%20Content%20Management&amp;severity=medium&amp;id=69dd958882d89c981f9c580f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39418-cwe-918-server-side-request-forgery-badcbb3e</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39418%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=69dd958882d89c981f9c581b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34257-cwe-601-url-redirection-to-untruste-3a3250f2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34257%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20ABAP&amp;severity=medium&amp;id=69dd958882d89c981f9c580b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34256-cwe-862-missing-authorization-in-sa-6bf07d71</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34256%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20ERP%20and%20SAP%20S%2F4%20HANA%20(Private%20Cloud%20and%20On-Premise)&amp;severity=high&amp;id=69dd958882d89c981f9c5807</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27683-cwe-79-improper-neutralization-of-i-03fa2e5c</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27683%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20SAP_SE%20SAP%20BusinessObjects%20Business%20Intelligence%20Platform&amp;severity=medium&amp;id=69dd877882d89c981f920dc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27681-cwe-89-improper-neutralization-of-s-a7704991</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27681%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20in%20SAP_SE%20SAP%20Business%20Planning%20and%20Consolidation%20and%20SAP%20Business%20Warehouse&amp;severity=critical&amp;id=69dd877882d89c981f920dbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27679-cwe-862-missing-authorization-in-sa-90db80ad</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27679%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20S%2F4HANA%20Frontend%20OData%20Service%20(Manage%20Reference%20Structures)&amp;severity=medium&amp;id=69dd877482d89c981f91f53c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27678-cwe-862-missing-authorization-in-sa-b49825de</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27678%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20S%2F4HANA%20Backend%20OData%20Service%20(Manage%20Reference%20Structures)&amp;severity=medium&amp;id=69dd877482d89c981f91f538</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27677-cwe-862-missing-authorization-in-sa-5a7f4542</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27677%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20S%2F4HANA%20OData%20Service%20(Manage%20Reference%20Equipment)&amp;severity=medium&amp;id=69dd877482d89c981f91f534</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27676-cwe-862-missing-authorization-in-sa-f0093fbc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27676%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20S%2F4HANA%20OData%20Service%20(Manage%20Technical%20Object%20Structures)&amp;severity=medium&amp;id=69dd877482d89c981f91f530</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27675-cwe-94-improper-control-of-generati-d79b5e7f</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27675%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20in%20SAP_SE%20SAP%20Landscape%20Transformation&amp;severity=low&amp;id=69dd877482d89c981f91f52c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27674-cwe-94-improper-control-of-generati-017daca5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27674%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20Java%20(Web%20Dynpro%20Java)&amp;severity=medium&amp;id=69dd877482d89c981f91f528</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27673-cwe-862-missing-authorization-in-sa-0d3d76b9</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27673%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20S%2F4HANA%20(Private%20Cloud%20and%20On-Premise)&amp;severity=medium&amp;id=69dd877482d89c981f91f524</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27672-cwe-862-missing-authorization-in-sa-cbb9e4e4</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27672%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20Material%20Master%20Application&amp;severity=medium&amp;id=69dd877482d89c981f91f520</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24318-cwe-539-use-of-persistent-cookies-c-b5e0c8eb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24318%3A%20CWE-539%3A%20Use%20of%20Persistent%20Cookies%20Containing%20Sensitive%20Information%20in%20SAP_SE%20SAP%20BusinessObjects%20Business%20Intelligence%20Platform&amp;severity=medium&amp;id=69dd877482d89c981f91f51c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0512-cwe-79-improper-neutralization-of-in-f12252f5</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0512%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20SAP_SE%20SAP%20Supplier%20Relationship%20Management%20(SICF%20Handler%20in%20SRM%20Catalog)&amp;severity=medium&amp;id=69dd877482d89c981f91f518</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39417-cwe-78-improper-neutralization-of-s-4644a8c0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39417%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=69dd877882d89c981f920dca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-15-4bca6267</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-15&amp;severity=medium&amp;id=69df507382d89c981fb85c73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-14-de7e96bd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-14&amp;severity=medium&amp;id=69ded8ea82d89c981f22a762</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70023-na-8e2b761a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70023%3A%20n%2Fa&amp;severity=critical&amp;id=69de7a1482d89c981fd6a5d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38533-na-76357efe</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38533%3A%20n%2Fa&amp;severity=medium&amp;id=69de5def82d89c981fb974df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38532-na-9e2b1a7e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38532%3A%20n%2Fa&amp;severity=high&amp;id=69de5def82d89c981fb974db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38530-na-2a555f71</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38530%3A%20n%2Fa&amp;severity=high&amp;id=69de5def82d89c981fb974d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38529-na-707c3506</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38529%3A%20n%2Fa&amp;severity=high&amp;id=69de5def82d89c981fb974d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38528-na-96f7457a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38528%3A%20n%2Fa&amp;severity=high&amp;id=69de5def82d89c981fb974cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38527-na-61b4f49b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38527%3A%20n%2Fa&amp;severity=high&amp;id=69de5def82d89c981fb974cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-38526-na-df6c8898</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-38526%3A%20n%2Fa&amp;severity=critical&amp;id=69de5def82d89c981fb974c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65136-na-7288dd01</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65136%3A%20n%2Fa&amp;severity=medium&amp;id=69de5dec82d89c981fb9743d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65135-na-31ed1bec</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65135%3A%20n%2Fa&amp;severity=critical&amp;id=69de5dec82d89c981fb9743a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65134-na-7cf4c1e4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65134%3A%20n%2Fa&amp;severity=null&amp;id=69de5dec82d89c981fb97437</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65133-na-972d16f1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65133%3A%20n%2Fa&amp;severity=critical&amp;id=69de5dec82d89c981fb97434</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65132-na-f679a329</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65132%3A%20n%2Fa&amp;severity=medium&amp;id=69de5dec82d89c981fb97431</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63939-na-64059743</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63939%3A%20n%2Fa&amp;severity=critical&amp;id=69de5dec82d89c981fb9742e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69993-na-c06fcbbf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69993%3A%20n%2Fa&amp;severity=medium&amp;id=69de56e582d89c981fb19049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69893-na-68897447</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69893%3A%20n%2Fa&amp;severity=medium&amp;id=69de56e582d89c981fb19045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37602-na-75e0d8cd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37602%3A%20n%2Fa&amp;severity=low&amp;id=69de4ff282d89c981fa84c8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37601-na-c6edace0</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37601%3A%20n%2Fa&amp;severity=low&amp;id=69de4ff282d89c981fa84c89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37600-na-9dcd1e03</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37600%3A%20n%2Fa&amp;severity=low&amp;id=69de4ff282d89c981fa84c86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37598-na-a4dc131b</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37598%3A%20n%2Fa&amp;severity=low&amp;id=69de4ff282d89c981fa84c83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37597-na-672bf1be</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37597%3A%20n%2Fa&amp;severity=low&amp;id=69de4ff282d89c981fa84c80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37596-na-9b822437</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37596%3A%20n%2Fa&amp;severity=low&amp;id=69de4fef82d89c981fa84b4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37595-na-e4e245bd</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37595%3A%20n%2Fa&amp;severity=low&amp;id=69de4fef82d89c981fa84b4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37594-na-f4237f0c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37594%3A%20n%2Fa&amp;severity=low&amp;id=69de4fef82d89c981fa84b48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37593-na-b3454f76</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37593%3A%20n%2Fa&amp;severity=low&amp;id=69de4fef82d89c981fa84b45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37592-na-24e4e97b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37592%3A%20n%2Fa&amp;severity=low&amp;id=69de4fef82d89c981fa84b42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37591-na-d31493d4</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37591%3A%20n%2Fa&amp;severity=low&amp;id=69de4fef82d89c981fa84b3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37590-na-442af028</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37590%3A%20n%2Fa&amp;severity=low&amp;id=69de4fef82d89c981fa84b3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37589-na-fc0502ef</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37589%3A%20n%2Fa&amp;severity=low&amp;id=69de4fef82d89c981fa84b39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30480-na-bf48b2a2</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30480%3A%20n%2Fa&amp;severity=medium&amp;id=69de4fef82d89c981fa84b36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61260-na-0294716d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61260%3A%20n%2Fa&amp;severity=critical&amp;id=69de4fef82d89c981fa84b32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31049-na-bfd86452</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31049%3A%20n%2Fa&amp;severity=critical&amp;id=69de455082d89c981f9c8aa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-14-62da04f7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-14&amp;severity=low&amp;id=69dda38b82d89c981fa8a874</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34069-cwe-617-reachable-assertion-in-nimi-b4043ed2</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34069%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20nimiq%20core-rs-albatross&amp;severity=medium&amp;id=69dd877882d89c981f920dc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33948-cwe-170-improper-null-termination-i-a19631d0</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33948%3A%20CWE-170%3A%20Improper%20Null%20Termination%20in%20jqlang%20jq&amp;severity=low&amp;id=69dd83f182d89c981f8ff256</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40164-cwe-328-use-of-weak-hash-in-jqlang--2e4df7f6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40164%3A%20CWE-328%3A%20Use%20of%20Weak%20Hash%20in%20jqlang%20jq&amp;severity=high&amp;id=69dd83f182d89c981f8ff25a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5086-cwe-208-observable-timing-discrepanc-a3e1c12b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5086%3A%20CWE-208%20Observable%20Timing%20Discrepancy%20in%20NERDVANA%20Crypt%3A%3ASecretBuffer&amp;severity=high&amp;id=69dd75df82d89c981f793936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6203-cwe-601-url-redirection-to-untrusted-33a1f48a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6203%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20wpeverest%20User%20Registration%20%26%20Membership%20%E2%80%93%20Free%20%26%20Paid%20Memberships%2C%20Subscriptions%2C%20Content%20Restriction%2C%20User%20Profile%2C%20Custom%20User%20Registration%20%26%20Login%20Builder&amp;severity=medium&amp;id=69dd725c82d89c981f75a06e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39979-cwe-125-out-of-bounds-read-in-jqlan-ef659246</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39979%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20jqlang%20jq&amp;severity=medium&amp;id=69dd725c82d89c981f75a06a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39956-cwe-125-out-of-bounds-read-in-jqlan-b9793416</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39956%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20jqlang%20jq&amp;severity=medium&amp;id=69dd6ed782d89c981f72b22a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4786-cwe-77-in-python-software-foundation-0859811e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4786%3A%20CWE-77%20in%20Python%20Software%20Foundation%20CPython&amp;severity=high&amp;id=69dd67d182d89c981f6a0138</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33947-cwe-674-uncontrolled-recursion-in-j-e92b8dcc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33947%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20jqlang%20jq&amp;severity=medium&amp;id=69dd67d182d89c981f6a0134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22563-cwe-20-improper-input-validation-in-4175b900</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22563%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Ubiquiti%20Inc%20UniFi%20Play%20PowerAmp&amp;severity=critical&amp;id=69dd644b82d89c981f67c511</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22562-cwe-22-path-traversal-in-ubiquiti-i-464fb9b6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22562%3A%20CWE-22%20Path%20Traversal%20in%20Ubiquiti%20Inc%20UniFi%20Play%20PowerAmp&amp;severity=critical&amp;id=69dd644b82d89c981f67c50d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22566-cwe-284-improper-access-control-gen-119ad1e7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22566%3A%20CWE-284%20Improper%20Access%20Control%20-%20Generic%20in%20Ubiquiti%20Inc%20UniFi%20Play%20PowerAmp&amp;severity=high&amp;id=69dd644b82d89c981f67c51a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22565-cwe-20-improper-input-validation-in-bf7c6da9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22565%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Ubiquiti%20Inc%20UniFi%20Play%20PowerAmp&amp;severity=high&amp;id=69dd644b82d89c981f67c517</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22564-cwe-284-improper-access-control-gen-9d486d7c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22564%3A%20CWE-284%20Improper%20Access%20Control%20-%20Generic%20in%20Ubiquiti%20Inc%20UniFi%20Play%20PowerAmp&amp;severity=critical&amp;id=69dd644b82d89c981f67c514</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6224-sandbox-issue-in-nocobase-plugin-wor-972a9f2b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6224%3A%20Sandbox%20Issue%20in%20nocobase%20plugin-workflow-javascript&amp;severity=medium&amp;id=69dd60c882d89c981f657d02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6220-server-side-request-forgery-in-humme-1003d9ad</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6220%3A%20Server-Side%20Request%20Forgery%20in%20HummerRisk&amp;severity=medium&amp;id=69dd60c882d89c981f657cfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6219-command-injection-in-aandrew-me-ytdo-7fe71fa6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6219%3A%20Command%20Injection%20in%20aandrew-me%20ytDownloader&amp;severity=medium&amp;id=69dd59c182d89c981f5d4d8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6218-cross-site-scripting-in-aandrew-me-y-047a4078</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6218%3A%20Cross%20Site%20Scripting%20in%20aandrew-me%20ytDownloader&amp;severity=medium&amp;id=69dd563d82d89c981f59ffe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32272-cwe-89-improper-neutralization-of-s-d6729621</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32272%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20craftcms%20commerce&amp;severity=high&amp;id=69dd563d82d89c981f59ffd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32271-cwe-89-improper-neutralization-of-s-99cfae41</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32271%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20craftcms%20commerce&amp;severity=high&amp;id=69dd563d82d89c981f59ffd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6216-cross-site-scripting-in-dbgate-0a91b1d3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6216%3A%20Cross%20Site%20Scripting%20in%20DbGate&amp;severity=medium&amp;id=69dd563d82d89c981f59ffe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32270-cwe-200-exposure-of-sensitive-infor-420217a6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32270%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20craftcms%20commerce&amp;severity=low&amp;id=69dd4f3582d89c981f535a6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6215-server-side-request-forgery-in-dbgat-f0b18b6d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6215%3A%20Server-Side%20Request%20Forgery%20in%20DbGate&amp;severity=medium&amp;id=69de21bb82d89c981f275285</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6202-sql-injection-in-code-projects-easy--bef2f821</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6202%3A%20SQL%20Injection%20in%20code-projects%20Easy%20Blog%20Site&amp;severity=medium&amp;id=69dd44ab82d89c981f46e105</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6201-improper-access-controls-in-codeastr-5f178a95</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6201%3A%20Improper%20Access%20Controls%20in%20CodeAstro%20Online%20Job%20Portal&amp;severity=medium&amp;id=69dd44ab82d89c981f46e0fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32605-cwe-125-out-of-bounds-read-in-nimiq-f8a5cdff</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32605%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20nimiq%20core-rs-albatross&amp;severity=high&amp;id=69dd44ab82d89c981f46e0f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6200-stack-based-buffer-overflow-in-tenda-8a88ed16</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6200%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69dd3da482d89c981f3fccd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6199-stack-based-buffer-overflow-in-tenda-30cccc87</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6199%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69dd3da482d89c981f3fccca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6198-stack-based-buffer-overflow-in-tenda-4cf4d0af</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6198%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69dd369b82d89c981f375085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40044-deserialization-of-untrusted-data-i-ddf575cc</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40044%3A%20Deserialization%20of%20Untrusted%20Data%20in%20pancho%20Pachno&amp;severity=critical&amp;id=69dd369b82d89c981f37507a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40043-authorization-bypass-through-user-c-cd03f12c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40043%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20pancho%20Pachno&amp;severity=high&amp;id=69dd369b82d89c981f375076</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40042-exposure-of-file-descriptor-to-unin-57db4884</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40042%3A%20Exposure%20of%20File%20Descriptor%20to%20Unintended%20Control%20Sphere%20(&apos;File%20Descriptor%20Leak&apos;)%20in%20pancho%20Pachno&amp;severity=critical&amp;id=69dd369b82d89c981f375072</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40041-cross-site-request-forgery-csrf-in--f30108bc</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40041%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20pancho%20Pachno&amp;severity=medium&amp;id=69dd369b82d89c981f37506e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40040-unrestricted-upload-of-file-with-da-ac271a05</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40040%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20pancho%20Pachno&amp;severity=high&amp;id=69dd369b82d89c981f37506a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40039-authentication-bypass-by-primary-we-45f81d73</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40039%3A%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20pancho%20Pachno&amp;severity=high&amp;id=69dd369b82d89c981f375066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40038-improper-neutralization-of-input-du-7c227709</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40038%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pancho%20Pachno&amp;severity=medium&amp;id=69dd369b82d89c981f375062</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6197-stack-based-buffer-overflow-in-tenda-1b570bd7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6197%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69dd369b82d89c981f37507e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32316-cwe-122-heap-based-buffer-overflow--67a3b592</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32316%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20jqlang%20jq&amp;severity=high&amp;id=69dd2f9182d89c981f2dce11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6196-stack-based-buffer-overflow-in-tenda-d5008aaf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6196%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F456&amp;severity=high&amp;id=69dd2f9182d89c981f2dce15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6195-os-command-injection-in-totolink-a71-657b0a43</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6195%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69dd369e82d89c981f37511d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6100-cwe-416-use-after-free-in-python-sof-0f033ecb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6100%3A%20CWE-416%20Use%20after%20free%20in%20Python%20Software%20Foundation%20CPython&amp;severity=critical&amp;id=69dd2f9182d89c981f2dce1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6194-stack-based-buffer-overflow-in-totol-a26bfb9e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6194%3A%20Stack-based%20Buffer%20Overflow%20in%20Totolink%20A3002MU&amp;severity=high&amp;id=69dd44ab82d89c981f46e10c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28291-cwe-78-improper-neutralization-of-s-96ab636e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28291%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20steveukx%20git-js&amp;severity=high&amp;id=69de21bb82d89c981f27528a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3756-cwe-1284-improper-validation-of-spec-7704dd12</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3756%3A%20CWE-1284%20Improper%20validation%20of%20specified%20quantity%20in%20input%20in%20ABB%20AC800M%20(System%20800xA)&amp;severity=high&amp;id=69dd369e82d89c981f37511a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6193-sql-injection-in-phpgurukul-daily-ex-c7eac9ac</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6193%3A%20SQL%20Injection%20in%20PHPGurukul%20Daily%20Expense%20Tracking%20System&amp;severity=medium&amp;id=69de21bb82d89c981f275299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6192-integer-overflow-in-uclouvain-openjp-ef28e36c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6192%3A%20Integer%20Overflow%20in%20uclouvain%20openjpeg&amp;severity=medium&amp;id=69de21bb82d89c981f275290</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39940-cwe-601-url-redirection-to-untruste-2a35287b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39940%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20ChurchCRM%20CRM&amp;severity=medium&amp;id=69dd1e0282d89c981f1b771a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6191-sql-injection-in-itsourcecode-constr-e5549c5e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6191%3A%20SQL%20Injection%20in%20itsourcecode%20Construction%20Management%20System&amp;severity=medium&amp;id=69dd1e0282d89c981f1b772c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6190-sql-injection-in-itsourcecode-constr-0f179bdd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6190%3A%20SQL%20Injection%20in%20itsourcecode%20Construction%20Management%20System&amp;severity=medium&amp;id=69dd1e0282d89c981f1b7725</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6189-sql-injection-in-sourcecodester-phar-96023dda</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6189%3A%20SQL%20Injection%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69dd1e0282d89c981f1b771e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31991-cwe-307-improper-restriction-of-exc-c5c21653</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31991%3A%20CWE-307%20Improper%20restriction%20of%20excessive%20authentication%20attempts%20in%20HCLSoftware%20Velocity&amp;severity=medium&amp;id=69dd138382d89c981f0e28d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6188-sql-injection-in-sourcecodester-phar-06fa6ee4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6188%3A%20SQL%20Injection%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69dd138382d89c981f0e28e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6231-cwe-20-improper-input-validation-in--97f26bbc</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6231%3A%20CWE-20%20Improper%20input%20validation%20in%20MongoDB%20Inc.%20C%20Driver&amp;severity=medium&amp;id=69dd138382d89c981f0e28ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6187-sql-injection-in-sourcecodester-phar-aea1d8b0</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6187%3A%20SQL%20Injection%20in%20SourceCodester%20Pharmacy%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69dd138382d89c981f0e28df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6186-buffer-overflow-in-utt-hiper-1200gw-043a1972</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6186%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%201200GW&amp;severity=high&amp;id=69dd0c8782d89c981f09c95b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/adobe-reader-0-day-96bf67be</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Adobe%20Reader%200-day&amp;severity=medium&amp;id=69dd08e282d89c981f03878d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/polymarket-trader-funds-at-risk-dprk-npm-package-s-2ee92661</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Polymarket%20Trader%20Funds%20at%20Risk%3A%20DPRK%20npm%20Package%20Steals%20Wallet%20Keys%20and%20Installs%20SSH%20Backdoor&amp;severity=medium&amp;id=69dd171882d89c981f125412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/live-c2-dump-recovering-every-stage-of-the-kill-ch-709bdb72</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Live%20C2%20Dump%20Recovering%20Every%20Stage%20of%20the%20Kill%20Chain%3A%20CHM%20Dropper%2C%20VBScript%20Stager%2C%20PowerShell%20Keylogger&amp;severity=medium&amp;id=69dd171882d89c981f12541a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-recruiter-campaign-targets-crypto-developers--85147d94</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20recruiter%20campaign%20targets%20crypto%20developers%20with%20RAT&amp;severity=medium&amp;id=69dd137d82d89c981f0e1bbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/refundee-inside-a-shadow-panel-phishing-as-a-servi-e71e8c6b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=REFUNDEE%3A%20Inside%20a%20Shadow%20Panel%20Phishing-as-a-Service%20Operation&amp;severity=medium&amp;id=69dd0fea82d89c981f0adb42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tracking-an-ottercookie-infostealer-campaign-acros-5d5ba2f6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tracking%20an%20OtterCookie%20Infostealer%20Campaign%20Across%20npm&amp;severity=medium&amp;id=69dd0c6682d89c981f09ae9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6184-cross-site-scripting-in-code-project-ba5c4786</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6184%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Content%20Management%20System&amp;severity=medium&amp;id=69dd0c8782d89c981f09c954</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1462-cwe-502-deserialization-of-untrusted-6e6c5fa9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1462%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20keras-team%20keras-team%2Fkeras&amp;severity=high&amp;id=69dd057082d89c981f016d7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6183-sql-injection-in-code-projects-simpl-974105a8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6183%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Content%20Management%20System&amp;severity=medium&amp;id=69dd057082d89c981f016da0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-actor-targets-arabian-gulf-region-with-plug-40a84b9a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Actor%20Targets%20Arabian%20Gulf%20Region%20With%20PlugX&amp;severity=medium&amp;id=69dd01da82d89c981ff9dcf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33858-cwe-502-deserialization-of-untruste-c129833d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33858%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=high&amp;id=69dd057082d89c981f016d92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6182-sql-injection-in-code-projects-simpl-82289a0b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6182%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Content%20Management%20System&amp;severity=medium&amp;id=69dd057082d89c981f016d99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-new-android-rat-turning-infected-devices-into-po-1b096751</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20new%20Android%20RAT%20turning%20infected%20devices%20into%20potential%20residential%20proxy%20nodes&amp;severity=medium&amp;id=69dd01db82d89c981ff9dd2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bookingcom-says-hackers-accessed-user-information-fe24f788</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Booking.com%20Says%20Hackers%20Accessed%20User%20Information&amp;severity=medium&amp;id=69dcfe5782d89c981ff7af6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66236-cwe-532-insertion-of-sensitive-info-d9544988</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66236%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=high&amp;id=69dd057082d89c981f016d7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-actors-leverage-claude-code-leak-as-social--8f910002</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Actors%20Leverage%20Claude%20Code%20Leak%20as%20Social%20Engineering%20Lure%20to%20Distribute%20Malicious%20Payloads%20via%20GitHub&amp;severity=medium&amp;id=69dd01db82d89c981ff9dd14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/browsergate-claims-of-linkedin-spying-clash-with-s-385b7592</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BrowserGate%3A%20Claims%20of%20LinkedIn%20%E2%80%98Spying%E2%80%99%20Clash%20With%20Security%20Research%20Findings&amp;severity=medium&amp;id=69dd0a1182d89c981f054399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/13th-april-threat-intelligence-report-88885a79</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=13th%20April%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=69dceccf82d89c981fdf6988</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scans-for-encystphp-webshell-mon-apr-13th-12c43e49</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scans%20for%20EncystPHP%20Webshell%2C%20(Mon%2C%20Apr%2013th)&amp;severity=medium&amp;id=69dcecc482d89c981fdf6328</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34476-cwe-918-server-side-request-forgery-d592247b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34476%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Apache%20Software%20Foundation%20Apache%20SkyWalking%20MCP&amp;severity=high&amp;id=69dcecd082d89c981fdf6a09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openai-impacted-by-north-korea-linked-axios-supply-db914e14</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenAI%20Impacted%20by%20North%20Korea-Linked%20Axios%20Supply%20Chain%20Hack&amp;severity=medium&amp;id=69dce5bb82d89c981fda16e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/international-operation-targets-multimillion-dolla-5525d62a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=International%20Operation%20Targets%20Multimillion-Dollar%20Crypto%20Theft%20Schemes&amp;severity=medium&amp;id=69dcd7ac82d89c981fc769bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-protect-your-privacy-while-using-smart-sex--988c951e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%20protect%20your%20privacy%20while%20using%20smart%20sex%20toys%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69dcd02982d89c981fbb38ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cpuid-hacked-to-serve-trojanized-cpu-z-and-hwmonit-7573c4c3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CPUID%20Hacked%20to%20Serve%20Trojanized%20CPU-Z%20and%20HWMonitor%20Downloads&amp;severity=medium&amp;id=69dccd1f82d89c981fb6579e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-claude-website-distributes-plugx-rat-aa7431ab</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Claude%20Website%20Distributes%20PlugX%20RAT&amp;severity=medium&amp;id=69dcbf0f82d89c981f99f930</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15632-cross-site-scripting-in-1panel-dev--7a3eba1c</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15632%3A%20Cross%20Site%20Scripting%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=69dcbf1a82d89c981f9a03c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35337-cwe-502-deserialization-of-untruste-675b4697</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35337%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Storm%20Client&amp;severity=high&amp;id=69dcbf1a82d89c981f9a03d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35565-cwe-79-improper-neutralization-of-i-3f694165</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35565%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Storm%20UI&amp;severity=medium&amp;id=69dcbf1a82d89c981f9a03e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cpu-z-hwmonitor-cpuidcom-watering-hole-attack-f42e55fc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CPU-Z%20%26%20HWMonitor%2C%20cpuid.com%2C%20Watering%20Hole%20Attack&amp;severity=medium&amp;id=69dcb11e82d89c981f84024d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4810-cwe-306-missing-authentication-for-c-90e44d82</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4810%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20Google%20Cloud%20Agent%20Development%20Kit%20(ADK)&amp;severity=critical&amp;id=69dcb49d82d89c981f86edcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gmail-brings-end-to-end-encryption-to-android-and--0642b6a6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Gmail%20Brings%20End-to-End%20Encryption%20to%20Android%20and%20iOS%20for%20Enterprise%20Users&amp;severity=low&amp;id=69dca9f782d89c981f7d90e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0232-cwe-15-external-control-of-system-or-7ae8859f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0232%3A%20CWE-15%3A%20External%20Control%20of%20System%20or%20Configuration%20Setting%20in%20Palo%20Alto%20Networks%20Cortex%20XDR%20Agent&amp;severity=medium&amp;id=69dc9f6d82d89c981f660387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0233-cwe-295-improper-certificate-validat-3fa76797</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0233%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Palo%20Alto%20Networks%20Autonomous%20Digital%20Experience%20Manager&amp;severity=low&amp;id=69dc9f6d82d89c981f66038a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0234-cwe-347-improper-verification-of-cry-77c20c64</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0234%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Palo%20Alto%20Networks%20Cortex%20XSOAR%20Microsoft%20Teams%20Marketplace&amp;severity=high&amp;id=69dc9f6d82d89c981f66038d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5936-cwe-918-server-side-request-forgery--703e707e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5936%3A%20CWE-918%20Server-Side%20request%20forgery%20(SSRF)%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Services%20API&amp;severity=high&amp;id=69dcd01e82d89c981fbb28e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5085-cwe-340-generation-of-predictable-nu-b0e46b2d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5085%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20MCRAWFOR%20Solstice%3A%3ASession&amp;severity=critical&amp;id=69dcd01e82d89c981fbb28d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40436-cwe269-improper-privilege-managemen-3c704b13</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40436%3A%20CWE%E2%80%91269%20Improper%20Privilege%20Management%20in%20ZTE%20ZXEDM%20iEMS&amp;severity=high&amp;id=69dcd01e82d89c981fbb28d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6168-stack-based-buffer-overflow-in-totol-926c3f9e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6168%3A%20Stack-based%20Buffer%20Overflow%20in%20TOTOLINK%20A7000R&amp;severity=high&amp;id=69dcd01f82d89c981fbb2903</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6167-sql-injection-in-code-projects-facul-930b857e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6167%3A%20SQL%20Injection%20in%20code-projects%20Faculty%20Management%20System&amp;severity=medium&amp;id=69dcd01e82d89c981fbb28f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34866-cwe-120-buffer-copy-without-checkin-299fb76a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34866%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69dcd01e82d89c981fbb28c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34865-cwe-122-heap-based-buffer-overflow--f39e88a4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34865%3A%20CWE-122%20Heap-based%20buffer%20overflow%20in%20Huawei%20HarmonyOS&amp;severity=critical&amp;id=69dcd01e82d89c981fbb28bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6166-sql-injection-in-code-projects-vehic-a755d753</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6166%3A%20SQL%20Injection%20in%20code-projects%20Vehicle%20Showroom%20Management%20System&amp;severity=medium&amp;id=69dcd01e82d89c981fbb28e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3830-cwe-89-sql-injection-in-product-filt-8d62abb0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3830%3A%20CWE-89%20SQL%20Injection%20in%20Product%20Filter%20for%20WooCommerce%20by%20WBW&amp;severity=high&amp;id=69dcd01e82d89c981fbb28cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15441-cwe-89-sql-injection-in-form-maker--b9ba0370</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15441%3A%20CWE-89%20SQL%20Injection%20in%20Form%20Maker%20by%2010Web&amp;severity=medium&amp;id=69dcd01e82d89c981fbb28b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6165-sql-injection-in-code-projects-vehic-c4e85e3c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6165%3A%20SQL%20Injection%20in%20code-projects%20Vehicle%20Showroom%20Management%20System&amp;severity=medium&amp;id=69dc86f082d89c981f39d666</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6164-sql-injection-in-code-projects-lost--96df4a92</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6164%3A%20SQL%20Injection%20in%20code-projects%20Lost%20and%20Found%20Thing%20Management&amp;severity=medium&amp;id=69dc86f082d89c981f39d65f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6163-sql-injection-in-code-projects-lost--716fd1d1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6163%3A%20SQL%20Injection%20in%20code-projects%20Lost%20and%20Found%20Thing%20Management&amp;severity=medium&amp;id=69dc86f082d89c981f39d657</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21010-cwe-20-improper-input-validation-in-46318ce4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21010%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69dc86eb82d89c981f39d4c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21008-cwe-200-exposure-of-sensitive-infor-f4dc6453</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21008%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69dc86eb82d89c981f39d4c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40447-cwe-190-integer-overflow-or-wraparo-b9281796</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40447%3A%20CWE-190%20Integer%20overflow%20or%20wraparound%20in%20Samsung%20Open%20Source%20Escargot&amp;severity=medium&amp;id=69dc86eb82d89c981f39d4d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21014-cwe-284-improper-access-control-in--1fe32321</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21014%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Camera&amp;severity=medium&amp;id=69dc86eb82d89c981f39d4d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21013-cwe-276-incorrect-default-permissio-2eb54624</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21013%3A%20CWE-276%3A%20Incorrect%20Default%20Permission%20in%20Samsung%20Mobile%20Galaxy%20Wearable&amp;severity=medium&amp;id=69dc86eb82d89c981f39d4d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21012-cwe-73-external-control-of-file-nam-0e39053f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21012%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69dc86eb82d89c981f39d4ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21011-cwe-266-incorrect-privilege-assignm-7ca30c25</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21011%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69dc86eb82d89c981f39d4cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21009-cwe-754-improper-check-for-unusual--5cdeb51a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21009%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69dc86eb82d89c981f39d4c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21007-cwe-754-improper-check-for-unusual--3067d701</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21007%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69dc86eb82d89c981f39d4bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21006-cwe-284-improper-access-control-in--f34ac3c1</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21006%3A%20CWE-284%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69dc86eb82d89c981f39d4a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6162-cross-site-scripting-in-phpgurukul-c-943de151</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6162%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Company%20Visitor%20Management%20System&amp;severity=medium&amp;id=69dc7c4a82d89c981f24c393</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21003-cwe-20-improper-input-validation-in-428207a8</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21003%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69dc7c4582d89c981f24c1bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40446-cwe-843-access-of-resource-using-in-c8f86d8b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40446%3A%20CWE-843%20Access%20of%20resource%20using%20incompatible%20type%20(&apos;type%20confusion&apos;)%20in%20Samsung%20Open%20Source%20Escargot&amp;severity=medium&amp;id=69dc7c4782d89c981f24c288</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25209-cwe-125-out-of-bounds-read-in-samsu-a8f7687c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25209%3A%20CWE-125%20Out-of-bounds%20read%20in%20Samsung%20Open%20Source%20Escargot&amp;severity=medium&amp;id=69dc7c4582d89c981f24c1ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25208-cwe-190-integer-overflow-or-wraparo-e8a94f50</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25208%3A%20CWE-190%20Integer%20overflow%20or%20wraparound%20in%20Samsung%20Open%20Source%20Escargot&amp;severity=high&amp;id=69dc7c4582d89c981f24c1c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25207-cwe-787-out-of-bounds-write-in-sams-4980e58e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25207%3A%20CWE-787%20Out-of-bounds%20write%20in%20Samsung%20Open%20Source%20Escargot&amp;severity=high&amp;id=69dc7c4582d89c981f24c1c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6161-sql-injection-in-code-projects-simpl-2248136e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6161%3A%20SQL%20Injection%20in%20code-projects%20Simple%20ChatBox&amp;severity=medium&amp;id=69dc7c4a82d89c981f24c38c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25206-cwe-125-out-of-bounds-read-in-samsu-d749862b</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25206%3A%20CWE-125%20Out-of-bounds%20read%20in%20Samsung%20Open%20Source%20Escargot&amp;severity=medium&amp;id=69dc7c4582d89c981f24c1c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25205-cwe-122-heap-based-buffer-overflow--4584a89e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25205%3A%20CWE-122%20Heap-based%20buffer%20overflow%20in%20Samsung%20Open%20Source%20Escargot&amp;severity=high&amp;id=69dc7c4582d89c981f24c1be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6160-file-and-directory-information-expos-fa73f35f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6160%3A%20File%20and%20Directory%20Information%20Exposure%20in%20code-projects%20Simple%20ChatBox&amp;severity=medium&amp;id=69dc7c4a82d89c981f24c385</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6159-cross-site-scripting-in-code-project-c7655aab</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6159%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20ChatBox&amp;severity=medium&amp;id=69dc7c4782d89c981f24c292</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34864-cwe-119-improper-restriction-of-ope-7e86aa19</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34864%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69dc7c4782d89c981f24c27f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34863-cwe-787-out-of-bounds-write-in-huaw-e3f550ca</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34863%3A%20CWE-787%20Out-of-bounds%20write%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69dc7c4782d89c981f24c27c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34862-cwe-362-concurrent-execution-using--0efce1e5</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34862%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69dc7c4782d89c981f24c278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34861-cwe-362-concurrent-execution-using--2cbedd77</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34861%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69dc7c4782d89c981f24c274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34859-cwe-416-use-after-free-in-huawei-ha-5f3182f4</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34859%3A%20CWE-416%20Use%20after%20free%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69dc7c4782d89c981f24c270</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34858-cwe-362-concurrent-execution-using--7cfd5c85</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34858%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69dc7c4782d89c981f24c26b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34857-cwe-362-concurrent-execution-using--717a190f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34857%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69dc7c4582d89c981f24c1d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35553-stack-based-buffer-overflow-in-dyna-e28ddf92</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35553%3A%20Stack-based%20buffer%20overflow%20in%20Dynabook%20Inc.%20TOSRFEC.SYS&amp;severity=medium&amp;id=69dc7c4782d89c981f24c283</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34855-cwe-20-improper-input-validation-in-fab36aeb</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34855%3A%20CWE-20%20Improper%20input%20validation%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69dc7c4582d89c981f24c1d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34854-cwe-416-use-after-free-in-huawei-ha-a4c7ceb2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34854%3A%20CWE-416%20Use%20after%20free%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69dc7c4582d89c981f24c1d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6158-os-command-injection-in-totolink-n30-6e3cef0c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6158%3A%20OS%20Command%20Injection%20in%20Totolink%20N300RH&amp;severity=medium&amp;id=69dc7c4782d89c981f24c28b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34849-cwe-362-concurrent-execution-using--0ae21aaa</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34849%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=low&amp;id=69dc7c4582d89c981f24c1cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34856-cwe-362-concurrent-execution-using--b615401f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34856%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=69dc6aaf82d89c981fecb079</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34853-cwe-270-privilege-context-switching-47f2dae2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34853%3A%20CWE-270%20Privilege%20context%20switching%20error%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=69dc6aaf82d89c981fecb075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28553-cwe-275-permission-issues-in-huawei-ad31a06e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28553%3A%20CWE-275%20Permission%20Issues%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69dc6aaf82d89c981fecb065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34867-cwe-415-double-free-in-huawei-harmo-34799778</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34867%3A%20CWE-415%20Double%20free%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69dc6aaf82d89c981fecb081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34860-cwe-284-improper-access-control-in--0d2249cf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34860%3A%20CWE-284%20Improper%20Access%20Control%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69dc6aaf82d89c981fecb07d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34852-cwe-835-loop-with-unreachable-exit--538938f4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34852%3A%20CWE-835%20Loop%20with%20unreachable%20exit%20condition%20(&apos;infinite%20loop&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69dc6aaf82d89c981fecb070</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6157-buffer-overflow-in-totolink-a800r-47a7fe50</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6157%3A%20Buffer%20Overflow%20in%20Totolink%20A800R&amp;severity=high&amp;id=69dc6ab182d89c981fecb370</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34851-cwe-362-concurrent-execution-using--40f83c52</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34851%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=low&amp;id=69dc6aaf82d89c981fecb06c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34850-cwe-362-concurrent-execution-using--4b5d699d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34850%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=low&amp;id=69dc6aaf82d89c981fecb068</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6156-os-command-injection-in-totolink-a71-061dc469</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6156%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69dc6ab182d89c981fecb369</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6155-os-command-injection-in-totolink-a71-7391e9c3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6155%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69dc6ab182d89c981fecb362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6154-os-command-injection-in-totolink-a71-87e9e42c</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6154%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69dc6aaf82d89c981fecb08c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6153-sql-injection-in-code-projects-vehic-31081b24</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6153%3A%20SQL%20Injection%20in%20code-projects%20Vehicle%20Showroom%20Management%20System&amp;severity=medium&amp;id=69dc6aaf82d89c981fecb085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6152-sql-injection-in-code-projects-vehic-235da6a5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6152%3A%20SQL%20Injection%20in%20code-projects%20Vehicle%20Showroom%20Management%20System&amp;severity=medium&amp;id=69dc591b82d89c981fc8a5ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6179-cwe-79-improper-neutralization-of-in-f9fe77cc</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6179%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20FPT%20Software%20NightWolf%20Penetration%20Testing%20Platform&amp;severity=medium&amp;id=69dc591b82d89c981fc8a5d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6151-sql-injection-in-code-projects-vehic-256441ac</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6151%3A%20SQL%20Injection%20in%20code-projects%20Vehicle%20Showroom%20Management%20System&amp;severity=medium&amp;id=69dc591b82d89c981fc8a5c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6150-cross-site-scripting-in-code-project-deba8bdf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6150%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69dc591b82d89c981fc8a5bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-monday-april-13th-2026-httpsiscs-13a5275d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Monday%2C%20April%2013th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9888%2C%20(Mon%2C%20Apr%2013th)&amp;severity=medium&amp;id=69dc4e8f82d89c981fb3cbb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6149-sql-injection-in-code-projects-vehic-9d23061b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6149%3A%20SQL%20Injection%20in%20code-projects%20Vehicle%20Showroom%20Management%20System&amp;severity=medium&amp;id=69dc4b0b82d89c981fa7dfd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6148-sql-injection-in-code-projects-vehic-bd615293</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6148%3A%20SQL%20Injection%20in%20code-projects%20Vehicle%20Showroom%20Management%20System&amp;severity=medium&amp;id=69dc4b0b82d89c981fa7dfd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6143-permissive-cross-domain-policy-with--b3323dd8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6143%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20farion1231%20cc-switch&amp;severity=medium&amp;id=69dc4b0b82d89c981fa7dfc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6142-sql-injection-in-tushar-2223-hotel-m-4439ac4c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6142%3A%20SQL%20Injection%20in%20tushar-2223%20Hotel%20Management%20System&amp;severity=medium&amp;id=69dc440382d89c981fa0ac0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25204-cwe-502-deserialization-of-untruste-10355b57</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25204%3A%20CWE-502%20Deserialization%20of%20untrusted%20data%20in%20Samsung%20Open%20Source%20Escargot&amp;severity=medium&amp;id=69dc440382d89c981fa0abf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6141-os-command-injection-in-danielmiessl-45304d9b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6141%3A%20OS%20Command%20Injection%20in%20danielmiessler%20Personal_AI_Infrastructure&amp;severity=medium&amp;id=69dc440382d89c981fa0ac05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6140-os-command-injection-in-totolink-a71-8e1c7584</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6140%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69dc440382d89c981fa0abfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6139-os-command-injection-in-totolink-a71-92890d24</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6139%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69dc440382d89c981fa0abf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6138-os-command-injection-in-totolink-a71-a4d695c6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6138%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69dc35f382d89c981f798832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-14-aae7f576</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-14&amp;severity=medium&amp;id=69de33af82d89c981f2f83c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-13-425403c0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-13&amp;severity=medium&amp;id=69dd876a82d89c981f91c0fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26460-na-18771092</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26460%3A%20n%2Fa&amp;severity=medium&amp;id=69dd59c182d89c981f5d4d8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70936-na-3e41b6df</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70936%3A%20n%2Fa&amp;severity=medium&amp;id=69dd59c182d89c981f5d4d87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31280-na-efadddcc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31280%3A%20n%2Fa&amp;severity=medium&amp;id=69dd563d82d89c981f59ffce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51414-na-91604ecd</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51414%3A%20n%2Fa&amp;severity=high&amp;id=69dd563d82d89c981f59ffca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31048-na-cb39c07b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31048%3A%20n%2Fa&amp;severity=critical&amp;id=69dd44ab82d89c981f46e0f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29955-na-ff239336</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29955%3A%20n%2Fa&amp;severity=high&amp;id=69dd369b82d89c981f37505e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36952-na-b681ec7b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36952%3A%20n%2Fa&amp;severity=low&amp;id=69dd1e0282d89c981f1b7717</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36950-na-ccb4d705</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36950%3A%20n%2Fa&amp;severity=low&amp;id=69dd1e0282d89c981f1b7714</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36948-na-73e247d5</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36948%3A%20n%2Fa&amp;severity=high&amp;id=69dd1e0282d89c981f1b7710</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36938-na-6e422029</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36938%3A%20n%2Fa&amp;severity=low&amp;id=69dd138382d89c981f0e28dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36937-na-01c3f985</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36937%3A%20n%2Fa&amp;severity=low&amp;id=69dd138382d89c981f0e28d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63743-na-26e8c8c0</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63743%3A%20n%2Fa&amp;severity=medium&amp;id=69dd138382d89c981f0e28d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69627-na-7e25f884</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69627%3A%20n%2Fa&amp;severity=high&amp;id=69dd0c8782d89c981f09c950</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69624-na-547e4d69</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69624%3A%20n%2Fa&amp;severity=high&amp;id=69dd0c8782d89c981f09c94d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66769-na-b9a9fdef</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66769%3A%20n%2Fa&amp;severity=high&amp;id=69dd0c8782d89c981f09c949</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36941-na-44ede602</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36941%3A%20n%2Fa&amp;severity=low&amp;id=69dd057082d89c981f016d96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30999-na-8fbedab9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30999%3A%20n%2Fa&amp;severity=high&amp;id=69dd057082d89c981f016d8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30998-na-8cbe983f</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30998%3A%20n%2Fa&amp;severity=high&amp;id=69dd057082d89c981f016d87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30997-na-b89c6367</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30997%3A%20n%2Fa&amp;severity=high&amp;id=69dd057082d89c981f016d83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36945-na-17861145</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36945%3A%20n%2Fa&amp;severity=low&amp;id=69dcfe7a82d89c981ff7d611</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36944-na-f9de8d02</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36944%3A%20n%2Fa&amp;severity=low&amp;id=69dcfe7a82d89c981ff7d60e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36943-na-41506e89</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36943%3A%20n%2Fa&amp;severity=low&amp;id=69dcfe7a82d89c981ff7d60b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36942-na-b4d79b66</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36942%3A%20n%2Fa&amp;severity=low&amp;id=69dcfe7a82d89c981ff7d608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31283-na-a7ddfa0d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31283%3A%20n%2Fa&amp;severity=critical&amp;id=69dcfe7a82d89c981ff7d604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31282-na-88dbd640</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31282%3A%20n%2Fa&amp;severity=critical&amp;id=69dcfe7a82d89c981ff7d600</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31281-na-2b1c5812</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31281%3A%20n%2Fa&amp;severity=high&amp;id=69dcfe7a82d89c981ff7d5fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29628-na-e13f5148</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29628%3A%20n%2Fa&amp;severity=medium&amp;id=69dcfe7a82d89c981ff7d5f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36947-na-8bda4b83</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36947%3A%20n%2Fa&amp;severity=low&amp;id=69dcf3cf82d89c981fee9b1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36946-na-1cc0a2fa</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36946%3A%20n%2Fa&amp;severity=low&amp;id=69dcf3cf82d89c981fee9b1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36923-na-84469258</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36923%3A%20n%2Fa&amp;severity=low&amp;id=69dcecd082d89c981fdf6a12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36922-na-ecbf239b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36922%3A%20n%2Fa&amp;severity=low&amp;id=69dcecd082d89c981fdf6a0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36920-na-3b139a32</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36920%3A%20n%2Fa&amp;severity=low&amp;id=69dcecd082d89c981fdf6a0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36919-na-2c9e4158</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36919%3A%20n%2Fa&amp;severity=low&amp;id=69dce5c582d89c981fda2b0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36874-na-12d6a30b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36874%3A%20n%2Fa&amp;severity=low&amp;id=69dce5c582d89c981fda2b07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36873-na-5c465477</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36873%3A%20n%2Fa&amp;severity=low&amp;id=69dce5c582d89c981fda2b04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36872-na-b4ff357e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36872%3A%20n%2Fa&amp;severity=low&amp;id=69dce5c582d89c981fda2b01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-13-91de2cd6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-13&amp;severity=low&amp;id=69dc86e282d89c981f39b609</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6137-stack-based-buffer-overflow-in-tenda-189c6cd1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6137%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69dc327182d89c981f768b49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6136-stack-based-buffer-overflow-in-tenda-fb08e76b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6136%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69dc2f0082d89c981f6be0d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6135-stack-based-buffer-overflow-in-tenda-3254f476</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6135%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69dc2b6782d89c981f6938cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6134-stack-based-buffer-overflow-in-tenda-c1d0d543</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6134%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69dc27e482d89c981f652da4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6133-stack-based-buffer-overflow-in-tenda-3b6543ea</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6133%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69dc245f82d89c981f62f978</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6132-os-command-injection-in-totolink-a71-401747c5</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6132%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69dc20db82d89c981f45ab3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6131-os-command-injection-in-totolink-a71-ce3a9dd9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6131%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69dc1d5782d89c981f304cb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6130-os-command-injection-in-chatboxai-ch-705fc80d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6130%3A%20OS%20Command%20Injection%20in%20chatboxai%20chatbox&amp;severity=medium&amp;id=69dc19d482d89c981f05d631</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6129-missing-authentication-in-zhayujie-c-9a9de156</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6129%3A%20Missing%20Authentication%20in%20zhayujie%20chatgpt-on-wechat%20CowAgent&amp;severity=medium&amp;id=69dbfa3282d89c981fc610c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40396-cwe-670-always-incorrect-control-fl-7bfc9c43</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40396%3A%20CWE-670%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20varnish-software%20Varnish%20Cache&amp;severity=medium&amp;id=69dbf32682d89c981fb00945</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40395-cwe-770-allocation-of-resources-wit-311788da</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40395%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20varnish-software%20Varnish%20Enterprise&amp;severity=medium&amp;id=69dbf32682d89c981fb00942</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40394-cwe-670-always-incorrect-control-fl-e713a1d7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40394%3A%20CWE-670%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20varnish-software%20Varnish%20Cache&amp;severity=medium&amp;id=69dbf32682d89c981fb0093f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40393-cwe-787-out-of-bounds-write-in-mesa-fa5bea91</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40393%3A%20CWE-787%20Out-of-bounds%20Write%20in%20mesa3d%20Mesa&amp;severity=high&amp;id=69dbefa382d89c981fa9bf0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40386-cwe-191-integer-underflow-wrap-or-w-d3d5978b</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40386%3A%20CWE-191%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20libexif%20project%20libexif&amp;severity=medium&amp;id=69dbe51682d89c981fa14164</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40385-cwe-190-integer-overflow-or-wraparo-223f5288</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40385%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20libexif%20project%20libexif&amp;severity=medium&amp;id=69dbe51682d89c981fa14161</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6126-missing-authentication-in-zhayujie-c-501c13d2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6126%3A%20Missing%20Authentication%20in%20zhayujie%20chatgpt-on-wechat%20CowAgent&amp;severity=medium&amp;id=69db781b82d89c981f3d4477</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6125-code-injection-in-dromara-warm-flow-8c53d100</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6125%3A%20Code%20Injection%20in%20Dromara%20warm-flow&amp;severity=medium&amp;id=69db6d8f82d89c981f360dac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6124-stack-based-buffer-overflow-in-tenda-4ff35eb5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6124%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69db630382d89c981f2e65bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6123-stack-based-buffer-overflow-in-tenda-96a0216c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6123%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69db7e7c82d89c981f416476</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/adobe-patches-reader-zero-day-exploited-for-months-cd76f82f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Adobe%20Patches%20Reader%20Zero-Day%20Exploited%20for%20Months&amp;severity=medium&amp;id=69db4deb82d89c981f1a302e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6122-stack-based-buffer-overflow-in-tenda-40cd8adb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6122%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69db517682d89c981f1ce65f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6121-stack-based-buffer-overflow-in-tenda-e3f9272e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6121%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69db4a6682d89c981f186e50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6120-stack-based-buffer-overflow-in-tenda-54bc050c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6120%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69db38d382d89c981f09b1a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6119-server-side-request-forgery-in-astrb-c678b667</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6119%3A%20Server-Side%20Request%20Forgery%20in%20AstrBotDevs%20AstrBot&amp;severity=medium&amp;id=69db31ca82d89c981f05ff23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6118-command-injection-in-astrbotdevs-ast-ac56d615</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6118%3A%20Command%20Injection%20in%20AstrBotDevs%20AstrBot&amp;severity=medium&amp;id=69db273e82d89c981fe5dd89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6117-sandbox-issue-in-astrbotdevs-astrbot-00abdc7e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6117%3A%20Sandbox%20Issue%20in%20AstrBotDevs%20AstrBot&amp;severity=medium&amp;id=69db273e82d89c981fe5dd82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6116-os-command-injection-in-totolink-a71-15ee14e2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6116%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69db273e82d89c981fe5dd7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6115-os-command-injection-in-totolink-a71-2eb78416</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6115%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69db273e82d89c981fe5dd74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6114-os-command-injection-in-totolink-a71-384165a1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6114%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69db193e82d89c981fd60368</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6113-os-command-injection-in-totolink-a71-16ad03cb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6113%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69db193e82d89c981fd60361</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6112-os-command-injection-in-totolink-a71-83c5f182</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6112%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69db193e82d89c981fd6035a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6111-server-side-request-forgery-in-found-2c681ea1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6111%3A%20Server-Side%20Request%20Forgery%20in%20FoundationAgents%20MetaGPT&amp;severity=medium&amp;id=69db079a82d89c981fa08bee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1116-cwe-79-improper-neutralization-of-in-c711f067</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1116%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20parisneo%20parisneo%2Flollms&amp;severity=high&amp;id=69db079a82d89c981fa08be2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6110-code-injection-in-foundationagents-m-f4c02c00</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6110%3A%20Code%20Injection%20in%20FoundationAgents%20MetaGPT&amp;severity=medium&amp;id=69db079a82d89c981fa08be6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6109-cross-site-request-forgery-in-founda-03848c85</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6109%3A%20Cross-Site%20Request%20Forgery%20in%20FoundationAgents%20MetaGPT&amp;severity=medium&amp;id=69daf99182d89c981f7b7ff4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6108-os-command-injection-in-1panel-dev-m-0d8b3931</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6108%3A%20OS%20Command%20Injection%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=69db7e7c82d89c981f416488</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6107-cross-site-scripting-in-1panel-dev-m-f1e01e0b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6107%3A%20Cross%20Site%20Scripting%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=69db7e7c82d89c981f41647e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-13-b0fcb029</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-13&amp;severity=medium&amp;id=69dd136882d89c981f0d7575</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-12-7b4cc969</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-12&amp;severity=medium&amp;id=69dc35ea82d89c981f7953ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-12-bd47b229</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-12&amp;severity=low&amp;id=69db667e82d89c981f307658</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6106-cross-site-scripting-in-1panel-dev-m-cd592a06</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6106%3A%20Cross%20Site%20Scripting%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=69dacbd682d89c981f306a5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6105-improper-authorization-in-perfree-go-21e2d196</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6105%3A%20Improper%20Authorization%20in%20perfree%20go-fastdfs-web&amp;severity=medium&amp;id=69dac85b82d89c981f2de9ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31845-cwe-79-improper-neutralization-of-i-5f1f2c55</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31845%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(Cross-site%20Scripting)%20in%20Rukovoditel%20Rukovoditel%20CRM&amp;severity=critical&amp;id=69da972082d89c981f082366</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23900-cwe-79-improper-neutralization-of-i-e50d7564</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23900%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20phoca.cz%20phoca.cz%20-%20Phoca%20Maps%20for%20Joomla&amp;severity=medium&amp;id=69da4d4882d89c981fd2d7c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5809-cwe-73-external-control-of-file-name-7d1ff4ec</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5809%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20tomdever%20wpForo%20Forum&amp;severity=high&amp;id=69da00db1cc7ad14da61c7fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34621-improperly-controlled-modification--1b9951d5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34621%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20(CWE-1321)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=69da15f41cc7ad14da6d013e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3371-cwe-639-authorization-bypass-through-6e97df2c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3371%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=medium&amp;id=69d9a5741cc7ad14da144113</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4979-cwe-918-server-side-request-forgery--5030e4e2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4979%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20stiofansisland%20UsersWP%20%E2%80%93%20Front-end%20login%20form%2C%20User%20Registration%2C%20User%20Profile%20%26%20Members%20Directory%20plugin%20for%20WP&amp;severity=medium&amp;id=69d9a5741cc7ad14da144129</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5144-cwe-269-improper-privilege-managemen-f1535bf6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5144%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20boonebgorges%20BuddyPress%20Groupblog&amp;severity=high&amp;id=69d9a5741cc7ad14da144131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3498-cwe-79-improper-neutralization-of-in-2f47cf95</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3498%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpblockart%20BlockArt%20Blocks%20%E2%80%93%20Gutenberg%20Blocks%2C%20Page%20Builder%20Blocks%20%2CWordPress%20Block%20Plugin%2C%20Sections%20%26%20Template%20Library&amp;severity=medium&amp;id=69d9a5741cc7ad14da14411a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4895-cwe-79-improper-neutralization-of-in-4c0d635b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4895%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpsoul%20Greenshift%20%E2%80%93%20animation%20and%20page%20builder%20blocks&amp;severity=medium&amp;id=69d9a5741cc7ad14da144120</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5217-cwe-79-improper-neutralization-of-in-49825cdd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5217%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20optimole%20Optimole%20%E2%80%93%20Optimize%20Images%20in%20Real%20Time&amp;severity=high&amp;id=69d9a5741cc7ad14da144142</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5207-cwe-89-improper-neutralization-of-sp-9d26e41a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5207%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20chrisbadgett%20LifterLMS%20%E2%80%93%20WP%20LMS%20for%20eLearning%2C%20Online%20Courses%2C%20%26%20Quizzes&amp;severity=medium&amp;id=69d9a5741cc7ad14da14413b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5226-cwe-79-improper-neutralization-of-in-a73b4818</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5226%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20optimole%20Optimole%20%E2%80%93%20Optimize%20Images%20in%20Real%20Time&amp;severity=medium&amp;id=69d9a5741cc7ad14da14414b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3358-cwe-862-missing-authorization-in-the-541a13ec</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3358%3A%20CWE-862%20Missing%20Authorization%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=medium&amp;id=69d9a5741cc7ad14da14410a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40354-cwe-61-unix-symbolic-link-symlink-f-067082f4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40354%3A%20CWE-61%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20Flatpak%20xdg-desktop-portal&amp;severity=low&amp;id=69d99e6e1cc7ad14da1225aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4157-cwe-78-improper-neutralization-of-sp-e916d229</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4157%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ChargePoint%20Home%20Flex&amp;severity=high&amp;id=69d99e6e1cc7ad14da1225b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4156-cwe-121-stack-based-buffer-overflow--4cc3f2ce</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4156%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20ChargePoint%20Home%20Flex&amp;severity=high&amp;id=69d99e6e1cc7ad14da1225b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4155-cwe-540-inclusion-of-sensitive-infor-6f8550d5</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4155%3A%20CWE-540%3A%20Inclusion%20of%20Sensitive%20Information%20in%20Source%20Code%20in%20ChargePoint%20Home%20Flex&amp;severity=high&amp;id=69d99e6e1cc7ad14da1225b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5495-cwe-787-out-of-bounds-write-in-labce-29682a54</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5495%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Labcenter%20Electronics%20Proteus&amp;severity=high&amp;id=69d99e6e1cc7ad14da1225c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5494-cwe-787-out-of-bounds-write-in-labce-1c6b705a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5494%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Labcenter%20Electronics%20Proteus&amp;severity=high&amp;id=69d99e6e1cc7ad14da1225bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5493-cwe-787-out-of-bounds-write-in-labce-65326a90</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5493%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Labcenter%20Electronics%20Proteus&amp;severity=high&amp;id=69d99e6e1cc7ad14da1225bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5496-cwe-843-access-of-resource-using-inc-83683539</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5496%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Labcenter%20Electronics%20Proteus&amp;severity=high&amp;id=69d99e6e1cc7ad14da1225c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4149-cwe-119-improper-restriction-of-oper-dcf90312</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4149%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Sonos%20Era%20300&amp;severity=critical&amp;id=69d99e6e1cc7ad14da1225b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-12-83aa8314</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-12&amp;severity=medium&amp;id=69dbf6a382d89c981fb12448</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-11-b2ee18dd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-11&amp;severity=medium&amp;id=69dae46a82d89c981f441f7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-11-870bf8db</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-11&amp;severity=low&amp;id=69d9ba841cc7ad14da1f0f17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40199-cwe-130-improper-handling-of-length-73de8518</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40199%3A%20CWE-130%20Improper%20Handling%20of%20Length%20Parameter%20Inconsistency%20in%20STIGTSP%20Net%3A%3ACIDR%3A%3ALite&amp;severity=medium&amp;id=69d9743b1cc7ad14daee2672</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40198-cwe-1286-improper-validation-of-syn-dbf39b2e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40198%3A%20CWE-1286%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20STIGTSP%20Net%3A%3ACIDR%3A%3ALite&amp;severity=high&amp;id=69d9743b1cc7ad14daee266d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33118-spoofing-in-microsoft-microsoft-edg-828099eb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33118%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=69d96d341cc7ad14daec12be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33119-cwe-451-user-interface-ui-misrepres-3c84bf78</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33119%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Microsoft%20Microsoft%20Edge%20for%20Android&amp;severity=medium&amp;id=69d96d341cc7ad14daec12c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5724-cwe-306-missing-authentication-for-c-2cb7d2d5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5724%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20Temporal%20Technologies%2C%20Inc.%20temporal&amp;severity=medium&amp;id=69d969b01cc7ad14daeabe2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40252-cwe-284-improper-access-control-in--2ccbdf06</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40252%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20labring%20FastGPT&amp;severity=medium&amp;id=69d9662c1cc7ad14dae9687b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40242-cwe-918-server-side-request-forgery-5eaaa2b0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40242%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20getarcaneapp%20arcane&amp;severity=high&amp;id=69d962a81cc7ad14dae87051</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40191-cwe-863-incorrect-authorization-in--1c3e33a9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40191%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20craigjbass%20clearancekit&amp;severity=medium&amp;id=69d95f431cc7ad14dae72c3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40190-cwe-1321-improperly-controlled-modi-f84ee3e4</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40190%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20langchain-ai%20langsmith-sdk&amp;severity=medium&amp;id=69d9581c1cc7ad14dae48c85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40189-cwe-862-missing-authorization-in-pa-3a1ae9b4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40189%3A%20CWE-862%3A%20Missing%20Authorization%20in%20patrickhener%20goshs&amp;severity=critical&amp;id=69d9581c1cc7ad14dae48c80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40188-cwe-1314-missing-write-protection-f-3b40b321</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40188%3A%20CWE-1314%3A%20Missing%20Write%20Protection%20for%20Parametric%20Data%20Values%20in%20patrickhener%20goshs&amp;severity=high&amp;id=69d9581c1cc7ad14dae48c7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40185-cwe-862-missing-authorization-in-ma-0fd98725</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40185%3A%20CWE-862%3A%20Missing%20Authorization%20in%20mauriceboe%20TREK&amp;severity=high&amp;id=69d9581c1cc7ad14dae48c76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40184-cwe-306-missing-authentication-for--4af6e206</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40184%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20mauriceboe%20TREK&amp;severity=low&amp;id=69d9581c1cc7ad14dae48c71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40180-cwe-22-improper-limitation-of-a-pat-9f8db994</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40180%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20quarkiverse%20quarkus-openapi-generator&amp;severity=high&amp;id=69d9581c1cc7ad14dae48c6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40168-cwe-918-server-side-request-forgery-e96b88f9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40168%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20gitroomhq%20postiz-app&amp;severity=high&amp;id=69d9d9721cc7ad14da3f862a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27460-cwe-409-improper-handling-of-highly-1160e850</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27460%3A%20CWE-409%3A%20Improper%20Handling%20of%20Highly%20Compressed%20Data%20(Data%20Amplification)%20in%20TandoorRecipes%20recipes&amp;severity=medium&amp;id=69d94d8f1cc7ad14dae0fae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33737-cwe-611-improper-restriction-of-xml-c825261b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33737%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69d94d8f1cc7ad14dae0faf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33736-cwe-639-authorization-bypass-throug-7ed8eb06</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33736%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69d94d8f1cc7ad14dae0faf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33710-cwe-330-use-of-insufficiently-rando-14b6a24b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33710%3A%20CWE-330%3A%20Use%20of%20Insufficiently%20Random%20Values%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69d94d8f1cc7ad14dae0faf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33708-cwe-862-missing-authorization-in-ch-c3c25773</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33708%3A%20CWE-862%3A%20Missing%20Authorization%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69d94d8f1cc7ad14dae0faec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33707-cwe-640-weak-password-recovery-mech-2af5871d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33707%3A%20CWE-640%3A%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20chamilo%20chamilo-lms&amp;severity=critical&amp;id=69d94d8f1cc7ad14dae0fae7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33706-cwe-269-improper-privilege-manageme-125a7abd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33706%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69d94d8f1cc7ad14dae0fae3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33705-cwe-538-insertion-of-sensitive-info-00b761cb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33705%3A%20CWE-538%3A%20Insertion%20of%20Sensitive%20Information%20into%20Externally-Accessible%20File%20or%20Directory%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69d9d9721cc7ad14da3f8633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33704-cwe-434-unrestricted-upload-of-file-9f5d6a2e</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33704%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69d9d9721cc7ad14da3f862f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33703-cwe-639-authorization-bypass-throug-cb9e803c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33703%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69d943121cc7ad14dadcb1a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3446-vulnerability-in-python-software-fou-9e529bcb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3446%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=69d943121cc7ad14dadcb1a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33702-cwe-639-authorization-bypass-throug-925fbc0e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33702%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69d943121cc7ad14dadcb19d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33698-cwe-552-files-or-directories-access-2b2046ff</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33698%3A%20CWE-552%3A%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20chamilo%20chamilo-lms&amp;severity=critical&amp;id=69d943121cc7ad14dadcb199</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33618-cwe-95-improper-neutralization-of-d-d093150c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33618%3A%20CWE-95%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69d943121cc7ad14dadcb195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33141-cwe-639-authorization-bypass-throug-8ba8b98b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33141%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69d93c061cc7ad14dada4d60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32892-cwe-78-improper-neutralization-of-s-5b2019d4</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32892%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=critical&amp;id=69d93c061cc7ad14dada4d4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1502-vulnerability-in-python-software-fou-d29a3a25</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1502%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=69d93c061cc7ad14dada4d46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32932-cwe-601-url-redirection-to-untruste-630b1042</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32932%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69d93c061cc7ad14dada4d5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32931-cwe-434-unrestricted-upload-of-file-4bedfb62</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32931%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69d93c061cc7ad14dada4d56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32930-cwe-639-authorization-bypass-throug-898438cc</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32930%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69d93c061cc7ad14dada4d51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32894-cwe-476-null-pointer-dereference-in-cef4e8af</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32894%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69d938791cc7ad14dad95287</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32893-cwe-79-improper-neutralization-of-i-7ad4ff8e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32893%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69d938791cc7ad14dad95283</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31941-cwe-918-server-side-request-forgery-eae47332</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31941%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69d938791cc7ad14dad9527e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31940-cwe-384-session-fixation-in-chamilo-5447c6f8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31940%3A%20CWE-384%3A%20Session%20Fixation%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69d938791cc7ad14dad95279</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5483-insertion-of-sensitive-information-i-7240e491</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5483%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Red%20Hat%20Red%20Hat%20OpenShift%20AI%202.16&amp;severity=high&amp;id=69d938791cc7ad14dad9528c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31939-cwe-22-improper-limitation-of-a-pat-40f7a66b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31939%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69d938791cc7ad14dad95274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-protect-your-organization-from-airsnitch-wi-37876665</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%20protect%20your%20organization%20from%20AirSnitch%20Wi-Fi%20vulnerabilities%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69d931771cc7ad14dad5c79b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40160-cwe-918-server-side-request-forgery-ff80f530</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40160%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20MervinPraison%20PraisonAIAgents&amp;severity=high&amp;id=69d9d9751cc7ad14da3f8720</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40159-cwe-200-exposure-of-sensitive-infor-d2289657</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40159%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20MervinPraison%20PraisonAI&amp;severity=medium&amp;id=69d9d9751cc7ad14da3f871d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40158-cwe-94-improper-control-of-generati-fa9a72f4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40158%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69d9d9721cc7ad14da3f863d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40157-cwe-22-improper-limitation-of-a-pat-3d24639a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40157%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=critical&amp;id=69d9d9751cc7ad14da3f871a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40156-cwe-94-improper-control-of-generati-73f8ee37</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40156%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69d9d9721cc7ad14da3f8650</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40100-cwe-918-server-side-request-forgery-a0467b74</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40100%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20labring%20FastGPT&amp;severity=medium&amp;id=69d9d9721cc7ad14da3f864d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40097-cwe-129-improper-validation-of-arra-afec90ff</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40097%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20smallstep%20certificates&amp;severity=low&amp;id=69d9d9721cc7ad14da3f8637</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40074-cwe-755-improper-handling-of-except-ab3c4168</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40074%3A%20CWE-755%3A%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20sveltejs%20kit&amp;severity=medium&amp;id=69d9d9721cc7ad14da3f8648</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40073-cwe-770-allocation-of-resources-wit-94ac7182</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40073%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20sveltejs%20kit&amp;severity=high&amp;id=69d9d9721cc7ad14da3f8643</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40086-cwe-22-improper-limitation-of-a-pat-26967144</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40086%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20danielgatis%20rembg&amp;severity=medium&amp;id=69d943121cc7ad14dadcb1ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40103-cwe-836-use-of-password-hash-instea-cc9ae4f5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40103%3A%20CWE-836%3A%20Use%20of%20Password%20Hash%20Instead%20of%20Password%20for%20Authentication%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69d9d9751cc7ad14da3f8745</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35602-cwe-770-allocation-of-resources-wit-179f6de2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35602%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69d9d9751cc7ad14da3f8740</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35601-cwe-93-improper-neutralization-of-c-b8fd76dd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35601%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69d9d9751cc7ad14da3f873b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35600-cwe-79-improper-neutralization-of-i-e4d51935</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35600%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69d9d9751cc7ad14da3f8735</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35599-cwe-407-inefficient-algorithmic-com-60e6d707</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35599%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69d943121cc7ad14dadcb1b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35598-cwe-862-missing-authorization-in-go-9155d27b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35598%3A%20CWE-862%3A%20Missing%20Authorization%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69d9d9751cc7ad14da3f872f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35597-cwe-307-improper-restriction-of-exc-f368b092</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35597%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69d9d9751cc7ad14da3f8729</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35596-cwe-863-incorrect-authorization-in--fcc1ca1b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35596%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69d9d9751cc7ad14da3f8723</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35595-cwe-269-improper-privilege-manageme-a259bb47</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35595%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20go-vikunja%20vikunja&amp;severity=high&amp;id=69d943121cc7ad14dadcb1ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35594-cwe-613-insufficient-session-expira-e2a90dbd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35594%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69d91fde1cc7ad14dacba29a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40023-cwe-116-improper-encoding-or-escapi-f19f4564</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40023%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Apache%20Software%20Foundation%20Apache%20Log4cxx&amp;severity=medium&amp;id=69d91fe11cc7ad14dacba377</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34727-cwe-287-improper-authentication-in--cfd9d51e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34727%3A%20CWE-287%3A%20Improper%20Authentication%20in%20go-vikunja%20vikunja&amp;severity=high&amp;id=69d91fde1cc7ad14dacba297</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40021-cwe-116-improper-encoding-or-escapi-a5bdd51d</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40021%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Apache%20Software%20Foundation%20Apache%20Log4net&amp;severity=medium&amp;id=69d91fde1cc7ad14dacba2a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34481-cwe-116-improper-encoding-or-escapi-067c8388</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34481%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Apache%20Software%20Foundation%20Apache%20Log4j%20JSON%20Template%20Layout&amp;severity=medium&amp;id=69d91fde1cc7ad14dacba290</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34480-cwe-116-improper-encoding-or-escapi-b2386ff0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34480%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Apache%20Software%20Foundation%20Apache%20Log4j%20Core&amp;severity=medium&amp;id=69d91fde1cc7ad14dacba289</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34479-cwe-116-improper-encoding-or-escapi-6c8114de</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34479%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Apache%20Software%20Foundation%20Apache%20Log4j%201%20to%20Log4j%202%20bridge&amp;severity=medium&amp;id=69d91fde1cc7ad14dacba282</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34478-cwe-684-incorrect-provision-of-spec-8f1d16cd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34478%3A%20CWE-684%20Incorrect%20Provision%20of%20Specified%20Functionality%20in%20Apache%20Software%20Foundation%20Apache%20Log4j%20Core&amp;severity=medium&amp;id=69d91fde1cc7ad14dacba27b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34477-cwe-297-improper-validation-of-cert-d4dde496</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34477%3A%20CWE-297%20Improper%20Validation%20of%20Certificate%20with%20Host%20Mismatch%20in%20Apache%20Software%20Foundation%20Apache%20Log4j%20Core&amp;severity=medium&amp;id=69d91fde1cc7ad14dacba274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29043-cwe-122-heap-based-buffer-overflow--273d2e09</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29043%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20HDFGroup%20hdf5&amp;severity=medium&amp;id=69d91fde1cc7ad14dacba271</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-cyberattack-stings-stryker-windows-z-4d4a8d15</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20Cyberattack%20Stings%20Stryker%2C%20Windows%20Zero-Day%2C%20China%20Supercomputer%20Hack&amp;severity=medium&amp;id=69d90e481cc7ad14dac44e37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/juniper-networks-patches-dozens-of-junos-os-vulner-fe030f73</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Juniper%20Networks%20Patches%20Dozens%20of%20Junos%20OS%20Vulnerabilities&amp;severity=critical&amp;id=69d900381cc7ad14dabf8a9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40217-cwe-420-unprotected-alternate-chann-f9abccd5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40217%3A%20CWE-420%20Unprotected%20Alternate%20Channel%20in%20BerriAI%20LiteLLM&amp;severity=high&amp;id=69d907431cc7ad14dac20a7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58920-cwe-79-improper-neutralization-of-i-c9e7ee08</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58920%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Zootemplate%20Cerato&amp;severity=high&amp;id=69d900441cc7ad14dabf8fbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58913-cwe-98-improper-control-of-filename-a903f3ae</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58913%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20CactusThemes%20VideoPro&amp;severity=high&amp;id=69d900441cc7ad14dabf8fba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5804-cwe-98-improper-control-of-filename--57692503</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5804%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Case%20Themes%20Case%20Theme%20User&amp;severity=high&amp;id=69d900441cc7ad14dabf8fc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33092-cwe-15-in-acronis-acronis-true-imag-376576fa</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33092%3A%20CWE-15%20in%20Acronis%20Acronis%20True%20Image%20OEM&amp;severity=high&amp;id=69d900441cc7ad14dabf8fc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/industry-reactions-to-iran-hacking-ics-in-critical-f621dd3a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Industry%20Reactions%20to%20Iran%20Hacking%20ICS%20in%20Critical%20Infrastructure%3A%20Feedback%20Friday&amp;severity=critical&amp;id=69d8f2271cc7ad14dab982a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5412-cwe-285-improper-authorization-in-ca-2eb08bc1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5412%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Canonical%20Juju&amp;severity=critical&amp;id=69d8f2321cc7ad14dab98423</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5774-cwe-362-concurrent-execution-using-s-9ae612a0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5774%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Canonical%20Juju&amp;severity=medium&amp;id=69d9d97c1cc7ad14da3f88ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/orthanc-dicom-vulnerabilities-lead-to-crashes-rce-36ef54de</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Orthanc%20DICOM%20Vulnerabilities%20Lead%20to%20Crashes%2C%20RCE&amp;severity=low&amp;id=69d8e79b1cc7ad14dab3dbc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5777-cwe-306-missing-authentication-for-c-2883531c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5777%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20EGate%20Atom%203X%20Projector&amp;severity=high&amp;id=69d8e7a61cc7ad14dab3dea0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39304-denial-of-service-via-out-of-memory-33ee0636</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39304%3A%20Denial%20of%20Service%20via%20Out%20of%20Memory%20in%20Apache%20Software%20Foundation%20Apache%20ActiveMQ%20Client&amp;severity=high&amp;id=69d8d98b1cc7ad14daad853a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-147-patches-60-vulnerabilities-including-tw-c47f3657</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%20147%20Patches%2060%20Vulnerabilities%2C%20Including%20Two%20Critical%20Flaws%20Worth%20%2486%2C000&amp;severity=critical&amp;id=69d8d6081cc7ad14daac3dad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mitre-releases-fight-fraud-framework-12271865</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MITRE%20Releases%20Fight%20Fraud%20Framework&amp;severity=medium&amp;id=69d8cb7c1cc7ad14daa783bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4162-cwe-862-missing-authorization-in-roc-0356dad0</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4162%3A%20CWE-862%20Missing%20Authorization%20in%20RocketGenius%20Gravity%20SMTP&amp;severity=high&amp;id=69d8c7f71cc7ad14daa5fce1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6057-cwe-22-path-traversal-in-falkordb-fa-80645f49</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6057%3A%20CWE-22%20Path%20Traversal%20in%20FalkorDB%20FalkorDB%20Browser&amp;severity=critical&amp;id=69d8c7f71cc7ad14daa5fce5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-marimo-flaw-exploited-hours-after-public--82162d6d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Marimo%20Flaw%20Exploited%20Hours%20After%20Public%20Disclosure&amp;severity=critical&amp;id=69d8c0a51cc7ad14daa30adc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6042-inefficient-algorithmic-complexity-i-f62f8871</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6042%3A%20Inefficient%20Algorithmic%20Complexity%20in%20musl%20libc&amp;severity=medium&amp;id=69d8c0ed1cc7ad14daa35351</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6038-sql-injection-in-code-projects-vehic-ca755ced</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6038%3A%20SQL%20Injection%20in%20code-projects%20Vehicle%20Showroom%20Management%20System&amp;severity=medium&amp;id=69d8c0ed1cc7ad14daa3534a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33457-cwe-140-improper-neutralization-of--5b1489cf</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33457%3A%20CWE-140%3A%20Improper%20Neutralization%20of%20Delimiters%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=medium&amp;id=69d8b9e71cc7ad14daa069b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33456-cwe-140-improper-neutralization-of--0f4aeaea</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33456%3A%20CWE-140%3A%20Improper%20Neutralization%20of%20Delimiters%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=medium&amp;id=69d8b9e71cc7ad14daa069b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33455-cwe-140-improper-neutralization-of--9d5c22ba</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33455%3A%20CWE-140%3A%20Improper%20Neutralization%20of%20Delimiters%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=medium&amp;id=69d8b9e71cc7ad14daa069af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6037-sql-injection-in-code-projects-vehic-469cfa07</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6037%3A%20SQL%20Injection%20in%20code-projects%20Vehicle%20Showroom%20Management%20System&amp;severity=medium&amp;id=69d8b9e71cc7ad14daa069bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6036-sql-injection-in-code-projects-vehic-c8c5a593</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6036%3A%20SQL%20Injection%20in%20code-projects%20Vehicle%20Showroom%20Management%20System&amp;severity=medium&amp;id=69d8b9e71cc7ad14daa069b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-memory-loader-drops-screenconnect-03401746</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In-Memory%20Loader%20Drops%20ScreenConnect&amp;severity=medium&amp;id=69d8ceff1cc7ad14daa9150b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/npm-package-supply-chain-compromise-leads-to-rat-d-5471ad80</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NPM%20Package%20Supply%20Chain%20Compromise%20Leads%20to%20RAT%20Deployment&amp;severity=medium&amp;id=69d8cb821cc7ad14daa7855e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6035-cross-site-scripting-in-code-project-4b5e4f61</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6035%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Vehicle%20Showroom%20Management%20System&amp;severity=medium&amp;id=69d8c0ed1cc7ad14daa35374</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-rolls-out-cookie-theft-protections-in-chrom-6d88d9a0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Rolls%20Out%20Cookie%20Theft%20Protections%20in%20Chrome&amp;severity=medium&amp;id=69d8abd81cc7ad14da99e7ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6034-cross-site-scripting-in-code-project-dc8a4ac6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6034%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Vehicle%20Showroom%20Management%20System&amp;severity=medium&amp;id=69d8c0ed1cc7ad14daa3536d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5525-cwe-121-stack-based-buffer-overflow--eed490de</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5525%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Notepad%2B%2B%20Project%20Notepad%2B%2B&amp;severity=medium&amp;id=69d8c0ed1cc7ad14daa35361</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-finds-vulnerability-exposing-millions-of-0f3042e8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Finds%20Vulnerability%20Exposing%20Millions%20of%20Android%20Crypto%20Wallet%20Users&amp;severity=medium&amp;id=69d8a8541cc7ad14da97e786</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22750-vulnerability-in-vmware-spring-clou-95534ffc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22750%3A%20Vulnerability%20in%20VMware%20Spring%20Cloud%20Gateway&amp;severity=high&amp;id=69d8c0ed1cc7ad14daa35358</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6033-sql-injection-in-codeastro-online-cl-ffdda805</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6033%3A%20SQL%20Injection%20in%20CodeAstro%20Online%20Classroom&amp;severity=medium&amp;id=69d8c0ed1cc7ad14daa35366</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6032-cross-site-scripting-in-code-project-382797a0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6032%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69d8a85b1cc7ad14da97ec05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6031-sql-injection-in-code-projects-simpl-075bdf26</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6031%3A%20SQL%20Injection%20in%20code-projects%20Simple%20IT%20Discussion%20Forum&amp;severity=medium&amp;id=69d8a85b1cc7ad14da97ebfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6030-sql-injection-in-itsourcecode-constr-ef9de984</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6030%3A%20SQL%20Injection%20in%20itsourcecode%20Construction%20Management%20System&amp;severity=medium&amp;id=69d8a14c1cc7ad14da9459ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/obfuscated-javascript-or-nothing-thu-apr-9th-bb996e09</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Obfuscated%20JavaScript%20or%20Nothing%2C%20(Thu%2C%20Apr%209th)&amp;severity=medium&amp;id=69d89dc71cc7ad14da930bf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6029-os-command-injection-in-totolink-a71-25809d7e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6029%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d8a14c1cc7ad14da9459e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1115-cwe-79-improper-neutralization-of-in-d36d67ac</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1115%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20parisneo%20parisneo%2Flollms&amp;severity=critical&amp;id=69d8a14c1cc7ad14da9459dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6028-os-command-injection-in-totolink-a71-9a88a334</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6028%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d8a14c1cc7ad14da9459e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6027-os-command-injection-in-totolink-a71-31aeb5d4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6027%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d896c01cc7ad14da90814c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4432-cwe-862-missing-authorization-in-yit-643fc10d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4432%3A%20CWE-862%20Missing%20Authorization%20in%20YITH%20WooCommerce%20Wishlist&amp;severity=medium&amp;id=69d896c01cc7ad14da908142</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14545-cwe-94-improper-control-of-generati-3ff76783</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14545%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20YML%20for%20Yandex%20Market&amp;severity=medium&amp;id=69d896c01cc7ad14da90813a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28704-uncontrolled-search-path-element-in-0070be31</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28704%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Japan%20Computer%20Emergency%20Response%20Team%20Coordination%20Center%20(JPCERT%2FCC)%20Emocheck&amp;severity=high&amp;id=69d896c01cc7ad14da90813d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6026-os-command-injection-in-totolink-a71-a189cd98</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6026%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d896c01cc7ad14da908145</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6025-os-command-injection-in-totolink-a71-da9e8d99</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6025%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d8c0ef1cc7ad14daa353ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6024-path-traversal-in-tenda-i6-dd97391a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6024%3A%20Path%20Traversal%20in%20Tenda%20i6&amp;severity=medium&amp;id=69d8c0ef1cc7ad14daa353c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6016-stack-based-buffer-overflow-in-tenda-87108250</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6016%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC9&amp;severity=high&amp;id=69d8c0ed1cc7ad14daa35382</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6015-stack-based-buffer-overflow-in-tenda-303df20e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6015%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC9&amp;severity=high&amp;id=69d8c0ed1cc7ad14daa3537b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6014-buffer-overflow-in-d-link-dir-513-d6993d66</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6014%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-513&amp;severity=high&amp;id=69d881ab1cc7ad14da707af7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4482-cwe-732-incorrect-permission-assignm-bd880abd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4482%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Rapid7%20Insight%20Agent&amp;severity=medium&amp;id=69d881ab1cc7ad14da707add</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6013-buffer-overflow-in-d-link-dir-513-6c13a0cf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6013%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-513&amp;severity=high&amp;id=69d881ab1cc7ad14da707af0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6012-buffer-overflow-in-d-link-dir-513-ac2f7246</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6012%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-513&amp;severity=high&amp;id=69d881ab1cc7ad14da707ae9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6011-server-side-request-forgery-in-openc-b423bc79</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6011%3A%20Server-Side%20Request%20Forgery%20in%20OpenClaw&amp;severity=medium&amp;id=69d881ab1cc7ad14da707ae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2305-cwe-79-improper-neutralization-of-in-ec8c241e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2305%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20addfunc%20AddFunc%20Head%20%26%20Footer%20Code&amp;severity=medium&amp;id=69d873981cc7ad14da5fb241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6010-sql-injection-in-codeastro-online-cl-d106f93e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6010%3A%20SQL%20Injection%20in%20CodeAstro%20Online%20Classroom&amp;severity=medium&amp;id=69d873981cc7ad14da5fb260</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6007-sql-injection-in-itsourcecode-constr-62b9a200</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6007%3A%20SQL%20Injection%20in%20itsourcecode%20Construction%20Management%20System&amp;severity=medium&amp;id=69d873981cc7ad14da5fb259</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6006-sql-injection-in-code-projects-patie-2a1a603c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6006%3A%20SQL%20Injection%20in%20code-projects%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=69d873981cc7ad14da5fb252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6005-sql-injection-in-code-projects-patie-08e27ebc</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6005%3A%20SQL%20Injection%20in%20code-projects%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=69d873981cc7ad14da5fb24b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6004-sql-injection-in-code-projects-simpl-b10f2cc5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6004%3A%20SQL%20Injection%20in%20code-projects%20Simple%20IT%20Discussion%20Forum&amp;severity=medium&amp;id=69d862041cc7ad14da50d951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6003-cross-site-scripting-in-code-project-cdc25457</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6003%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20IT%20Discussion%20Forum&amp;severity=medium&amp;id=69d862041cc7ad14da50d94a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-6000-information-disclosure-in-code-proje-37b28a8f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-6000%3A%20Information%20Disclosure%20in%20code-projects%20Online%20Library%20Management%20System&amp;severity=medium&amp;id=69d862041cc7ad14da50d943</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5999-improper-authorization-in-jeecgboot-8621e765</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5999%3A%20Improper%20Authorization%20in%20JeecgBoot&amp;severity=medium&amp;id=69d862041cc7ad14da50d93b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5998-path-traversal-in-zhayujie-chatgpt-o-0d97bf7f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5998%3A%20Path%20Traversal%20in%20zhayujie%20chatgpt-on-wechat%20CowAgent&amp;severity=medium&amp;id=69d8577b1cc7ad14da4a0e44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4305-cwe-79-improper-neutralization-of-in-420b397d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4305%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wproyal%20Royal%20WordPress%20Backup%2C%20Restore%20%26%20Migration%20Plugin%20%E2%80%93%20Backup%20WordPress%20Sites%20Safely&amp;severity=medium&amp;id=69d857791cc7ad14da4a0d58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4977-cwe-862-missing-authorization-in-sti-a4ee5ded</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4977%3A%20CWE-862%20Missing%20Authorization%20in%20stiofansisland%20UsersWP%20%E2%80%93%20Front-end%20login%20form%2C%20User%20Registration%2C%20User%20Profile%20%26%20Members%20Directory%20plugin%20for%20WP&amp;severity=medium&amp;id=69d857791cc7ad14da4a0d67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1924-cwe-352-cross-site-request-forgery-c-822f5202</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1924%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20arubadev%20Aruba%20HiSpeed%20Cache&amp;severity=medium&amp;id=69d857791cc7ad14da4a0d37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1263-cwe-79-improper-neutralization-of-in-11b0b0dd</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1263%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20usystemsgmbh%20Webling&amp;severity=medium&amp;id=69d857791cc7ad14da4a0d2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4057-cwe-862-missing-authorization-in-cod-ad9364fd</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4057%3A%20CWE-862%20Missing%20Authorization%20in%20codename065%20Download%20Manager&amp;severity=medium&amp;id=69d857791cc7ad14da4a0d4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3360-cwe-862-missing-authorization-in-the-e76eed5e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3360%3A%20CWE-862%20Missing%20Authorization%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=high&amp;id=69d857791cc7ad14da4a0d47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2712-cwe-863-incorrect-authorization-in-d-fc686a53</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2712%3A%20CWE-863%20Incorrect%20Authorization%20in%20davidanderson%20WP-Optimize%20%E2%80%93%20Cache%2C%20Compress%20images%2C%20Minify%20%26%20Clean%20database%20to%20boost%20page%20speed%20%26%20performance&amp;severity=medium&amp;id=69d857791cc7ad14da4a0d40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4664-cwe-287-improper-authentication-in-i-4055877c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4664%3A%20CWE-287%20Improper%20Authentication%20in%20ivole%20Customer%20Reviews%20for%20WooCommerce&amp;severity=medium&amp;id=69d857791cc7ad14da4a0d5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25203-cwe-276-incorrect-default-permissio-03753a3c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25203%3A%20CWE-276%20Incorrect%20default%20permissions%20in%20Samsung%20Electronics%20MagicINFO%209%20Server&amp;severity=high&amp;id=69d857791cc7ad14da4a0d3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5997-os-command-injection-in-totolink-a71-76c83173</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5997%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d8577b1cc7ad14da4a0e3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5996-os-command-injection-in-totolink-a71-7853c72c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5996%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d857791cc7ad14da4a0d71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5995-os-command-injection-in-totolink-a71-27cc3191</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5995%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d84cee1cc7ad14da453a6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5994-os-command-injection-in-totolink-a71-2d1c7675</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5994%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d84cee1cc7ad14da453a67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5993-os-command-injection-in-totolink-a71-a914265d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5993%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d84cee1cc7ad14da453a60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5992-stack-based-buffer-overflow-in-tenda-c07121b3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5992%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69d843721cc7ad14da3fb3ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-11-2d3e7714</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-11&amp;severity=medium&amp;id=69da49bb82d89c981fbccd9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/d-link-dir-650in-authenticated-command-injection-dcfa2848</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=D-Link%20DIR-650IN%20-%20Authenticated%20Command%20Injection&amp;severity=medium&amp;id=69da14bc1cc7ad14da6c87c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/netbt-e-fatura-privilege-escalation-2d29044b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NetBT%20e-Fatura%20-%20Privilege%20Escalation&amp;severity=high&amp;id=69da14bc1cc7ad14da6c87be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36235-na-0ae03a2e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36235%3A%20n%2Fa&amp;severity=critical&amp;id=69d9d97c1cc7ad14da3f88cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36234-na-a5ba7054</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36234%3A%20n%2Fa&amp;severity=critical&amp;id=69d9d97c1cc7ad14da3f88c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23782-na-0fdc13b3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23782%3A%20n%2Fa&amp;severity=high&amp;id=69d9d97c1cc7ad14da3f88c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23780-na-ab7a798d</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23780%3A%20n%2Fa&amp;severity=high&amp;id=69d9d97c1cc7ad14da3f88c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-10-1d7bbbf2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-10&amp;severity=medium&amp;id=69d990531cc7ad14dafc4172</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40200-cwe-670-always-incorrect-control-fl-f042e7c6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40200%3A%20CWE-670%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20musl-libc%20musl&amp;severity=high&amp;id=69d934f31cc7ad14dad772cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23781-na-c225d0b4</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23781%3A%20n%2Fa&amp;severity=critical&amp;id=69d91fde1cc7ad14dacba26d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36236-na-44ed902d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36236%3A%20n%2Fa&amp;severity=critical&amp;id=69d911cc1cc7ad14dac5d991</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36233-na-5f0d3ffa</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36233%3A%20n%2Fa&amp;severity=critical&amp;id=69d911cc1cc7ad14dac5d98e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-36232-na-0e8be59d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-36232%3A%20n%2Fa&amp;severity=critical&amp;id=69d911cc1cc7ad14dac5d98b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31262-na-06fac518</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31262%3A%20n%2Fa&amp;severity=medium&amp;id=69d911cc1cc7ad14dac5d987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29861-na-674eb41c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29861%3A%20n%2Fa&amp;severity=critical&amp;id=69d911cc1cc7ad14dac5d984</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44560-na-078fe07f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44560%3A%20n%2Fa&amp;severity=critical&amp;id=69d911cc1cc7ad14dac5d980</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40212-cwe-79-improper-neutralization-of-i-3208d4c2</loc>
    <lastmod>2026-04-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40212%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20OpenStack%20Skyline&amp;severity=medium&amp;id=69d8c0ed1cc7ad14daa3535c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-10-b8cac7f4</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-10&amp;severity=low&amp;id=69d89dbf1cc7ad14da92fe8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33551-cwe-863-incorrect-authorization-in--d9f794f9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33551%3A%20CWE-863%20Incorrect%20Authorization%20in%20OpenStack%20Keystone&amp;severity=low&amp;id=69d862041cc7ad14da50d937</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5991-stack-based-buffer-overflow-in-tenda-d9d7beab</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5991%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69d83edb1cc7ad14da371612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5990-stack-based-buffer-overflow-in-tenda-d9b58ad7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5990%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69d83b611cc7ad14da35ec14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5989-stack-based-buffer-overflow-in-tenda-4ab9255d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5989%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69d837d41cc7ad14da341bd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5988-stack-based-buffer-overflow-in-tenda-f0bea76b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5988%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F451&amp;severity=high&amp;id=69d830cb1cc7ad14da313a2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34424-cwe-506-embedded-malicious-code-in--565778ad</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34424%3A%20CWE-506%20Embedded%20Malicious%20Code%20in%20Nextendweb%20Smart%20Slider%203%20Pro%20for%20WordPress&amp;severity=critical&amp;id=69d830cb1cc7ad14da313a1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5987-improper-neutralization-of-special-e-dbbbc8a6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5987%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20Sanluan%20PublicCMS&amp;severity=medium&amp;id=69d830cb1cc7ad14da313a24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5986-inefficient-regular-expression-compl-786c5a63</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5986%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20Zod%20jsVideoUrlParser&amp;severity=medium&amp;id=69d82d481cc7ad14da2fc1d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5985-sql-injection-in-code-projects-simpl-7a020e0b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5985%3A%20SQL%20Injection%20in%20code-projects%20Simple%20IT%20Discussion%20Forum&amp;severity=medium&amp;id=69d829c91cc7ad14da2ebbbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5984-buffer-overflow-in-d-link-dir-605l-1e0e7e69</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5984%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-605L&amp;severity=high&amp;id=69d826401cc7ad14da2cd53c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5983-buffer-overflow-in-d-link-dir-605l-7db7f7d5</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5983%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-605L&amp;severity=high&amp;id=69d822bf1cc7ad14da2ad179</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39848-cwe-306-missing-authentication-for--f97002da</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39848%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%2010ij%20dockyard&amp;severity=medium&amp;id=69d822bf1cc7ad14da2ad173</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40154-cwe-829-inclusion-of-functionality--9f489fbc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40154%3A%20CWE-829%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20MervinPraison%20PraisonAI&amp;severity=critical&amp;id=69d822bf1cc7ad14da2ad176</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33791-cwe-78-improper-neutralization-of-s-fe83384c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33791%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69d822bf1cc7ad14da2ad16d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33790-cwe-754-improper-check-for-unusual--85692ec6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33790%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=69d822bf1cc7ad14da2ad16a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33787-cwe-754-improper-check-for-unusual--694a92be</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33787%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69d822bd1cc7ad14da2ac97b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33785-cwe-862-missing-authorization-in-ju-907520bd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33785%3A%20CWE-862%20Missing%20Authorization%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=69d822bd1cc7ad14da2ac977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33784-cwe-1393-use-of-default-password-in-a5f42388</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33784%3A%20CWE-1393%20Use%20of%20Default%20Password%20in%20Juniper%20Networks%20JSI%20LWC&amp;severity=critical&amp;id=69d822bd1cc7ad14da2ac974</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33783-cwe-686-function-call-with-incorrec-e831da69</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33783%3A%20CWE-686%20Function%20Call%20With%20Incorrect%20Argument%20Type%20in%20Juniper%20Networks%20Junos%20OS%20Evolved&amp;severity=medium&amp;id=69d822bd1cc7ad14da2ac971</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33781-cwe-754-improper-check-for-unusual--5da4c39e</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33781%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69d822bd1cc7ad14da2ac96e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33778-cwe-1286-improper-validation-of-syn-7e44dea9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33778%3A%20CWE-1286%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=69d822bd1cc7ad14da2ac96b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33776-cwe-862-missing-authorization-in-ju-76a39714</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33776%3A%20CWE-862%20Missing%20Authorization%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69d822bd1cc7ad14da2ac968</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33774-cwe-754-improper-check-for-unusual--42120f1d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33774%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69d822bd1cc7ad14da2ac965</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33771-cwe-521-weak-password-requirements--2b26f331</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33771%3A%20CWE-521%20Weak%20Password%20Requirements%20in%20Juniper%20Networks%20CTP%20OS&amp;severity=high&amp;id=69d822bd1cc7ad14da2ac962</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13914-cwe-322-key-exchange-without-entity-37c05f82</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13914%3A%20CWE-322%20Key%20Exchange%20without%20Entity%20Authentication%20in%20Juniper%20Networks%20Apstra&amp;severity=high&amp;id=69d822bd1cc7ad14da2ac95f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33797-cwe-20-improper-input-validation-in-032bb2fa</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33797%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=69d822bf1cc7ad14da2ad170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33779-cwe-296-improper-following-of-a-cer-0b4d9e12</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33779%3A%20CWE-296%20Improper%20Following%20of%20a%20Certificate&apos;s%20Chain%20of%20Trust%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69d843721cc7ad14da3fb40d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5982-buffer-overflow-in-d-link-dir-605l-29438337</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5982%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-605L&amp;severity=high&amp;id=69d843771cc7ad14da3fb5d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33775-cwe-401-missing-release-of-memory-a-f0fccbf5</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33775%3A%20CWE-401%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69d843721cc7ad14da3fb407</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40151-cwe-200-exposure-of-sensitive-infor-41548a8f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40151%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20MervinPraison%20PraisonAI&amp;severity=medium&amp;id=69d843771cc7ad14da3fb5c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33782-cwe-401-missing-release-of-memory-a-e886ea1e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33782%3A%20CWE-401%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69d843751cc7ad14da3fb550</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33780-cwe-401-missing-release-of-memory-a-b58b1c8c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33780%3A%20CWE-401%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69d843721cc7ad14da3fb410</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33773-cwe-1419-incorrect-initialization-o-03dd345c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33773%3A%20CWE-1419%20Incorrect%20Initialization%20of%20Resource%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69d843721cc7ad14da3fb403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33786-cwe-754-improper-check-for-unusual--ee330a5e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33786%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69d843751cc7ad14da3fb553</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21916-cwe-61-unix-symbolic-link-symlink-f-d17287ef</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21916%3A%20CWE-61%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=69d843721cc7ad14da3fb3fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40153-cwe-526-cleartext-storage-of-sensit-f8d2a9e5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40153%3A%20CWE-526%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20an%20Environment%20Variable%20in%20MervinPraison%20PraisonAIAgents&amp;severity=high&amp;id=69d843771cc7ad14da3fb5cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33788-cwe-306-missing-authentication-for--9816a849</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33788%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Juniper%20Networks%20Junos%20OS%20Evolved&amp;severity=high&amp;id=69d843751cc7ad14da3fb556</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40152-cwe-22-improper-limitation-of-a-pat-c32af342</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40152%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20MervinPraison%20PraisonAIAgents&amp;severity=medium&amp;id=69d843771cc7ad14da3fb5cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21919-cwe-821-incorrect-synchronization-i-6dad3dbd</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21919%3A%20CWE-821%20Incorrect%20Synchronization%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69d843721cc7ad14da3fb400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21915-cwe-183-permissive-list-of-allowed--507f4fbe</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21915%3A%20CWE-183%20Permissive%20List%20of%20Allowed%20Input%20in%20Juniper%20Networks%20JSI%20LWC&amp;severity=medium&amp;id=69d843721cc7ad14da3fb3fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21904-cwe-79-improper-neutralization-of-i-dd40f02e</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21904%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=69d843721cc7ad14da3fb3f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40150-cwe-918-server-side-request-forgery-f4493f40</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40150%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20MervinPraison%20PraisonAIAgents&amp;severity=high&amp;id=69d843771cc7ad14da3fb5c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59969-cwe-120-buffer-copy-without-checkin-b5ea3861</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59969%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Juniper%20Networks%20Junos%20OS%20Evolved&amp;severity=medium&amp;id=69d843721cc7ad14da3fb3f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33793-cwe-250-execution-with-unnecessary--3bbff8ce</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33793%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=69d843751cc7ad14da3fb559</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40149-cwe-396-declaration-of-catch-for-ge-02f2486d</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40149%3A%20CWE-396%3A%20Declaration%20of%20Catch%20for%20Generic%20Exception%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69d843771cc7ad14da3fb5c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40148-cwe-409-improper-handling-of-highly-d3e405c0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40148%3A%20CWE-409%3A%20Improper%20Handling%20of%20Highly%20Compressed%20Data%20(Data%20Amplification)%20in%20MervinPraison%20PraisonAI&amp;severity=medium&amp;id=69d843771cc7ad14da3fb5c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40117-cwe-862-missing-authorization-in-me-70fd32bd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40117%3A%20CWE-862%3A%20Missing%20Authorization%20in%20MervinPraison%20PraisonAIAgents&amp;severity=medium&amp;id=69d843771cc7ad14da3fb5bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40116-cwe-770-allocation-of-resources-wit-314adf4e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40116%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69d843751cc7ad14da3fb56b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40115-cwe-770-allocation-of-resources-wit-b5c41bbe</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40115%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20MervinPraison%20PraisonAI&amp;severity=medium&amp;id=69d843751cc7ad14da3fb568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40114-cwe-918-server-side-request-forgery-7451409a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40114%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69d843751cc7ad14da3fb565</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40113-cwe-88-improper-neutralization-of-a-5a799066</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40113%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69d843751cc7ad14da3fb562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40112-cwe-79-improper-neutralization-of-i-bf712808</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40112%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=medium&amp;id=69d843751cc7ad14da3fb55f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5981-buffer-overflow-in-d-link-dir-605l-6fa03a4c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5981%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-605L&amp;severity=high&amp;id=69d843771cc7ad14da3fb5d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40111-cwe-78-improper-neutralization-of-s-03ac2b4d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40111%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20MervinPraison%20PraisonAIAgents&amp;severity=critical&amp;id=69d843751cc7ad14da3fb55c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40109-cwe-287-improper-authentication-in--838f1a64</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40109%3A%20CWE-287%3A%20Improper%20Authentication%20in%20fluxcd%20notification-controller&amp;severity=low&amp;id=69d818301cc7ad14da2455d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40107-cwe-918-server-side-request-forgery-d79e17bb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40107%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=69d818301cc7ad14da2455d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5980-buffer-overflow-in-d-link-dir-605l-e4664738</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5980%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-605L&amp;severity=high&amp;id=69d818301cc7ad14da2455de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5979-buffer-overflow-in-d-link-dir-605l-b22fd00b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5979%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-605L&amp;severity=high&amp;id=69d814ae1cc7ad14da21653e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5978-os-command-injection-in-totolink-a71-67e7851c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5978%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d814ae1cc7ad14da216536</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40093-cwe-1284-improper-validation-of-spe-f1fcce45</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40093%3A%20CWE-1284%3A%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20nimiq%20core-rs-albatross&amp;severity=high&amp;id=69d814ae1cc7ad14da21652c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/payroll-pirate-attacks-targeting-canadian-employee-53033fb6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Payroll%20pirate%20attacks%20targeting%20Canadian%20employees&amp;severity=medium&amp;id=69d8ceff1cc7ad14daa91506</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5977-os-command-injection-in-totolink-a71-090c4d25</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5977%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d814ae1cc7ad14da21652f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4436-cwe-306-in-gpl-odorizers-gpl750-xl4-dbe0f47c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4436%3A%20CWE-306%20in%20GPL%20Odorizers%20GPL750%20(XL4)&amp;severity=high&amp;id=69d80a201cc7ad14da1a948e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5976-os-command-injection-in-totolink-a71-3f6a2565</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5976%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d80a201cc7ad14da1a9493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13926-cwe-807-in-contemporary-controls-ba-6c5309fd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13926%3A%20CWE-807%20in%20Contemporary%20Controls%20BASControl20&amp;severity=critical&amp;id=69d806d21cc7ad14da15a557</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5975-os-command-injection-in-totolink-a71-9db2234a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5975%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d806d51cc7ad14da15a662</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40088-cwe-78-improper-neutralization-of-s-245484f8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40088%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=critical&amp;id=69d806d21cc7ad14da15a576</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40089-cwe-918-server-side-request-forgery-35713674</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40089%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20sonicverse-eu%20audiostreaming-stack&amp;severity=critical&amp;id=69d806d21cc7ad14da15a57a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35577-cwe-346-origin-validation-error-in--8745ce80</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35577%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20apollographql%20apollo-mcp-server&amp;severity=medium&amp;id=69d806d21cc7ad14da15a568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34500-clientcert-authentication-does-not--63ca00a7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34500%3A%20CLIENT_CERT%20authentication%20does%20not%20fail%20as%20expected%20for%20some%20scenarios%20when%20soft%20fail%20is%20disabled%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=medium&amp;id=69d806d21cc7ad14da15a565</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34487-cwe-532-insertion-of-sensitive-info-07344d29</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34487%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=high&amp;id=69d806d21cc7ad14da15a562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34486-cwe-311-missing-encryption-of-sensi-1ab7897d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34486%3A%20CWE-311%20Missing%20Encryption%20of%20Sensitive%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=high&amp;id=69d806d21cc7ad14da15a55f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40087-cwe-1336-improper-neutralization-of-fca192b1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40087%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20langchain-ai%20langchain&amp;severity=medium&amp;id=69d806d21cc7ad14da15a56d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34483-cwe-116-improper-encoding-or-escapi-c352f5d2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34483%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=high&amp;id=69d806d21cc7ad14da15a55c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5974-os-command-injection-in-foundationag-8a1cc3ed</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5974%3A%20OS%20Command%20Injection%20in%20FoundationAgents%20MetaGPT&amp;severity=medium&amp;id=69d806d21cc7ad14da15a57d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40077-cwe-184-incomplete-list-of-disallow-9c7f4ad8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40077%3A%20CWE-184%3A%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20henrygd%20beszel&amp;severity=low&amp;id=69d7ff941cc7ad14da10e9de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32990-cwe-20-improper-input-validation-in-0341ee1d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32990%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=medium&amp;id=69d7ff941cc7ad14da10e9d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29146-padding-oracle-in-apache-software-f-295d2dfe</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29146%3A%20Padding%20Oracle%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=high&amp;id=69d7ff941cc7ad14da10e9ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29145-clientcert-authentication-does-not--11e42669</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29145%3A%20CLIENT_CERT%20authentication%20does%20not%20fail%20as%20expected%20for%20some%20scenarios%20when%20soft%20fail%20is%20disabled%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=critical&amp;id=69d7ff941cc7ad14da10e9cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29129-configured-cipher-preference-order--0d71e2cd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29129%3A%20Configured%20cipher%20preference%20order%20not%20preserved%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=high&amp;id=69d7ff941cc7ad14da10e9c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5973-os-command-injection-in-foundationag-59f6508b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5973%3A%20OS%20Command%20Injection%20in%20FoundationAgents%20MetaGPT&amp;severity=medium&amp;id=69d7ff961cc7ad14da10ea47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25854-cwe-601-url-redirection-to-untruste-d400d1c0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25854%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=medium&amp;id=69d7ff941cc7ad14da10e9c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24880-cwe-444-inconsistent-interpretation-eda0d8cc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24880%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=high&amp;id=69d7ff941cc7ad14da10e9c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39977-cwe-22-improper-limitation-of-a-pat-bed6ef14</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39977%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20flatpak%20flatpak-builder&amp;severity=high&amp;id=69d7ff941cc7ad14da10e9db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34734-cwe-416-use-after-free-in-hdfgroup--d00b0ad3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34734%3A%20CWE-416%3A%20Use%20After%20Free%20in%20HDFGroup%20hdf5&amp;severity=high&amp;id=69d7ff941cc7ad14da10e9d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5972-os-command-injection-in-foundationag-a112b45e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5972%3A%20OS%20Command%20Injection%20in%20FoundationAgents%20MetaGPT&amp;severity=medium&amp;id=69d7ff961cc7ad14da10ea3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35195-cwe-787-out-of-bounds-write-in-byte-0b549b4f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35195%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20bytecodealliance%20wasmtime&amp;severity=medium&amp;id=69d7f88e1cc7ad14da0c179f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35186-cwe-789-memory-allocation-with-exce-60d4a794</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35186%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20bytecodealliance%20wasmtime&amp;severity=medium&amp;id=69d7f88c1cc7ad14da0c170c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34988-cwe-119-improper-restriction-of-ope-738809df</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34988%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20bytecodealliance%20wasmtime&amp;severity=low&amp;id=69d7f88c1cc7ad14da0c1709</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34987-cwe-125-out-of-bounds-read-in-bytec-5d6922fa</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34987%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20bytecodealliance%20wasmtime&amp;severity=critical&amp;id=69d7f88c1cc7ad14da0c1706</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34983-cwe-416-use-after-free-in-bytecodea-5453e933</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34983%3A%20CWE-416%3A%20Use%20After%20Free%20in%20bytecodealliance%20wasmtime&amp;severity=low&amp;id=69d7f88c1cc7ad14da0c1703</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34971-cwe-125-out-of-bounds-read-in-bytec-510a8be8</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34971%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20bytecodealliance%20wasmtime&amp;severity=critical&amp;id=69d7f88c1cc7ad14da0c1700</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34946-cwe-670-always-incorrect-control-fl-797568c7</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34946%3A%20CWE-670%3A%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20bytecodealliance%20wasmtime&amp;severity=medium&amp;id=69d7f88c1cc7ad14da0c16fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34945-cwe-681-incorrect-conversion-betwee-93e30ae8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34945%3A%20CWE-681%3A%20Incorrect%20Conversion%20between%20Numeric%20Types%20in%20bytecodealliance%20wasmtime&amp;severity=low&amp;id=69d7f88c1cc7ad14da0c16fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34944-cwe-248-uncaught-exception-in-bytec-19057013</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34944%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20bytecodealliance%20wasmtime&amp;severity=medium&amp;id=69d7f88c1cc7ad14da0c16f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34943-cwe-248-uncaught-exception-in-bytec-2b6ea09e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34943%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20bytecodealliance%20wasmtime&amp;severity=medium&amp;id=69d7f88c1cc7ad14da0c16f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34942-cwe-129-improper-validation-of-arra-8b6d6f53</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34942%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20bytecodealliance%20wasmtime&amp;severity=medium&amp;id=69d806d51cc7ad14da15a669</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34941-cwe-125-out-of-bounds-read-in-bytec-44d942e6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34941%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20bytecodealliance%20wasmtime&amp;severity=medium&amp;id=69d843791cc7ad14da3fb68c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stealer-campaign-impacting-sltt-macos-users-463cbc4e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Stealer%20Campaign%20Impacting%20SLTT%20macOS%20Users&amp;severity=medium&amp;id=69d7f1821cc7ad14da06f834</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1584-null-pointer-dereference-in-red-hat--56fa43b6</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1584%3A%20NULL%20Pointer%20Dereference%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=69d7ee091cc7ad14da04a8bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5971-improper-neutralization-of-directive-5770f87f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5971%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20in%20FoundationAgents%20MetaGPT&amp;severity=medium&amp;id=69d7ee091cc7ad14da04a8d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39911-cwe-668-exposure-of-resource-to-wro-9576e92f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39911%3A%20CWE-668%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20hashgraph%20guardian&amp;severity=high&amp;id=69d7ee091cc7ad14da04a8ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39315-cwe-184-incomplete-list-of-disallow-a8a63c9e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39315%3A%20CWE-184%3A%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20unjs%20unhead&amp;severity=medium&amp;id=69d7ee091cc7ad14da04a8c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5329-cwe-20-improper-input-validation-in--bf8aa5a7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5329%3A%20CWE-20%20Improper%20input%20validation%20in%20Rapid7%20Velociraptor&amp;severity=high&amp;id=69d7ee091cc7ad14da04a8d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35207-cwe-295-improper-certificate-valida-e017082c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35207%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20linuxdeepin%20dde-control-center&amp;severity=medium&amp;id=69d7ee091cc7ad14da04a8c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/this-fake-windows-support-website-delivers-passwor-edce3a29</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=This%20fake%20Windows%20support%20website%20delivers%20password-stealing%20malware&amp;severity=medium&amp;id=69d7e6f61cc7ad14dafe7e5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40072-cwe-918-server-side-request-forgery-61669d9c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40072%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ethereum%20web3.py&amp;severity=low&amp;id=69d7e6ff1cc7ad14dafe8de8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40070-cwe-347-improper-verification-of-cr-caaefd13</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40070%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20sgbett%20bsv-ruby-sdk&amp;severity=high&amp;id=69d7e6ff1cc7ad14dafe8de1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40069-cwe-754-improper-check-for-unusual--107e7303</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40069%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20sgbett%20bsv-ruby-sdk&amp;severity=high&amp;id=69d7e6ff1cc7ad14dafe8dda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39987-cwe-306-missing-authentication-for--7b043647</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39987%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20marimo-team%20marimo&amp;severity=critical&amp;id=69d7e6ff1cc7ad14dafe8dec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39961-cwe-269-improper-privilege-manageme-9281336f</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39961%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20aiven%20aiven-operator&amp;severity=medium&amp;id=69d843791cc7ad14da3fb693</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39985-cwe-601-url-redirection-to-untruste-53c41450</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39985%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20aces%20Loris&amp;severity=medium&amp;id=69d843791cc7ad14da3fb69d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39983-cwe-93-improper-neutralization-of-c-5c3326f7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39983%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20patrickjuchli%20basic-ftp&amp;severity=high&amp;id=69d806d51cc7ad14da15a66c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39981-cwe-22-improper-limitation-of-a-pat-3d5cb72d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39981%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Josh-XT%20AGiXT&amp;severity=high&amp;id=69d843791cc7ad14da3fb698</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5970-code-injection-in-foundationagents-m-8f8c046d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5970%3A%20Code%20Injection%20in%20FoundationAgents%20MetaGPT&amp;severity=medium&amp;id=69d7ee091cc7ad14da04a8dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39980-cwe-1336-improper-neutralization-of-06ee5ee4</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39980%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20OpenCTI-Platform%20opencti&amp;severity=critical&amp;id=69d7f88e1cc7ad14da0c17a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39976-cwe-287-improper-authentication-in--ed402c61</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39976%3A%20CWE-287%3A%20Improper%20Authentication%20in%20laravel%20passport&amp;severity=high&amp;id=69d7dc7c1cc7ad14daf451de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39974-cwe-918-server-side-request-forgery-b8153f8d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39974%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20czlonkowski%20n8n-mcp&amp;severity=high&amp;id=69d7dc7c1cc7ad14daf451d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39972-cwe-1289-improper-validation-of-uns-b2f4daad</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39972%3A%20CWE-1289%3A%20Improper%20Validation%20of%20Unsafe%20Equivalence%20in%20Input%20in%20dunglas%20mercure&amp;severity=high&amp;id=69d7dc7c1cc7ad14daf451d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5962-path-traversal-in-tenda-ch22-8c2770fd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5962%3A%20Path%20Traversal%20in%20Tenda%20CH22&amp;severity=medium&amp;id=69d7dc7c1cc7ad14daf451e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39959-cwe-770-allocation-of-resources-wit-3b1278fa</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39959%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20tmds%20Tmds.DBus&amp;severity=high&amp;id=69d7dc7c1cc7ad14daf451d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39958-cwe-93-improper-neutralization-of-c-87cdf680</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39958%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20AOSC-Dev%20oma&amp;severity=medium&amp;id=69d7dc7c1cc7ad14daf451cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5961-sql-injection-in-code-projects-simpl-212dd00d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5961%3A%20SQL%20Injection%20in%20code-projects%20Simple%20IT%20Discussion%20Forum&amp;severity=medium&amp;id=69d7d5661cc7ad14daeeafc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39957-cwe-863-incorrect-authorization-in--e2f07009</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39957%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20LycheeOrg%20Lychee&amp;severity=low&amp;id=69d7d5661cc7ad14daeeafbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39856-cwe-125-out-of-bounds-read-in-mtroj-7ec6c2c8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39856%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20mtrojnar%20osslsigncode&amp;severity=medium&amp;id=69d7d5661cc7ad14daeeafb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39855-cwe-125-out-of-bounds-read-in-mtroj-d24019ff</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39855%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20mtrojnar%20osslsigncode&amp;severity=medium&amp;id=69d7d5661cc7ad14daeeafb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40046-cwe-190-integer-overflow-or-wraparo-44ec5833</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40046%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Apache%20Software%20Foundation%20Apache%20ActiveMQ&amp;severity=high&amp;id=69d7d5661cc7ad14daeeafc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33005-cwe-274-improper-handling-of-insuff-ac9e3c46</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33005%3A%20CWE-274%20Improper%20Handling%20of%20Insufficient%20Privileges%20in%20Apache%20Software%20Foundation%20Apache%20OpenMeetings&amp;severity=medium&amp;id=69d7ce5e1cc7ad14dae8f912</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33266-cwe-321-use-of-hard-coded-cryptogra-2ef088ef</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33266%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Apache%20Software%20Foundation%20Apache%20OpenMeetings&amp;severity=high&amp;id=69d7ce5e1cc7ad14dae8f916</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34020-cwe-598-use-of-get-request-method-w-60f3b614</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34020%3A%20CWE-598%20Use%20of%20GET%20Request%20Method%20With%20Sensitive%20Query%20Strings%20in%20Apache%20Software%20Foundation%20Apache%20OpenMeetings&amp;severity=high&amp;id=69d7ce5e1cc7ad14dae8f919</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39853-cwe-121-stack-based-buffer-overflow-b0fc9cb2</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39853%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20mtrojnar%20osslsigncode&amp;severity=high&amp;id=69d7ce5e1cc7ad14dae8f922</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39843-cwe-918-server-side-request-forgery-320d8b73</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39843%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20makeplane%20plane&amp;severity=high&amp;id=69d7ce5e1cc7ad14dae8f91f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39941-cwe-79-improper-neutralization-of-i-7e221f3f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39941%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=medium&amp;id=69d7ce5e1cc7ad14dae8f927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5960-information-disclosure-in-code-proje-0cffe94e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5960%3A%20Information%20Disclosure%20in%20code-projects%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=69d843791cc7ad14da3fb6b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14551-cwe-1258-exposure-of-sensitive-syst-9638ed34</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14551%3A%20CWE-1258%20Exposure%20of%20sensitive%20system%20information%20due%20to%20uncleared%20debug%20information%20in%20Canonical%20Ubuntu&amp;severity=low&amp;id=69d843791cc7ad14da3fb6a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15480-cwe-1258-exposure-of-sensitive-syst-91250a7b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15480%3A%20CWE-1258%20Exposure%20of%20sensitive%20system%20information%20due%20to%20uncleared%20debug%20information%20in%20Canonical%20Ubuntu&amp;severity=low&amp;id=69d843791cc7ad14da3fb6a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35041-cwe-1333-inefficient-regular-expres-03a72d0b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35041%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20nearform%20fast-jwt&amp;severity=medium&amp;id=69d7d5661cc7ad14daeeafcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35040-cwe-697-incorrect-comparison-in-nea-15fbf83e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35040%3A%20CWE-697%3A%20Incorrect%20Comparison%20in%20nearform%20fast-jwt&amp;severity=medium&amp;id=69d843791cc7ad14da3fb6ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4878-time-of-check-time-of-use-toctou-rac-180716e1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4878%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Red%20Hat%20Red%20Hat%20Hardened%20Images&amp;severity=medium&amp;id=69d7ce5e1cc7ad14dae8f92c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5439-cwe-770-allocation-of-resources-with-074c2bff</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5439%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Orthanc%20DICOM%20Server&amp;severity=high&amp;id=69d7bcce1cc7ad14dad7b6e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5437-cwe-125-out-of-bounds-read-in-orthan-293b06ad</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5437%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Orthanc%20DICOM%20Server&amp;severity=high&amp;id=69d7bccb1cc7ad14dad7b13d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5438-cwe-770-allocation-of-resources-with-79ed6dbd</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5438%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Orthanc%20DICOM%20Server&amp;severity=high&amp;id=69d7bcce1cc7ad14dad7b6df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5440-cwe-770-allocation-of-resources-with-06df998f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5440%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Orthanc%20DICOM%20Server&amp;severity=high&amp;id=69d7bcce1cc7ad14dad7b6eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5442-cwe-190-integer-overflow-or-wraparou-82cdd837</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5442%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Orthanc%20DICOM%20Server&amp;severity=critical&amp;id=69d7bcce1cc7ad14dad7b6f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5443-cwe-190-integer-overflow-or-wraparou-81ca17a5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5443%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Orthanc%20DICOM%20Server&amp;severity=critical&amp;id=69d7bcce1cc7ad14dad7b6fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5445-cwe-125-out-of-bounds-read-in-orthan-76abb402</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5445%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Orthanc%20DICOM%20Server&amp;severity=critical&amp;id=69d7bcce1cc7ad14dad7b704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5444-cwe-190-integer-overflow-or-wraparou-9c148454</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5444%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Orthanc%20DICOM%20Server&amp;severity=high&amp;id=69d7bcce1cc7ad14dad7b6ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5441-cwe-125-out-of-bounds-read-in-orthan-a48040f3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5441%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Orthanc%20DICOM%20Server&amp;severity=high&amp;id=69d7bcce1cc7ad14dad7b6f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34757-cwe-416-use-after-free-in-pnggroup--e7c61505</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34757%3A%20CWE-416%3A%20Use%20After%20Free%20in%20pnggroup%20libpng&amp;severity=medium&amp;id=69d7bccb1cc7ad14dad7b12a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34578-cwe-90-improper-neutralization-of-s-17b84668</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34578%3A%20CWE-90%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20LDAP%20Query%20(&apos;LDAP%20Injection&apos;)%20in%20opnsense%20core&amp;severity=high&amp;id=69d7bccb1cc7ad14dad7b126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5959-improper-authentication-in-glinet-gl-10bc5666</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5959%3A%20Improper%20Authentication%20in%20GL.iNet%20GL-RM1&amp;severity=high&amp;id=69d7bcce1cc7ad14dad7b709</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4116-cwe-176-improper-handling-of-unicode-8fb56da1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4116%3A%20CWE-176%20Improper%20handling%20of%20unicode%20encoding%20in%20SonicWall%20SMA1000&amp;severity=high&amp;id=69d7bccb1cc7ad14dad7b13a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4114-cwe-176-improper-handling-of-unicode-d58b930d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4114%3A%20CWE-176%20Improper%20handling%20of%20unicode%20encoding%20in%20SonicWall%20SMA1000&amp;severity=null&amp;id=69d7bccb1cc7ad14dad7b137</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4113-cwe-204-observable-response-discrepa-f4d701a4</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4113%3A%20CWE-204%20Observable%20response%20discrepancy%20in%20SonicWall%20SMA1000&amp;severity=high&amp;id=69d7bccb1cc7ad14dad7b134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4112-cwe-89-improper-neutralization-of-sp-b9df2c98</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4112%3A%20CWE-89%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20injection&apos;)%20in%20SonicWall%20SMA1000&amp;severity=null&amp;id=69d7bccb1cc7ad14dad7b131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4660-cwe-200-exposure-of-sensitive-inform-dbd7d623</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4660%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20HashiCorp%20Tooling&amp;severity=high&amp;id=69d7b5c31cc7ad14dad0f199</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-intelligence-ai-guardrails-bypassed-in-new-a-79953f19</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Intelligence%20AI%20Guardrails%20Bypassed%20in%20New%20Attack&amp;severity=medium&amp;id=69d7aeb91cc7ad14dac9d0e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/can-we-trust-ai-no-but-eventually-we-must-e2dcb60f</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Can%20We%20Trust%20AI%3F%20No%20%E2%80%93%20But%20Eventually%20We%20Must&amp;severity=medium&amp;id=69d7ab341cc7ad14dac63dde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2519-cwe-472-external-control-of-assumed--f77b1e5e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2519%3A%20CWE-472%20External%20Control%20of%20Assumed-Immutable%20Web%20Parameter%20in%20ladela%20Online%20Scheduling%20and%20Appointment%20Booking%20System%20%E2%80%93%20Bookly&amp;severity=medium&amp;id=69d8437c1cc7ad14da3fb791</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3005-cwe-79-improper-neutralization-of-in-f4313294</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3005%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fernandobt%20List%20category%20posts&amp;severity=medium&amp;id=69d7e6ff1cc7ad14dafe8df1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-api-keys-in-android-apps-expose-gemini-endp-14a569b2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20API%20Keys%20in%20Android%20Apps%20Expose%20Gemini%20Endpoints%20to%20Unauthorized%20Access&amp;severity=medium&amp;id=69d79d241cc7ad14daba7bed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/palo-alto-networks-sonicwall-patch-high-severity-v-2ff5737b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Palo%20Alto%20Networks%2C%20SonicWall%20Patch%20High-Severity%20Vulnerabilities&amp;severity=high&amp;id=69d7961c1cc7ad14dab19540</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57735-cwe-613-insufficient-session-expira-9dc4a2f3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57735%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=critical&amp;id=69d78b8f1cc7ad14daa6c55e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-hidden-roi-of-visibility-better-decisions-bett-17805858</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Hidden%20ROI%20of%20Visibility%3A%20Better%20Decisions%2C%20Better%20Behavior%2C%20Better%20Security&amp;severity=medium&amp;id=69d788131cc7ad14daa31486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1490-cwe-94-improper-control-of-generatio-5517fc7b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1490%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20WAGO%20CC100%20(0751-9x01)&amp;severity=high&amp;id=69d78b8f1cc7ad14daa6c55a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-bts-arirang-tour-tickets-k-pop-fans-being-tar-0be0f8a4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20BTS%20ARIRANG%20tour%20tickets%3A%20K-pop%20fans%20being%20targeted%20by%20scammers%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69d843531cc7ad14da3f941e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-long-road-to-your-crypto-clipbanker-and-its-ma-4b0c512e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20long%20road%20to%20your%20crypto%3A%20ClipBanker%20and%20its%20marathon%20infection%20chain&amp;severity=medium&amp;id=69d7edfe1cc7ad14da04a129</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-warns-of-new-campaign-targeting-bpos-to-ste-2ae94a62</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Warns%20of%20New%20Campaign%20Targeting%20BPOs%20to%20Steal%20Corporate%20Data&amp;severity=medium&amp;id=69d776771cc7ad14da90de65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34185-cwe-89-improper-neutralization-of-s-b24b909e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34185%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Hydrosystem%20Control%20System&amp;severity=high&amp;id=69d779fb1cc7ad14da954be3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34184-cwe-862-missing-authorization-in-hy-99f5b924</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34184%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Hydrosystem%20Control%20System&amp;severity=high&amp;id=69d779fb1cc7ad14da954bdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4901-cwe-532-insertion-of-sensitive-infor-8b7a094e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4901%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Hydrosystem%20Control%20System&amp;severity=medium&amp;id=69d779fb1cc7ad14da954be7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62188-cwe-200-exposure-of-sensitive-infor-99fa2049</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62188%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Apache%20Software%20Foundation%20Apache%20DolphinScheduler&amp;severity=high&amp;id=69d779fb1cc7ad14da954bdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34179-cwe-915-improperly-controlled-modif-752fa0b8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34179%3A%20CWE-915%20Improperly%20controlled%20modification%20of%20Dynamically-Determined%20object%20attributes%20in%20Canonical%20lxd&amp;severity=critical&amp;id=69d773081cc7ad14da8bdc23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34178-cwe-20-improper-input-validation-in-47a9832a</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34178%3A%20CWE-20%20Improper%20input%20validation%20in%20Canonical%20lxd&amp;severity=critical&amp;id=69d773081cc7ad14da8bdc1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34177-cwe-184-incomplete-list-of-disallow-fcea39f7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34177%3A%20CWE-184%20Incomplete%20list%20of%20disallowed%20inputs%20in%20Canonical%20lxd&amp;severity=critical&amp;id=69d773081cc7ad14da8bdc1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34538-cwe-668-exposure-of-resource-to-wro-0014a9aa</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34538%3A%20CWE-668%3A%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=medium&amp;id=69d773081cc7ad14da8bdc27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/adobe-reader-zero-day-exploited-for-months-researc-bb17e8d5</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Adobe%20Reader%20Zero-Day%20Exploited%20for%20Months%3A%20Researcher&amp;severity=medium&amp;id=69d768671cc7ad14da81cf4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/300000-people-impacted-by-eurail-data-breach-a952810e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=300%2C000%20People%20Impacted%20by%20Eurail%20Data%20Breach&amp;severity=medium&amp;id=69d764e31cc7ad14da7ab3e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5854-os-command-injection-in-totolink-a71-6aac9f98</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5854%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d7ab3c1cc7ad14dac63fc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/36-million-stolen-in-bitcoin-depot-hack-9a950dd5</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%243.6%20Million%20Stolen%20in%20Bitcoin%20Depot%20Hack&amp;severity=medium&amp;id=69d74c471cc7ad14da5c17cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5853-os-command-injection-in-totolink-a71-2b9f2bf4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5853%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d843791cc7ad14da3fb6b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5852-os-command-injection-in-totolink-a71-675e6a7d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5852%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d7d5661cc7ad14daeeafd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5851-os-command-injection-in-totolink-a71-cec71662</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5851%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d745461cc7ad14da533b28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5850-os-command-injection-in-totolink-a71-c437d074</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5850%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=69d745461cc7ad14da533b21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5849-path-traversal-in-tenda-i12-633437ed</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5849%3A%20Path%20Traversal%20in%20Tenda%20i12&amp;severity=medium&amp;id=69d73e371cc7ad14da48c73d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5848-code-injection-in-jeecgboot-jimurepo-5ed759a0</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5848%3A%20Code%20Injection%20in%20jeecgboot%20JimuReport&amp;severity=medium&amp;id=69d73e371cc7ad14da48c735</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5847-information-disclosure-in-code-proje-2971db23</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5847%3A%20Information%20Disclosure%20in%20code-projects%20Movie%20Ticketing%20System&amp;severity=medium&amp;id=69d733ab1cc7ad14da3bfe82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5844-os-command-injection-in-d-link-dir-8-643de94e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5844%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-882&amp;severity=high&amp;id=69d733ab1cc7ad14da3bfe7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5842-authorization-bypass-in-decolua-9rou-1a856ee8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5842%3A%20Authorization%20Bypass%20in%20decolua%209router&amp;severity=medium&amp;id=69d733ab1cc7ad14da3bfe71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5841-path-traversal-in-tenda-i3-164f6532</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5841%3A%20Path%20Traversal%20in%20Tenda%20i3&amp;severity=medium&amp;id=69d733ab1cc7ad14da3bfe6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5840-sql-injection-in-phpgurukul-news-por-954d6b68</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5840%3A%20SQL%20Injection%20in%20PHPGurukul%20News%20Portal%20Project&amp;severity=medium&amp;id=69d729211cc7ad14da1b3396</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5839-sql-injection-in-phpgurukul-news-por-8075a883</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5839%3A%20SQL%20Injection%20in%20PHPGurukul%20News%20Portal%20Project&amp;severity=medium&amp;id=69d729211cc7ad14da1b338f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5838-sql-injection-in-phpgurukul-news-por-cde1d916</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5838%3A%20SQL%20Injection%20in%20PHPGurukul%20News%20Portal%20Project&amp;severity=medium&amp;id=69d729211cc7ad14da1b3388</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5742-cwe-79-improper-neutralization-of-in-075f568f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5742%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20stiofansisland%20UsersWP%20%E2%80%93%20Front-end%20login%20form%2C%20User%20Registration%2C%20User%20Profile%20%26%20Members%20Directory%20plugin%20for%20WP&amp;severity=medium&amp;id=69d729211cc7ad14da1b337b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4336-cwe-79-improper-neutralization-of-in-a8fdf393</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4336%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rustaurius%20Ultimate%20FAQ%20Accordion%20Plugin&amp;severity=medium&amp;id=69d729211cc7ad14da1b3371</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1830-cwe-862-missing-authorization-in-dav-233f04bb</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1830%3A%20CWE-862%20Missing%20Authorization%20in%20davidfcarr%20Quick%20Playground&amp;severity=critical&amp;id=69d729211cc7ad14da1b336b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5837-sql-injection-in-phpgurukul-news-por-ed5b132e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5837%3A%20SQL%20Injection%20in%20PHPGurukul%20News%20Portal%20Project&amp;severity=medium&amp;id=69d71b0f1cc7ad14da048d1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5836-cross-site-scripting-in-code-project-5aecdbe0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5836%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Online%20Shoe%20Store&amp;severity=medium&amp;id=69d71b0f1cc7ad14da048d13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5835-cross-site-scripting-in-code-project-c85ef674</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5835%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Online%20Shoe%20Store&amp;severity=medium&amp;id=69d71b0f1cc7ad14da048d0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5834-cross-site-scripting-in-code-project-5de33a51</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5834%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Online%20Shoe%20Store&amp;severity=medium&amp;id=69d71b0f1cc7ad14da048d05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3568-cwe-639-authorization-bypass-through-4f70d3ac</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3568%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20inspireui%20MStore%20API%20%E2%80%93%20Create%20Native%20Android%20%26%20iOS%20Apps%20On%20The%20Cloud&amp;severity=medium&amp;id=69d71b0f1cc7ad14da048cc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3574-cwe-79-improper-neutralization-of-in-05424aae</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3574%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20uxdexperts%20Experto%20Dashboard%20for%20WooCommerce&amp;severity=medium&amp;id=69d71b0f1cc7ad14da048cd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4429-cwe-79-improper-neutralization-of-in-1c6cee7c</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4429%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20photoweblog%20OSM%20%E2%80%93%20OpenStreetMap&amp;severity=medium&amp;id=69d71b0f1cc7ad14da048ce7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5357-cwe-79-improper-neutralization-of-in-e6dba13a</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5357%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codename065%20Download%20Manager&amp;severity=medium&amp;id=69d71b0f1cc7ad14da048cf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4124-cwe-862-missing-authorization-in-oli-51e7aa24</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4124%3A%20CWE-862%20Missing%20Authorization%20in%20oliverfriedmann%20Ziggeo&amp;severity=medium&amp;id=69d71b0f1cc7ad14da048cd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5833-command-injection-in-awwaiid-mcp-ser-701bd158</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5833%3A%20Command%20Injection%20in%20awwaiid%20mcp-server-taskwarrior&amp;severity=medium&amp;id=69d71b0f1cc7ad14da048cfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5832-server-side-request-forgery-in-atoto-14e72165</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5832%3A%20Server-Side%20Request%20Forgery%20in%20atototo%20api-lab-mcp&amp;severity=medium&amp;id=69d736f91cc7ad14da418a41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-thursday-april-9th-2026-httpsisc-a0436d63</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Thursday%2C%20April%209th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9886%2C%20(Thu%2C%20Apr%209th)&amp;severity=medium&amp;id=69d7097b1cc7ad14daf111f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5831-os-command-injection-in-agions-taskf-212bac83</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5831%3A%20OS%20Command%20Injection%20in%20Agions%20taskflow-ai&amp;severity=medium&amp;id=69d736f91cc7ad14da418a38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5830-stack-based-buffer-overflow-in-tenda-981c5f43</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5830%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC15&amp;severity=high&amp;id=69d736f91cc7ad14da418a31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4326-cwe-862-missing-authorization-in-web-dd66b007</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4326%3A%20CWE-862%20Missing%20Authorization%20in%20webilia%20Vertex%20Addons%20for%20Elementor&amp;severity=high&amp;id=69d736f91cc7ad14da418a25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shaky-ceasefire-unlikely-to-stop-cyberattacks-from-6f18e0b3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shaky%20Ceasefire%20Unlikely%20to%20Stop%20Cyberattacks%20From%20Iran-Linked%20Hackers%20for%20Long&amp;severity=medium&amp;id=69d702731cc7ad14daeb9723</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5829-sql-injection-in-code-projects-simpl-29fb31de</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5829%3A%20SQL%20Injection%20in%20code-projects%20Simple%20IT%20Discussion%20Forum&amp;severity=medium&amp;id=69d736f91cc7ad14da418a50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5828-sql-injection-in-code-projects-simpl-1d307435</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5828%3A%20SQL%20Injection%20in%20code-projects%20Simple%20IT%20Discussion%20Forum&amp;severity=medium&amp;id=69d736f91cc7ad14da418a49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/number-usage-in-passwords-take-two-thu-apr-9th-403df6ed</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Number%20Usage%20in%20Passwords%3A%20Take%20Two%2C%20(Thu%2C%20Apr%209th)&amp;severity=medium&amp;id=69d6fb701cc7ad14dae5c803</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5827-sql-injection-in-code-projects-simpl-99d025b7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5827%3A%20SQL%20Injection%20in%20code-projects%20Simple%20IT%20Discussion%20Forum&amp;severity=medium&amp;id=69d6f7e71cc7ad14dadd0205</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5826-cross-site-scripting-in-code-project-39d2de4c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5826%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20IT%20Discussion%20Forum&amp;severity=medium&amp;id=69d6f7e71cc7ad14dadd01fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5825-cross-site-scripting-in-code-project-cbb32e8a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5825%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69d6f7e71cc7ad14dadd01f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-10-8f59087b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-10&amp;severity=medium&amp;id=69d92a5f1cc7ad14dad12fb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63238-na-9f8a7fac</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63238%3A%20n%2Fa&amp;severity=medium&amp;id=69d843791cc7ad14da3fb68f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70797-na-541710b7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70797%3A%20n%2Fa&amp;severity=medium&amp;id=69d843771cc7ad14da3fb5e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zsh-59-rce-38823372</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ZSH%205.9%20-%20RCE&amp;severity=critical&amp;id=69d842c21cc7ad14da3f5b1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jumbo-website-manager-remote-code-execution-e1adfaac</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Jumbo%20Website%20Manager%20%20-%20Remote%20Code%20Execution&amp;severity=critical&amp;id=69d842c21cc7ad14da3f5b15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/romm-440-xsscsrf-chain-26560fa6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RomM%20%204.4.0%20-%20%20XSS_CSRF%20Chain&amp;severity=medium&amp;id=69d842c21cc7ad14da3f5b10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/react-server-1920-remote-code-execution-a47c1524</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=React%20Server%2019.2.0%20-%20Remote%20Code%20Execution&amp;severity=critical&amp;id=69d842c21cc7ad14da3f5b0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-09-529a6852</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-09&amp;severity=medium&amp;id=69d83ed21cc7ad14da370704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30478-na-6c9f2b00</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30478%3A%20n%2Fa&amp;severity=high&amp;id=69d814ae1cc7ad14da216545</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29923-na-d93035f5</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29923%3A%20n%2Fa&amp;severity=high&amp;id=69d7ff941cc7ad14da10e9d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31170-na-b6e95fba</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31170%3A%20n%2Fa&amp;severity=critical&amp;id=69d7f88c1cc7ad14da0c16f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30479-na-433cc714</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30479%3A%20n%2Fa&amp;severity=critical&amp;id=69d7d5661cc7ad14daeeafae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70365-na-eb904860</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70365%3A%20n%2Fa&amp;severity=medium&amp;id=69d7ce5e1cc7ad14dae8f90e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70364-na-586092fd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70364%3A%20n%2Fa&amp;severity=high&amp;id=69d7ce5e1cc7ad14dae8f90a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70811-na-92c3ea46</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70811%3A%20n%2Fa&amp;severity=medium&amp;id=69d7bccb1cc7ad14dad7b121</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70810-na-aca56658</loc>
    <lastmod>2026-04-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70810%3A%20n%2Fa&amp;severity=high&amp;id=69d7bccb1cc7ad14dad7b11c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50228-na-e450932f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50228%3A%20n%2Fa&amp;severity=critical&amp;id=69d7bccb1cc7ad14dad7b117</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45806-na-0e08cff6</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45806%3A%20n%2Fa&amp;severity=medium&amp;id=69d7b5c31cc7ad14dad0f194</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-09-e95f5b79</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-09&amp;severity=low&amp;id=69d780fb1cc7ad14da9b687c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5824-sql-injection-in-code-projects-simpl-13fb8677</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5824%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69d6ed861cc7ad14dac7072b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5823-sql-injection-in-itsourcecode-constr-d97f737e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5823%3A%20SQL%20Injection%20in%20itsourcecode%20Construction%20Management%20System&amp;severity=medium&amp;id=69d6e9e31cc7ad14dac41f41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5815-stack-based-buffer-overflow-in-d-lin-6637b7b7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5815%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-645&amp;severity=high&amp;id=69d6e6551cc7ad14dac1d68e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5814-sql-injection-in-phpgurukul-online-c-86739237</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5814%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Course%20Registration&amp;severity=medium&amp;id=69d6e6551cc7ad14dac1d687</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5813-sql-injection-in-phpgurukul-online-c-05695093</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5813%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Course%20Registration&amp;severity=medium&amp;id=69d6df4b1cc7ad14dabe8749</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5812-business-logic-errors-in-sourcecodes-bdf698b9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5812%3A%20Business%20Logic%20Errors%20in%20SourceCodester%20Pharmacy%20Product%20Management%20System&amp;severity=medium&amp;id=69d6dbd71cc7ad14dabd4729</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3199-cwe-502-deserialization-of-untrusted-067114aa</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3199%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Sonatype%20Nexus%20Repository&amp;severity=critical&amp;id=69d6d8431cc7ad14dabb05cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3438-cwe-79-improper-neutralization-of-in-86971f0a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3438%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Sonatype%20Nexus%20Repository&amp;severity=medium&amp;id=69d6d8431cc7ad14dabb05d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5811-business-logic-errors-in-sourcecodes-5f8fd1d9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5811%3A%20Business%20Logic%20Errors%20in%20SourceCodester%20Online%20Food%20Ordering%20System&amp;severity=medium&amp;id=69d6d8431cc7ad14dabb05d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5810-cross-site-scripting-in-sourcecodest-fc4b6522</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5810%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69d6d13b1cc7ad14dab766c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40036-cwe-770-allocation-of-resources-wit-a6778d4e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40036%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20obsidianforensics%20unfurl&amp;severity=high&amp;id=69d6d13b1cc7ad14dab766cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40035-cwe-489-active-debug-code-in-obsidi-883d1265</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40035%3A%20CWE-489%20Active%20Debug%20Code%20in%20obsidianforensics%20unfurl&amp;severity=critical&amp;id=69d6d13b1cc7ad14dab766cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40032-improper-neutralization-of-special--b7859277</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40032%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20tclahr%20UAC&amp;severity=high&amp;id=69d6cdb91cc7ad14dab5bfaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40031-cwe-427-uncontrolled-search-path-el-86bb5af2</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40031%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20ufrisk%20MemProcFS&amp;severity=high&amp;id=69d6cdb91cc7ad14dab5bfa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40030-improper-neutralization-of-special--e7e4c480</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40030%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20khyrenz%20parseusbs&amp;severity=high&amp;id=69d6cdb91cc7ad14dab5bfa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40029-improper-neutralization-of-special--af174d66</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40029%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20khyrenz%20parseusbs&amp;severity=high&amp;id=69d6cdb91cc7ad14dab5bf9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40028-cwe-79-improper-neutralization-of-i-f38ecff8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40028%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Yamato-Security%20hayabusa&amp;severity=medium&amp;id=69d6cdb91cc7ad14dab5bf98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-40027-cwe-22-improper-limitation-of-a-pat-c5e77607</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-40027%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20abrignoni%20ALEAPP&amp;severity=high&amp;id=69d6cdb91cc7ad14dab5bf92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5808-cross-site-scripting-in-openstatushq-f958f2cf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5808%3A%20Cross%20Site%20Scripting%20in%20openstatusHQ%20openstatus&amp;severity=medium&amp;id=69d6cdb91cc7ad14dab5bfbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5711-cwe-79-improper-neutralization-of-in-b0a1f1ec</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5711%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pubudu-malalasekara%20Post%20Blocks%20%26%20Tools&amp;severity=medium&amp;id=69d6cdb91cc7ad14dab5bfb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5919-insufficient-validation-of-untrusted-cc335c74</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5919%3A%20Insufficient%20validation%20of%20untrusted%20input%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca441cc7ad14dab3ce63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5918-inappropriate-implementation-in-goog-85bbee64</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5918%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca421cc7ad14dab3ce0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5915-insufficient-validation-of-untrusted-40ff480c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5915%3A%20Insufficient%20validation%20of%20untrusted%20input%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca421cc7ad14dab3ce06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5914-type-confusion-in-google-chrome-d064b24a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5914%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca421cc7ad14dab3ce02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5913-out-of-bounds-read-in-google-chrome-4fd648ea</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5913%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca421cc7ad14dab3cdfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5912-integer-overflow-in-google-chrome-73decb5a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5912%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca421cc7ad14dab3cdfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5911-policy-bypass-in-google-chrome-bc41f8ef</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5911%3A%20Policy%20bypass%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca421cc7ad14dab3cdf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5910-integer-overflow-in-google-chrome-bb2b2b54</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5910%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca421cc7ad14dab3cdf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5909-integer-overflow-in-google-chrome-9cd1c959</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5909%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca421cc7ad14dab3cdee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5908-integer-overflow-in-google-chrome-8af47645</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5908%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca421cc7ad14dab3cdea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5907-insufficient-data-validation-in-goog-b8535f82</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5907%3A%20Insufficient%20data%20validation%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca421cc7ad14dab3cde6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5906-incorrect-security-ui-in-google-chro-e55741d0</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5906%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca401cc7ad14dab3cdb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5905-incorrect-security-ui-in-google-chro-b1cc01f1</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5905%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca401cc7ad14dab3cdb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5904-use-after-free-in-google-chrome-033227fd</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5904%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca401cc7ad14dab3cdb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5903-policy-bypass-in-google-chrome-8f14a797</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5903%3A%20Policy%20bypass%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca401cc7ad14dab3cdac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5902-race-in-google-chrome-32d92464</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5902%3A%20Race%20in%20Google%20Chrome&amp;severity=critical&amp;id=69d6ca401cc7ad14dab3cda8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5901-policy-bypass-in-google-chrome-0f88b312</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5901%3A%20Policy%20bypass%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca401cc7ad14dab3cda4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5900-policy-bypass-in-google-chrome-1d248127</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5900%3A%20Policy%20bypass%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca401cc7ad14dab3cda0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5899-incorrect-security-ui-in-google-chro-e7632c22</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5899%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca401cc7ad14dab3cd9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5898-incorrect-security-ui-in-google-chro-1ea6a19c</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5898%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca401cc7ad14dab3cd98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5897-incorrect-security-ui-in-google-chro-f3fa91bb</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5897%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca401cc7ad14dab3cd94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5896-policy-bypass-in-google-chrome-4a875369</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5896%3A%20Policy%20bypass%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3e1cc7ad14dab3cd6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5895-incorrect-security-ui-in-google-chro-be6e597f</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5895%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3e1cc7ad14dab3cd66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5894-inappropriate-implementation-in-goog-2c81a6bf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5894%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3e1cc7ad14dab3cd62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5893-race-in-google-chrome-5ddb3cf9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5893%3A%20Race%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3e1cc7ad14dab3cd5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5892-insufficient-policy-enforcement-in-g-cb6c6b8d</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5892%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3e1cc7ad14dab3cd5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5891-insufficient-policy-enforcement-in-g-db71c088</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5891%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3e1cc7ad14dab3cd56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5890-race-in-google-chrome-cc385d34</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5890%3A%20Race%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3e1cc7ad14dab3cd52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5889-cryptographic-flaw-in-google-chrome-df3ad6e9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5889%3A%20Cryptographic%20Flaw%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3e1cc7ad14dab3cd4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5888-uninitialized-use-in-google-chrome-b2563f01</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5888%3A%20Uninitialized%20Use%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3e1cc7ad14dab3cd4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5887-insufficient-validation-of-untrusted-d67fafeb</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5887%3A%20Insufficient%20validation%20of%20untrusted%20input%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3e1cc7ad14dab3cd46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5886-out-of-bounds-read-in-google-chrome-7ca4d0af</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5886%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3b1cc7ad14dab3cc77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5885-insufficient-validation-of-untrusted-4ffcbeb2</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5885%3A%20Insufficient%20validation%20of%20untrusted%20input%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3b1cc7ad14dab3cc73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5884-insufficient-validation-of-untrusted-119bb8eb</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5884%3A%20Insufficient%20validation%20of%20untrusted%20input%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca3b1cc7ad14dab3cc6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5883-use-after-free-in-google-chrome-adf1ec4a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5883%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3b1cc7ad14dab3cc6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5882-incorrect-security-ui-in-google-chro-700d0342</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5882%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3b1cc7ad14dab3cc67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5881-policy-bypass-in-google-chrome-e00814a7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5881%3A%20Policy%20bypass%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3b1cc7ad14dab3cc63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5880-incorrect-security-ui-in-google-chro-862c68eb</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5880%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3b1cc7ad14dab3cc5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5879-insufficient-validation-of-untrusted-bf0ed693</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5879%3A%20Insufficient%20validation%20of%20untrusted%20input%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca3b1cc7ad14dab3cc5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5878-incorrect-security-ui-in-google-chro-b56f6a3a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5878%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca3b1cc7ad14dab3cc57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5877-use-after-free-in-google-chrome-4281f5a2</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5877%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca3b1cc7ad14dab3cc53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5876-side-channel-information-leakage-in--bf8afdaa</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5876%3A%20Side-channel%20information%20leakage%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca391cc7ad14dab3cbcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5875-policy-bypass-in-google-chrome-f0e918b0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5875%3A%20Policy%20bypass%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca391cc7ad14dab3cbcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5874-use-after-free-in-google-chrome-f08fd110</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5874%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=critical&amp;id=69d6ca391cc7ad14dab3cbc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5873-out-of-bounds-read-and-write-in-goog-7d05a430</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5873%3A%20Out%20of%20bounds%20read%20and%20write%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca391cc7ad14dab3cbc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5872-use-after-free-in-google-chrome-6bf1af4b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5872%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca391cc7ad14dab3cbbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5871-type-confusion-in-google-chrome-061cf3d7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5871%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca391cc7ad14dab3cbbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5870-integer-overflow-in-google-chrome-734323c8</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5870%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca391cc7ad14dab3cbb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5869-heap-buffer-overflow-in-google-chrom-e9e2c0dd</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5869%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca391cc7ad14dab3cbb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5868-heap-buffer-overflow-in-google-chrom-a7f123ac</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5868%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca391cc7ad14dab3cbaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5867-heap-buffer-overflow-in-google-chrom-903da312</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5867%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca391cc7ad14dab3cbab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5866-use-after-free-in-google-chrome-ca9dddbd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5866%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca371cc7ad14dab3cb73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5865-type-confusion-in-google-chrome-eaffaa1e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5865%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca371cc7ad14dab3cb6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5864-heap-buffer-overflow-in-google-chrom-9e3c27ca</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5864%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=medium&amp;id=69d6ca371cc7ad14dab3cb6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5863-inappropriate-implementation-in-goog-eb628808</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5863%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca371cc7ad14dab3cb67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5862-inappropriate-implementation-in-goog-1605f1f1</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5862%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca371cc7ad14dab3cb63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5861-use-after-free-in-google-chrome-92acefd5</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5861%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca371cc7ad14dab3cb5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5860-use-after-free-in-google-chrome-4fcd253c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5860%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca371cc7ad14dab3cb5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5859-integer-overflow-in-google-chrome-baee9cba</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5859%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca371cc7ad14dab3cb57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5858-heap-buffer-overflow-in-google-chrom-15930810</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5858%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69d6ca371cc7ad14dab3cb53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5806-cross-site-scripting-in-code-project-8a977b91</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5806%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Easy%20Blog%20Site&amp;severity=medium&amp;id=69d6ca371cc7ad14dab3cb4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39860-cwe-61-unix-symbolic-link-symlink-f-8f2fa90c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39860%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20NixOS%20nix&amp;severity=critical&amp;id=69d6c32c1cc7ad14dab1ab39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39892-cwe-119-improper-restriction-of-ope-5b8d3307</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39892%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20pyca%20cryptography&amp;severity=medium&amp;id=69d6c32c1cc7ad14dab1ab4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39891-cwe-94-improper-control-of-generati-8cf06461</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39891%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69d6c32c1cc7ad14dab1ab4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39890-cwe-502-deserialization-of-untruste-f407d865</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39890%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20MervinPraison%20PraisonAI&amp;severity=critical&amp;id=69d6c32c1cc7ad14dab1ab47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39889-cwe-200-exposure-of-sensitive-infor-5cac7484</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39889%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69d6c32c1cc7ad14dab1ab44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39888-cwe-657-violation-of-secure-design--053285e2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39888%3A%20CWE-657%3A%20Violation%20of%20Secure%20Design%20Principles%20in%20MervinPraison%20praisonaiagents&amp;severity=critical&amp;id=69d6c32c1cc7ad14dab1ab41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39885-cwe-918-server-side-request-forgery-b0b6ba4a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39885%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20agentfront%20frontmcp&amp;severity=high&amp;id=69d6bfa81cc7ad14dab01ac0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5805-sql-injection-in-code-projects-easy--cac7f445</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5805%3A%20SQL%20Injection%20in%20code-projects%20Easy%20Blog%20Site&amp;severity=medium&amp;id=69d6bfa81cc7ad14dab01ad4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39883-cwe-426-untrusted-search-path-in-op-4a3a460e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39883%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20open-telemetry%20opentelemetry-go&amp;severity=high&amp;id=69d6bfa81cc7ad14dab01abc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5436-cwe-22-improper-limitation-of-a-path-ba455af8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5436%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20inc2734%20MW%20WP%20Form&amp;severity=high&amp;id=69d6bfa81cc7ad14dab01ac4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5451-cwe-79-improper-neutralization-of-in-9369247d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5451%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hupe13%20Extensions%20for%20Leaflet%20Map&amp;severity=medium&amp;id=69d6bfa81cc7ad14dab01acb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39882-cwe-789-memory-allocation-with-exce-341c852d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39882%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20open-telemetry%20opentelemetry-go&amp;severity=medium&amp;id=69d6bfa81cc7ad14dab01ab8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39429-cwe-862-missing-authorization-in-kc-6a375916</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39429%3A%20CWE-862%3A%20Missing%20Authorization%20in%20kcp-dev%20kcp&amp;severity=high&amp;id=69d6bc281cc7ad14daadeade</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5803-server-side-request-forgery-in-bigsk-0808d0e3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5803%3A%20Server-Side%20Request%20Forgery%20in%20bigsk1%20openai-realtime-ui&amp;severity=medium&amp;id=69d6bc281cc7ad14daadeae8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39844-cwe-22-improper-limitation-of-a-pat-2aa72956</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39844%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20zauberzeug%20nicegui&amp;severity=medium&amp;id=69d6bc281cc7ad14daadeae3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39416-cwe-79-improper-neutralization-of-i-710941ba</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39416%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ail-project%20ail-framework&amp;severity=high&amp;id=69d6bc281cc7ad14daadeada</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39415-cwe-602-client-side-enforcement-of--aa92afa9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39415%3A%20CWE-602%3A%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20frappe%20lms&amp;severity=medium&amp;id=69d6bc281cc7ad14daadead7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39880-cwe-362-concurrent-execution-using--486d98d7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39880%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20remnawave%20backend&amp;severity=medium&amp;id=69d6b51c1cc7ad14daaa5cf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5802-os-command-injection-in-idachev-mcp--44929899</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5802%3A%20OS%20Command%20Injection%20in%20idachev%20mcp-javadc&amp;severity=medium&amp;id=69d6b51c1cc7ad14daaa5cf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39862-cwe-78-improper-neutralization-of-s-e1fd5309</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39862%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Shopify%20tophat&amp;severity=medium&amp;id=69d6b51c1cc7ad14daaa5cec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39859-cwe-22-improper-limitation-of-a-pat-eb4e4019</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39859%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20harttle%20liquidjs&amp;severity=medium&amp;id=69d6b51c1cc7ad14daaa5ce9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39413-cwe-347-improper-verification-of-cr-65040a13</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39413%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20HKUDS%20LightRAG&amp;severity=medium&amp;id=69d6b51c1cc7ad14daaa5ce6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39412-cwe-200-exposure-of-sensitive-infor-c828575b</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39412%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20harttle%20liquidjs&amp;severity=medium&amp;id=69d6b1991cc7ad14daa7cb9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35525-cwe-61-unix-symbolic-link-symlink-f-c78ff532</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35525%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20harttle%20liquidjs&amp;severity=high&amp;id=69d6b1991cc7ad14daa7cb9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23869-cwe-502-deserialization-of-untruste-56f5fbec</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23869%3A%20(CWE-502)%20Deserialization%20of%20Untrusted%20Data%2C%20(CWE-400)%20Uncontrolled%20Resource%20Consumption%20in%20Meta%20react-server-dom-turbopack&amp;severity=high&amp;id=69d6b1991cc7ad14daa7cb97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/canis-c2-exposed-previously-undocumented-cross-pla-e1c0317e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Canis%20C2%20Exposed%3A%20Previously%20Undocumented%20Cross-Platform%20...&amp;severity=medium&amp;id=69d7e6f61cc7ad14dafe7e61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35455-cwe-79-improper-neutralization-of-i-573d1665</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35455%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20immich-app%20immich&amp;severity=high&amp;id=69d736f91cc7ad14da418a60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35446-cwe-552-files-or-directories-access-9eb009af</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35446%3A%20CWE-552%3A%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20aces%20Loris&amp;severity=high&amp;id=69d6bc281cc7ad14daadeafa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35403-cwe-79-improper-neutralization-of-i-664839e9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35403%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aces%20Loris&amp;severity=medium&amp;id=69d736f91cc7ad14da418a5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35400-cwe-59-improper-link-resolution-bef-9bad991e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35400%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20aces%20Loris&amp;severity=low&amp;id=69d6b51c1cc7ad14daaa5cfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35169-cwe-79-improper-neutralization-of-i-2c58241a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35169%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aces%20Loris&amp;severity=high&amp;id=69d736f91cc7ad14da418a5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35165-cwe-639-authorization-bypass-throug-77a552ef</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35165%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20aces%20Loris&amp;severity=medium&amp;id=69d6bc281cc7ad14daadeaf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34985-cwe-639-authorization-bypass-throug-b3f6cc2e</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34985%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20aces%20Loris&amp;severity=medium&amp;id=69d736f91cc7ad14da418a57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20709-escalation-of-privilege-in-intelr-p-4405e30a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20709%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Pentium(R)%20Processor%20Silver%20Series%2C%20Intel(R)%20Celeron(R)%20Processor%20J%20Series%2C%20Intel(R)%20Celeron(R)%20Processor%20N%20Series%20may%20allow%20an%20escalation%20of%20privilege.%20Hardware%20reverse%20engineer%20adversary%20with%20a%20privileged%20user%20combined%20with%20a%20high%20complexity%20attack%20may%20enable%20escalation%20of%20privilege.%20This%20result%20may%20potentially%20occur%20via%20physical%20access%20when%20attack%20requirements%20are%20present%20with%20special%20internal%20knowledge%20and%20requires%20no%20user%20interaction.%20The%20potential%20vulnerability%20may%20impact%20the%20confidentiality%20(high)%2C%20integrity%20(none)%20and%20availability%20(none)%20of%20the%20vulnerable%20system%2C%20resulting%20in%20subsequent%20system%20confidentiality%20(high)%2C%20integrity%20(high)%20and%20availability%20(none)%20impacts.&amp;severity=medium&amp;id=69d6b51c1cc7ad14daaa5cfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34392-cwe-552-files-or-directories-access-3dcf7cce</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34392%3A%20CWE-552%3A%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20aces%20Loris&amp;severity=high&amp;id=69d736fd1cc7ad14da418ad2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30818-cwe-78-improper-neutralization-of-s-1f2ec8c0</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30818%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20AX53%20v1.0&amp;severity=high&amp;id=69d6b19c1cc7ad14daa7cc65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30817-cwe-15-external-control-of-system-o-7377e4ef</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30817%3A%20CWE-15%20External%20control%20of%20system%20or%20configuration%20setting%20in%20TP-Link%20Systems%20Inc.%20AX53%20v1.0&amp;severity=medium&amp;id=69d6b1991cc7ad14daa7cbc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30816-cwe-15-external-control-of-system-o-ad8808da</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30816%3A%20CWE-15%20External%20control%20of%20system%20or%20configuration%20setting%20in%20TP-Link%20Systems%20Inc.%20AX53%20v1.0&amp;severity=medium&amp;id=69d6b1991cc7ad14daa7cbbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30815-cwe-78-improper-neutralization-of-s-e64f09b4</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30815%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20AX53%20v1.0&amp;severity=high&amp;id=69d6b1991cc7ad14daa7cbb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34166-cwe-400-uncontrolled-resource-consu-597ecf56</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34166%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20harttle%20liquidjs&amp;severity=low&amp;id=69d736fd1cc7ad14da418acd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30814-cwe-121-stack-based-buffer-overflow-55b44b4e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30814%3A%20CWE-121%20Stack-based%20buffer%20overflow%20in%20TP-Link%20Systems%20Inc.%20AX53%20v1.0&amp;severity=high&amp;id=69d6b1991cc7ad14daa7cbb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33350-cwe-89-improper-neutralization-of-s-91697de3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33350%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20aces%20Loris&amp;severity=high&amp;id=69d6b19c1cc7ad14daa7cc6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27806-cwe-78-improper-neutralization-of-s-ba7f9fe1</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27806%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20fleetdm%20fleet&amp;severity=high&amp;id=69d736fb1cc7ad14da418a9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30650-cwe-306-missing-authentication-for--762e46b9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30650%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69d6bc281cc7ad14daadeaf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0811-cwe-352-cross-site-request-forgery-c-3f34647d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0811%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20vsourz1td%20Advanced%20Contact%20form%207%20DB&amp;severity=medium&amp;id=69d6b1991cc7ad14daa7cba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0814-cwe-862-missing-authorization-in-vso-88777e5a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0814%3A%20CWE-862%20Missing%20Authorization%20in%20vsourz1td%20Advanced%20Contact%20form%207%20DB&amp;severity=medium&amp;id=69d736fb1cc7ad14da418a79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2942-cwe-434-unrestricted-upload-of-file--b7e9cbd0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2942%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20prosolution%20ProSolution%20WP%20Client&amp;severity=critical&amp;id=69d6b1991cc7ad14daa7cbae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/teampcp-supply-chain-campaign-update-007-cisco-sou-1add4738</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TeamPCP%20Supply%20Chain%20Campaign%3A%20Update%20007%20-%20Cisco%20Source%20Code%20Stolen%20via%20Trivy-Linked%20Breach%2C%20Google%20GTIG%20Tracks%20TeamPCP%20as%20UNC6780%2C%20and%20CISA%20KEV%20Deadline%20Arrives%20with%20No%20Standalone%20Advisory%2C%20(Wed%2C%20Apr%208th)&amp;severity=medium&amp;id=69d68e701cc7ad14da93c4ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32591-server-side-request-forgery-ssrf-in-522c3953</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32591%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Red%20Hat%20mirror%20registry%20for%20Red%20Hat%20OpenShift&amp;severity=medium&amp;id=69d737011cc7ad14da419497</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32590-deserialization-of-untrusted-data-i-2ac51227</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32590%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Red%20Hat%20mirror%20registry%20for%20Red%20Hat%20OpenShift&amp;severity=high&amp;id=69d6b19c1cc7ad14daa7cc6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32589-authorization-bypass-through-user-c-a7beb159</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32589%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Red%20Hat%20mirror%20registry%20for%20Red%20Hat%20OpenShift&amp;severity=high&amp;id=69d736fd1cc7ad14da418ad5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33466-cwe-22-improper-limitation-of-a-pat-c3f5e5cb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33466%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Elastic%20Logstash&amp;severity=high&amp;id=69d6b19c1cc7ad14daa7cc75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33458-cwe-918-server-side-request-forgery-637efd36</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33458%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=69d6b19c1cc7ad14daa7cc72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33459-cwe-400-uncontrolled-resource-consu-70fe4680</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33459%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=69d737031cc7ad14da4194b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33460-cwe-863-incorrect-authorization-in--22d07900</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33460%3A%20CWE-863%20Incorrect%20Authorization%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=69d737031cc7ad14da4194d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14243-generation-of-error-message-contain-a37e8c0f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14243%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Red%20Hat%20mirror%20registry%20for%20Red%20Hat%20OpenShift&amp;severity=medium&amp;id=69d6b1991cc7ad14daa7cba5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33461-cwe-863-incorrect-authorization-in--fa848cf6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33461%3A%20CWE-863%20Incorrect%20Authorization%20in%20Elastic%20Kibana&amp;severity=high&amp;id=69d737031cc7ad14da4194db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4498-cwe-250-execution-with-unnecessary-p-df770b45</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4498%3A%20CWE-250%20%20Execution%20with%20Unnecessary%20Privileges%20in%20Elastic%20Kibana&amp;severity=high&amp;id=69d737031cc7ad14da4194de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2377-server-side-request-forgery-ssrf-in--81c7f9e6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2377%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Red%20Hat%20mirror%20registry%20for%20Red%20Hat%20OpenShift&amp;severity=medium&amp;id=69d6aa921cc7ad14daa3e922</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4837-cwe-95-improper-neutralization-of-di-59dba1b6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4837%3A%20CWE-95%20Improper%20neutralization%20of%20directives%20in%20dynamically%20evaluated%20code%20(&apos;eval%20injection&apos;)%20in%20Rapid7%20Insight%20Agent&amp;severity=medium&amp;id=69d729211cc7ad14da1b339d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/data-leakage-vulnerability-patched-in-openssl-53eed26d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Data%20Leakage%20Vulnerability%20Patched%20in%20OpenSSL&amp;severity=medium&amp;id=69d679581cc7ad14da88dc9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33753-cwe-295-improper-certificate-valida-6c184a01</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33753%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20trailofbits%20rfc3161-client&amp;severity=medium&amp;id=69d672521cc7ad14da85d64f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33229-cwe-862-missing-authorization-in-xw-2e4740d9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33229%3A%20CWE-862%3A%20Missing%20Authorization%20in%20xwiki%20xwiki-platform&amp;severity=high&amp;id=69d672521cc7ad14da85d649</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clickfix-malware-uses-macos-script-editor-to-deliv-7a29e1d2</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ClickFix%20Malware%20Uses%20macOS%20Script%20Editor%20to%20Deliver%20Atomic%20Stealer&amp;severity=medium&amp;id=69d6805e1cc7ad14da8bd0e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39410-cwe-20-improper-input-validation-in-1020d1d4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39410%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20honojs%20hono&amp;severity=medium&amp;id=69d672521cc7ad14da85d658</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39409-cwe-180-incorrect-behavior-order-va-1414983d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39409%3A%20CWE-180%3A%20Incorrect%20Behavior%20Order%3A%20Validate%20Before%20Canonicalize%20in%20honojs%20hono&amp;severity=medium&amp;id=69d737041cc7ad14da419536</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39408-cwe-22-improper-limitation-of-a-pat-66010df7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39408%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20honojs%20hono&amp;severity=medium&amp;id=69d737061cc7ad14da419553</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39407-cwe-22-improper-limitation-of-a-pat-eda2389a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39407%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20honojs%20hono&amp;severity=medium&amp;id=69d737041cc7ad14da419531</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39406-cwe-22-improper-limitation-of-a-pat-011619d9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39406%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20honojs%20node-server&amp;severity=medium&amp;id=69d672521cc7ad14da85d655</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39394-cwe-93-improper-neutralization-of-c-77c1a2a2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39394%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=high&amp;id=69d737041cc7ad14da41952e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39393-cwe-306-missing-authentication-for--2ef30390</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39393%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20ci4-cms-erp%20ci4ms&amp;severity=high&amp;id=69d737041cc7ad14da41953e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39392-cwe-79-improper-neutralization-of-i-2a311013</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39392%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=medium&amp;id=69d737041cc7ad14da41952b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rce-bug-lurked-in-apache-activemq-classic-for-13-y-def0a809</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RCE%20Bug%20Lurked%20in%20Apache%20ActiveMQ%20Classic%20for%2013%20Years&amp;severity=medium&amp;id=69d667c41cc7ad14da7efa7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39391-cwe-79-improper-neutralization-of-i-6c691515</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39391%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=medium&amp;id=69d672521cc7ad14da85d652</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39390-cwe-79-improper-neutralization-of-i-3ca1c395</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39390%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=medium&amp;id=69d737041cc7ad14da419528</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39389-cwe-285-improper-authorization-in-c-861cb544</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39389%3A%20CWE-285%3A%20Improper%20Authorization%20in%20ci4-cms-erp%20ci4ms&amp;severity=medium&amp;id=69d737041cc7ad14da41953b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/more-honeypot-fingerprinting-scans-wed-apr-8th-8f55a218</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=More%20Honeypot%20Fingerprinting%20Scans%2C%20(Wed%2C%20Apr%208th)&amp;severity=medium&amp;id=69d667d01cc7ad14da7efc4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58713-incorrect-default-permissions-in-re-e2dea4de</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58713%3A%20Incorrect%20Default%20Permissions%20in%20Red%20Hat%20Red%20Hat%20Process%20Automation%207&amp;severity=medium&amp;id=69d664421cc7ad14da7c09be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57853-incorrect-default-permissions-in-re-598e8725</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57853%3A%20Incorrect%20Default%20Permissions%20in%20Red%20Hat%20Red%20Hat%20Web%20Terminal&amp;severity=medium&amp;id=69d664421cc7ad14da7c09b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57854-incorrect-default-permissions-in-re-a8e4f541</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57854%3A%20Incorrect%20Default%20Permissions%20in%20Red%20Hat%20Red%20Hat%20OpenShift%20Update%20Service&amp;severity=medium&amp;id=69d664421cc7ad14da7c09ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57851-incorrect-default-permissions-in-re-4a9ea030</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57851%3A%20Incorrect%20Default%20Permissions%20in%20Red%20Hat%20Multicluster%20Engine%20for%20Kubernetes&amp;severity=medium&amp;id=69d664421cc7ad14da7c09b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57847-incorrect-default-permissions-in-re-2124732f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57847%3A%20Incorrect%20Default%20Permissions%20in%20Red%20Hat%20Red%20Hat%20Ansible%20Automation%20Platform%202&amp;severity=medium&amp;id=69d664421cc7ad14da7c09ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-lua-based-malware-lucidrook-observed-in-target-41a1408d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Lua-based%20malware%20LucidRook%20observed%20in%20targeted%20attacks%20against%20Taiwanese%20organizations&amp;severity=medium&amp;id=69d683e41cc7ad14da8df5e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-cybercrime-losses-neared-21-billion-in-2025-aee29786</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%3A%20Cybercrime%20Losses%20Neared%20%2421%20Billion%20in%202025&amp;severity=high&amp;id=69d659b41cc7ad14da6ff066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5795-cwe-226-sensitive-information-in-res-9bb8041f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5795%3A%20CWE-226%20Sensitive%20information%20in%20resource%20not%20removed%20before%20reuse%20in%20Eclipse%20Foundation%20Eclipse%20Jetty&amp;severity=high&amp;id=69d729211cc7ad14da1b33a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2509-cwe-79-improper-neutralization-of-in-d2f401e2</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2509%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20softaculous%20Page%20Builder%3A%20Pagelayer%20%E2%80%93%20Drag%20and%20Drop%20website%20builder&amp;severity=medium&amp;id=69d737031cc7ad14da4194b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14816-cwe-317-cleartext-storage-of-sensit-e3c6f53b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14816%3A%20CWE-317%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20GUI%20in%20Mitsubishi%20Electric%20Corporation%20GENESIS64&amp;severity=critical&amp;id=69d737041cc7ad14da419523</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14815-cwe-312-cleartext-storage-of-sensit-1111c12c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14815%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Mitsubishi%20Electric%20Corporation%20GENESIS64&amp;severity=critical&amp;id=69d737041cc7ad14da41951e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35023-cwe-639-authorization-bypass-throug-032ebf5b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35023%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Cloud%20Solutions%20SAS%20Wimi%20Teamwork&amp;severity=medium&amp;id=69d737061cc7ad14da419558</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28261-cwe-532-insertion-of-sensitive-info-3383cc31</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28261%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Dell%20Elastic%20Cloud%20Storage&amp;severity=high&amp;id=69d652ab1cc7ad14da6cf237</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/massachusetts-hospital-diverts-ambulances-as-cyber-a4d8f793</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Massachusetts%20Hospital%20Diverts%20Ambulances%20as%20Cyberattack%20Causes%20Disruption&amp;severity=medium&amp;id=69d64ba31cc7ad14da6b63d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24511-cwe-209-generation-of-error-message-464099fe</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24511%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=69d64bc31cc7ad14da6b6b11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27102-cwe-266-incorrect-privilege-assignm-09eee350</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27102%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=69d64bc31cc7ad14da6b6b14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5302-cwe-942-permissive-cross-domain-poli-0fe04074</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5302%3A%20CWE-942%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20CoolerControl%20coolercontrold&amp;severity=medium&amp;id=69d64bc31cc7ad14da6b6b20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5300-cwe-306-missing-authentication-for-c-24cdf83c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5300%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20CoolerControl%20coolercontrold&amp;severity=medium&amp;id=69d64bc31cc7ad14da6b6b17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5301-cwe-79-improper-neutralization-of-in-aa6dc7fe</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5301%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CoolerControl%20coolercontrol-ui&amp;severity=high&amp;id=69d64bc31cc7ad14da6b6b1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/evasive-masjesu-ddos-botnet-targets-iot-devices-aef686d5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Evasive%20Masjesu%20DDoS%20Botnet%20Targets%20IoT%20Devices&amp;severity=critical&amp;id=69d641171cc7ad14da6710d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5208-cwe-78-improper-neutralization-of-sp-43d0d794</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5208%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20CoolerControl%20coolercontrold&amp;severity=high&amp;id=69d641201cc7ad14da672288</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28264-cwe-732-incorrect-permission-assign-c77bd300</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28264%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Dell%20PowerProtect%20Agent&amp;severity=low&amp;id=69d641201cc7ad14da672271</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-targeting-critical-ninja-forms-bug-that-ex-4a20e46c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Targeting%20Critical%20Ninja%20Forms%20Bug%20That%20Exposes%20WordPress%20Sites%20to%20Takeover&amp;severity=critical&amp;id=69d63a0f1cc7ad14da63b20f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3396-cwe-89-improper-neutralization-of-sp-b4d531e0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3396%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20shamimmoeen%20WCAPF%20%E2%80%93%20Ajax%20Product%20Filter%20for%20WooCommerce&amp;severity=high&amp;id=69d641201cc7ad14da672280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1672-cwe-352-cross-site-request-forgery-c-20c6ab40</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1672%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20realmag777%20BEAR%20%E2%80%93%20Bulk%20Editor%20and%20Products%20Manager%20Professional%20for%20WooCommerce%20by%20Pluginus.Net&amp;severity=medium&amp;id=69d641201cc7ad14da672260</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2481-cwe-79-improper-neutralization-of-in-74882230</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2481%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20beaverbuilder%20Beaver%20Builder%20Page%20Builder%20%E2%80%93%20Drag%20and%20Drop%20Website%20Builder&amp;severity=medium&amp;id=69d641201cc7ad14da672274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3243-cwe-22-improper-limitation-of-a-path-47ffd1ff</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3243%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20danbilabs%20Advanced%20Members%20for%20ACF&amp;severity=high&amp;id=69d641201cc7ad14da672278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1673-cwe-352-cross-site-request-forgery-c-e5802127</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1673%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20realmag777%20BEAR%20%E2%80%93%20Bulk%20Editor%20and%20Products%20Manager%20Professional%20for%20WooCommerce%20by%20Pluginus.Net&amp;severity=medium&amp;id=69d641201cc7ad14da672267</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1865-cwe-89-improper-neutralization-of-sp-26abc5f4</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1865%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpeverest%20User%20Registration%20%26%20Membership%20%E2%80%93%20Free%20%26%20Paid%20Memberships%2C%20Subscriptions%2C%20Content%20Restriction%2C%20User%20Profile%2C%20Custom%20User%20Registration%20%26%20Login%20Builder&amp;severity=medium&amp;id=69d641201cc7ad14da67226d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-disrupts-russian-espionage-operation-involving--40648239</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Disrupts%20Russian%20Espionage%20Operation%20Involving%20Hacked%20Routers%20and%20DNS%20Hijacking&amp;severity=medium&amp;id=69d6368b1cc7ad14da6116ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4300-cwe-79-improper-neutralization-of-in-28f97e93</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4300%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20robosoft%20Robo%20Gallery%20%E2%80%93%20Photo%20%26%20Image%20Slider&amp;severity=medium&amp;id=69d6330f1cc7ad14da5fceb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4025-cwe-79-improper-neutralization-of-in-595e52c7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4025%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lcweb-projects%20PrivateContent%20Free&amp;severity=medium&amp;id=69d6330f1cc7ad14da5fce9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4303-cwe-79-improper-neutralization-of-in-668fbda1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4303%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20osamaesh%20WP%20Visitor%20Statistics%20(Real%20Time%20Traffic)&amp;severity=medium&amp;id=69d6330f1cc7ad14da5fcec0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4073-cwe-79-improper-neutralization-of-in-d7e9452f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4073%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dougblackjr%20pdfl.io&amp;severity=medium&amp;id=69d6330f1cc7ad14da5fcea8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-koreas-contagious-interview-campaign-spreads-dab88f6f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korea&apos;s%20Contagious%20Interview%20Campaign%20Spreads%20Across%205%20Ecosystems%2C%20Delivering%20Staged%20RAT%20Payloads&amp;severity=medium&amp;id=69d636951cc7ad14da612c2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unmasking-the-64-bit-variant-of-the-infamous-lumma-f87ffc8b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unmasking%20The%2064-bit%20Variant%20of%20the%20Infamous%20Lumma%20Stealer&amp;severity=medium&amp;id=69d636951cc7ad14da612c39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/leveling-up-with-nightspire-ransomware-15a6d07c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Leveling%20Up%20with%20NightSpire%20Ransomware&amp;severity=medium&amp;id=69d636951cc7ad14da612c35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25776-code-injection-in-six-apart-ltd-mov-c0a38b7e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25776%3A%20Code%20injection%20in%20Six%20Apart%20Ltd.%20Movable%20Type&amp;severity=critical&amp;id=69d61a8c1cc7ad14da4e089b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33088-improper-neutralization-of-special--986381b5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33088%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20Injection&apos;)%20in%20Six%20Apart%20Ltd.%20Movable%20Type&amp;severity=high&amp;id=69d61a8c1cc7ad14da4e08a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39716-missing-authorization-in-ckthemes-f-5bb90c60</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39716%3A%20Missing%20Authorization%20in%20CKThemes%20Flipmart&amp;severity=medium&amp;id=69d6170f1cc7ad14da4b0108</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39715-missing-authorization-in-anytrack-a-c8c688ed</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39715%3A%20Missing%20Authorization%20in%20AnyTrack%20AnyTrack%20Affiliate%20Link%20Manager&amp;severity=medium&amp;id=69d6170f1cc7ad14da4b0105</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39714-missing-authorization-in-g5theme-g5-7e202b33</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39714%3A%20Missing%20Authorization%20in%20G5Theme%20G5Plus%20April&amp;severity=medium&amp;id=69d6170f1cc7ad14da4b0102</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39713-missing-authorization-in-mailerclou-885e1e12</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39713%3A%20Missing%20Authorization%20in%20mailercloud%20Mailercloud%20%E2%80%93%20Integrate%20webforms%20and%20synchronize%20website%20contacts&amp;severity=medium&amp;id=69d6170f1cc7ad14da4b00ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39712-improper-neutralization-of-script-r-e77d5193</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39712%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20tagDiv%20tagDiv%20Composer&amp;severity=medium&amp;id=69d6170f1cc7ad14da4b00fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39711-insertion-of-sensitive-information--6fd7de96</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39711%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20stmcan%20RT-Theme%2018%20%7C%20Extensions&amp;severity=medium&amp;id=69d6170f1cc7ad14da4b00f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39710-cross-site-request-forgery-csrf-in--ffdaf480</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39710%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20stmcan%20RT-Theme%2018%20%7C%20Extensions&amp;severity=medium&amp;id=69d6170f1cc7ad14da4b00f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39709-insertion-of-sensitive-information--07f770e8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39709%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20thetechtribe%20The%20Tribal&amp;severity=medium&amp;id=69d6170f1cc7ad14da4b00f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39708-improper-neutralization-of-input-du-37293b52</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39708%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20uicore%20UiCore%20Elements&amp;severity=medium&amp;id=69d6170f1cc7ad14da4b00f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39707-missing-authorization-in-zealousweb-1c0f1e09</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39707%3A%20Missing%20Authorization%20in%20ZealousWeb%20Accept%20PayPal%20Payments%20using%20Contact%20Form%207&amp;severity=medium&amp;id=69d6170d1cc7ad14da4b00a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39706-missing-authorization-in-netro-syst-76ad30c4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39706%3A%20Missing%20Authorization%20in%20Netro%20Systems%20Make%20My%20Trivia&amp;severity=medium&amp;id=69d6170d1cc7ad14da4b00a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39705-missing-authorization-in-mulika-tea-3f637445</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39705%3A%20Missing%20Authorization%20in%20Mulika%20Team%20MIPL%20WC%20Multisite%20Sync&amp;severity=medium&amp;id=69d6170d1cc7ad14da4b009d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39704-missing-authorization-in-nfusionsol-461a37b3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39704%3A%20Missing%20Authorization%20in%20nfusionsolutions%20Precious%20Metals%20Automated%20Product%20Pricing%20%E2%80%93%20Pro&amp;severity=medium&amp;id=69d6170d1cc7ad14da4b009a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39703-improper-neutralization-of-input-du-4f8d1788</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39703%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpbits%20WPBITS%20Addons%20For%20Elementor%20Page%20Builder&amp;severity=medium&amp;id=69d6170d1cc7ad14da4b0097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39702-improper-neutralization-of-input-du-605f6758</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39702%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Wealcoder%20Animation%20Addons%20for%20Elementor&amp;severity=medium&amp;id=69d6170d1cc7ad14da4b0094</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39701-missing-authorization-in-andrew-sho-2a1a28f9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39701%3A%20Missing%20Authorization%20in%20Andrew%20ShopWP&amp;severity=medium&amp;id=69d6170d1cc7ad14da4b0091</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39700-missing-authorization-in-wpxpo-wowo-434bf2b0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39700%3A%20Missing%20Authorization%20in%20WPXPO%20WowOptin&amp;severity=medium&amp;id=69d6170d1cc7ad14da4b008e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39699-missing-authorization-in-massiveshi-21bf615b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39699%3A%20Missing%20Authorization%20in%20massiveshift%20AI%20Workflow%20Automation&amp;severity=medium&amp;id=69d6170d1cc7ad14da4b008b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39698-missing-authorization-in-publisherd-f1b61006</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39698%3A%20Missing%20Authorization%20in%20PublisherDesk%20The%20Publisher%20Desk%20ads.txt&amp;severity=medium&amp;id=69d6170d1cc7ad14da4b0088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39697-missing-authorization-in-hbss-techn-f0e981c9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39697%3A%20Missing%20Authorization%20in%20HBSS%20Technologies%20MAIO%20%E2%80%93%20The%20new%20AI%20GEO%20%2F%20SEO%20tool&amp;severity=medium&amp;id=69d6170c1cc7ad14da4b0049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39696-improper-neutralization-of-input-du-69c8831b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39696%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Elfsight%20Elfsight%20WhatsApp%20Chat%20CC&amp;severity=medium&amp;id=69d6170c1cc7ad14da4b0046</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39694-missing-authorization-in-nsquared-s-37b8eff3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39694%3A%20Missing%20Authorization%20in%20NSquared%20Simply%20Schedule%20Appointments&amp;severity=medium&amp;id=69d6170c1cc7ad14da4b0043</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39693-improper-neutralization-of-input-du-a9c9bdc1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39693%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fesomia%20FSM%20Custom%20Featured%20Image%20Caption&amp;severity=medium&amp;id=69d6170c1cc7ad14da4b0040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39692-improper-neutralization-of-input-du-830a178a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39692%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tagDiv%20tagDiv%20Composer&amp;severity=medium&amp;id=69d6170c1cc7ad14da4b003d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39691-missing-authorization-in-adastracry-96af4a1b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39691%3A%20Missing%20Authorization%20in%20AdAstraCrypto%20Cryptocurrency%20Donation%20Box%20%E2%80%93%20Bitcoin%20%26%20Crypto%20Donations&amp;severity=medium&amp;id=69d6170c1cc7ad14da4b003a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39690-missing-authorization-in-paul-bearn-915d2868</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39690%3A%20Missing%20Authorization%20in%20Paul%20Bearne%20Author%20Avatars%20List%2FBlock&amp;severity=medium&amp;id=69d6170c1cc7ad14da4b0037</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39689-missing-authorization-in-eshipper-e-5e8bc15c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39689%3A%20Missing%20Authorization%20in%20eshipper%20eShipper%20Commerce&amp;severity=medium&amp;id=69d6170c1cc7ad14da4b0034</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39688-missing-authorization-in-glowlogix--4d7f1971</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39688%3A%20Missing%20Authorization%20in%20Glowlogix%20WP%20Frontend%20Profile&amp;severity=medium&amp;id=69d6170c1cc7ad14da4b0031</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39687-missing-authorization-in-rapid-car--54457d5d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39687%3A%20Missing%20Authorization%20in%20Rapid%20Car%20Check%20Rapid%20Car%20Check%20Vehicle%20Data&amp;severity=medium&amp;id=69d6170c1cc7ad14da4b002e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39686-exposure-of-sensitive-system-inform-a60b3975</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39686%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20bannersky%20BSK%20PDF%20Manager&amp;severity=medium&amp;id=69d6170a1cc7ad14da4affe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39685-missing-authorization-in-lvaudore-t-dfcb5c55</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39685%3A%20Missing%20Authorization%20in%20lvaudore%20The%20Moneytizer&amp;severity=medium&amp;id=69d6170a1cc7ad14da4affe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39684-improper-control-of-filename-for-in-ef8b4fbf</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39684%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20UnTheme%20OrganicFood&amp;severity=high&amp;id=69d6170a1cc7ad14da4affe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39683-improper-neutralization-of-input-du-e59c4297</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39683%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Chief%20Gnome%20Garden%20Gnome%20Package&amp;severity=medium&amp;id=69d6170a1cc7ad14da4affde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39682-missing-authorization-in-arjan-pron-4a6b3907</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39682%3A%20Missing%20Authorization%20in%20Arjan%20Pronk%20linkPizza-Manager&amp;severity=medium&amp;id=69d6170a1cc7ad14da4affdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39681-improper-control-of-filename-for-in-1690a4a9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39681%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ApusTheme%20Homeo&amp;severity=high&amp;id=69d6170a1cc7ad14da4affd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39680-missing-authorization-in-mwp-develo-0cd2af4d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39680%3A%20Missing%20Authorization%20in%20MWP%20Development%20Diet%20Calorie%20Calculator&amp;severity=medium&amp;id=69d6170a1cc7ad14da4affd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39679-improper-control-of-filename-for-in-427ce365</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39679%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ApusTheme%20Freeio&amp;severity=high&amp;id=69d6170a1cc7ad14da4affd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39678-missing-authorization-in-dotonpaper-6bffaa78</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39678%3A%20Missing%20Authorization%20in%20DOTonPAPER%20Pinpoint%20Booking%20System&amp;severity=medium&amp;id=69d6170a1cc7ad14da4affcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39677-improper-control-of-filename-for-in-d312e518</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39677%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Creatives_Planet%20Emphires&amp;severity=high&amp;id=69d6170a1cc7ad14da4affcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39676-missing-authorization-in-shahjada-d-f847ca3a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39676%3A%20Missing%20Authorization%20in%20Shahjada%20Download%20Manager&amp;severity=medium&amp;id=69d617091cc7ad14da4aff70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39675-missing-authorization-in-webmuehle--de1f4d2c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39675%3A%20Missing%20Authorization%20in%20webmuehle%20Court%20Reservation&amp;severity=medium&amp;id=69d617091cc7ad14da4aff6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39674-improper-neutralization-of-input-du-f256b351</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39674%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Manoj%20Kumar%20MK%20Google%20Directions&amp;severity=medium&amp;id=69d617091cc7ad14da4aff6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39673-missing-authorization-in-shrikantka-a43e6ac7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39673%3A%20Missing%20Authorization%20in%20shrikantkale%20iZooto&amp;severity=medium&amp;id=69d617091cc7ad14da4aff67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39672-missing-authorization-in-shiptime-s-c1df82e0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39672%3A%20Missing%20Authorization%20in%20shiptime%20ShipTime%3A%20Discounted%20Shipping%20Rates&amp;severity=medium&amp;id=69d617091cc7ad14da4aff64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39671-cross-site-request-forgery-csrf-in--cfec4007</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39671%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Dotstore%20Extra%20Fees%20Plugin%20for%20WooCommerce&amp;severity=high&amp;id=69d617091cc7ad14da4aff61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39670-server-side-request-forgery-ssrf-in-9775c543</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39670%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Brecht%20Visual%20Link%20Preview&amp;severity=medium&amp;id=69d617091cc7ad14da4aff5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39668-missing-authorization-in-g5theme-bo-cf8964bc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39668%3A%20Missing%20Authorization%20in%20g5theme%20Book%20Previewer%20for%20Woocommerce&amp;severity=medium&amp;id=69d617091cc7ad14da4aff5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39667-improper-neutralization-of-input-du-2d48dce4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39667%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jongmyoung%20Kim%20Korea%20SNS&amp;severity=medium&amp;id=69d617091cc7ad14da4aff58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39666-improper-neutralization-of-input-du-87b4cf8d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39666%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20telepathy%20Hello%20Bar%20Popup%20Builder&amp;severity=medium&amp;id=69d617091cc7ad14da4aff55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39665-improper-neutralization-of-input-du-8c22e649</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39665%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vladimir%20Prelovac%20SEO%20Friendly%20Images&amp;severity=medium&amp;id=69d617071cc7ad14da4aff48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39663-missing-authorization-in-themetechm-be395ba6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39663%3A%20Missing%20Authorization%20in%20themetechmount%20TrueBooker&amp;severity=medium&amp;id=69d617071cc7ad14da4aff45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39662-missing-authorization-in-prowcplugi-bc63743f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39662%3A%20Missing%20Authorization%20in%20ProWCPlugins%20Product%20Price%20by%20Formula%20for%20WooCommerce&amp;severity=medium&amp;id=69d617071cc7ad14da4aff42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39660-missing-authorization-in-automattic-d4520bba</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39660&amp;severity=null&amp;id=69d617071cc7ad14da4aff3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39659-aa1d911c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39659&amp;severity=null&amp;id=69e75c8219fe3cd2cdc91b86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39658-missing-authorization-in-coding-pan-6a730078</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39658%3A%20Missing%20Authorization%20in%20Coding%20Panda%20Panda%20Pods%20Repeater%20Field&amp;severity=medium&amp;id=69d617071cc7ad14da4aff3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39657-missing-authorization-in-leadlovers-d6a0a48b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39657%3A%20Missing%20Authorization%20in%20leadlovers%20leadlovers%20forms&amp;severity=medium&amp;id=69d617071cc7ad14da4aff39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39656-missing-authorization-in-razorpay-r-7b8f408a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39656%3A%20Missing%20Authorization%20in%20Razorpay%20Razorpay%20for%20WooCommerce&amp;severity=medium&amp;id=69d617071cc7ad14da4aff36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39654-improper-neutralization-of-input-du-8e014536</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39654%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ashish%20Ajani%20WP%20Simple%20HTML%20Sitemap&amp;severity=medium&amp;id=69d617071cc7ad14da4aff33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39653-missing-authorization-in-deepen-baj-12aea5fd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39653%3A%20Missing%20Authorization%20in%20Deepen%20Bajracharya%20Video%20Conferencing%20with%20Zoom&amp;severity=medium&amp;id=69d617071cc7ad14da4aff30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39652-missing-authorization-in-igms-igms--5296a529</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39652%3A%20Missing%20Authorization%20in%20igms%20iGMS%20Direct%20Booking&amp;severity=medium&amp;id=69d617071cc7ad14da4aff2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39651-missing-authorization-in-totalsuite-944d0008</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39651%3A%20Missing%20Authorization%20in%20TotalSuite%20Total%20Poll%20Lite&amp;severity=medium&amp;id=69d617051cc7ad14da4afefe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39650-missing-authorization-in-unitech-we-6e818b77</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39650%3A%20Missing%20Authorization%20in%20Unitech%20Web%20UnitechPay&amp;severity=medium&amp;id=69d617051cc7ad14da4afefb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39649-missing-authorization-in-themebeez--ce475639</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39649%3A%20Missing%20Authorization%20in%20themebeez%20Royale%20News&amp;severity=medium&amp;id=69d617051cc7ad14da4afef8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39648-missing-authorization-in-themebeez--b3361ed4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39648%3A%20Missing%20Authorization%20in%20themebeez%20Cream%20Blog&amp;severity=medium&amp;id=69d617051cc7ad14da4afef5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39647-server-side-request-forgery-ssrf-in-8e42a0c1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39647%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20sonaar%20MP3%20Audio%20Player%20for%20Music%2C%20Radio%20%26%20Podcast%20by%20Sonaar&amp;severity=medium&amp;id=69d617051cc7ad14da4afef2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39646-improper-neutralization-of-input-du-35cfcff0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39646%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bozdoz%20Leaflet%20Map&amp;severity=medium&amp;id=69d617051cc7ad14da4afeef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39645-server-side-request-forgery-ssrf-in-bd2c4602</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39645%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Global%20Payments%20GlobalPayments%20WooCommerce&amp;severity=medium&amp;id=69d617051cc7ad14da4afeec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39644-missing-authorization-in-roxnor-wp--0ca5b0ae</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39644%3A%20Missing%20Authorization%20in%20Roxnor%20Wp%20Ultimate%20Review&amp;severity=medium&amp;id=69d617051cc7ad14da4afee9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39643-missing-authorization-in-payment-pl-e37c79ac</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39643%3A%20Missing%20Authorization%20in%20Payment%20Plugins%20Payment%20Plugins%20for%20PayPal%20WooCommerce&amp;severity=medium&amp;id=69d617051cc7ad14da4afee6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39641-cross-site-request-forgery-csrf-in--2af9df80</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39641%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Skywarrior%20Blackfyre&amp;severity=medium&amp;id=69d617051cc7ad14da4afee3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39640-cross-site-request-forgery-csrf-in--2243ccb4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39640%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mndpsingh287%20Theme%20Editor&amp;severity=critical&amp;id=69d617031cc7ad14da4afea7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39639-missing-authorization-in-redpixelst-bee83bf4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39639%3A%20Missing%20Authorization%20in%20redpixelstudios%20RPS%20Include%20Content&amp;severity=medium&amp;id=69d617031cc7ad14da4afea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39638-improper-neutralization-of-input-du-7631301e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39638%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themeum%20Qubely&amp;severity=medium&amp;id=69d617031cc7ad14da4afea0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39637-missing-authorization-in-spabrice-m-bdd66bda</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39637%3A%20Missing%20Authorization%20in%20SpabRice%20Mogi&amp;severity=medium&amp;id=69d617031cc7ad14da4afe9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39636-improper-neutralization-of-input-du-3c4a91d2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39636%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20livemesh%20Livemesh%20Addons%20for%20Elementor&amp;severity=medium&amp;id=69d617031cc7ad14da4afe9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39635-cross-site-request-forgery-csrf-in--a32a3287</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39635%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ThemeGoods%20Grand%20Magazine&amp;severity=medium&amp;id=69d617031cc7ad14da4afe97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39634-cross-site-request-forgery-csrf-in--4494cb3d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39634%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ThemeGoods%20Grand%20Portfolio&amp;severity=medium&amp;id=69d617031cc7ad14da4afe94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39633-cross-site-request-forgery-csrf-in--0c89e848</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39633%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ThemeGoods%20Grand%20Car%20Rental&amp;severity=medium&amp;id=69d617031cc7ad14da4afe91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39632-cross-site-request-forgery-csrf-in--876f30ef</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39632%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ThemeGoods%20Grand%20Blog&amp;severity=medium&amp;id=69d617031cc7ad14da4afe8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39631-missing-authorization-in-ronikunlim-056815bc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39631%3A%20Missing%20Authorization%20in%20Ronik%40UnlimitedWP%20WPSchoolPress&amp;severity=medium&amp;id=69d617031cc7ad14da4afe8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39629-improper-neutralization-of-script-r-c319eefa</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39629%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20kutethemes%20Uminex&amp;severity=medium&amp;id=69d617011cc7ad14da4afdd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39628-improper-neutralization-of-script-r-396420fe</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39628%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20kutethemes%20DukaMarket&amp;severity=medium&amp;id=69d617011cc7ad14da4afdd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39627-missing-authorization-in-wproyal-as-b41441e5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39627%3A%20Missing%20Authorization%20in%20wproyal%20Ashe&amp;severity=medium&amp;id=69d617011cc7ad14da4afdd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39626-improper-neutralization-of-script-r-0f0d2bb4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39626%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20kutethemes%20Armania&amp;severity=medium&amp;id=69d617011cc7ad14da4afdce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39625-improper-neutralization-of-script-r-a01cb56a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39625%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20kutethemes%20TechOne&amp;severity=medium&amp;id=69d617011cc7ad14da4afdcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39624-missing-authorization-in-kutethemes-7c0e8504</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39624%3A%20Missing%20Authorization%20in%20kutethemes%20Biolife&amp;severity=medium&amp;id=69d617011cc7ad14da4afdc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39623-improper-control-of-filename-for-in-4d2fd1c3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39623%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20kutethemes%20Biolife&amp;severity=high&amp;id=69d617011cc7ad14da4afdc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39622-missing-authorization-in-acmethemes-8703d7da</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39622%3A%20Missing%20Authorization%20in%20acmethemes%20Education%20Base&amp;severity=medium&amp;id=69d617011cc7ad14da4afdc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39621-cross-site-request-forgery-csrf-in--6a2ce25f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39621%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20spicethemes%20SpicePress&amp;severity=high&amp;id=69d617011cc7ad14da4afdbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39620-cross-site-request-forgery-csrf-in--fa017005</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39620%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20priyanshumittal%20Appointment&amp;severity=critical&amp;id=69d617011cc7ad14da4afdbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39619-cross-site-request-forgery-csrf-in--fb37f1cf</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39619%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20priyanshumittal%20Busiprof&amp;severity=critical&amp;id=69d616fe1cc7ad14da4afd40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39618-cross-site-request-forgery-csrf-in--ec5ce884</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39618%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20themearile%20NewsExo&amp;severity=medium&amp;id=69d616fe1cc7ad14da4afd3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39617-cross-site-request-forgery-csrf-in--10c0110c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39617%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20priyanshumittal%20Bluestreet&amp;severity=critical&amp;id=69d616fe1cc7ad14da4afd3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39616-authorization-bypass-through-user-c-78d81e2f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39616%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20dFactory%20Download%20Attachments&amp;severity=medium&amp;id=69d616fe1cc7ad14da4afd37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39615-improper-neutralization-of-input-du-251c6e78</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39615%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Shahjada%20Download%20Manager&amp;severity=medium&amp;id=69d616fe1cc7ad14da4afd34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39614-missing-authorization-in-ilghera-jw-c0b4a550</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39614%3A%20Missing%20Authorization%20in%20ilGhera%20JW%20Player%20for%20WordPress&amp;severity=medium&amp;id=69d616fe1cc7ad14da4afd31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39613-improper-control-of-filename-for-in-b90760c4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39613%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20kutethemes%20Boutique&amp;severity=high&amp;id=69d616fe1cc7ad14da4afd2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39612-missing-authorization-in-kutethemes-2d5544f6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39612%3A%20Missing%20Authorization%20in%20kutethemes%20KuteShop&amp;severity=medium&amp;id=69d616fe1cc7ad14da4afd2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39611-improper-control-of-filename-for-in-62d28ace</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39611%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20kutethemes%20KuteShop&amp;severity=high&amp;id=69d616fe1cc7ad14da4afd28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39610-missing-authorization-in-pankaj-kum-c7e969a3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39610%3A%20Missing%20Authorization%20in%20Pankaj%20Kumar%20WpXmas-Snow&amp;severity=medium&amp;id=69d616fe1cc7ad14da4afd25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39609-missing-authorization-in-wavaco-wav-ac9b8fb3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39609%3A%20Missing%20Authorization%20in%20Wava.co%20Wava%20Payment&amp;severity=medium&amp;id=69d616fc1cc7ad14da4afca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39608-missing-authorization-in-ipospays-i-faef3077</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39608%3A%20Missing%20Authorization%20in%20iPOSPays%20iPOSpays%20Gateways%20WC&amp;severity=medium&amp;id=69d616fc1cc7ad14da4afca4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39607-missing-authorization-in-wpbens-fil-ece8b913</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39607%3A%20Missing%20Authorization%20in%20Wpbens%20Filter%20Plus&amp;severity=medium&amp;id=69d616fc1cc7ad14da4afca1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39606-missing-authorization-in-foysal-imr-50c178ee</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39606%3A%20Missing%20Authorization%20in%20Foysal%20Imran%20BizReview&amp;severity=medium&amp;id=69d616fc1cc7ad14da4afc9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39605-missing-authorization-in-obadiah-su-7ae924d7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39605%3A%20Missing%20Authorization%20in%20Obadiah%20Super%20Custom%20Login&amp;severity=medium&amp;id=69d616fc1cc7ad14da4afc9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39604-improper-neutralization-of-input-du-3872f08c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39604%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zookatron%20MyBookTable%20Bookstore&amp;severity=medium&amp;id=69d616fc1cc7ad14da4afc98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39603-cross-site-request-forgery-csrf-in--c72d1294</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39603%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ThemeGoods%20Grand%20Photography&amp;severity=medium&amp;id=69d616fc1cc7ad14da4afc95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39602-missing-authorization-in-rustaurius-63531315</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39602%3A%20Missing%20Authorization%20in%20Rustaurius%20Order%20Tracking&amp;severity=medium&amp;id=69d616fc1cc7ad14da4afc92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39592-missing-authorization-in-andy-ha-de-80b4222f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39592%3A%20Missing%20Authorization%20in%20Andy%20Ha%20DEPART&amp;severity=medium&amp;id=69d616fc1cc7ad14da4afc8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39588-missing-authorization-in-nmerii-nm--e798b4ec</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39588%3A%20Missing%20Authorization%20in%20nmerii%20NM%20Gift%20Registry%20and%20Wishlist%20Lite&amp;severity=medium&amp;id=69d616fc1cc7ad14da4afc8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39586-insertion-of-sensitive-information--c19d163a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39586%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Ateeq%20Rafeeq%20RepairBuddy&amp;severity=medium&amp;id=69d616fb1cc7ad14da4afc50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39585-missing-authorization-in-arraytics--3cdfad1b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39585%3A%20Missing%20Authorization%20in%20Arraytics%20Booktics&amp;severity=medium&amp;id=69d616fb1cc7ad14da4afc4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39575-improper-neutralization-of-input-du-3d1e8b18</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39575%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ronald%20Huereca%20Custom%20Query%20Blocks&amp;severity=medium&amp;id=69d616fb1cc7ad14da4afc49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39572-exposure-of-sensitive-system-inform-a5237c39</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39572%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20magepeopleteam%20Bus%20Ticket%20Booking%20with%20Seat%20Reservation&amp;severity=medium&amp;id=69d616fb1cc7ad14da4afc46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39571-exposure-of-sensitive-system-inform-b08f32be</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39571%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Themefic%20Instantio&amp;severity=medium&amp;id=69d616fb1cc7ad14da4afc43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39570-insertion-of-sensitive-information--0254299a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39570%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20AA%20Web%20Servant%2012%20Step%20Meeting%20List&amp;severity=medium&amp;id=69d616fb1cc7ad14da4afc40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39569-missing-authorization-in-aa-web-ser-1ea0bfe6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39569%3A%20Missing%20Authorization%20in%20AA%20Web%20Servant%2012%20Step%20Meeting%20List&amp;severity=medium&amp;id=69d616fb1cc7ad14da4afc3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39566-exposure-of-sensitive-system-inform-bab9495d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39566%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Designinvento%20DirectoryPress&amp;severity=medium&amp;id=69d616fb1cc7ad14da4afc3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39565-missing-authorization-in-magepeople-51b3362f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39565%3A%20Missing%20Authorization%20in%20magepeopleteam%20WpTravelly&amp;severity=medium&amp;id=69d616fb1cc7ad14da4afc37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39564-insertion-of-sensitive-information--f306c3d0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39564%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20sunshinephotocart%20Sunshine%20Photo%20Cart&amp;severity=medium&amp;id=69d616fb1cc7ad14da4afc34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39563-missing-authorization-in-illid-shar-6719974c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39563%3A%20Missing%20Authorization%20in%20ILLID%20Share%20This%20Image&amp;severity=medium&amp;id=69d616f91cc7ad14da4afbd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39562-missing-authorization-in-boldgrid-c-f3791555</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39562%3A%20Missing%20Authorization%20in%20BoldGrid%20Client%20Invoicing%20by%20Sprout%20Invoices&amp;severity=medium&amp;id=69d616f91cc7ad14da4afbd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39561-missing-authorization-in-wp-chill-r-199a1e62</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39561%3A%20Missing%20Authorization%20in%20WP%20Chill%20Revive.so&amp;severity=medium&amp;id=69d616f91cc7ad14da4afbce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39544-improper-control-of-filename-for-in-91cc223d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39544%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20themeStek%20LabtechCO&amp;severity=high&amp;id=69d616f91cc7ad14da4afbcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39543-missing-authorization-in-themefic-t-196247a7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39543%3A%20Missing%20Authorization%20in%20Themefic%20Tourfic&amp;severity=medium&amp;id=69d616f91cc7ad14da4afbc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39542-insertion-of-sensitive-information--0460275f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39542%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Doofinder%20Doofinder%20for%20WooCommerce&amp;severity=medium&amp;id=69d616f91cc7ad14da4afbc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39541-improper-neutralization-of-input-du-73f33e9d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39541%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themefic%20Hydra%20Booking&amp;severity=medium&amp;id=69d616f91cc7ad14da4afbc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39538-improper-control-of-filename-for-in-91d9ccf3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39538%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Mikado%20Core&amp;severity=high&amp;id=69d616f91cc7ad14da4afbbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39536-exposure-of-sensitive-system-inform-85ad2a2a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39536%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20WP%20Chill%20RSVP%20and%20Event%20Management&amp;severity=medium&amp;id=69d616f91cc7ad14da4afbbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39535-missing-authorization-in-fullworks--a42a2483</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39535%3A%20Missing%20Authorization%20in%20fullworks%20Display%20Eventbrite%20Events&amp;severity=medium&amp;id=69d616f91cc7ad14da4afbb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39521-server-side-request-forgery-ssrf-in-f2101bb5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39521%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Nelio%20Software%20Nelio%20Content&amp;severity=medium&amp;id=69d616f71cc7ad14da4afb89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39520-missing-authorization-in-wedevs-wed-c70e74d4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39520%3A%20Missing%20Authorization%20in%20weDevs%20weDocs&amp;severity=medium&amp;id=69d616f71cc7ad14da4afb86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39517-improper-neutralization-of-input-du-09284a0b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39517%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20A%20WP%20Life%20Blog%20Filter&amp;severity=medium&amp;id=69d616f71cc7ad14da4afb83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39516-exposure-of-sensitive-system-inform-66aa6a83</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39516%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20POSIMYTH%20Nexter%20Blocks&amp;severity=medium&amp;id=69d616f71cc7ad14da4afb80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39510-authorization-bypass-through-user-c-d1b52bbc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39510%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20WP%20Chill%20Image%20Photo%20Gallery%20Final%20Tiles%20Grid&amp;severity=low&amp;id=69d616f71cc7ad14da4afb7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39509-missing-authorization-in-wpwax-dire-e5a0bac6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39509%3A%20Missing%20Authorization%20in%20wpWax%20Directorist&amp;severity=medium&amp;id=69d616f71cc7ad14da4afb7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39508-improper-neutralization-of-input-du-7de8079d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39508%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Josh%20Kohlbach%20Advanced%20Coupons%20for%20WooCommerce%20Coupons&amp;severity=medium&amp;id=69d616f71cc7ad14da4afb77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39506-missing-authorization-in-jordy-meow-8ed7dcf5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39506%3A%20Missing%20Authorization%20in%20Jordy%20Meow%20AI%20Engine%20(Pro)&amp;severity=medium&amp;id=69d616f71cc7ad14da4afb74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39505-missing-authorization-in-craig-hewi-7796c727</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39505%3A%20Missing%20Authorization%20in%20Craig%20Hewitt%20Seriously%20Simple%20Podcasting&amp;severity=medium&amp;id=69d616f71cc7ad14da4afb71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39504-missing-authorization-in-instawp-in-9d2aa628</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39504%3A%20Missing%20Authorization%20in%20InstaWP%20InstaWP%20Connect&amp;severity=medium&amp;id=69d616f71cc7ad14da4afb6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39501-missing-authorization-in-realmag777-a60ba421</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39501%3A%20Missing%20Authorization%20in%20RealMag777%20FOX&amp;severity=medium&amp;id=69d616f51cc7ad14da4afb00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39500-improper-neutralization-of-input-du-90bb209c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39500%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themesflat%20themesflat-addons-for-elementor&amp;severity=medium&amp;id=69d616f51cc7ad14da4afafd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39497-improper-neutralization-of-special--41e1ab43</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39497%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20RealMag777%20FOX&amp;severity=high&amp;id=69d616f51cc7ad14da4afafa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39496-improper-neutralization-of-special--7b4afd34</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39496%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20YayCommerce%20YayMail&amp;severity=high&amp;id=69d616f51cc7ad14da4afaf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39495-improper-neutralization-of-special--e31f432d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39495%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20NSquared%20Simply%20Schedule%20Appointments&amp;severity=high&amp;id=69d616f51cc7ad14da4afaf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39487-improper-neutralization-of-special--6e2a6b79</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39487%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ameliabooking%20Amelia&amp;severity=high&amp;id=69d616f51cc7ad14da4afaf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39486-improper-neutralization-of-special--ca98010d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39486%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WP%20Chill%20Download%20Monitor&amp;severity=high&amp;id=69d616f51cc7ad14da4afaee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39485-missing-authorization-in-embedplus--553b7b84</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39485%3A%20Missing%20Authorization%20in%20embedplus%20Youtube%20Embed%20Plus&amp;severity=medium&amp;id=69d616f51cc7ad14da4afaeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39484-url-redirection-to-untrusted-site-o-aefc8aa3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39484%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20John%20Darrel%20Hide%20My%20WP%20Ghost&amp;severity=medium&amp;id=69d616f51cc7ad14da4afae8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39483-improper-neutralization-of-input-du-bde97d33</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39483%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Hidekazu%20Ishikawa%20VK%20All%20in%20One%20Expansion%20Unit&amp;severity=medium&amp;id=69d616f51cc7ad14da4afae5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39482-improper-neutralization-of-input-du-72a40454</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39482%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PublishPress%20Post%20Expirator&amp;severity=medium&amp;id=69d616f31cc7ad14da4afaac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39479-improper-neutralization-of-special--f248450f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39479%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Brainstorm%20Force%20OttoKit&amp;severity=high&amp;id=69d616f31cc7ad14da4afaa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39477-missing-authorization-in-brainstorm-2883b008</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39477%3A%20Missing%20Authorization%20in%20Brainstorm%20Force%20CartFlows&amp;severity=medium&amp;id=69d616f31cc7ad14da4afaa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39476-missing-authorization-in-syed-balkh-71ee3c64</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39476%3A%20Missing%20Authorization%20in%20Syed%20Balkhi%20User%20Feedback&amp;severity=medium&amp;id=69d616f31cc7ad14da4afaa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39475-improper-neutralization-of-special--4455fa78</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39475%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Syed%20Balkhi%20User%20Feedback&amp;severity=high&amp;id=69d616f31cc7ad14da4afaa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39473-insertion-of-sensitive-information--68bbdf27</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39473%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20P%C3%A4r%20Thernstr%C3%B6m%20Simple%20History&amp;severity=medium&amp;id=69d616f31cc7ad14da4afa9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39469-exposure-of-sensitive-system-inform-ea7f9095</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39469%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Softaculous%20PageLayer&amp;severity=medium&amp;id=69d616f31cc7ad14da4afa9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39466-improper-neutralization-of-special--5e225890</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39466%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WPMU%20DEV%20-%20Your%20All-in-One%20WordPress%20Platform%20Broken%20Link%20Checker&amp;severity=high&amp;id=69d616f31cc7ad14da4afa97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39464-server-side-request-forgery-ssrf-in-5f9f2910</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39464%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20SeedProd%20Coming%20Soon%20Page%2C%20Under%20Construction%20%26%20Maintenance%20Mode%20by%20SeedProd&amp;severity=medium&amp;id=69d616f31cc7ad14da4afa94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1396-cwe-79-improper-neutralization-of-in-d8ea9142</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1396%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20magicplugins%20Magic%20Conversation%20For%20Gravity%20Forms&amp;severity=medium&amp;id=69d616f31cc7ad14da4afa8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hardening-security-management-console-settings-kas-196b1d89</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hardening%20security%20management%20console%20settings%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69d843531cc7ad14da3f9421</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4330-cwe-639-authorization-bypass-through-5faf3f4d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4330%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20pr-gateway%20Blog2Social%3A%20Social%20Media%20Auto%20Post%20%26%20Scheduler&amp;severity=medium&amp;id=69d60c5a1cc7ad14da40051f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4654-cwe-639-authorization-bypass-through-3569b1d3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4654%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20awesomesupport%20Awesome%20Support%20%E2%80%93%20WordPress%20HelpDesk%20%26%20Support%20Plugin&amp;severity=medium&amp;id=69d60c5a1cc7ad14da400531</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4655-cwe-79-improper-neutralization-of-in-b7a2a664</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4655%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20Element%20Pack%20%E2%80%93%20Widgets%2C%20Templates%20%26%20Addons%20for%20Elementor&amp;severity=medium&amp;id=69d60c5a1cc7ad14da400539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4483-cwe-782-exposed-ioctl-with-insuffici-c15e4a28</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4483%3A%20CWE-782%3A%20Exposed%20IOCTL%20with%20Insufficient%20Access%20Control%20in%20Moxa%20MxGeneralIo&amp;severity=high&amp;id=69d6330f1cc7ad14da5fceca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1794-cwe-79-improper-neutralization-of-in-5f6cbf28</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1794%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20johanaarstein%20AM%20LottiePlayer&amp;severity=medium&amp;id=69d5fe4c1cc7ad14da373828</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3781-cwe-89-improper-neutralization-of-sp-8de4ea08</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3781%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20tnomi%20Attendance%20Manager&amp;severity=medium&amp;id=69d5fe4c1cc7ad14da37386a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4141-cwe-352-cross-site-request-forgery-c-1bb39fd6</loc>
    <lastmod>2026-04-19</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4141%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20edckwt%20Quran%20Translations&amp;severity=medium&amp;id=69d5fe4c1cc7ad14da373896</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2838-cwe-79-improper-neutralization-of-in-58a6fbc4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2838%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20idealwebdesignlk%20Whole%20Enquiry%20Cart%20for%20WooCommerce&amp;severity=medium&amp;id=69d5fe4c1cc7ad14da37382d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5506-cwe-79-improper-neutralization-of-in-4eeb5819</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5506%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lucascaro%20Wavr&amp;severity=medium&amp;id=69d5fe4e1cc7ad14da373a58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3618-cwe-79-improper-neutralization-of-in-c0a8e3b8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3618%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bestweblayout%20Columns%20by%20BestWebSoft%20%E2%80%93%20Additional%20Columns%20Plugin%20for%20Posts%20Pages%20and%20Widgets&amp;severity=medium&amp;id=69d5fe4c1cc7ad14da37385f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5167-cwe-639-authorization-bypass-through-7e74c610</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5167%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20masteriyo%20Masteriyo%20LMS%20%E2%80%93%20Online%20Course%20Builder%20for%20eLearning%2C%20LMS%20%26%20Education&amp;severity=medium&amp;id=69d5fe4e1cc7ad14da373a46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3477-cwe-862-missing-authorization-in-pro-ba62e916</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3477%3A%20CWE-862%20Missing%20Authorization%20in%20projectzealous01%20PZ%20Frontend%20Manager&amp;severity=medium&amp;id=69d5fe4c1cc7ad14da37383b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5508-cwe-79-improper-neutralization-of-in-d52f9afd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5508%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20theyeti%20WowPress&amp;severity=medium&amp;id=69d5fe4e1cc7ad14da373a5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4808-cwe-434-unrestricted-upload-of-file--351bdd48</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4808%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20tidevapps%20Gerador%20de%20Certificados%20%E2%80%93%20DevApps&amp;severity=high&amp;id=69d5fe4e1cc7ad14da373a3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3142-cwe-79-improper-neutralization-of-in-28bf6e05</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3142%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20uniquecodergmailcom%20Pinterest%20Site%20Verification%20plugin%20using%20Meta%20Tag&amp;severity=medium&amp;id=69d5fe4c1cc7ad14da373831</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5169-cwe-79-improper-neutralization-of-in-e4e92042</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5169%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20udamadu%20Inquiry%20form%20to%20posts%20or%20pages&amp;severity=medium&amp;id=69d5fe4e1cc7ad14da373a4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3535-cwe-434-unrestricted-upload-of-file--f7fa2474</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3535%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20mlfactory%20DSGVO%20Google%20Web%20Fonts%20GDPR&amp;severity=critical&amp;id=69d5fe4c1cc7ad14da37384d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3480-cwe-862-missing-authorization-in-bur-092801c6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3480%3A%20CWE-862%20Missing%20Authorization%20in%20burlingtonbytes%20WP%20Blockade%20%E2%80%93%20Visual%20Page%20Builder&amp;severity=medium&amp;id=69d5fe4c1cc7ad14da373844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4871-cwe-79-improper-neutralization-of-in-21516959</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4871%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pstruik%20Sports%20Club%20Management&amp;severity=medium&amp;id=69d5fe4e1cc7ad14da373a41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3594-cwe-200-exposure-of-sensitive-inform-fa14576c</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3594%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20imprintnext%20Riaxe%20Product%20Customizer&amp;severity=medium&amp;id=69d5fe4c1cc7ad14da373854</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4338-cwe-200-information-exposure-in-acti-e17048f4</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4338%3A%20CWE-200%20Information%20Exposure%20in%20ActivityPub&amp;severity=high&amp;id=69d5f7631cc7ad14da1ac467</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5083-cwe-340-generation-of-predictable-nu-687eb344</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5083%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20BEROV%20Ado%3A%3ASessions&amp;severity=medium&amp;id=69d5f0511cc7ad14da136bdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5082-cwe-340-generation-of-predictable-nu-cfa6d925</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5082%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20TOKUHIROM%20Amon2%3A%3APlugin%3A%3AWeb%3A%3ACSRFDefender&amp;severity=medium&amp;id=69d5f0511cc7ad14da136bda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3311-cwe-79-improper-neutralization-of-in-7dd384e4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3311%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20posimyththemes%20The%20Plus%20Addons%20for%20Elementor%20%E2%80%93%20Addons%20for%20Elementor%2C%20Page%20Templates%2C%20Widgets%2C%20Mega%20Menu%2C%20WooCommerce&amp;severity=medium&amp;id=69d5f0511cc7ad14da136bd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27787-cross-site-scripting-xss-in-icz-cor-bd3c9fc2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27787%3A%20Cross-site%20scripting%20(XSS)%20in%20ICZ%20Corporation%20MATCHA%20SNS&amp;severity=medium&amp;id=69d5e9331cc7ad14da0af38a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33273-unrestricted-upload-of-file-with-da-08282ecf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33273%3A%20Unrestricted%20upload%20of%20file%20with%20dangerous%20type%20in%20ICZ%20Corporation%20MATCHA%20INVOICE&amp;severity=medium&amp;id=69d5e9331cc7ad14da0af38e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24913-improper-neutralization-of-special--a0c970a4</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24913%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20Injection&apos;)%20in%20ICZ%20Corporation%20MATCHA%20INVOICE&amp;severity=high&amp;id=69d5e9331cc7ad14da0af385</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3239-cwe-79-improper-neutralization-of-in-e321677f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3239%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpchill%20Strong%20Testimonials&amp;severity=medium&amp;id=69d5da2a43e2781badfbe5e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3646-cwe-862-missing-authorization-in-eni-4151b69d</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3646%3A%20CWE-862%20Missing%20Authorization%20in%20enituretechnology%20LTL%20Freight%20Quotes%20%E2%80%93%20R%2BL%20Carriers%20Edition&amp;severity=medium&amp;id=69d5da2a43e2781badfbe5f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4299-cwe-862-missing-authorization-in-mai-39a16b63</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4299%3A%20CWE-862%20Missing%20Authorization%20in%20mainwp%20MainWP%20Child%20Reports&amp;severity=medium&amp;id=69d5da2a43e2781badfbe611</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4785-cwe-79-improper-neutralization-of-in-0c03eae6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4785%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20latepoint%20LatePoint%20%E2%80%93%20Calendar%20Booking%20Plugin%20for%20Appointments%20and%20Events&amp;severity=medium&amp;id=69d5da2a43e2781badfbe629</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4341-cwe-79-improper-neutralization-of-in-7abe1d49</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4341%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20Prime%20Slider%20%E2%80%93%20Addons%20for%20Elementor&amp;severity=medium&amp;id=69d5da2a43e2781badfbe621</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3513-cwe-79-improper-neutralization-of-in-dd5c336b</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3513%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20realmag777%20TableOn%20%E2%80%93%20WordPress%20Posts%20Table%20Filterable&amp;severity=medium&amp;id=69d5da2a43e2781badfbe5eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4003-cwe-862-missing-authorization-in-fel-3d2461b4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4003%3A%20CWE-862%20Missing%20Authorization%20in%20felixmartinez%20Users%20manager%20%E2%80%93%20PN&amp;severity=critical&amp;id=69d5da2a43e2781badfbe603</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4333-cwe-79-improper-neutralization-of-in-74879927</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4333%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thimpress%20LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin%20for%20Create%20and%20Sell%20Online%20Courses&amp;severity=medium&amp;id=69d5da2a43e2781badfbe619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iran-linked-hackers-disrupt-us-critical-infrastruc-e5d8387a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran-Linked%20Hackers%20Disrupt%20US%20Critical%20Infrastructure%20via%20PLC%20Attacks&amp;severity=critical&amp;id=69d5c50e43e2781bade1a050</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2988-cwe-79-improper-neutralization-of-in-c3d5b403</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2988%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20blubrry%20PowerPress%20Podcasting%20plugin%20by%20Blubrry&amp;severity=medium&amp;id=69d5cf9a43e2781badef2665</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4379-cwe-79-improper-neutralization-of-in-dff1ae19</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4379%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20firelightwp%20LightPress%20Lightbox&amp;severity=medium&amp;id=69d5cf9a43e2781badef2669</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1163-cwe-613-insufficient-session-expirat-89ecf2fc</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1163%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20parisneo%20parisneo%2Flollms&amp;severity=medium&amp;id=69d5be0543e2781badde667d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-wednesday-april-8th-2026-httpsis-20e60d29</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Wednesday%2C%20April%208th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9884%2C%20(Wed%2C%20Apr%208th)&amp;severity=medium&amp;id=69d5b6fe43e2781badd932f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5726-cwe-121-stack-based-buffer-overflow--e858c143</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5726%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20DeltaWW%20ASDA-Soft&amp;severity=high&amp;id=69d5be0543e2781badde6681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3499-cwe-352-cross-site-request-forgery-c-c703541c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3499%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20jkohlbach%20Product%20Feed%20PRO%20for%20WooCommerce%20by%20AdTribes%20%E2%80%93%20Product%20Feeds%20for%20WooCommerce&amp;severity=high&amp;id=69d5da2f43e2781badfbe70e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3296-cwe-502-deserialization-of-untrusted-0f906f62</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3296%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20wpeverest%20Everest%20Forms%20%E2%80%93%20Contact%20Form%2C%20Payment%20Form%2C%20Quiz%2C%20Survey%20%26%20Custom%20Form%20Builder&amp;severity=critical&amp;id=69d5da2d43e2781badfbe6a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14732-cwe-87-improper-neutralization-of-a-c80c9004</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14732%3A%20CWE-87%20Improper%20Neutralization%20of%20Alternate%20XSS%20Syntax%20in%20elemntor%20Elementor%20Website%20Builder%20%E2%80%93%20more%20than%20just%20a%20page%20builder&amp;severity=medium&amp;id=69d5da2a43e2781badfbe631</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32280-cwe-770-allocation-of-resources-wit-de80e7e4</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32280%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Go%20standard%20library%20crypto%2Fx509&amp;severity=high&amp;id=69d5da2d43e2781badfbe67e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32281-cwe-407-inefficient-algorithmic-com-b72394eb</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32281%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20Go%20standard%20library%20crypto%2Fx509&amp;severity=high&amp;id=69d5da2d43e2781badfbe684</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27140-cwe-501-trust-boundary-violation-in-af12b387</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27140%3A%20CWE-501%3A%20Trust%20Boundary%20Violation%20in%20Go%20toolchain%20cmd%2Fgo&amp;severity=high&amp;id=69d5da2a43e2781badfbe636</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32283-cwe-667-improper-locking-in-go-stan-8f02aa51</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32283%3A%20CWE-667%3A%20Improper%20Locking%20in%20Go%20standard%20library%20crypto%2Ftls&amp;severity=high&amp;id=69d5da2d43e2781badfbe690</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32288-cwe-400-uncontrolled-resource-consu-6cf553fa</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32288%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Go%20standard%20library%20archive%2Ftar&amp;severity=medium&amp;id=69d5da2d43e2781badfbe696</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27143-cwe-190-integer-overflow-or-wraparo-3cb5316f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27143%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Go%20toolchain%20cmd%2Fcompile&amp;severity=critical&amp;id=69d5da2d43e2781badfbe671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27144-cwe-440-expected-behavior-violation-79ce4188</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27144%3A%20CWE-440%3A%20Expected%20Behavior%20Violation%20in%20Go%20toolchain%20cmd%2Fcompile&amp;severity=high&amp;id=69d5da2d43e2781badfbe678</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33810-cwe-295-improper-certificate-valida-7c6514b8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33810%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Go%20standard%20library%20crypto%2Fx509&amp;severity=high&amp;id=69d5da2d43e2781badfbe6a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32289-cwe-79-improper-neutralization-of-i-bb1dc664</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32289%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Go%20standard%20library%20html%2Ftemplate&amp;severity=medium&amp;id=69d5da2d43e2781badfbe69c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32282-cwe-61-unix-symbolic-link-symlink-f-45c62abb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32282%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20Go%20standard%20library%20internal%2Fsyscall%2Funix&amp;severity=medium&amp;id=69d5da2d43e2781badfbe68a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4788-cwe-532-insertion-of-sensitive-infor-b2599224</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4788%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20IBM%20Tivoli%20Netcool%20Impact&amp;severity=high&amp;id=69d5a90e43e2781badc258eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3357-cwe-502-deserialization-of-untrusted-adf6ffea</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3357%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20IBM%20Langflow%20Desktop&amp;severity=high&amp;id=69d5a90e43e2781badc258e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1346-cwe-250-execution-with-unnecessary-p-0c7a9e3f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1346%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20IBM%20Verify%20Identity%20Access%20Container&amp;severity=critical&amp;id=69d5a90e43e2781badc258e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1343-cwe-918-server-side-request-forgery--fb6c56f8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1343%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20IBM%20Verify%20Identity%20Access%20Container&amp;severity=high&amp;id=69d5a90e43e2781badc258e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/horilla-v13-rce-0b1af8fd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Horilla%20v1.3%20-%20RCE&amp;severity=critical&amp;id=69d842c21cc7ad14da3f5b38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-mmc-msc-eviltwin-local-admin-creation-4e805a5a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20MMC%20MSC%20EvilTwin%20-%20Local%20Admin%20Creation&amp;severity=medium&amp;id=69d842c21cc7ad14da3f5b33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sqlite-3501-heap-overflow-a085d62f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SQLite%203.50.1%20-%20Heap%20Overflow&amp;severity=medium&amp;id=69d842c21cc7ad14da3f5b2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/xibocms-334-rce-da56583b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=xibocms%203.3.4%20-%20RCE&amp;severity=critical&amp;id=69d842c21cc7ad14da3f5b29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/7-zip-2400-directory-traversal-9985f72b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=7-Zip%2024.00%20-%20Directory%20Traversal&amp;severity=medium&amp;id=69d842c21cc7ad14da3f5b24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortiweb-802-remote-code-execution-d02f75d9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FortiWeb%20%208.0.2%20-%20Remote%20Code%20Execution&amp;severity=critical&amp;id=69d842c21cc7ad14da3f5b1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-09-6a284ade</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-09&amp;severity=medium&amp;id=69d780fb1cc7ad14da9b68aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30080-na-dfe8d7bc</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30080%3A%20n%2Fa&amp;severity=high&amp;id=69d737041cc7ad14da41951b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31017-na-c9a2ad62</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31017%3A%20n%2Fa&amp;severity=critical&amp;id=69d737031cc7ad14da4194d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30075-na-e26c9b0a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30075%3A%20n%2Fa&amp;severity=high&amp;id=69d737031cc7ad14da4194cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57175-cwe-259-use-of-hard-coded-password--3f56779a</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57175%3A%20CWE-259%20Use%20of%20Hard-coded%20Password%20in%20Siklu%20EtherHaul%208010&amp;severity=medium&amp;id=69d737031cc7ad14da4194c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52222-na-e14790c0</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52222%3A%20n%2Fa&amp;severity=high&amp;id=69d737011cc7ad14da419493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52221-na-d9756d46</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52221%3A%20n%2Fa&amp;severity=high&amp;id=69d737011cc7ad14da41948f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45059-na-da4be87d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45059%3A%20n%2Fa&amp;severity=high&amp;id=69d737011cc7ad14da41948a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45058-na-9b99274a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45058%3A%20n%2Fa&amp;severity=high&amp;id=69d737011cc7ad14da419485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45057-na-4fdbe786</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45057%3A%20n%2Fa&amp;severity=high&amp;id=69d737011cc7ad14da419480</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50665-na-87d73563</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50665%3A%20n%2Fa&amp;severity=high&amp;id=69d737011cc7ad14da419474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50664-na-fce2f7ef</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50664%3A%20n%2Fa&amp;severity=high&amp;id=69d737011cc7ad14da419470</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50663-na-b4dcd5be</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50663%3A%20n%2Fa&amp;severity=high&amp;id=69d736ff1cc7ad14da418c0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50662-na-8246a6d1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50662%3A%20n%2Fa&amp;severity=high&amp;id=69d736ff1cc7ad14da418c07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50661-na-80b3206d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50661%3A%20n%2Fa&amp;severity=high&amp;id=69d736ff1cc7ad14da418c02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50660-na-18486f57</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50660%3A%20n%2Fa&amp;severity=high&amp;id=69d736ff1cc7ad14da418bfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50659-na-3df7cbb2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50659%3A%20n%2Fa&amp;severity=high&amp;id=69d736ff1cc7ad14da418bfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50657-na-2beef1d5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50657%3A%20n%2Fa&amp;severity=high&amp;id=69d736ff1cc7ad14da418bf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50655-na-8161f53b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50655%3A%20n%2Fa&amp;severity=high&amp;id=69d736ff1cc7ad14da418bf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50654-na-474a2263</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50654%3A%20n%2Fa&amp;severity=high&amp;id=69d736ff1cc7ad14da418bee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50653-na-58791e05</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50653%3A%20n%2Fa&amp;severity=high&amp;id=69d736ff1cc7ad14da418bea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50652-na-250b1507</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50652%3A%20n%2Fa&amp;severity=high&amp;id=69d736ff1cc7ad14da418be6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50650-na-e59a18ab</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50650%3A%20n%2Fa&amp;severity=high&amp;id=69d736fd1cc7ad14da418af1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50649-na-0364b3d8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50649%3A%20n%2Fa&amp;severity=high&amp;id=69d736fd1cc7ad14da418aed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50648-na-06f6f35d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50648%3A%20n%2Fa&amp;severity=high&amp;id=69d736fd1cc7ad14da418ae9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50647-na-847ab36b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50647%3A%20n%2Fa&amp;severity=high&amp;id=69d736fd1cc7ad14da418ae5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50646-na-f2566770</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50646%3A%20n%2Fa&amp;severity=high&amp;id=69d736fd1cc7ad14da418ae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50645-na-06e8d547</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50645%3A%20n%2Fa&amp;severity=high&amp;id=69d736fd1cc7ad14da418add</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50644-na-48254413</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50644%3A%20n%2Fa&amp;severity=high&amp;id=69d736fd1cc7ad14da418ad9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50673-na-56b2d24f</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50673%3A%20n%2Fa&amp;severity=high&amp;id=69d736fb1cc7ad14da418a9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50672-na-ba1cf499</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50672%3A%20n%2Fa&amp;severity=high&amp;id=69d736fb1cc7ad14da418a96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50671-na-fff78188</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50671%3A%20n%2Fa&amp;severity=high&amp;id=69d736fb1cc7ad14da418a92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50670-na-64c194af</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50670%3A%20n%2Fa&amp;severity=high&amp;id=69d736fb1cc7ad14da418a8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50669-na-73b4f094</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50669%3A%20n%2Fa&amp;severity=high&amp;id=69d736fb1cc7ad14da418a8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50668-na-5da5fff6</loc>
    <lastmod>2026-04-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50668%3A%20n%2Fa&amp;severity=high&amp;id=69d736fb1cc7ad14da418a86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50667-na-0d001b9b</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50667%3A%20n%2Fa&amp;severity=high&amp;id=69d736fb1cc7ad14da418a82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50666-na-3f2d51f6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50666%3A%20n%2Fa&amp;severity=high&amp;id=69d736fb1cc7ad14da418a7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-08-88662dcf</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-08&amp;severity=medium&amp;id=69d6ed521cc7ad14dac65b97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31040-na-bf49c58b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31040%3A%20n%2Fa&amp;severity=critical&amp;id=69d672521cc7ad14da85d643</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-08-006a6854</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-08&amp;severity=low&amp;id=69d5d31643e2781badf30886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4401-cwe-352-cross-site-request-forgery-c-786129b0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4401%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpchill%20Download%20Monitor&amp;severity=medium&amp;id=69d593d643e2781bad930d9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2263-cwe-862-missing-authorization-in-wpm-922a4ba2</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2263%3A%20CWE-862%20Missing%20Authorization%20in%20wpmudev%20Hustle%20%E2%80%93%20Email%20Marketing%2C%20Lead%20Generation%2C%20Optins%2C%20Popups&amp;severity=medium&amp;id=69d593d643e2781bad930d96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1342-cwe-829-inclusion-of-functionality-f-958a04f2</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1342%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20IBM%20Verify%20Identity%20Access%20Container&amp;severity=high&amp;id=69d593d643e2781bad930d93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5747-cwe-787-out-of-bounds-write-in-aws-f-b3ecdbf7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5747%3A%20CWE-787%20Out-of-bounds%20write%20in%20AWS%20Firecracker&amp;severity=high&amp;id=69d593d643e2781bad930da5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20628-cwe-1220-insufficient-granularity-o-a7a6b97a</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20628%3A%20CWE-1220%20Insufficient%20Granularity%20of%20Access%20Control%20in%20Ping%20Identity%20PingIDM&amp;severity=medium&amp;id=69d5896b43e2781bad87a4ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39936-cwe-79-improper-neutralization-of-i-7dd665bb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39936%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20Score%20Extension&amp;severity=medium&amp;id=69d5898e43e2781bad88a87f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39935-cwe-79-improper-neutralization-of-i-4f937883</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39935%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20CampaignEvents%20Extension&amp;severity=medium&amp;id=69d5898d43e2781bad88a87b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39934-cwe-835-loop-with-unreachable-exit--3c5cb986</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39934%3A%20CWE-835%20Loop%20with%20unreachable%20exit%20condition%20(&apos;infinite%20loop&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20GrowthExperiments%20Extension&amp;severity=medium&amp;id=69d5826f43e2781bad7a17e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39933-cwe-79-improper-neutralization-of-i-01337219</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39933%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20GlobalWatchlist%20Extension&amp;severity=medium&amp;id=69d5826f43e2781bad7a17c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39937-cwe-212-improper-removal-of-sensiti-6c7ae469</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39937%3A%20CWE-212%20Improper%20removal%20of%20sensitive%20information%20before%20storage%20or%20transfer%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20CentralAuth%20Extension&amp;severity=high&amp;id=69d57b23aaed68159a6dfc21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39847-cwe-22-improper-limitation-of-a-pat-645f3706</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39847%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20emmett-framework%20emmett&amp;severity=critical&amp;id=69d57b23aaed68159a6dfc1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39846-cwe-79-improper-neutralization-of-i-d77ddc8a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39846%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=critical&amp;id=69d57b23aaed68159a6dfc1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35406-cwe-400-uncontrolled-resource-consu-da0dd3f9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35406%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20containers%20aardvark-dns&amp;severity=medium&amp;id=69d57b23aaed68159a6dfc15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4065-cwe-862-missing-authorization-in-nex-9dddec99</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4065%3A%20CWE-862%20Missing%20Authorization%20in%20nextendweb%20Smart%20Slider%203&amp;severity=medium&amp;id=69d5779eaaed68159a6ad78a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34582-cwe-841-improper-enforcement-of-beh-4800545c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34582%3A%20CWE-841%3A%20Improper%20Enforcement%20of%20Behavioral%20Workflow%20in%20randombit%20botan&amp;severity=high&amp;id=69d5779eaaed68159a6ad783</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34580-cwe-295-improper-certificate-valida-eaa06a84</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34580%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20randombit%20botan&amp;severity=critical&amp;id=69d5779eaaed68159a6ad780</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34371-cwe-22-improper-limitation-of-a-pat-933bc4a9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34371%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20danny-avila%20LibreChat&amp;severity=medium&amp;id=69d5779eaaed68159a6ad77d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35568-cwe-346-origin-validation-error-in--286f27ae</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35568%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20modelcontextprotocol%20java-sdk&amp;severity=high&amp;id=69d5779eaaed68159a6ad786</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35533-cwe-284-improper-access-control-in--c575f90b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35533%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20jdx%20mise&amp;severity=high&amp;id=69d5743aaaed68159a661746</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34080-cwe-1289-improper-validation-of-uns-d20a9131</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34080%3A%20CWE-1289%3A%20Improper%20Validation%20of%20Unsafe%20Equivalence%20in%20Input%20in%20flatpak%20xdg-dbus-proxy&amp;severity=medium&amp;id=69d5743aaaed68159a661743</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33439-cwe-502-deserialization-of-untruste-ba9f5241</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33439%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20OpenIdentityPlatform%20OpenAM&amp;severity=critical&amp;id=69d5743aaaed68159a661740</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29181-cwe-770-allocation-of-resources-wit-bd8d6c9e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29181%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20open-telemetry%20opentelemetry-go&amp;severity=high&amp;id=69d5874b43e2781bad84eb00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27949-cwe-200-exposure-of-sensitive-infor-edab4ef3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27949%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20makeplane%20plane&amp;severity=low&amp;id=69d5874b43e2781bad84eafd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39401-cwe-862-missing-authorization-in-jh-2110547e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39401%3A%20CWE-862%3A%20Missing%20Authorization%20in%20jhuckaby%20Cronicle&amp;severity=medium&amp;id=69d5698eaaed68159a5d8dfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39400-cwe-79-improper-neutralization-of-i-8da42c7d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39400%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jhuckaby%20Cronicle&amp;severity=medium&amp;id=69d5698eaaed68159a5d8df8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39397-cwe-862-missing-authorization-in-de-8180a502</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39397%3A%20CWE-862%3A%20Missing%20Authorization%20in%20delmaredigital%20payload-puck&amp;severity=critical&amp;id=69d5698eaaed68159a5d8df3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39395-cwe-754-improper-check-for-unusual--f6857bb4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39395%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20sigstore%20cosign&amp;severity=medium&amp;id=69d5660baaed68159a5b407a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5741-os-command-injection-in-suvarchal-do-31706638</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5741%3A%20OS%20Command%20Injection%20in%20suvarchal%20docker-mcp-server&amp;severity=medium&amp;id=69d5660baaed68159a5b407d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39356-cwe-89-improper-neutralization-of-s-1f1d9545</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39356%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20drizzle-team%20drizzle-orm&amp;severity=high&amp;id=69d5660baaed68159a5b4073</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14859-cwe-327-use-of-a-broken-or-risky-cr-93275ea7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14859%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Semtech%20LR1110&amp;severity=high&amp;id=69d5660baaed68159a5b406d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14858-cwe-226-sensitive-information-in-re-f6b360c3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14858%3A%20CWE-226%20Sensitive%20Information%20in%20Resource%20Not%20Removed%20Before%20Reuse%20in%20Semtech%20LR1110&amp;severity=medium&amp;id=69d5660baaed68159a5b4069</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14857-cwe-123-write-what-where-condition--c8c3a068</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14857%3A%20CWE-123%20Write-what-where%20Condition%20in%20Semtech%20LR1110&amp;severity=medium&amp;id=69d5660baaed68159a5b4066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32864-cwe-125-out-of-bounds-read-in-ni-la-6af518ee</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32864%3A%20CWE-125%20Out-of-bounds%20read%20in%20NI%20LabVIEW&amp;severity=high&amp;id=69d5660baaed68159a5b4070</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39382-cwe-78-improper-neutralization-of-s-b49396ae</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39382%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20dbt-labs%20dbt-core&amp;severity=critical&amp;id=69d5660baaed68159a5b4076</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32863-cwe-125-out-of-bounds-read-in-ni-la-4bc30ff3</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32863%3A%20CWE-125%20Out-of-bounds%20read%20in%20NI%20LabVIEW&amp;severity=high&amp;id=69d56287aaed68159a58f978</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39381-cwe-863-incorrect-authorization-in--ea8cb850</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39381%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69d56287aaed68159a58f984</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32862-cwe-787-out-of-bounds-write-in-ni-l-e080252e</loc>
    <lastmod>2026-04-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32862%3A%20CWE-787%20Out-of-bounds%20write%20in%20NI%20LabVIEW&amp;severity=high&amp;id=69d56287aaed68159a58f975</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39837-cwe-80-improper-neutralization-of-s-0845af33</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39837%3A%20CWE-80%20Improper%20neutralization%20of%20Script-Related%20HTML%20tags%20in%20a%20web%20page%20(basic%20XSS)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20Cargo%20Extension&amp;severity=medium&amp;id=69d56287aaed68159a58f989</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32861-cwe-787-out-of-bounds-write-in-ni-l-febe3e90</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32861%3A%20CWE-787%20Out-of-bounds%20write%20in%20NI%20LabVIEW&amp;severity=high&amp;id=69d56287aaed68159a58f972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39376-cwe-674-uncontrolled-recursion-in-k-a81ba893</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39376%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20kagisearch%20fastfeedparser&amp;severity=high&amp;id=69d56287aaed68159a58f981</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39841-cwe-80-improper-neutralization-of-s-a175a700</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39841%3A%20CWE-80%20Improper%20neutralization%20of%20Script-Related%20HTML%20tags%20in%20a%20web%20page%20(basic%20XSS)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20Cargo%20Extension&amp;severity=medium&amp;id=69d56289aaed68159a58f9b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32860-cwe-787-out-of-bounds-write-in-ni-l-b871832b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32860%3A%20CWE-787%C2%A0-%20Out%20of%20Bounds%20Write%20in%20NI%20LabVIEW&amp;severity=high&amp;id=69d56287aaed68159a58f96f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39374-cwe-639-authorization-bypass-throug-07ac8902</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39374%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20makeplane%20plane&amp;severity=medium&amp;id=69d56287aaed68159a58f97e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39840-cwe-79-improper-neutralization-of-i-1432962f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39840%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20Cargo%20Extension&amp;severity=medium&amp;id=69d56287aaed68159a58f98d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39373-cwe-409-improper-handling-of-highly-78e8fadf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39373%3A%20CWE-409%3A%20Improper%20Handling%20of%20Highly%20Compressed%20Data%20(Data%20Amplification)%20in%20latchset%20jwcrypto&amp;severity=medium&amp;id=69d56287aaed68159a58f97b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39839-cwe-80-improper-neutralization-of-s-43014776</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39839%3A%20CWE-80%20Improper%20neutralization%20of%20Script-Related%20HTML%20tags%20in%20a%20web%20page%20(basic%20XSS)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20Cargo%20Extension&amp;severity=medium&amp;id=69d55f0aaaed68159a5629d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39371-cwe-352-cross-site-request-forgery--ad62fb02</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39371%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20redwoodjs%20sdk&amp;severity=high&amp;id=69d55f0aaaed68159a5629cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39370-cwe-918-server-side-request-forgery-7f740e78</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39370%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69d55f0aaaed68159a5629c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39369-cwe-22-improper-limitation-of-a-pat-d8d90b53</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39369%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69d55f07aaed68159a562955</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39368-cwe-918-server-side-request-forgery-41ed5d8d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39368%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69d55f07aaed68159a562952</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39367-cwe-79-improper-neutralization-of-i-a2c0f0ca</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39367%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69d55f07aaed68159a56294e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39366-cwe-345-insufficient-verification-o-78f504b1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39366%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69d55f07aaed68159a56294a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39838-cwe-79-improper-neutralization-of-i-92dcc43c</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39838%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Wikimedia%20Foundation%20MediaWiki%20-%20ProofreadPage%20Extension&amp;severity=medium&amp;id=69d55f0aaaed68159a5629cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5739-code-injection-in-powerjob-55e7481f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5739%3A%20Code%20Injection%20in%20PowerJob&amp;severity=medium&amp;id=69d55f0aaaed68159a5629da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39365-cwe-22-improper-limitation-of-a-pat-1bdd4154</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39365%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20vitejs%20vite&amp;severity=medium&amp;id=69d55f07aaed68159a562947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39364-cwe-180-incorrect-behavior-order-va-9046ca3d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39364%3A%20CWE-180%3A%20Incorrect%20Behavior%20Order%3A%20Validate%20Before%20Canonicalize%20in%20vitejs%20vite&amp;severity=high&amp;id=69d55f07aaed68159a562944</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39363-cwe-200-exposure-of-sensitive-infor-318e5c87</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39363%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20vitejs%20vite&amp;severity=high&amp;id=69d55f07aaed68159a562941</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39322-cwe-287-improper-authentication-in--52a7d8f2</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39322%3A%20CWE-287%3A%20Improper%20Authentication%20in%20polarnl%20PolarLearn&amp;severity=critical&amp;id=69d55f07aaed68159a56293e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39355-cwe-862-missing-authorization-in-mg-7e4b58a8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39355%3A%20CWE-862%3A%20Missing%20Authorization%20in%20MGeurts%20genealogy&amp;severity=critical&amp;id=69d5874b43e2781bad84eb12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39354-cwe-639-authorization-bypass-throug-42d52418</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39354%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Erudika%20scoold&amp;severity=medium&amp;id=69d5874b43e2781bad84eb0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5736-sql-injection-in-powerjob-52439f1b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5736%3A%20SQL%20Injection%20in%20PowerJob&amp;severity=medium&amp;id=69d5874b43e2781bad84eb15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5762-cwe-770-allocation-of-resources-with-356f3801</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5762%3A%20CWE-770%20Allocation%20of%20resources%20without%20limits%20or%20throttling%20in%20Wikimedia%20Foundation%20MediaWiki%20-%20ReportIncident%20Extension&amp;severity=medium&amp;id=69d5874b43e2781bad84eb07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/anthropic-unveils-claude-mythos-a-cybersecurity-br-5fcf7a85</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Anthropic%C2%A0Unveils%20%E2%80%98Claude%20Mythos%E2%80%99%20%E2%80%93%20A%20Cybersecurity%20Breakthrough%20That%20Could%20Also%20Supercharge%20Attacks&amp;severity=critical&amp;id=69d550f2aaed68159a4b492d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22711-cwe-87-improper-neutralization-of-a-5efa9e0c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22711%3A%20CWE-87%20Improper%20neutralization%20of%20alternate%20XSS%20syntax%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20Wikilove%20Extension&amp;severity=medium&amp;id=69d5874b43e2781bad84eb03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-little-bit-pivoting-what-web-shells-are-attacker-e7efe859</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20Little%20Bit%20Pivoting%3A%20What%20Web%20Shells%20are%20Attackers%20Looking%20for%26%23x3f%3B%2C%20(Tue%2C%20Apr%207th)&amp;severity=critical&amp;id=69d54d6eaaed68159a48c750</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39324-cwe-287-improper-authentication-in--fb314bd2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39324%3A%20CWE-287%3A%20Improper%20Authentication%20in%20rack%20rack-session&amp;severity=critical&amp;id=69d549ecaaed68159a47390c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39321-cwe-208-observable-timing-discrepan-78f06f4f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39321%3A%20CWE-208%3A%20Observable%20Timing%20Discrepancy%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69d549ecaaed68159a473907</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39337-cwe-94-improper-control-of-generati-d10607b6</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39337%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=critical&amp;id=69d549ecaaed68159a47390f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39319-cwe-89-improper-neutralization-of-s-d67499f3</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39319%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d549ecaaed68159a473904</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39344-cwe-80-improper-neutralization-of-s-a8984072</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39344%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d549eeaaed68159a473968</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39343-cwe-89-improper-neutralization-of-s-261e41ba</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39343%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d549ecaaed68159a473921</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39342-cwe-89-improper-neutralization-of-s-7364aad1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39342%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=critical&amp;id=69d549ecaaed68159a47391e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39341-cwe-89-improper-neutralization-of-s-5581e9ff</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39341%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d549ecaaed68159a47391b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39340-cwe-89-improper-neutralization-of-s-bd7d68e6</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39340%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d549ecaaed68159a473918</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39339-cwe-284-improper-access-control-in--d81b63be</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39339%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20ChurchCRM%20CRM&amp;severity=critical&amp;id=69d549ecaaed68159a473915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39338-cwe-79-improper-neutralization-of-i-e5710ece</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39338%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d549ecaaed68159a473912</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39336-cwe-79-improper-neutralization-of-i-0d695d4a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39336%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=medium&amp;id=69d54667aaed68159a45f2a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39334-cwe-89-improper-neutralization-of-s-86f645fb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39334%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d54667aaed68159a45f29e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39333-cwe-79-improper-neutralization-of-i-4197b72d</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39333%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d54667aaed68159a45f29b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39332-cwe-79-improper-neutralization-of-i-58566cc9</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39332%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d54667aaed68159a45f298</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39331-cwe-639-authorization-bypass-throug-d615f628</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39331%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d54667aaed68159a45f295</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39330-cwe-89-improper-neutralization-of-s-ee261c11</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39330%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d54667aaed68159a45f292</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39329-cwe-89-improper-neutralization-of-s-e56fe8e9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39329%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d54667aaed68159a45f28f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39328-cwe-79-improper-neutralization-of-i-0bd6d06b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39328%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d54667aaed68159a45f28c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39327-cwe-89-improper-neutralization-of-s-676247de</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39327%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d54667aaed68159a45f289</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39326-cwe-89-improper-neutralization-of-s-38ebd0e9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39326%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d5660daaed68159a5b4136</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39325-cwe-89-improper-neutralization-of-s-6b2e8d23</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39325%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d5874d43e2781bad84f53a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39323-cwe-89-improper-neutralization-of-s-1746d817</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39323&amp;severity=null&amp;id=69d5874b43e2781bad84eb22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39318-cwe-89-improper-neutralization-of-s-b28e5f1c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39318%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d5874d43e2781bad84f537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39335-cwe-79-improper-neutralization-of-i-1a28ade0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39335%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=medium&amp;id=69d5874e43e2781bad84f790</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39317-cwe-89-improper-neutralization-of-s-d04471fb</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39317&amp;severity=null&amp;id=69d5660baaed68159a5b4087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24175-cwe-248-uncaught-exception-in-nvidi-9f848a2c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24175%3A%20CWE-248%20Uncaught%20Exception%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=high&amp;id=69d5874d43e2781bad84f525</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24174-cwe-681-incorrect-conversion-betwee-f5c56edf</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24174%3A%20CWE-681%20Incorrect%20Conversion%20between%20Numeric%20Types%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=high&amp;id=69d5874d43e2781bad84f520</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24173-cwe-190-integer-overflow-or-wraparo-7caeae47</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24173%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=high&amp;id=69d5874b43e2781bad84eb1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24147-cwe-22-improper-limitation-of-a-pat-f50a1d12</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24147%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=medium&amp;id=69d55f0aaaed68159a5629e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24146-cwe-789-memory-allocation-with-exce-3e49f936</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24146%3A%20CWE-789%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=high&amp;id=69d55f0aaaed68159a5629e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35576-cwe-79-improper-neutralization-of-i-6b4a2278</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35576%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d5874d43e2781bad84f533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24156-cwe-502-deserialization-of-untruste-b62ca16f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24156%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20DALI&amp;severity=high&amp;id=69d55f0aaaed68159a5629eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22682-cwe-863-incorrect-authorization-in--2c6d5e70</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22682%3A%20CWE-863%20Incorrect%20Authorization%20in%20HKUDS%20OpenHarness&amp;severity=high&amp;id=69d5874d43e2781bad84f51b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35575-cwe-79-improper-neutralization-of-i-4f65591c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35575%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d550fbaaed68159a4b4b11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22680-cwe-862-missing-authorization-in-vo-b1333a95</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22680%3A%20CWE-862%20Missing%20Authorization%20in%20Volcengine%20OpenViking&amp;severity=medium&amp;id=69d5874d43e2781bad84f515</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35572-cwe-918-server-side-request-forgery-9880f733</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35572%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d5660baaed68159a5b4084</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35573-cwe-22-improper-limitation-of-a-pat-cd7c363b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35573%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ChurchCRM%20CRM&amp;severity=critical&amp;id=69d5874d43e2781bad84f530</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35574-cwe-79-improper-neutralization-of-i-964a1eb4</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35574%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d53bdbaaed68159a38bdbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39316-cwe-416-use-after-free-in-openprint-81491557</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39316%3A%20CWE-416%3A%20Use%20After%20Free%20in%20OpenPrinting%20cups&amp;severity=medium&amp;id=69d53bddaaed68159a38be0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39314-cwe-191-integer-underflow-wrap-or-w-216f8413</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39314%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20OpenPrinting%20cups&amp;severity=medium&amp;id=69d53bddaaed68159a38be09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35610-cwe-285-improper-authorization-in-p-8a184153</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35610%3A%20CWE-285%3A%20Improper%20Authorization%20in%20polarnl%20PolarLearn&amp;severity=high&amp;id=69d53bdbaaed68159a38bdc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23696-cwe-89-improper-neutralization-of-s-55a8fb9d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23696%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Windmill%20Labs%20Windmill%20CE%20(Community%20Edition)&amp;severity=critical&amp;id=69d53bdbaaed68159a38bdad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22683-cwe-862-missing-authorization-in-wi-68e61a60</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22683%3A%20CWE-862%20Missing%20Authorization%20in%20Windmill%20Labs%20Windmill%20CE%20(Community%20Edition)&amp;severity=high&amp;id=69d53bdbaaed68159a38bda5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39307-cwe-22-improper-limitation-of-a-pat-dcad6020</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39307%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69d53bdbaaed68159a38bdce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39308-cwe-22-improper-limitation-of-a-pat-cbe46351</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39308%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69d53bddaaed68159a38be06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39306-cwe-22-improper-limitation-of-a-pat-b272ba3d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39306%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69d53bdbaaed68159a38bdcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39305-cwe-22-improper-limitation-of-a-pat-ee1c9c84</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39305%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=critical&amp;id=69d53bdbaaed68159a38bdc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35615-cwe-22-improper-limitation-of-a-pat-ac7728e9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35615%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=critical&amp;id=69d53bdbaaed68159a38bdc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32588-cwe-400-uncontrolled-resource-consu-09d4adec</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32588%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Apache%20Software%20Foundation%20Apache%20Cassandra&amp;severity=medium&amp;id=69d53bdbaaed68159a38bdba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-new-rules-of-engagement-matching-agentic-attac-9364e595</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20New%20Rules%20of%20Engagement%3A%20Matching%20Agentic%20Attack%20Speed&amp;severity=medium&amp;id=69d534d4aaed68159a357310</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27315-cwe-532-insertion-of-sensitive-info-6ca7f942</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27315%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Apache%20Software%20Foundation%20Apache%20Cassandra&amp;severity=medium&amp;id=69d53bdbaaed68159a38bdb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35613-cwe-22-improper-limitation-of-a-pat-e3f4414f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35613%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20moritzmyrz%20coursevault-preview&amp;severity=medium&amp;id=69d534e5aaed68159a357dd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35611-cwe-1333-inefficient-regular-expres-c299d172</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35611%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20sporkmonger%20addressable&amp;severity=high&amp;id=69d534e5aaed68159a357dce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35608-cwe-79-improper-neutralization-of-i-c1166cc0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35608%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RoastSlav%20quickdrop&amp;severity=medium&amp;id=69d534e5aaed68159a357dca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trent-ai-emerges-from-stealth-with-13-million-in-f-7a90dd79</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trent%20AI%20Emerges%20From%20Stealth%20With%20%2413%20Million%20in%20Funding&amp;severity=medium&amp;id=69d534d4aaed68159a357313</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14821-uncontrolled-search-path-element-in-a80a017f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14821%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Red%20Hat%20Red%20Hat%20Hardened%20Images&amp;severity=high&amp;id=69d534e5aaed68159a357db8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27314-cwe-267-privilege-defined-with-unsa-7e231997</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27314%3A%20CWE-267%20Privilege%20Defined%20With%20Unsafe%20Actions%20in%20Apache%20Software%20Foundation%20Apache%20Cassandra&amp;severity=high&amp;id=69d534e5aaed68159a357dc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4631-improper-neutralization-of-special-e-ba011f09</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4631%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=critical&amp;id=69d534e5aaed68159a357dd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14944-cwe-862-missing-authorization-in-in-6a37bcb0</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14944%3A%20CWE-862%20Missing%20Authorization%20in%20inisev%20BackupBliss%20%E2%80%93%20Backup%20%26%20Migration%20with%20Free%20Cloud%20Storage&amp;severity=medium&amp;id=69d534e5aaed68159a357dbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35584-cwe-306-missing-authentication-for--587bb12d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35584%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=69d5314faaed68159a33992b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-39384-cwe-639-authorization-bypass-throug-fc977f46</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-39384%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=69d5314faaed68159a33992e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35523-cwe-306-missing-authentication-for--051f992d</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35523%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20strawberry-graphql%20strawberry&amp;severity=high&amp;id=69d5314faaed68159a33991a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35583-cwe-22-improper-limitation-of-a-pat-f33beecb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35583%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20NationalSecurityAgency%20emissary&amp;severity=medium&amp;id=69d5314faaed68159a339928</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35581-cwe-78-improper-neutralization-of-s-c191187e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35581%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20NationalSecurityAgency%20emissary&amp;severity=high&amp;id=69d5314faaed68159a339925</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35580-cwe-77-improper-neutralization-of-s-e4caccb1</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35580%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20NationalSecurityAgency%20emissary&amp;severity=critical&amp;id=69d5314faaed68159a339920</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35578-cwe-601-url-redirection-to-untruste-0a63bdb7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35578&amp;severity=null&amp;id=69d5314faaed68159a33991d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35567-cwe-89-improper-neutralization-of-s-65faaa6c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35567&amp;severity=null&amp;id=69d52a46aaed68159a30f8b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35566-cwe-89-improper-neutralization-of-s-13b861c0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35566&amp;severity=null&amp;id=69d52a46aaed68159a30f8ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35534-cwe-79-improper-neutralization-of-i-4b6f14c4</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35534%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69d52a46aaed68159a30f8aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-flowise-vulnerability-in-attacker-crossha-a53d74a5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Flowise%20Vulnerability%20in%20Attacker%20Crosshairs&amp;severity=critical&amp;id=69d526c2aaed68159a2fe3da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35571-cwe-79-improper-neutralization-of-i-7dab1fcc</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35571%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NationalSecurityAgency%20emissary&amp;severity=medium&amp;id=69d52a46aaed68159a30f8b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35526-cwe-770-allocation-of-resources-wit-33a1f717</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35526%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20strawberry-graphql%20strawberry&amp;severity=high&amp;id=69d52a46aaed68159a30f8a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4931-cwe-681-incorrect-conversion-between-185741c0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4931%3A%20CWE-681%20Incorrect%20Conversion%20between%20Numeric%20Types%20in%20Marginal%20Marginal%20Smart%20Contract&amp;severity=medium&amp;id=69d52a47aaed68159a30f8dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35521-cwe-78-improper-neutralization-of-s-d0980be3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35521%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20pi-hole%20FTL&amp;severity=high&amp;id=69d52a46aaed68159a30f8a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33816-cwe-697-incorrect-comparison-in-git-90a754f8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33816%3A%20CWE-697%20%E2%80%94%20Incorrect%20Comparison%20in%20github.com%2Fjackc%2Fpgx%2Fv5%20github.com%2Fjackc%2Fpgx%2Fv5%2Fpgproto3&amp;severity=critical&amp;id=69d52a46aaed68159a30f89b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33815-cwe-129-improper-validation-of-arra-24136267</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33815%3A%20CWE-129%20%E2%80%94%20Improper%20Validation%20of%20Array%20Index%20in%20github.com%2Fjackc%2Fpgx%2Fv5%20github.com%2Fjackc%2Fpgx%2Fv5%2Fpgproto3&amp;severity=critical&amp;id=69d52a46aaed68159a30f898</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35520-cwe-78-improper-neutralization-of-s-1cae9e5c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35520%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20pi-hole%20FTL&amp;severity=high&amp;id=69d52a46aaed68159a30f8a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35519-cwe-78-improper-neutralization-of-s-ad11d3fa</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35519%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20pi-hole%20FTL&amp;severity=high&amp;id=69d52a46aaed68159a30f89e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1079-cwe-284-improper-access-control-in-p-d6216d38</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1079%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Pegasystems%20Pega%20Browser%20Extension%20(PBE)&amp;severity=medium&amp;id=69d52341aaed68159a2ec570</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35518-cwe-78-improper-neutralization-of-s-78f9c7fe</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35518%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20pi-hole%20FTL&amp;severity=high&amp;id=69d52344aaed68159a2ec624</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35517-cwe-78-improper-neutralization-of-s-f2c0d982</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35517%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20pi-hole%20FTL&amp;severity=high&amp;id=69d52344aaed68159a2ec621</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35516-cwe-918-server-side-request-forgery-5c669499</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35516%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Kovah%20LinkAce&amp;severity=medium&amp;id=69d52344aaed68159a2ec61e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24819-vulnerability-in-nokia-mantaray-nm-038e8147</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24819%3A%20Vulnerability%20in%20Nokia%20MantaRay%20NM&amp;severity=medium&amp;id=69d52341aaed68159a2ec566</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24818-vulnerability-in-nokia-mantaray-nm-1f8275a6</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24818%3A%20Vulnerability%20in%20Nokia%20MantaRay%20NM&amp;severity=high&amp;id=69d52341aaed68159a2ec563</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24817-vulnerability-in-nokia-mantaray-nm-4f065fd9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24817%3A%20Vulnerability%20in%20Nokia%20MantaRay%20NM&amp;severity=high&amp;id=69d52341aaed68159a2ec560</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35515-cwe-74-improper-neutralization-of-s-f8853fa9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35515%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20nestjs%20nest&amp;severity=medium&amp;id=69d52344aaed68159a2ec61b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1078-cwe-284-improper-access-control-in-p-5bac2281</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1078%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Pegasystems%20Pega%20Robot%20Studio&amp;severity=high&amp;id=69d52341aaed68159a2ec56d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35492-cwe-22-improper-limitation-of-a-pat-f84dc278</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35492%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20kedro-org%20kedro-plugins&amp;severity=medium&amp;id=69d52344aaed68159a2ec616</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35491-cwe-863-incorrect-authorization-in--4cb4d025</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35491%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20pi-hole%20FTL&amp;severity=medium&amp;id=69d52344aaed68159a2ec613</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5745-null-pointer-dereference-in-red-hat--880566c2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5745%3A%20NULL%20Pointer%20Dereference%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69d52346aaed68159a2ecada</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35490-cwe-863-incorrect-authorization-in--fecf3683</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35490%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20dgtlmoon%20changedetection.io&amp;severity=critical&amp;id=69d52344aaed68159a2ec610</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35489-cwe-639-authorization-bypass-throug-9fba6e7a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35489%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20TandoorRecipes%20recipes&amp;severity=high&amp;id=69d52344aaed68159a2ec60c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35488-cwe-749-exposed-dangerous-method-or-3a0a8a55</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35488%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20TandoorRecipes%20recipes&amp;severity=high&amp;id=69d52344aaed68159a2ec608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35487-cwe-22-improper-limitation-of-a-pat-e2594a7d</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35487%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20oobabooga%20text-generation-webui&amp;severity=medium&amp;id=69d52341aaed68159a2ec57c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35486-cwe-918-server-side-request-forgery-46e64d20</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35486%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20oobabooga%20text-generation-webui&amp;severity=high&amp;id=69d52341aaed68159a2ec579</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35485-cwe-22-improper-limitation-of-a-pat-077bd81d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35485%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20oobabooga%20text-generation-webui&amp;severity=high&amp;id=69d51c3eaaed68159a2c1622</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35484-cwe-22-improper-limitation-of-a-pat-1be27b8d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35484%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20oobabooga%20text-generation-webui&amp;severity=medium&amp;id=69d51c3eaaed68159a2c161f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35483-cwe-22-improper-limitation-of-a-pat-b3c7c859</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35483%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20oobabooga%20text-generation-webui&amp;severity=medium&amp;id=69d51c3eaaed68159a2c161c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35480-cwe-770-allocation-of-resources-wit-ce9cb61f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35480%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20ipld%20go-ipld-prime&amp;severity=medium&amp;id=69d51c3eaaed68159a2c1617</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4740-improper-certificate-validation-in-r-d209bf80</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4740%3A%20Improper%20Certificate%20Validation%20in%20Red%20Hat%20Multicluster%20Engine%20for%20Kubernetes&amp;severity=high&amp;id=69d51c3eaaed68159a2c1634</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35462-cwe-613-insufficient-session-expira-655ca154</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35462%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20papra-hq%20papra&amp;severity=medium&amp;id=69d51c3baaed68159a2c14fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35461-cwe-918-server-side-request-forgery-1fc369b3</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35461%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20papra-hq%20papra&amp;severity=medium&amp;id=69d51c3baaed68159a2c14f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35460-cwe-80-improper-neutralization-of-s-a1b65bf5</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35460%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20papra-hq%20papra&amp;severity=medium&amp;id=69d51c3baaed68159a2c14f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/severe-strongbox-vulnerability-patched-in-android-2406484f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Severe%20StrongBox%20Vulnerability%20Patched%20in%20Android&amp;severity=critical&amp;id=69d51530aaed68159a296f09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33034-cwe-770-allocation-of-resources-wit-62744c5c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33034%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20djangoproject%20Django&amp;severity=high&amp;id=69d51c3baaed68159a2c14ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33033-cwe-407-inefficient-algorithmic-com-29d5fe4e</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33033%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20djangoproject%20Django&amp;severity=medium&amp;id=69d51c3baaed68159a2c14e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4292-cwe-862-missing-authorization-in-dja-57d55899</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4292%3A%20CWE-862%3A%20Missing%20Authorization%20in%20djangoproject%20Django&amp;severity=low&amp;id=69d51c3eaaed68159a2c162f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4277-cwe-862-missing-authorization-in-dja-17fa66ce</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4277%3A%20CWE-862%3A%20Missing%20Authorization%20in%20djangoproject%20Django&amp;severity=critical&amp;id=69d51c3eaaed68159a2c162a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35457-cwe-770-allocation-of-resources-wit-4a7de5b5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35457%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20libp2p%20rust-libp2p&amp;severity=high&amp;id=69d51c3baaed68159a2c14f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3902-cwe-290-authentication-bypass-by-spo-925d7235</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3902%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20djangoproject%20Django&amp;severity=high&amp;id=69d51c3eaaed68159a2c1625</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35405-cwe-770-allocation-of-resources-wit-07b4b21d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35405%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20libp2p%20rust-libp2p&amp;severity=high&amp;id=69d51c3baaed68159a2c14ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5384-cwe-863-incorrect-authorization-in-r-4f054075</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5384%3A%20CWE-863%20Incorrect%20Authorization%20in%20runZero%20Platform&amp;severity=medium&amp;id=69d51c41aaed68159a2c16d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5383-cwe-863-incorrect-authorization-in-r-7d8c86a4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5383%3A%20CWE-863%20Incorrect%20Authorization%20in%20runZero%20Explorer&amp;severity=medium&amp;id=69d51c41aaed68159a2c16d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5382-cwe-863-incorrect-authorization-in-r-c59deb95</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5382%3A%20CWE-863%20Incorrect%20Authorization%20in%20runZero%20Platform&amp;severity=low&amp;id=69d51c41aaed68159a2c16cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5381-cwe-863-incorrect-authorization-in-r-72ccf558</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5381%3A%20CWE-863%20Incorrect%20Authorization%20in%20runZero%20Platform&amp;severity=low&amp;id=69d51c41aaed68159a2c16c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5380-cwe-863-incorrect-authorization-in-r-bbdccf91</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5380%3A%20CWE-863%20Incorrect%20Authorization%20in%20runZero%20Platform&amp;severity=medium&amp;id=69d51c41aaed68159a2c16c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5379-cwe-863-incorrect-authorization-in-r-bdf9f407</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5379%3A%20CWE-863%20Incorrect%20Authorization%20in%20runZero%20Platform&amp;severity=low&amp;id=69d51c41aaed68159a2c16c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5378-cwe-863-incorrect-authorization-in-r-b41d9219</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5378%3A%20CWE-863%20Incorrect%20Authorization%20in%20runZero%20Platform&amp;severity=medium&amp;id=69d51c41aaed68159a2c16bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5376-cwe-613-insufficient-control-of-reso-6f3cf9cc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5376%3A%20CWE-613%3A%20Insufficient%20Control%20of%20Resources%20After%20Expiration%20or%20Release%20in%20runZero%20Platform&amp;severity=medium&amp;id=69d51c3eaaed68159a2c1639</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5375-cwe-200-exposure-of-sensitive-inform-03b25ad4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5375%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20runZero%20Platform&amp;severity=low&amp;id=69d52346aaed68159a2ecaea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5374-cwe-863-incorrect-authorization-in-r-9c41aa0c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5374%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20runZero%20Platform&amp;severity=medium&amp;id=69d52346aaed68159a2ecae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5373-cwe-269-improper-privilege-managemen-43a9d747</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5373%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20runZero%20Platform&amp;severity=high&amp;id=69d52346aaed68159a2ecae2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5372-cwe-89-improper-neutralization-of-sp-38771393</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5372%3A%20CWE-89%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20injection&apos;)%20in%20runZero%20Platform&amp;severity=medium&amp;id=69d52346aaed68159a2ecade</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/grafanaghost-attackers-can-abuse-grafana-to-leak-e-3a7cc7cf</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GrafanaGhost%3A%20Attackers%20Can%20Abuse%20Grafana%20to%20Leak%20Enterprise%20Data&amp;severity=medium&amp;id=69d50e26aaed68159a26aa2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-dangers-of-telehealth-data-breaches-phishing-a-0ddbd472</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20dangers%20of%20telehealth%3A%20data%20breaches%2C%20phishing%2C%20and%20spam%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69d5d94943e2781badfb7efb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/webinar-today-why-automated-pentesting-alone-is-no-00c50312</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Webinar%20Today%3A%20Why%20Automated%20Pentesting%20Alone%20Is%20Not%20Enough&amp;severity=medium&amp;id=69d50724aaed68159a2422a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35554-cwe-416-use-after-free-in-apache-so-3aeacf12</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35554%3A%20CWE-416%20Use%20After%20Free%20in%20Apache%20Software%20Foundation%20Apache%20Kafka%20Clients&amp;severity=high&amp;id=69d50aa5aaed68159a256b3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5627-cwe-29-path-traversal-filename-in-mi-9e476f7c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5627%3A%20CWE-29%20Path%20Traversal%3A%20&apos;%5C..%5Cfilename&apos;%20in%20mintplex-labs%20mintplex-labs%2Fanything-llm&amp;severity=critical&amp;id=69d50aa5aaed68159a256b40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22679-cwe-306-missing-authentication-for--330ac532</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22679%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Weaver%20Network%20Co.%2C%20Ltd.%20E-cology&amp;severity=critical&amp;id=69d50016aaed68159a219ccc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5735-vulnerability-in-mozilla-firefox-60096f4b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5735%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69d50016aaed68159a219ce7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5734-vulnerability-in-mozilla-firefox-c0373840</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5734%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69d50016aaed68159a219ce2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5733-vulnerability-in-mozilla-firefox-05cd41e5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5733%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69d50016aaed68159a219cde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5732-vulnerability-in-mozilla-firefox-1f927624</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5732%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69d50016aaed68159a219cd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5731-vulnerability-in-mozilla-firefox-99d73722</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5731%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69d50016aaed68159a219cd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22666-cwe-95-improper-neutralization-of-d-0f29c4fc</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22666%3A%20CWE-95%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20Dolibarr%20Dolibarr%20ERP%2FCRM&amp;severity=high&amp;id=69d50016aaed68159a219cc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28808-cwe-863-incorrect-authorization-in--234c0945</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28808%3A%20CWE-863%20Incorrect%20Authorization%20in%20Erlang%20OTP&amp;severity=high&amp;id=69d4fc92aaed68159a20604c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32144-cwe-295-improper-certificate-valida-27760d2a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32144%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Erlang%20OTP&amp;severity=high&amp;id=69d4fc92aaed68159a206054</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23818-vulnerability-in-hewlett-packard-en-2e70c28e</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23818%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20Private%205G%20Core&amp;severity=high&amp;id=69d4fc92aaed68159a206049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39666-cwe-426-untrusted-search-path-in-ch-e2f0285d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39666%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=critical&amp;id=69d4fc92aaed68159a206046</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3466-cwe-79-improper-neutralization-of-in-d80ce4e1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3466%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=high&amp;id=69d4fc92aaed68159a20605c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gpubreach-root-shell-access-achieved-via-gpu-rowha-1215a777</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GPUBreach%3A%20Root%20Shell%20Access%20Achieved%20via%20GPU%20Rowhammer%20Attack&amp;severity=medium&amp;id=69d4ee82aaed68159a15c601</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31842-cwe-444-inconsistent-interpretation-c345cdab</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31842%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Tinyproxy%20Project%20Tinyproxy&amp;severity=high&amp;id=69d4ee89aaed68159a15cf1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ta416-resumes-european-government-espionage-campai-95cb4807</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TA416%20resumes%20European%20government%20espionage%20campaigns&amp;severity=medium&amp;id=69d4e778aaed68159a0e93d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/detections-for-the-axios-supply-chain-compromise-828371e5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Detections%20for%20the%20Axios%20supply%20chain%20compromise&amp;severity=medium&amp;id=69d4eafdaaed68159a12948d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/medusa-ransomware-fast-to-exploit-vulnerabilities--4446437b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Medusa%20Ransomware%20Fast%20to%20Exploit%20Vulnerabilities%2C%20Breached%20Systems&amp;severity=medium&amp;id=69d4e497aaed68159a0d6d3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/german-police-unmask-revil-ransomware-leader-662d4d22</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=German%20Police%20Unmask%20REvil%20Ransomware%20Leader&amp;severity=medium&amp;id=69d4cedeaaed68159a05effa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34903-cwe-862-missing-authorization-in-oc-0cb4688b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34903%3A%20CWE-862%20Missing%20Authorization%20in%20OceanWP%20Ocean%20Extra&amp;severity=medium&amp;id=69d4cb5aaaed68159a04482c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34899-cwe-862-missing-authorization-in-en-4d9d2403</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34899%3A%20CWE-862%20Missing%20Authorization%20in%20Eniture%20technology%20LTL%20Freight%20Quotes%20%E2%80%93%20Worldwide%20Express%20Edition&amp;severity=medium&amp;id=69d4c452aaed68159a00e3a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/white-house-seeks-to-slash-cisa-funding-by-707-mil-c930cb7f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=White%20House%20Seeks%20to%20Slash%20CISA%20Funding%20by%20%24707%20Million&amp;severity=critical&amp;id=69d4c0cfaaed68159afed9dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34904-cwe-352-cross-site-request-forgery--d695f98e</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34904%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Analytify%20Simple%20Social%20Media%20Share%20Buttons&amp;severity=high&amp;id=69d4c452aaed68159a00e3a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34896-cwe-352-cross-site-request-forgery--25e0cb83</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34896%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Analytify%20Under%20Construction%2C%20Coming%20Soon%20%26%20Maintenance%20Mode&amp;severity=high&amp;id=69d4c452aaed68159a00e3a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33227-cwe-22-improper-input-validation-fo-fcaded2c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33227%3A%20CWE-22%20Improper%20input%20validation%20for%20resource%20loading%20in%20Apache%20Software%20Foundation%20Apache%20ActiveMQ%20Client&amp;severity=medium&amp;id=69d4bd49aaed68159afc7f6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28810-cwe-340-generation-of-predictable-n-2cebe101</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28810%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20Erlang%20OTP&amp;severity=medium&amp;id=69d4bd49aaed68159afc7f61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34197-cwe-20-improper-input-validation-in-32baa8df</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34197%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20ActiveMQ%20Broker&amp;severity=high&amp;id=69d4bd49aaed68159afc7f6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3177-cwe-345-insufficient-verification-of-66835760</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3177%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20smub%20Charitable%20%E2%80%93%20Donation%20Plugin%20for%20WordPress%20%E2%80%93%20Fundraising%20with%20Recurring%20Donations%20%26%20More&amp;severity=medium&amp;id=69d4e4a2aaed68159a0d7521</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5465-cwe-639-authorization-bypass-through-c68a4d21</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5465%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20ameliabooking%20Booking%20for%20Appointments%20and%20Events%20Calendar%20%E2%80%93%20Amelia&amp;severity=high&amp;id=69d4af3baaed68159af4f58a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1114-cwe-284-improper-access-control-in-p-40f6ba09</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1114%3A%20CWE-284%20Improper%20Access%20Control%20in%20parisneo%20parisneo%2Flollms&amp;severity=critical&amp;id=69d4a832aaed68159ad9ba6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wynn-resorts-says-21000-employees-affected-by-shin-d88a1657</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Wynn%20Resorts%20Says%2021%2C000%20Employees%20Affected%20by%20ShinyHunters%20Hack&amp;severity=high&amp;id=69d4a12aaaed68159ad2b8e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4079-cwe-89-sql-injection-in-sql-chart-bu-96d8ce74</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4079%3A%20CWE-89%20SQL%20Injection%20in%20SQL%20Chart%20Builder&amp;severity=medium&amp;id=69d4a832aaed68159ad9ba75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1900-cwe-862-missing-authorization-in-lin-eb4c0dc8</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1900%3A%20CWE-862%20Missing%20Authorization%20in%20Link%20Whisper%20Free&amp;severity=medium&amp;id=69d4a832aaed68159ad9ba72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15611-cwe-79-cross-site-scripting-xss-in--8c937f1d</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15611%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Popup%20Box&amp;severity=medium&amp;id=69d4a832aaed68159ad9ba6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65116-cwe-763-release-of-invalid-pointer--6df269bb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65116%3A%20CWE-763%20Release%20of%20invalid%20pointer%20or%20reference%20in%20Hitachi%20JP1%2FIT%20Desktop%20Management%202%20-%20Manager&amp;severity=medium&amp;id=69d49de1aaed68159acfad0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1839-cwe-502-deserialization-of-untrusted-5f6a12e8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1839%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20huggingface%20huggingface%2Ftransformers&amp;severity=medium&amp;id=69d49a21aaed68159acbc2ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65115-cwe-73-external-control-of-file-nam-a8eb6ffa</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65115%3A%20CWE-73%20External%20control%20of%20file%20name%20or%20path%20in%20Hitachi%20JP1%2FIT%20Desktop%20Management%202%20-%20Manager&amp;severity=high&amp;id=69d49a21aaed68159acbc2aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0740-cwe-434-unrestricted-upload-of-file--9ec11832</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0740%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20SaturdayDrive%20Ninja%20Forms%20-%20File%20Uploads&amp;severity=critical&amp;id=69d48bf00a160ebd92416647</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20446-cwe-787-out-of-bounds-write-in-medi-9fb40fd5</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20446%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69d47ddc0a160ebd9234c837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20433-cwe-787-out-of-bounds-write-in-medi-1d30900f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20433%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=69d47ddc0a160ebd9234c834</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20432-cwe-787-out-of-bounds-write-in-medi-f16f04fd</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20432%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=69d47ddc0a160ebd9234c831</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20431-cwe-770-allocation-of-resources-wit-c21cd2dc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20431%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69d47ddc0a160ebd9234c82e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5719-sql-injection-in-itsourcecode-constr-df554fa7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5719%3A%20SQL%20Injection%20in%20itsourcecode%20Construction%20Management%20System&amp;severity=medium&amp;id=69d46fca0a160ebd92208af8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-tuesday-april-7th-2026-httpsiscs-d1fa261a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Tuesday%2C%20April%207th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9882%2C%20(Tue%2C%20Apr%207th)&amp;severity=medium&amp;id=69d465400a160ebd920711df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13044-cwe-340-generation-of-predictable-n-82b5f6dc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13044%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20IBM%20Concert&amp;severity=medium&amp;id=69d461b90a160ebd9203cbbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-08-2fb33380</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-08&amp;severity=medium&amp;id=69d660b31cc7ad14da71d60b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-07-896477e7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-07&amp;severity=medium&amp;id=69d59e5943e2781badb13b0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31272-na-cc351abb</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31272%3A%20n%2Fa&amp;severity=critical&amp;id=69d5874d43e2781bad84f52d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31271-na-b10371a9</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31271%3A%20n%2Fa&amp;severity=critical&amp;id=69d5874d43e2781bad84f52a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71058-na-060d58b9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71058%3A%20n%2Fa&amp;severity=critical&amp;id=69d5874b43e2781bad84eb0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69515-na-de1f3698</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69515%3A%20n%2Fa&amp;severity=critical&amp;id=69d55f07aaed68159a56293a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56015-na-10ff62bb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56015%3A%20n%2Fa&amp;severity=high&amp;id=69d55f07aaed68159a562936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-07-45db4b77</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-07&amp;severity=low&amp;id=69d542d9aaed68159a3c0b1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70844-na-707f43dc</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70844%3A%20n%2Fa&amp;severity=medium&amp;id=69d534e5aaed68159a357dc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36058-na-a04e0a3d</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36058%3A%20n%2Fa&amp;severity=critical&amp;id=69d5314faaed68159a339914</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30460-na-cdb1ba2a</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30460%3A%20n%2Fa&amp;severity=high&amp;id=69d52341aaed68159a2ec573</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52908-na-be591ca1</loc>
    <lastmod>2026-04-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52908%3A%20n%2Fa&amp;severity=critical&amp;id=69d52341aaed68159a2ec569</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36057-na-d4b2a2fa</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36057%3A%20n%2Fa&amp;severity=critical&amp;id=69d52341aaed68159a2ec55a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30079-na-46b40ad6</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30079%3A%20n%2Fa&amp;severity=critical&amp;id=69d51c3baaed68159a2c14e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62818-na-96afc532</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62818%3A%20n%2Fa&amp;severity=critical&amp;id=69d51c3baaed68159a2c14de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52909-na-7b723d69</loc>
    <lastmod>2026-04-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52909%3A%20n%2Fa&amp;severity=critical&amp;id=69d51c3baaed68159a2c14da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5705-cross-site-scripting-in-code-project-773e54db</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5705%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Online%20Hotel%20Booking&amp;severity=medium&amp;id=69d4459a0a160ebd92ea3486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5692-os-command-injection-in-totolink-a71-0e1d1ea0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5692%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=medium&amp;id=69d442150a160ebd92e8c0c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5691-os-command-injection-in-totolink-a71-9ff38c07</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5691%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=medium&amp;id=69d43e920a160ebd92e74967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5690-os-command-injection-in-totolink-a71-d07689a1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5690%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=medium&amp;id=69d43b0e0a160ebd92e61f94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5689-os-command-injection-in-totolink-a71-f836dc6b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5689%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=medium&amp;id=69d437a00a160ebd92e4f4b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5688-os-command-injection-in-totolink-a71-7df2adbb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5688%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=medium&amp;id=69d434060a160ebd92e3c28c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5687-stack-based-buffer-overflow-in-tenda-af9feb13</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5687%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20CX12L&amp;severity=high&amp;id=69d430940a160ebd92e2809b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35454-cwe-22-improper-limitation-of-a-pat-cf5ff4e9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35454%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20coder%20code-marketplace&amp;severity=high&amp;id=69d42d0d0a160ebd92e15bd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35452-cwe-200-exposure-of-sensitive-infor-e07a1773</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35452%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69d42d0d0a160ebd92e15bd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35450-cwe-306-missing-authentication-for--f2435df8</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35450%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69d42d0d0a160ebd92e15bd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35449-cwe-200-exposure-of-sensitive-infor-e15e3474</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35449%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69d42d0d0a160ebd92e15bce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5686-stack-based-buffer-overflow-in-tenda-a9c63a39</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5686%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20CX12L&amp;severity=high&amp;id=69d42d0d0a160ebd92e15bdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35448-cwe-862-missing-authorization-in-ww-041cc36d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35448%3A%20CWE-862%3A%20Missing%20Authorization%20in%20WWBN%20AVideo&amp;severity=low&amp;id=69d42d0d0a160ebd92e15bcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35444-cwe-125-out-of-bounds-read-in-libsd-af3db040</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35444%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20libsdl-org%20SDL_image&amp;severity=high&amp;id=69d42d0d0a160ebd92e15bc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35471-cwe-22-improper-limitation-of-a-pat-515b5296</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35471%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20patrickhener%20goshs&amp;severity=critical&amp;id=69d4297c0a160ebd92e0093d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5709-cwe-78-improper-neutralization-of-sp-fb21bdcc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5709%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20AWS%20Research%20and%20Engineering%20Studio%20(RES)&amp;severity=high&amp;id=69d4297c0a160ebd92e00951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5685-stack-based-buffer-overflow-in-tenda-75bc7b03</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5685%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20CX12L&amp;severity=high&amp;id=69d4297c0a160ebd92e00940</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5708-cwe-915-improperly-controlled-modifi-7d074816</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5708%3A%20CWE-915%20Improperly%20controlled%20modification%20of%20Dynamically-Determined%20object%20attributes%20in%20AWS%20Research%20and%20Engineering%20Studio%20(RES)&amp;severity=high&amp;id=69d4297c0a160ebd92e0094c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5707-cwe-78-improper-neutralization-of-sp-0c568b48</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5707%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20AWS%20Research%20and%20Engineering%20Studio%20(RES)&amp;severity=high&amp;id=69d4297c0a160ebd92e00947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35404-cwe-601-url-redirection-to-untruste-439d20b0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35404%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20openedx%20openedx-platform&amp;severity=medium&amp;id=69d425f60a160ebd92deddc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22675-cwe-79-improper-neutralization-of-i-3125cc30</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22675%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OCS%20Inventory%20OCS%20Inventory%20NG%20Server&amp;severity=medium&amp;id=69d425f60a160ebd92deddbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35475-cwe-601-url-redirection-to-untruste-ac706b50</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35475%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=69d425f60a160ebd92deddcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5684-stack-based-buffer-overflow-in-tenda-deeeb3f0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5684%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20CX12L&amp;severity=high&amp;id=69d425f60a160ebd92deddd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35474-cwe-601-url-redirection-to-untruste-d9ca66d2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35474%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=69d425f60a160ebd92deddc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35473-cwe-601-url-redirection-to-untruste-026e71eb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35473%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=69d425f60a160ebd92deddc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35399-cwe-79-improper-neutralization-of-i-01d4cda6</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35399%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=69d422720a160ebd92dda200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35472-cwe-601-url-redirection-to-untruste-1a6f86c5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35472%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=69d422720a160ebd92dda203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35398-cwe-601-url-redirection-to-untruste-d1e8c203</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35398%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=69d422720a160ebd92dda1fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35396-cwe-601-url-redirection-to-untruste-7af49979</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35396%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=69d422720a160ebd92dda1fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35395-cwe-89-improper-neutralization-of-s-dd6d2d62</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35395%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=69d422720a160ebd92dda1f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35394-cwe-939-improper-authorization-in-h-ff73149b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35394%3A%20CWE-939%3A%20Improper%20Authorization%20in%20Handler%20for%20Custom%20URL%20Scheme%20in%20mobile-next%20mobile-mcp&amp;severity=high&amp;id=69d41eee0a160ebd92dcdbe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35393-cwe-22-improper-limitation-of-a-pat-b57d1ba3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35393%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20patrickhener%20goshs&amp;severity=critical&amp;id=69d41eee0a160ebd92dcdbde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35392-cwe-22-improper-limitation-of-a-pat-4b67dff2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35392%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20patrickhener%20goshs&amp;severity=critical&amp;id=69d41eee0a160ebd92dcdbdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5683-stack-based-buffer-overflow-in-tenda-31031057</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5683%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20CX12L&amp;severity=medium&amp;id=69d41b690a160ebd92db5976</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-an-aienabled-device-code-phishing-campaign-a142ae3a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20an%20AIenabled%20device%20code%20phishing%20campaign&amp;severity=medium&amp;id=69d425f50a160ebd92dedd8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35391-cwe-348-use-of-less-trusted-source--c50ca1ef</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35391%3A%20CWE-348%3A%20Use%20of%20Less%20Trusted%20Source%20in%20bulwarkmail%20webmail&amp;severity=high&amp;id=69d417e60a160ebd92da7f8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35390-cwe-79-improper-neutralization-of-i-963b67d6</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35390%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bulwarkmail%20webmail&amp;severity=medium&amp;id=69d417e60a160ebd92da7f88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35389-cwe-295-improper-certificate-valida-a699249f</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35389%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20bulwarkmail%20webmail&amp;severity=high&amp;id=69d417e60a160ebd92da7f85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35213-cwe-1333-inefficient-regular-expres-174f25ab</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35213%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20hapijs%20content&amp;severity=high&amp;id=69d417e60a160ebd92da7f81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35208-cwe-79-improper-neutralization-of-i-d04e197a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35208%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lichess-org%20lila&amp;severity=medium&amp;id=69d417e60a160ebd92da7f7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35201-cwe-125-out-of-bounds-read-in-david-4802dc5c</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35201%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20davidfstr%20rdiscount&amp;severity=medium&amp;id=69d4982faaed68159ac9fe05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35200-cwe-436-interpretation-conflict-in--11991d06</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35200%3A%20CWE-436%3A%20Interpretation%20Conflict%20in%20parse-community%20parse-server&amp;severity=low&amp;id=69d4982faaed68159ac9fe00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5682-risky-cryptographic-algorithm-in-mee-ff18ecc6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5682%3A%20Risky%20Cryptographic%20Algorithm%20in%20Meesho%20Online%20Shopping%20App&amp;severity=medium&amp;id=69d4982faaed68159ac9fe08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35199-cwe-122-heap-based-buffer-overflow--aec400ee</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35199%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20microsoft%20SymCrypt&amp;severity=medium&amp;id=69d4982faaed68159ac9fdfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35197-cwe-94-improper-control-of-generati-08451375</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35197%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20mattieb%20dye&amp;severity=medium&amp;id=69d40d5a0a160ebd92d69897</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35185-cwe-284-improper-access-control-in--87e54f7f</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35185%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20haxtheweb%20HAXiam&amp;severity=high&amp;id=69d40d5a0a160ebd92d69894</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35184-cwe-89-improper-neutralization-of-s-f392ddab</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35184%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20phili67%20ecclesiacrm&amp;severity=high&amp;id=69d40d5a0a160ebd92d6988e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5681-sql-injection-in-itsourcecode-saniti-c40d4cdb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5681%3A%20SQL%20Injection%20in%20itsourcecode%20sanitize%20or%20validate%20this%20input&amp;severity=medium&amp;id=69d409da0a160ebd92d5a9da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35183-cwe-639-authorization-bypass-throug-c21973de</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35183%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Ajax30%20BraveCMS-2.0&amp;severity=high&amp;id=69d409da0a160ebd92d5a9ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35182-cwe-862-missing-authorization-in-aj-7e097403</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35182%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Ajax30%20BraveCMS-2.0&amp;severity=high&amp;id=69d409da0a160ebd92d5a9cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35181-cwe-352-cross-site-request-forgery--a6817e6a</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35181%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69d409d70a160ebd92d5a951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35180-cwe-352-cross-site-request-forgery--63177348</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35180%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69d409d70a160ebd92d5a94b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35179-cwe-862-missing-authorization-in-ww-2d01c7e5</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35179%3A%20CWE-862%3A%20Missing%20Authorization%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69d409d70a160ebd92d5a947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5679-os-command-injection-in-totolink-a33-a94bd30b</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5679%3A%20OS%20Command%20Injection%20in%20Totolink%20A3300R&amp;severity=medium&amp;id=69d409da0a160ebd92d5a9d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35176-cwe-125-out-of-bounds-read-in-trabu-d8cdef14</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35176%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20trabucayre%20openFPGALoader&amp;severity=high&amp;id=69d409d70a160ebd92d5a944</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35022-cwe-78-improper-neutralization-of-s-9ed949c7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35022%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Anthropic%20Claude%20Code&amp;severity=critical&amp;id=69d409d70a160ebd92d5a937</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35021-cwe-78-improper-neutralization-of-s-0c10b810</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35021%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Anthropic%20Claude%20Code&amp;severity=high&amp;id=69d409d70a160ebd92d5a933</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35170-cwe-125-out-of-bounds-read-in-trabu-6c582391</loc>
    <lastmod>2026-04-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35170%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20trabucayre%20openFPGALoader&amp;severity=high&amp;id=69d409d70a160ebd92d5a93c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35020-cwe-78-improper-neutralization-of-s-ecf20559</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35020%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Anthropic%20Claude%20Code&amp;severity=high&amp;id=69d409d70a160ebd92d5a92f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5678-os-command-injection-in-totolink-a71-30b2b01a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5678%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=medium&amp;id=69d402cf0a160ebd92d2b844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5677-os-command-injection-in-totolink-a71-8e1759cd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5677%3A%20OS%20Command%20Injection%20in%20Totolink%20A7100RU&amp;severity=medium&amp;id=69d3ff4a0a160ebd92d10004</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0049-denial-of-service-in-google-android-73e3359f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0049%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=69d3ff4a0a160ebd92d0fffa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48651-unknown-in-google-android-8892d81d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48651%3A%20Unknown%20in%20Google%20Android&amp;severity=medium&amp;id=69d40d5a0a160ebd92d6989b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5676-missing-authentication-in-totolink-a-4c98cc11</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5676%3A%20Missing%20Authentication%20in%20Totolink%20A8000R&amp;severity=medium&amp;id=69d3ff4a0a160ebd92d0fffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33817-413ceec5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33817&amp;severity=null&amp;id=69d737031cc7ad14da4194be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5675-sql-injection-in-itsourcecode-constr-61f7dbce</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5675%3A%20SQL%20Injection%20in%20itsourcecode%20Construction%20Management%20System&amp;severity=medium&amp;id=69d3f8440a160ebd92cf69a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35174-cwe-22-improper-limitation-of-a-pat-c16d1487</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35174%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20xenocrat%20chyrp-lite&amp;severity=critical&amp;id=69d3f8440a160ebd92cf699f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35173-cwe-639-authorization-bypass-throug-cb83b4ae</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35173%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20xenocrat%20chyrp-lite&amp;severity=medium&amp;id=69d3f8440a160ebd92cf699b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35171-cwe-94-improper-control-of-generati-06939640</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35171%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20kedro-org%20kedro&amp;severity=critical&amp;id=69d3f4be0a160ebd92ce2ef8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5672-sql-injection-in-code-projects-simpl-4f58dda2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5672%3A%20SQL%20Injection%20in%20code-projects%20Simple%20IT%20Discussion%20Forum&amp;severity=medium&amp;id=69d3f4be0a160ebd92ce2eff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35167-cwe-22-improper-limitation-of-a-pat-989e897d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35167%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20kedro-org%20kedro&amp;severity=high&amp;id=69d3f4be0a160ebd92ce2ef4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35470-cwe-89-improper-neutralization-of-s-92f103df</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35470%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20devcode-it%20openstamanager&amp;severity=high&amp;id=69d3f4be0a160ebd92ce2efb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35166-cwe-79-improper-neutralization-of-i-6bce5d1f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35166%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gohugoio%20hugo&amp;severity=medium&amp;id=69d3f4be0a160ebd92ce2ef1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35164-cwe-434-unrestricted-upload-of-file-984d2f6a</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35164%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Ajax30%20BraveCMS-2.0&amp;severity=high&amp;id=69d3f4be0a160ebd92ce2eee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35052-cwe-79-improper-neutralization-of-i-121184d0</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35052%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20man-group%20dtale&amp;severity=medium&amp;id=69d3f4be0a160ebd92ce2eeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35050-cwe-22-improper-limitation-of-a-pat-3480660e</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35050%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20oobabooga%20text-generation-webui&amp;severity=critical&amp;id=69d3f4be0a160ebd92ce2ee8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35209-cwe-1321-improperly-controlled-modi-76f08387</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35209%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20unjs%20defu&amp;severity=high&amp;id=69d3edbe0a160ebd92cb34cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35047-cwe-434-unrestricted-upload-of-file-a7c1a195</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35047%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Ajax30%20BraveCMS-2.0&amp;severity=critical&amp;id=69d3edbe0a160ebd92cb34c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35046-cwe-79-improper-neutralization-of-i-8d304dd6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35046%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20TandoorRecipes%20recipes&amp;severity=medium&amp;id=69d3edbe0a160ebd92cb34c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35045-cwe-639-authorization-bypass-throug-6f199385</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35045%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20TandoorRecipes%20recipes&amp;severity=high&amp;id=69d3edbe0a160ebd92cb34bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5671-cross-site-scripting-in-cyber-iii-st-fbf946b5</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5671%3A%20Cross%20Site%20Scripting%20in%20Cyber-III%20Student-Management-System&amp;severity=medium&amp;id=69d3edbe0a160ebd92cb34d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35042-cwe-345-insufficient-verification-o-d4271e43</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35042%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20nearform%20fast-jwt&amp;severity=high&amp;id=69d3ea320a160ebd92c9fd90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35039-cwe-345-insufficient-verification-o-e6af2ea6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35039%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20nearform%20fast-jwt&amp;severity=critical&amp;id=69d3ea320a160ebd92c9fd8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35037-cwe-918-server-side-request-forgery-b904914c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35037%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20lin-snow%20Ech0&amp;severity=high&amp;id=69d3ea320a160ebd92c9fd8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35036-cwe-918-server-side-request-forgery-4db6c315</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35036%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20lin-snow%20Ech0&amp;severity=high&amp;id=69d3ea320a160ebd92c9fd87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35035-cwe-79-improper-neutralization-of-i-6f9e3406</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35035%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=high&amp;id=69d3ea320a160ebd92c9fd84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35030-cwe-287-improper-authentication-in--918a2d56</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35030%3A%20CWE-287%3A%20Improper%20Authentication%20in%20BerriAI%20litellm&amp;severity=critical&amp;id=69d3ea320a160ebd92c9fd81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5670-unrestricted-upload-in-cyber-iii-stu-237569ef</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5670%3A%20Unrestricted%20Upload%20in%20Cyber-III%20Student-Management-System&amp;severity=medium&amp;id=69d3ea320a160ebd92c9fd94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35029-cwe-863-incorrect-authorization-in--ed3eedd3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35029%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20BerriAI%20litellm&amp;severity=high&amp;id=69d3ea320a160ebd92c9fda1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34992-cwe-311-missing-encryption-of-sensi-93f490eb</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34992%3A%20CWE-311%3A%20Missing%20Encryption%20of%20Sensitive%20Data%20in%20antrea-io%20antrea&amp;severity=high&amp;id=69d4982faaed68159ac9fe11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5669-sql-injection-in-cyber-iii-student-m-6a572c5a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5669%3A%20SQL%20Injection%20in%20Cyber-III%20Student-Management-System&amp;severity=medium&amp;id=69d3ea320a160ebd92c9fda4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34989-cwe-79-improper-neutralization-of-i-bdfd6b20</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34989%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=critical&amp;id=69d4982faaed68159ac9fe0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34981-cwe-918-server-side-request-forgery-6ba39912</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34981%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20pavelzbornik%20whisperX-FastAPI&amp;severity=medium&amp;id=69d3dfa80a160ebd92c701e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34977-cwe-78-improper-neutralization-of-s-e8f0aace</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34977%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Zeecka%20AperiSolve&amp;severity=critical&amp;id=69d3dfa80a160ebd92c701de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5668-cross-site-scripting-in-cyber-iii-st-14e3000c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5668%3A%20Cross%20Site%20Scripting%20in%20Cyber-III%20Student-Management-System&amp;severity=medium&amp;id=69d3dfa80a160ebd92c701e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34976-cwe-862-missing-authorization-in-dg-edb4d75f</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34976%3A%20CWE-862%3A%20Missing%20Authorization%20in%20dgraph-io%20dgraph&amp;severity=critical&amp;id=69d3dfa80a160ebd92c701db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34975-cwe-93-improper-neutralization-of-c-29f279cb</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34975%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20useplunk%20plunk&amp;severity=high&amp;id=69d3dfa80a160ebd92c701d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34841-cwe-494-download-of-code-without-in-97972daa</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34841%3A%20CWE-494%3A%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20usebruno%20bruno&amp;severity=critical&amp;id=69d3dfa80a160ebd92c701d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34783-cwe-22-improper-limitation-of-a-pat-b7f6108c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34783%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20MontFerret%20ferret&amp;severity=high&amp;id=69d3dfa80a160ebd92c701ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34950-cwe-327-use-of-a-broken-or-risky-cr-19d5d528</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34950%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20nearform%20fast-jwt&amp;severity=critical&amp;id=69d3dc220a160ebd92c52bd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34940-cwe-78-improper-neutralization-of-s-e39f3606</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34940%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20kubeai-project%20kubeai&amp;severity=high&amp;id=69e0004582d89c981f9b91c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34756-cwe-770-allocation-of-resources-wit-6938b632</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34756%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20vllm-project%20vllm&amp;severity=medium&amp;id=69d49831aaed68159aca0f94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34755-cwe-770-allocation-of-resources-wit-052948e9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34755%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20vllm-project%20vllm&amp;severity=medium&amp;id=69d402cf0a160ebd92d2b84e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34753-cwe-918-server-side-request-forgery-5a76be30</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34753%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20vllm-project%20vllm&amp;severity=medium&amp;id=69d49831aaed68159aca0f91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21382-cwe-120-buffer-copy-without-checkin-dbfa725a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21382%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69d3dfad0a160ebd92c70959</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21381-cwe-126-buffer-over-read-in-qualcom-97e60d99</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21381%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69d3dfad0a160ebd92c70956</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21380-cwe-416-use-after-free-in-qualcomm--39b98ba6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21380%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69d3dfaa0a160ebd92c7026a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21378-cwe-126-buffer-over-read-in-qualcom-db6e8adf</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21378%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69d3dfaa0a160ebd92c70267</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21376-cwe-126-buffer-over-read-in-qualcom-4b558eed</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21376%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69d3dfaa0a160ebd92c70264</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21375-cwe-126-buffer-over-read-in-qualcom-3e9ef29c</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21375%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69d3dfaa0a160ebd92c70261</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21374-cwe-126-buffer-over-read-in-qualcom-ec97fd40</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21374%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69d3dfaa0a160ebd92c7025e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21373-cwe-126-buffer-over-read-in-qualcom-f1151391</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21373%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69d3dfaa0a160ebd92c7025b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21372-cwe-122-heap-based-buffer-overflow--c4a06644</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21372%3A%20CWE-122%3A%20Heap-Based%20Buffer%20Overflow%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69d3dfaa0a160ebd92c70258</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21371-cwe-126-buffer-over-read-in-qualcom-59baca32</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21371%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69d3dfaa0a160ebd92c70255</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21367-cwe-126-buffer-over-read-in-qualcom-e1ac069c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21367%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69d3dfaa0a160ebd92c70252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47400-cwe-126-buffer-over-read-in-qualcom-bd042dbf</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47400%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69d3dfaa0a160ebd92c7024f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47392-cwe-190-integer-overflow-or-wraparo-02f5c4b9</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47392%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69d3dfa80a160ebd92c701f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47391-cwe-121-stack-based-buffer-overflow-1323497d</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47391%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69d3dfa80a160ebd92c701f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47390-cwe-126-buffer-over-read-in-qualcom-de63c3be</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47390%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69d48bf00a160ebd9241664f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47389-cwe-120-buffer-copy-without-checkin-0c21b8f0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47389%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69d48bf00a160ebd9241664c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47374-cwe-416-use-after-free-in-qualcomm--0d39ebfd</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47374%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=69d4982faaed68159ac9fe18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14032-cwe-862-missing-authorization-in-tw-75f09585</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14032%3A%20CWE-862%20Missing%20Authorization%20in%20Twitch%20Twitch%20Studio&amp;severity=high&amp;id=69d3ea320a160ebd92c9fd9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34589-cwe-190-integer-overflow-or-wraparo-670cf108</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34589%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20AcademySoftwareFoundation%20openexr&amp;severity=high&amp;id=69d47ddc0a160ebd9234c840</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-deepmind-researchers-map-web-attacks-agains-aeea6bb9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20DeepMind%20Researchers%20Map%20Web%20Attacks%20Against%20AI%20Agents&amp;severity=low&amp;id=69d3d51a0a160ebd92c27878</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34588-cwe-125-out-of-bounds-read-in-acade-6aa2dbfa</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34588%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20AcademySoftwareFoundation%20openexr&amp;severity=high&amp;id=69d47ddc0a160ebd9234c83a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34444-cwe-284-improper-access-control-in--55c5a0e1</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34444%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20scoder%20lupa&amp;severity=high&amp;id=69d402cf0a160ebd92d2b84b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5666-insecure-storage-of-sensitive-inform-5b3042a9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5666%3A%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20code-projects%20Online%20FIR%20System&amp;severity=medium&amp;id=69d49831aaed68159aca0f99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34402-cwe-89-improper-neutralization-of-s-f739644e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34402&amp;severity=null&amp;id=69d3dfad0a160ebd92c7095c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33405-cwe-79-improper-neutralization-of-i-00265079</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33405%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pi-hole%20web&amp;severity=low&amp;id=69d3d1a00a160ebd92c130ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34380-cwe-190-integer-overflow-or-wraparo-5fee1a08</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34380%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20AcademySoftwareFoundation%20openexr&amp;severity=medium&amp;id=69d3d1a00a160ebd92c130e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34379-cwe-704-incorrect-type-conversion-o-d3addab1</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34379%3A%20CWE-704%3A%20Incorrect%20Type%20Conversion%20or%20Cast%20in%20AcademySoftwareFoundation%20openexr&amp;severity=high&amp;id=69d3d1a00a160ebd92c130df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34378-cwe-190-integer-overflow-or-wraparo-2a394764</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34378%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20AcademySoftwareFoundation%20openexr&amp;severity=medium&amp;id=69d3d1a00a160ebd92c130dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5704-unrestricted-upload-of-file-with-dan-b8ef14a5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5704%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69d3d1a30a160ebd92c13132</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5665-sql-injection-in-code-projects-onlin-8cd984ff</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5665%3A%20SQL%20Injection%20in%20code-projects%20Online%20FIR%20System&amp;severity=medium&amp;id=69d3d1a30a160ebd92c1312b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34217-cwe-668-exposure-of-resource-to-wro-58a29899</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34217%3A%20CWE-668%3A%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20nyariv%20SandboxJS&amp;severity=medium&amp;id=69d3d1a00a160ebd92c130d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34211-cwe-674-uncontrolled-recursion-in-n-f8e7d7c6</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34211%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20nyariv%20SandboxJS&amp;severity=medium&amp;id=69d3d1a00a160ebd92c130d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34208-cwe-693-protection-mechanism-failur-e30541cd</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34208%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20nyariv%20SandboxJS&amp;severity=critical&amp;id=69d3d1a00a160ebd92c130d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34148-cwe-400-uncontrolled-resource-consu-a5ea008b</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34148%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20%40fedify%20fedify&amp;severity=high&amp;id=69d3d1a00a160ebd92c130d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33752-cwe-918-server-side-request-forgery-e0c92d48</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33752%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20lexiforest%20curl_cffi&amp;severity=high&amp;id=69d3d1a00a160ebd92c130cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33510-cwe-87-improper-neutralization-of-a-fa85fbb2</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33510%3A%20CWE-87%3A%20Improper%20Neutralization%20of%20Alternate%20XSS%20Syntax%20in%20homarr-labs%20homarr&amp;severity=high&amp;id=69d3ce180a160ebd92c09cd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34897-cwe-79-improper-neutralization-of-i-c217a2af</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34897%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20David%20Lingren%20Media%20LIbrary%20Assistant&amp;severity=medium&amp;id=69d3ce180a160ebd92c09cda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33406-cwe-79-improper-neutralization-of-i-32216ce3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33406%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pi-hole%20web&amp;severity=medium&amp;id=69d3ce180a160ebd92c09cd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33404-cwe-79-improper-neutralization-of-i-ebecab71</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33404%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pi-hole%20web&amp;severity=low&amp;id=69d3ce180a160ebd92c09cce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33403-cwe-79-improper-neutralization-of-i-b74d02a0</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33403%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pi-hole%20web&amp;severity=medium&amp;id=69d3ce180a160ebd92c09ccb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34885-cwe-89-improper-neutralization-of-s-37e96e1c</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34885%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20David%20Lingren%20Media%20LIbrary%20Assistant&amp;severity=high&amp;id=69d3ce180a160ebd92c09cd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32602-cwe-367-time-of-check-time-of-use-t-01123955</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32602%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20homarr-labs%20homarr&amp;severity=medium&amp;id=69d3ce180a160ebd92c09cc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29047-cwe-89-improper-neutralization-of-s-892178f3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29047%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20glpi-project%20glpi&amp;severity=high&amp;id=69d3ce150a160ebd92c09c38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26263-cwe-89-improper-neutralization-of-s-98f225c5</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26263%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20glpi-project%20glpi&amp;severity=high&amp;id=69d3c70a0a160ebd92be8322</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26027-cwe-79-improper-neutralization-of-i-5619f4b8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26027%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20glpi-project%20glpi&amp;severity=high&amp;id=69d3c70a0a160ebd92be831f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26026-cwe-94-improper-control-of-generati-4a1597fa</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26026%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20glpi-project%20glpi&amp;severity=critical&amp;id=69d3c70a0a160ebd92be831c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25932-cwe-116-improper-encoding-or-escapi-427f3b13</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25932%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20glpi-project%20glpi&amp;severity=high&amp;id=69d3c70a0a160ebd92be8319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5663-os-command-injection-in-offis-dcmtk-23884b4d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5663%3A%20OS%20Command%20Injection%20in%20OFFIS%20DCMTK&amp;severity=medium&amp;id=69d3c3860a160ebd92bdb61e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5661-denial-of-service-in-free5gc-ddea4988</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5661%3A%20Denial%20of%20Service%20in%20Free5GC&amp;severity=medium&amp;id=69d3c3860a160ebd92bdb615</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5660-sql-injection-in-itsourcecode-constr-98f1115c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5660%3A%20SQL%20Injection%20in%20itsourcecode%20Construction%20Management%20System&amp;severity=medium&amp;id=69d3bc7e0a160ebd92bb5f44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5659-deserialization-in-pytries-datrie-6b0a8d2f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5659%3A%20Deserialization%20in%20pytries%20datrie&amp;severity=medium&amp;id=69d3b5770a160ebd92b7fa70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/guardarian-users-targeted-with-malicious-strapi-np-667f63fb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Guardarian%20Users%20Targeted%20With%20Malicious%20Strapi%20NPM%20Packages&amp;severity=medium&amp;id=69d39cda0a160ebd92ab1d91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5650-insecure-storage-of-sensitive-inform-4d29decf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5650%3A%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20code-projects%20Online%20Application%20System%20for%20Admission&amp;severity=medium&amp;id=69d3a05e0a160ebd92acdcca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/6th-april-threat-intelligence-report-2e352230</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=6th%20April%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=69d399550a160ebd92a9b3cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5649-sql-injection-in-code-projects-onlin-2974d006</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5649%3A%20SQL%20Injection%20in%20code-projects%20Online%20Application%20System%20for%20Admission&amp;severity=medium&amp;id=69d399550a160ebd92a9b3c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-hackers-target-high-profile-nodejs-ma-25d12f06</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20Hackers%20Target%20High-Profile%20Node.js%20Maintainers&amp;severity=high&amp;id=69d395d20a160ebd92a6fec7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5648-sql-injection-in-code-projects-simpl-a580976b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5648%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69d395d90a160ebd92a70b21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5647-cross-site-scripting-in-code-project-ce53e321</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5647%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Online%20Shoe%20Store&amp;severity=medium&amp;id=69d395d90a160ebd92a70b0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5646-sql-injection-in-code-projects-easy--86537ffb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5646%3A%20SQL%20Injection%20in%20code-projects%20Easy%20Blog%20Site&amp;severity=medium&amp;id=69d38eca0a160ebd92a3e2d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5645-sql-injection-in-projectworlds-car-r-7806b7f4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5645%3A%20SQL%20Injection%20in%20projectworlds%20Car%20Rental%20System&amp;severity=medium&amp;id=69d38eca0a160ebd92a3e2cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5644-cross-site-scripting-in-cyber-iii-st-26209b3b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5644%3A%20Cross%20Site%20Scripting%20in%20Cyber-III%20Student-Management-System&amp;severity=medium&amp;id=69d387c10a160ebd92a05aed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5643-cross-site-scripting-in-cyber-iii-st-89b3b93c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5643%3A%20Cross%20Site%20Scripting%20in%20Cyber-III%20Student-Management-System&amp;severity=medium&amp;id=69d387c10a160ebd92a05ae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-rushes-emergency-fixes-for-exploited-zero-0e3162fa</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20Rushes%20Emergency%20Fixes%20for%20Exploited%20Zero-Day&amp;severity=low&amp;id=69d380ba0a160ebd929cdcbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5642-improper-authorization-in-cyber-iii--0ffbbeb4</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5642%3A%20Improper%20Authorization%20in%20Cyber-III%20Student-Management-System&amp;severity=medium&amp;id=69d380c00a160ebd929cdd60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5673-out-of-bounds-read-in-red-hat-red-ha-0905ee9b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5673%3A%20Out-of-bounds%20Read%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69d380c00a160ebd929cdd67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5641-sql-injection-in-phpgurukul-online-s-f420b58d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5641%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Shopping%20Portal%20Project&amp;severity=medium&amp;id=69d380c00a160ebd929cdd58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5640-sql-injection-in-phpgurukul-online-s-35d2da80</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5640%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Shopping%20Portal%20Project&amp;severity=medium&amp;id=69d379b20a160ebd9296724d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-often-are-redirects-used-in-phishing-in-2026x3-6e4aa013</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20often%20are%20redirects%20used%20in%20phishing%20in%202026%26%23x3f%3B%2C%20(Mon%2C%20Apr%206th)&amp;severity=medium&amp;id=69d376340a160ebd9294c463</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5639-sql-injection-in-phpgurukul-online-s-27b523e8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5639%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Shopping%20Portal%20Project&amp;severity=medium&amp;id=69d379b20a160ebd92967246</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-37977-origin-validation-error-in-red-hat--52323981</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-37977%3A%20Origin%20Validation%20Error%20in%20Red%20Hat%20Red%20Hat%20Build%20of%20Keycloak&amp;severity=low&amp;id=69d372ac0a160ebd9293290b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5638-path-traversal-in-heriklyma-cppwebfr-b0d21b50</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5638%3A%20Path%20Traversal%20in%20HerikLyma%20CPPWebFramework&amp;severity=medium&amp;id=69d372ac0a160ebd92932915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5637-sql-injection-in-projectworlds-car-r-292e4dae</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5637%3A%20SQL%20Injection%20in%20projectworlds%20Car%20Rental%20System&amp;severity=medium&amp;id=69d372ac0a160ebd9293290f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5636-sql-injection-in-phpgurukul-online-s-d95e00cd</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5636%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Shopping%20Portal%20Project&amp;severity=medium&amp;id=69d36ba30a160ebd9290d554</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5635-sql-injection-in-phpgurukul-online-s-b47bbe57</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5635%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Shopping%20Portal%20Project&amp;severity=medium&amp;id=69d36ba30a160ebd9290d54d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5634-sql-injection-in-projectworlds-car-r-fff45319</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5634%3A%20SQL%20Injection%20in%20projectworlds%20Car%20Rental%20Project&amp;severity=medium&amp;id=69d36ba30a160ebd9290d547</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5633-server-side-request-forgery-in-assaf-31e6e672</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5633%3A%20Server-Side%20Request%20Forgery%20in%20assafelovic%20gpt-researcher&amp;severity=medium&amp;id=69d3924a0a160ebd92a58b03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5632-missing-authentication-in-assafelovi-40387971</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5632%3A%20Missing%20Authentication%20in%20assafelovic%20gpt-researcher&amp;severity=medium&amp;id=69d35a0e0a160ebd92890b4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5631-code-injection-in-assafelovic-gpt-re-ae6c8081</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5631%3A%20Code%20Injection%20in%20assafelovic%20gpt-researcher&amp;severity=medium&amp;id=69d35a0e0a160ebd92890b47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5630-cross-site-scripting-in-assafelovic--c377408d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5630%3A%20Cross%20Site%20Scripting%20in%20assafelovic%20gpt-researcher&amp;severity=medium&amp;id=69d35a0e0a160ebd92890b40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5629-stack-based-buffer-overflow-in-belki-abbd3417</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5629%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1015&amp;severity=high&amp;id=69d34f820a160ebd9282cfe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5628-stack-based-buffer-overflow-in-belki-732548e5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5628%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1015&amp;severity=high&amp;id=69d34c040a160ebd9280c17c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5625-cross-site-scripting-in-assafelovic--72d4f926</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5625%3A%20Cross%20Site%20Scripting%20in%20assafelovic%20gpt-researcher&amp;severity=medium&amp;id=69d34c040a160ebd9280c175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5624-cross-site-request-forgery-in-projec-fecacb04</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5624%3A%20Cross-Site%20Request%20Forgery%20in%20ProjectSend&amp;severity=medium&amp;id=69d34c040a160ebd9280c16d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5623-server-side-request-forgery-in-hceng-e59811be</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5623%3A%20Server-Side%20Request%20Forgery%20in%20hcengineering%20Huly%20Platform&amp;severity=medium&amp;id=69d34c040a160ebd9280c168</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5622-use-of-hard-coded-cryptographic-key--31b4d302</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5622%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20hcengineering%20Huly%20Platform&amp;severity=medium&amp;id=69d33a730a160ebd9261d5bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5621-os-command-injection-in-chrischinchi-7676eab8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5621%3A%20OS%20Command%20Injection%20in%20ChrisChinchilla%20Vale-MCP&amp;severity=medium&amp;id=69d33a730a160ebd9261d5b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5620-sql-injection-in-itsourcecode-constr-ab89fe24</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5620%3A%20SQL%20Injection%20in%20itsourcecode%20Construction%20Management%20System&amp;severity=medium&amp;id=69d33a730a160ebd9261d5ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5619-os-command-injection-in-braffolk-mcp-d6998a0d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5619%3A%20OS%20Command%20Injection%20in%20Braffolk%20mcp-summarization-functions&amp;severity=medium&amp;id=69d33a730a160ebd9261d5a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5618-server-side-request-forgery-in-kalca-5e58cc4e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5618%3A%20Server-Side%20Request%20Forgery%20in%20kalcaddle%20kodbox&amp;severity=medium&amp;id=69d32c5a0a160ebd92539b27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5616-missing-authentication-in-jeecgboot-38bc1de7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5616%3A%20Missing%20Authentication%20in%20JeecgBoot&amp;severity=medium&amp;id=69d32c5a0a160ebd92539b1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5615-cross-site-scripting-in-givanz-vvveb-1c1067fc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5615%3A%20Cross%20Site%20Scripting%20in%20givanz%20Vvvebjs&amp;severity=medium&amp;id=69d32c5a0a160ebd92539b16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5614-stack-based-buffer-overflow-in-belki-4bd2dba3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5614%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1015&amp;severity=high&amp;id=69d32c5a0a160ebd92539b10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5613-stack-based-buffer-overflow-in-belki-4e7d7f43</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5613%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1015&amp;severity=high&amp;id=69d348ef0a160ebd927fa927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5612-stack-based-buffer-overflow-in-belki-c7735710</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5612%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1015&amp;severity=high&amp;id=69d348ef0a160ebd927fa91e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5611-stack-based-buffer-overflow-in-belki-807657fa</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5611%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1015&amp;severity=high&amp;id=69d348ef0a160ebd927fa915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-monday-april-6th-2026-httpsiscsa-2ee41ab0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Monday%2C%20April%206th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9880%2C%20(Mon%2C%20Apr%206th)&amp;severity=medium&amp;id=69d313bf0a160ebd923e6280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5610-stack-based-buffer-overflow-in-belki-eb86f832</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5610%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1015&amp;severity=high&amp;id=69d3103a0a160ebd923c912d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5609-stack-based-buffer-overflow-in-tenda-a4abeddf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5609%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20i12&amp;severity=high&amp;id=69d3103a0a160ebd923c9126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5608-stack-based-buffer-overflow-in-belki-c4d65888</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5608%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1122&amp;severity=high&amp;id=69d305ae0a160ebd92332185</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5607-server-side-request-forgery-in-imprv-cb207074</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5607%3A%20Server-Side%20Request%20Forgery%20in%20imprvhub%20mcp-browser-agent&amp;severity=medium&amp;id=69d305ae0a160ebd9233217f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5606-sql-injection-in-phpgurukul-online-s-9f42cde0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5606%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Shopping%20Portal%20Project&amp;severity=medium&amp;id=69d2fb230a160ebd9229b829</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-07-d0bfbefe</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-07&amp;severity=medium&amp;id=69d542daaaed68159a3c0b5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wordpress-madara-local-file-inclusion-8b9d5ae1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WordPress%20%20Madara%20-%20Local%20File%20Inclusion&amp;severity=medium&amp;id=69d4e432aaed68159a0d45a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ritecms-310-authenticated-remote-code-execution-8102a11a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RiteCMS%203.1.0%20-%20Authenticated%20Remote%20Code%20Execution&amp;severity=critical&amp;id=69d4e432aaed68159a0d459e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wbce-cms-164-remote-code-execution-cad05e4d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WBCE%20CMS%201.6.4%20-%20Remote%20Code%20Execution&amp;severity=critical&amp;id=69d4e432aaed68159a0d4599</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zhiyuan-oa-arbitrary-file-upload-leading-b478c822</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Zhiyuan%20OA%20-%20arbitrary%20file%20upload%20leading&amp;severity=medium&amp;id=69d4e432aaed68159a0d4594</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/grafana-1160-ssrf-cca26f05</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Grafana%2011.6.0%20-%20SSRF&amp;severity=medium&amp;id=69d4e432aaed68159a0d458f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aspnet-8010-bypass-09598bc2</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ASP.net%20%208.0.10%20-%20Bypass&amp;severity=medium&amp;id=69d4e432aaed68159a0d458a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/desktop-window-manager-core-library-100102400-priv-50e07b38</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Desktop%20Window%20Manager%20Core%20Library%2010.0.10240.0%20-%20Privilege%20Escalation&amp;severity=high&amp;id=69d4e432aaed68159a0d4585</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/windows-kernel-elevation-of-privilege-6bda53b7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Windows%20Kernel%20-%20Elevation%20of%20Privilege&amp;severity=high&amp;id=69d4e432aaed68159a0d4580</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-fortiweb-v801-auth-bypass-41827c94</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20FortiWeb%20v8.0.1%20-%20Auth%20Bypass&amp;severity=medium&amp;id=69d4e432aaed68159a0d457b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/is-localhost-ip-200-ssrf-6852b3d3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=is-localhost-ip%202.0.0%20-%20SSRF&amp;severity=medium&amp;id=69d4e432aaed68159a0d4576</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31352-na-b621af4c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31352%3A%20n%2Fa&amp;severity=medium&amp;id=69d4982faaed68159ac9fe21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31350-na-e6fb99eb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31350%3A%20n%2Fa&amp;severity=medium&amp;id=69d4982faaed68159ac9fe1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-06-03ccef92</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-06&amp;severity=medium&amp;id=69d44c990a160ebd92ef4b3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54601-na-de1c7b61</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54601%3A%20n%2Fa&amp;severity=high&amp;id=69d417e60a160ebd92da7f78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57834-na-d6f58338</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57834%3A%20n%2Fa&amp;severity=high&amp;id=69d40d5a0a160ebd92d6988a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54602-na-d03a9d7e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54602%3A%20n%2Fa&amp;severity=high&amp;id=69d409d70a160ebd92d5a92b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54328-na-18af0f52</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54328%3A%20n%2Fa&amp;severity=critical&amp;id=69d409d70a160ebd92d5a927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58349-na-9f3c45dd</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58349%3A%20n%2Fa&amp;severity=critical&amp;id=69d402cf0a160ebd92d2b840</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54324-na-8382b977</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54324%3A%20n%2Fa&amp;severity=high&amp;id=69d402cf0a160ebd92d2b83c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59440-na-7905e51f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59440%3A%20n%2Fa&amp;severity=high&amp;id=69d3f8440a160ebd92cf6997</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57835-na-a9c52f60</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57835%3A%20n%2Fa&amp;severity=high&amp;id=69d3f8440a160ebd92cf6993</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30613-na-a58e6b92</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30613%3A%20n%2Fa&amp;severity=medium&amp;id=69d3f4be0a160ebd92ce2ee4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61166-na-90779fb3</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61166%3A%20n%2Fa&amp;severity=medium&amp;id=69d3edbe0a160ebd92cb34bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31313-na-4ebc5a87</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31313%3A%20n%2Fa&amp;severity=medium&amp;id=69d3dfa80a160ebd92c701ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31354-na-36df3662</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31354%3A%20n%2Fa&amp;severity=medium&amp;id=69d3dc220a160ebd92c52bce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31353-na-9fbc1a43</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31353%3A%20n%2Fa&amp;severity=medium&amp;id=69d3dc220a160ebd92c52bca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31351-na-0aac2020</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31351%3A%20n%2Fa&amp;severity=medium&amp;id=69d3d1a00a160ebd92c130c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31067-na-b9bd7456</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31067%3A%20n%2Fa&amp;severity=medium&amp;id=69d3ce180a160ebd92c09cc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31066-na-2af03cb2</loc>
    <lastmod>2026-04-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31066%3A%20n%2Fa&amp;severity=medium&amp;id=69d3ce150a160ebd92c09c54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31065-na-b7520b37</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31065%3A%20n%2Fa&amp;severity=medium&amp;id=69d3ce150a160ebd92c09c51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31063-na-c31fc392</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31063%3A%20n%2Fa&amp;severity=medium&amp;id=69d3ce150a160ebd92c09c4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31062-na-40958597</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31062%3A%20n%2Fa&amp;severity=medium&amp;id=69d3ce150a160ebd92c09c4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31061-na-b9e481ed</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31061%3A%20n%2Fa&amp;severity=medium&amp;id=69d3ce150a160ebd92c09c48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31060-na-6d26087b</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31060%3A%20n%2Fa&amp;severity=medium&amp;id=69d3ce150a160ebd92c09c45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31059-na-9fbd7824</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31059%3A%20n%2Fa&amp;severity=critical&amp;id=69d3ce150a160ebd92c09c42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31058-na-880ca1c0</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31058%3A%20n%2Fa&amp;severity=medium&amp;id=69d3ce150a160ebd92c09c3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31053-na-a6a7c90d</loc>
    <lastmod>2026-04-19</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31053%3A%20n%2Fa&amp;severity=medium&amp;id=69d3ce150a160ebd92c09c3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31153-na-df948ad8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31153%3A%20n%2Fa&amp;severity=medium&amp;id=69d3c70a0a160ebd92be832d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31151-na-d0e23eb3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31151%3A%20n%2Fa&amp;severity=critical&amp;id=69d3c70a0a160ebd92be8329</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31150-na-06667191</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31150%3A%20n%2Fa&amp;severity=medium&amp;id=69d3c70a0a160ebd92be8325</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30078-na-0c914f65</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30078%3A%20n%2Fa&amp;severity=high&amp;id=69d3bc7e0a160ebd92bb5f40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-06-c4385a78</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-06&amp;severity=low&amp;id=69d30cad0a160ebd92390330</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5605-stack-based-buffer-overflow-in-tenda-5175b382</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5605%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=69d2f0950a160ebd92223704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5604-stack-based-buffer-overflow-in-tenda-db7d292f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5604%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=69d2e98e0a160ebd921dd793</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5603-os-command-injection-in-elgentos-mag-77273804</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5603%3A%20OS%20Command%20Injection%20in%20elgentos%20magento2-dev-mcp&amp;severity=medium&amp;id=69d2e60a0a160ebd921baa0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5602-os-command-injection-in-nor2-io-heim-b47b6f51</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5602%3A%20OS%20Command%20Injection%20in%20Nor2-io%20heim-mcp&amp;severity=medium&amp;id=69d2e2860a160ebd921a0373</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4272-cwe-306-missing-authentication-for-c-c9a0d783</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4272%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Honeywell%20Barcode%20Scanners&amp;severity=high&amp;id=69d2df020a160ebd921850c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5601-information-disclosure-in-acrel-elec-0d3391a6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5601%3A%20Information%20Disclosure%20in%20Acrel%20Electrical%20Prepaid%20Cloud%20Platform&amp;severity=medium&amp;id=69d2df020a160ebd921850c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35679-cwe-358-improperly-implemented-secu-190d6e68</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35679%3A%20CWE-358%20Improperly%20Implemented%20Security%20Check%20for%20Standard%20in%20Zcash%20zcashd&amp;severity=low&amp;id=69d2d4760a160ebd9210510c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5597-path-traversal-in-griptape-ai-gripta-63b77628</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5597%3A%20Path%20Traversal%20in%20griptape-ai%20griptape&amp;severity=medium&amp;id=69d2d4760a160ebd92105110</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5596-sql-injection-in-griptape-ai-griptap-ba35b0fe</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5596%3A%20SQL%20Injection%20in%20griptape-ai%20griptape&amp;severity=medium&amp;id=69d2cd6e0a160ebd920c956e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5595-path-traversal-in-griptape-ai-gripta-afe36018</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5595%3A%20Path%20Traversal%20in%20griptape-ai%20griptape&amp;severity=medium&amp;id=69d2b8560a160ebd920208d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5594-code-injection-in-premai-io-premsql-97f422d1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5594%3A%20Code%20Injection%20in%20premAI-io%20premsql&amp;severity=medium&amp;id=69d2adca0a160ebd92fc0d07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5587-sql-injection-in-wbbeyourself-mac-sq-ccb4e970</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5587%3A%20SQL%20Injection%20in%20wbbeyourself%20MAC-SQL&amp;severity=medium&amp;id=69d2aa460a160ebd92fa19c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5586-sql-injection-in-zhongyu09-openchatb-1cc59c89</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5586%3A%20SQL%20Injection%20in%20zhongyu09%20openchatbi&amp;severity=medium&amp;id=69d2a6c30a160ebd92f87995</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5585-information-disclosure-in-tencent-ai-f43c5abe</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5585%3A%20Information%20Disclosure%20in%20Tencent%20AI-Infra-Guard&amp;severity=medium&amp;id=69d29fba0a160ebd92f4a36d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5584-code-injection-in-fosowl-agenticseek-5ebdc688</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5584%3A%20Code%20Injection%20in%20Fosowl%20agenticSeek&amp;severity=medium&amp;id=69d2952e0a160ebd92ee8ca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5583-sql-injection-in-phpgurukul-online-s-7e53dc46</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5583%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Shopping%20Portal%20Project&amp;severity=medium&amp;id=69d291aa0a160ebd92ed361d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5580-sql-injection-in-codeastro-online-cl-588a3e11</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5580%3A%20SQL%20Injection%20in%20CodeAstro%20Online%20Classroom&amp;severity=medium&amp;id=69d28e260a160ebd92ebf79e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5579-sql-injection-in-codeastro-online-cl-8a36bff3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5579%3A%20SQL%20Injection%20in%20CodeAstro%20Online%20Classroom&amp;severity=medium&amp;id=69d28aa20a160ebd92eae607</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5578-sql-injection-in-codeastro-online-cl-270cae2a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5578%3A%20SQL%20Injection%20in%20CodeAstro%20Online%20Classroom&amp;severity=medium&amp;id=69d2872d0a160ebd92e8c403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5577-sql-injection-in-song-li-crossbrowse-75f65393</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5577%3A%20SQL%20Injection%20in%20Song-Li%20cross_browser&amp;severity=medium&amp;id=69d2839a0a160ebd92e66794</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5576-unrestricted-upload-in-sourcecodeste-8cf7d296</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5576%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Record%20Management%20System&amp;severity=medium&amp;id=69d280150a160ebd92e46934</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5575-sql-injection-in-sourcecodester-reco-fd2e567e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5575%3A%20SQL%20Injection%20in%20SourceCodester%20Record%20Management%20System&amp;severity=medium&amp;id=69d27c920a160ebd92e1f0e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5574-missing-authorization-in-technostrob-06b353f0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5574%3A%20Missing%20Authorization%20in%20Technostrobe%20HI-LED-WR120-G2&amp;severity=medium&amp;id=69d2790f0a160ebd92e069e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5573-unrestricted-upload-in-technostrobe--f074c6ed</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5573%3A%20Unrestricted%20Upload%20in%20Technostrobe%20HI-LED-WR120-G2&amp;severity=medium&amp;id=69d2758a0a160ebd92df43da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5572-cross-site-request-forgery-in-techno-06441469</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5572%3A%20Cross-Site%20Request%20Forgery%20in%20Technostrobe%20HI-LED-WR120-G2&amp;severity=medium&amp;id=69d26e830a160ebd92dcfb20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5571-information-disclosure-in-technostro-516ca39f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5571%3A%20Information%20Disclosure%20in%20Technostrobe%20HI-LED-WR120-G2&amp;severity=medium&amp;id=69d26afe0a160ebd92db2dc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5570-improper-authentication-in-technostr-b7d1e5d8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5570%3A%20Improper%20Authentication%20in%20Technostrobe%20HI-LED-WR120-G2&amp;severity=medium&amp;id=69d2677a0a160ebd92d9f069</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5569-improper-access-controls-in-technost-c554c45e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5569%3A%20Improper%20Access%20Controls%20in%20Technostrobe%20HI-LED-WR120-G2&amp;severity=medium&amp;id=69d2677a0a160ebd92d9f063</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5568-cross-site-scripting-in-akaunting-86cee6b8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5568%3A%20Cross%20Site%20Scripting%20in%20Akaunting&amp;severity=medium&amp;id=69d2607d0a160ebd92d8087b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5567-buffer-overflow-in-tenda-m3-072d4fc1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5567%3A%20Buffer%20Overflow%20in%20Tenda%20M3&amp;severity=high&amp;id=69d2607d0a160ebd92d80874</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5599-cwe-653-improper-isolation-or-compar-fc614c1a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5599%3A%20CWE-653%20Improper%20isolation%20or%20compartmentalization%20in%20pretix%20Venueless&amp;severity=high&amp;id=69d2596b0a160ebd92d5b95c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5566-buffer-overflow-in-utt-hiper-1250gw-91d9c7d5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5566%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%201250GW&amp;severity=high&amp;id=69d255e50a160ebd92d4a22a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5565-sql-injection-in-code-projects-simpl-b07ef79f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5565%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69d255e50a160ebd92d4a223</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5564-sql-injection-in-code-projects-simpl-b881b02b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5564%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69d24b5a0a160ebd92cf6eee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5563-sql-injection-in-autohomecorp-frostm-2a715c16</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5563%3A%20SQL%20Injection%20in%20AutohomeCorp%20frostmourne&amp;severity=medium&amp;id=69d247d60a160ebd92ce48cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5562-code-injection-in-provectus-kafka-ui-442a7aab</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5562%3A%20Code%20Injection%20in%20provectus%20kafka-ui&amp;severity=medium&amp;id=69d244520a160ebd92ccff0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5561-injection-in-campcodes-complete-pos--7e32e92a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5561%3A%20Injection%20in%20Campcodes%20Complete%20POS%20Management%20and%20Inventory%20System&amp;severity=medium&amp;id=69d240c80a160ebd92cc2116</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5560-sql-injection-in-phpgurukul-online-s-96eac83b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5560%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Shopping%20Portal%20Project&amp;severity=medium&amp;id=69d23d4b0a160ebd92ca42f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5559-improper-neutralization-of-special-e-0f220e7d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5559%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20AntaresMugisho%20PyBlade&amp;severity=medium&amp;id=69d239c60a160ebd92c92f43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5558-sql-injection-in-phpgurukul-phpguruk-e94dae7f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5558%3A%20SQL%20Injection%20in%20PHPGurukul%20PHPGurukul%20Online%20Shopping%20Portal%20Project&amp;severity=medium&amp;id=69d236420a160ebd92c84fbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5557-authentication-bypass-using-alternat-9548feee</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5557%3A%20Authentication%20Bypass%20Using%20Alternate%20Channel%20in%20badlogic%20pi-mono&amp;severity=medium&amp;id=69d232be0a160ebd92c6ef65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5556-code-injection-in-badlogic-pi-mono-c43049d6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5556%3A%20Code%20Injection%20in%20badlogic%20pi-mono&amp;severity=medium&amp;id=69d22f510a160ebd92c5a8d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5555-sql-injection-in-code-projects-conce-8ea5e7de</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5555%3A%20SQL%20Injection%20in%20code-projects%20Concert%20Ticket%20Reservation%20System&amp;severity=medium&amp;id=69d22bb60a160ebd92c4c66b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5554-sql-injection-in-code-projects-conce-3e644e27</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5554%3A%20SQL%20Injection%20in%20code-projects%20Concert%20Ticket%20Reservation%20System&amp;severity=medium&amp;id=69d22bb60a160ebd92c4c664</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5553-sql-injection-in-itsourcecode-online-f04df440</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5553%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Cellphone%20System&amp;severity=medium&amp;id=69d240c80a160ebd92cc211e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5552-sql-injection-in-phpgurukul-online-s-2c0bee43</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5552%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Shopping%20Portal%20Project&amp;severity=medium&amp;id=69d2212a0a160ebd92c0fdde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5551-sql-injection-in-itsourcecode-free-h-36ec2bc4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5551%3A%20SQL%20Injection%20in%20itsourcecode%20Free%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=69d21da50a160ebd92bf5b5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5550-stack-based-buffer-overflow-in-tenda-a47995aa</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5550%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC10&amp;severity=high&amp;id=69d21a220a160ebd92bda2f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5549-use-of-hard-coded-cryptographic-key--5da1f78a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5549%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Tenda%20AC10&amp;severity=medium&amp;id=69d21a220a160ebd92bda2eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5548-stack-based-buffer-overflow-in-tenda-b21b0ead</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5548%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC10&amp;severity=high&amp;id=69d240c80a160ebd92cc2125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5547-os-command-injection-in-tenda-ac10-059e62c9</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5547%3A%20OS%20Command%20Injection%20in%20Tenda%20AC10&amp;severity=medium&amp;id=69d20f950a160ebd92b9623e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5546-unrestricted-upload-in-campcodes-com-39af8247</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5546%3A%20Unrestricted%20Upload%20in%20Campcodes%20Complete%20Online%20Learning%20Management%20System&amp;severity=medium&amp;id=69d2050a0a160ebd92b5ca37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5544-stack-based-buffer-overflow-in-utt-h-45d31ae5</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5544%3A%20Stack-based%20Buffer%20Overflow%20in%20UTT%20HiPER%201250GW&amp;severity=high&amp;id=69d1f7600a160ebd92af7735</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5543-sql-injection-in-phpgurukul-user-reg-7eff5247</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5543%3A%20SQL%20Injection%20in%20PHPGurukul%20User%20Registration%20%26%20Login%20and%20User%20Management%20System&amp;severity=medium&amp;id=69d1e8ea0a160ebd9293977d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5542-cross-site-scripting-in-code-project-92369ba6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5542%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69d1e8ea0a160ebd92939775</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5541-cross-site-scripting-in-code-project-9d9eda40</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5541%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69d1e8ea0a160ebd9293976e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5540-sql-injection-in-code-projects-simpl-d6b5d26d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5540%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69d1e8ea0a160ebd92939767</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5590-null-pointer-dereference-in-zephyrpr-8d20064c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5590%3A%20NULL%20Pointer%20Dereference%20in%20zephyrproject-rtos%20Zephyr&amp;severity=medium&amp;id=69d1dada0a160ebd92844add</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5539-cross-site-scripting-in-code-project-db8879a5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5539%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69d1dada0a160ebd92844ad6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5538-server-side-request-forgery-in-qingd-fc47f9c1</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5538%3A%20Server-Side%20Request%20Forgery%20in%20QingdaoU%20OnlineJudge&amp;severity=medium&amp;id=69d1dada0a160ebd92844ad0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5537-sql-injection-in-halex-coursesel-763c9bf3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5537%3A%20SQL%20Injection%20in%20halex%20CourseSEL&amp;severity=medium&amp;id=69d1dada0a160ebd92844aca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5536-deserialization-in-fedml-ai-fedml-83857636</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5536%3A%20Deserialization%20in%20FedML-AI%20FedML&amp;severity=medium&amp;id=69d1dada0a160ebd92844ac4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5535-path-traversal-in-fedml-ai-fedml-a593f60b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5535%3A%20Path%20Traversal%20in%20FedML-AI%20FedML&amp;severity=medium&amp;id=69d1ccca0a160ebd92763d75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5534-sql-injection-in-itsourcecode-online-c19ce8d5</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5534%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Enrollment%20System&amp;severity=medium&amp;id=69d1ccca0a160ebd92763d6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5533-cross-site-scripting-in-badlogic-pi--560a39e7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5533%3A%20Cross%20Site%20Scripting%20in%20badlogic%20pi-mono&amp;severity=medium&amp;id=69d1beba0a160ebd9263934f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5532-os-command-injection-in-scrapegrapha-517e04f7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5532%3A%20OS%20Command%20Injection%20in%20ScrapeGraphAI%20scrapegraph-ai&amp;severity=medium&amp;id=69d1beba0a160ebd92639349</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5531-cleartext-storage-in-a-file-or-on-di-a84e61b0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5531%3A%20Cleartext%20Storage%20in%20a%20File%20or%20on%20Disk%20in%20SourceCodester%20Student%20Result%20Management%20System&amp;severity=medium&amp;id=69d1beba0a160ebd92639342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5530-server-side-request-forgery-in-ollam-fdcf16de</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5530%3A%20Server-Side%20Request%20Forgery%20in%20Ollama&amp;severity=medium&amp;id=69d1f7600a160ebd92af7748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5529-improper-authorization-in-dromara-la-95f7d62a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5529%3A%20Improper%20Authorization%20in%20Dromara%20lamp-cloud&amp;severity=medium&amp;id=69d1f7600a160ebd92af773e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-05-8e0ed497</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-05&amp;severity=medium&amp;id=69d2fb190a160ebd9229a5af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-05-877aed8c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-05&amp;severity=low&amp;id=69d1ec650a160ebd92aa0b80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5528-os-command-injection-in-moussaabbadl-7c70d590</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5528%3A%20OS%20Command%20Injection%20in%20MoussaabBadla%20code-screenshot-mcp&amp;severity=medium&amp;id=69d1a29a0a160ebd92f0a043</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5527-use-of-hard-coded-cryptographic-key--3a414038</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5527%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Tenda%204G03%20Pro&amp;severity=medium&amp;id=69d19f160a160ebd92e2b2f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5526-improper-access-controls-in-tenda-4g-14b70564</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5526%3A%20Improper%20Access%20Controls%20in%20Tenda%204G03%20Pro&amp;severity=medium&amp;id=69d1f7600a160ebd92af7750</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3666-cwe-22-improper-limitation-of-a-path-8b05d9d8</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3666%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20tomdever%20wpForo%20Forum&amp;severity=high&amp;id=69d0f6560a160ebd92e6d966</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2936-cwe-79-improper-neutralization-of-in-422ba84b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2936%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wp-buy%20Visitor%20Traffic%20Real%20Time%20Statistics&amp;severity=high&amp;id=69d0f6560a160ebd92e6d95e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1233-cwe-798-use-of-hard-coded-credential-6c6e620c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1233%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20mvirik%20Text%20to%20Speech%20%E2%80%93%20TTSWP&amp;severity=high&amp;id=69d0f6560a160ebd92e6d95a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14938-cwe-434-unrestricted-upload-of-file-2401272d</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14938%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20purethemes%20Listeo-Core%20-%20Directory%20Plugin%20by%20Purethemes&amp;severity=medium&amp;id=69d0f6560a160ebd92e6d952</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3309-cwe-94-improper-control-of-generatio-826c5da5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3309%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20properfraction%20Paid%20Membership%20Plugin%2C%20Ecommerce%2C%20User%20Registration%20Form%2C%20Login%20Form%2C%20User%20Profile%20%26%20Restrict%20Content%20%E2%80%93%20ProfilePress&amp;severity=medium&amp;id=69d0f6560a160ebd92e6d962</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0626-cwe-79-improper-neutralization-of-in-5419438f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0626%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20getwpfunnels%20WPFunnels%20%E2%80%93%20Funnel%20Builder%20for%20WooCommerce%20with%20Checkout%20%26%20One%20Click%20Upsell&amp;severity=medium&amp;id=69d0f6560a160ebd92e6d956</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/european-commission-confirms-data-breach-linked-to-7237c06f</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=European%20Commission%20Confirms%20Data%20Breach%20Linked%20to%20Trivy%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=69d0ebcb0a160ebd92e486b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3445-cwe-862-missing-authorization-in-pro-38b78a54</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3445%3A%20CWE-862%20Missing%20Authorization%20in%20properfraction%20Paid%20Membership%20Plugin%2C%20Ecommerce%2C%20User%20Registration%20Form%2C%20Login%20Form%2C%20User%20Profile%20%26%20Restrict%20Content%20%E2%80%93%20ProfilePress&amp;severity=high&amp;id=69d0cfab0a160ebd92dd86d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2826-cwe-862-missing-authorization-in-ste-6610cfb4</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2826%3A%20CWE-862%20Missing%20Authorization%20in%20stellarwp%20Kadence%20Blocks%20%E2%80%94%20Page%20Builder%20Toolkit%20for%20Gutenberg%20Editor&amp;severity=medium&amp;id=69d0cfab0a160ebd92dd86cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2437-cwe-79-improper-neutralization-of-in-0af0e1d5</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2437%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wptravelengine%20WP%20Travel%20Engine%20%E2%80%93%20Tour%20Booking%20Plugin%20%E2%80%93%20Tour%20Operator%20Software&amp;severity=medium&amp;id=69d0cfab0a160ebd92dd86c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5425-cwe-79-improper-neutralization-of-in-1c7aa2af</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5425%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20trustindex%20Widgets%20for%20Social%20Photo%20Feed&amp;severity=high&amp;id=69d0cfab0a160ebd92dd86d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4896-cwe-639-authorization-bypass-through-8abf7432</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4896%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wclovers%20WCFM%20%E2%80%93%20Frontend%20Manager%20for%20WooCommerce&amp;severity=high&amp;id=69d0c19a0a160ebd92d74647</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13368-cwe-79-improper-neutralization-of-i-081a22a8</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13368%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xpro%20Xpro%20Addons%20%E2%80%94%20140%2B%20Widgets%20for%20Elementor&amp;severity=medium&amp;id=69d0c19a0a160ebd92d74629</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0552-cwe-79-improper-neutralization-of-in-1f4cccca</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0552%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mra13%20Simple%20Shopping%20Cart&amp;severity=medium&amp;id=69d0c19a0a160ebd92d74631</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0737-cwe-79-improper-neutralization-of-in-4c65f006</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0737%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gn_themes%20WP%20Shortcodes%20Plugin%20%E2%80%94%20Shortcodes%20Ultimate&amp;severity=medium&amp;id=69d0c19a0a160ebd92d74639</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0738-cwe-79-improper-neutralization-of-in-c28c2c0b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0738%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gn_themes%20WP%20Shortcodes%20Plugin%20%E2%80%94%20Shortcodes%20Ultimate&amp;severity=medium&amp;id=69d0c19a0a160ebd92d7463e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2600-cwe-79-improper-neutralization-of-in-49ef0340</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2600%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20roxnor%20ElementsKit%20Elementor%20Addons%20%E2%80%93%20Advanced%20Widgets%20%26%20Templates%20Addons%20for%20Elementor&amp;severity=medium&amp;id=69d0c19a0a160ebd92d74643</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0664-cwe-79-improper-neutralization-of-in-897d2c33</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0664%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wproyal%20Royal%20Addons%20for%20Elementor%20%E2%80%93%20Addons%20and%20Templates%20Kit%20for%20Elementor&amp;severity=medium&amp;id=69d0c19a0a160ebd92d74635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15064-cwe-79-improper-neutralization-of-i-35918fc7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15064%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ultimatemember%20Ultimate%20Member%20%E2%80%93%20User%20Profile%2C%20Registration%2C%20Login%2C%20Member%20Directory%2C%20Content%20Restriction%20%26%20Membership%20Plugin&amp;severity=medium&amp;id=69d0c19a0a160ebd92d7462d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2949-cwe-79-improper-neutralization-of-in-ba43818e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2949%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xpro%20Xpro%20Addons%20%E2%80%94%20140%2B%20Widgets%20for%20Elementor&amp;severity=medium&amp;id=69d085d60a160ebd9291ffbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2924-cwe-79-improper-neutralization-of-in-c8383986</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2924%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jegstudio%20Gutenverse%20%E2%80%93%20Ultimate%20WordPress%20FSE%20Blocks%20Addons%20%26%20Ecosystem&amp;severity=medium&amp;id=69d085d60a160ebd9291ffb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3571-cwe-862-missing-authorization-in-gen-414f53ac</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3571%3A%20CWE-862%20Missing%20Authorization%20in%20genetechproducts%20Pie%20Register%20%E2%80%93%20User%20Registration%2C%20Profiles%20%26%20Content%20Restriction&amp;severity=medium&amp;id=69d074630a160ebd927ffddd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35616-escalation-of-privilege-in-fortinet-1f903372</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35616%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiClientEMS&amp;severity=critical&amp;id=69d062ae0a160ebd92704c2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-05-ff758128</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-05&amp;severity=medium&amp;id=69d27c8a0a160ebd92e1bfb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-04-7eb28cb1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-04&amp;severity=medium&amp;id=69d1a9990a160ebd92071c05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-04-b9a3641d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-04&amp;severity=low&amp;id=69d0cc1f0a160ebd92dc5a23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34955-cwe-78-improper-neutralization-of-s-35d9d34b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34955%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69d04d960a160ebd926594f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34954-cwe-918-server-side-request-forgery-896ba330</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34954%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69d04a110a160ebd9264ca72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34953-cwe-863-incorrect-authorization-in--72e3ef5e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34953%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20MervinPraison%20PraisonAI&amp;severity=critical&amp;id=69d04a110a160ebd9264ca6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34952-cwe-306-missing-authentication-for--4a535aff</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34952%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20MervinPraison%20PraisonAI&amp;severity=critical&amp;id=69d04a110a160ebd9264ca6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34939-cwe-1333-inefficient-regular-expres-34333858</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34939%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20MervinPraison%20PraisonAI&amp;severity=medium&amp;id=69d04a110a160ebd9264ca69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34938-cwe-693-protection-mechanism-failur-01ac669c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34938%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20MervinPraison%20PraisonAI&amp;severity=critical&amp;id=69d04a110a160ebd9264ca66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34937-cwe-78-improper-neutralization-of-s-323a6925</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34937%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69d04a110a160ebd9264ca63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34936-cwe-918-server-side-request-forgery-f70ae3e4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34936%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20MervinPraison%20PraisonAI&amp;severity=high&amp;id=69d04a110a160ebd9264ca60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34934-cwe-89-improper-neutralization-of-s-2e7eac46</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34934%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=critical&amp;id=69d046900a160ebd9263e690</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34935-cwe-78-improper-neutralization-of-s-aa91a94a</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34935%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20MervinPraison%20PraisonAI&amp;severity=critical&amp;id=69d046900a160ebd9263e693</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34824-cwe-125-out-of-bounds-read-in-mesop-38b40f4e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34824%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20mesop-dev%20mesop&amp;severity=high&amp;id=69d046900a160ebd9263e68b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34612-cwe-89-improper-neutralization-of-s-c7c6454f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34612%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20kestra-io%20kestra&amp;severity=critical&amp;id=69d046900a160ebd9263e685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35468-cwe-252-unchecked-return-value-in-n-d12f56bd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35468%3A%20CWE-252%3A%20Unchecked%20Return%20Value%20in%20nimiq%20core-rs-albatross&amp;severity=medium&amp;id=69d03f860a160ebd92619e21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33184-cwe-191-integer-underflow-wrap-or-w-4ea8d7a9</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33184%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20nimiq%20core-rs-albatross&amp;severity=high&amp;id=69d03f860a160ebd92619e11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34061-cwe-345-insufficient-verification-o-7684b074</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34061%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20nimiq%20core-rs-albatross&amp;severity=medium&amp;id=69d03f860a160ebd92619e1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34052-cwe-401-missing-release-of-memory-a-4d60fc53</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34052%3A%20CWE-401%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20jupyterhub%20ltiauthenticator&amp;severity=medium&amp;id=69d03f860a160ebd92619e17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33175-cwe-287-improper-authentication-in--900dd73d</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33175%3A%20CWE-287%3A%20Improper%20Authentication%20in%20jupyterhub%20oauthenticator&amp;severity=high&amp;id=69d03c020a160ebd926055e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28797-cwe-20-improper-input-validation-in-23caf65b</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28797%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20infiniflow%20ragflow&amp;severity=high&amp;id=69d038800a160ebd925f4637</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34980-cwe-20-improper-input-validation-in-692dc2f6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34980%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20OpenPrinting%20cups&amp;severity=medium&amp;id=69d031770a160ebd925d2016</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34979-cwe-122-heap-based-buffer-overflow--62848072</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34979%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20OpenPrinting%20cups&amp;severity=medium&amp;id=69d031770a160ebd925d2013</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34978-cwe-22-improper-limitation-of-a-pat-c074c0e7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34978%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20OpenPrinting%20cups&amp;severity=medium&amp;id=69d031770a160ebd925d2010</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34990-cwe-287-improper-authentication-in--2f45c293</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34990%3A%20CWE-287%3A%20Improper%20Authentication%20in%20OpenPrinting%20cups&amp;severity=medium&amp;id=69d031770a160ebd925d201a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27447-cwe-863-incorrect-authorization-in--07eb4b03</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27447%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20OpenPrinting%20cups&amp;severity=medium&amp;id=69d031770a160ebd925d200c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22665-cwe-178-improper-handling-of-case-s-4e82a4fd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22665%3A%20CWE-178%20Improper%20Handling%20of%20Case%20Sensitivity%20in%20prompts.chat&amp;severity=high&amp;id=69d026ec0a160ebd92593012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22664-cwe-918-server-side-request-forgery-8828a448</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22664%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20prompts.chat&amp;severity=high&amp;id=69d026ec0a160ebd9259300d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22663-cwe-862-missing-authorization-in-pr-a0e6cd29</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22663%3A%20CWE-862%20Missing%20Authorization%20in%20prompts.chat&amp;severity=high&amp;id=69d026ec0a160ebd92593008</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22662-cwe-918-server-side-request-forgery-11de16a3</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22662%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20prompts.chat&amp;severity=medium&amp;id=69d026ec0a160ebd92593003</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22661-cwe-22-improper-limitation-of-a-pat-e784ddc0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22661%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20prompts.chat&amp;severity=high&amp;id=69d026ec0a160ebd92592ffe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10681-cwe-798-in-gardyn-mobile-applicatio-18dc4351</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10681%3A%20CWE-798%20in%20Gardyn%20Mobile%20Application&amp;severity=high&amp;id=69d026ec0a160ebd92592ff9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25197-cwe-639-in-gardyn-cloud-api-0887f9ef</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25197%3A%20CWE-639%20in%20Gardyn%20Cloud%20API&amp;severity=critical&amp;id=69d026ec0a160ebd92593017</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28766-cwe-306-in-gardyn-cloud-api-a7ac8e53</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28766%3A%20CWE-306%20in%20Gardyn%20Cloud%20API&amp;severity=critical&amp;id=69d026ec0a160ebd9259301d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28767-cwe-306-in-gardyn-cloud-api-7cf9d13d</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28767%3A%20CWE-306%20in%20Gardyn%20Cloud%20API&amp;severity=medium&amp;id=69d023670a160ebd92577b07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32646-cwe-306-in-gardyn-cloud-api-42895e3c</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32646%3A%20CWE-306%20in%20Gardyn%20Cloud%20API&amp;severity=high&amp;id=69d023670a160ebd92577b0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35558-cwe-77-improper-neutralization-of-s-2fdf5088</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35558%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Amazon%20Amazon%20Athena%20ODBC%20driver&amp;severity=high&amp;id=69d023670a160ebd92577b16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35559-cwe-787-out-of-bounds-write-in-amaz-64d68bf7</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35559%3A%20CWE-787%20Out-of-bounds%20write%20in%20Amazon%20Amazon%20Athena%20ODBC%20driver&amp;severity=medium&amp;id=69d023670a160ebd92577b1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5485-cwe-78-improper-neutralization-of-sp-efef007b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5485%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20Amazon%20Amazon%20Athena%20ODBC%20driver&amp;severity=high&amp;id=69d023670a160ebd92577b3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32662-cwe-489-in-gardyn-cloud-api-d58ccfc1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32662%3A%20CWE-489%20in%20Gardyn%20Cloud%20API&amp;severity=medium&amp;id=69d023670a160ebd92577b11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35562-cwe-770-allocation-of-resources-wit-55242724</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35562%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Amazon%20Amazon%20Athena%20ODBC%20driver&amp;severity=high&amp;id=69d023670a160ebd92577b36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35561-cwe-862-missing-authorization-in-am-b3c9fe82</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35561%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Amazon%20Amazon%20Athena%20ODBC%20driver&amp;severity=high&amp;id=69d023670a160ebd92577b2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35560-cwe-295-improper-certificate-valida-6b4d3803</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35560%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Amazon%20Amazon%20Athena%20ODBC%20driver&amp;severity=high&amp;id=69d023670a160ebd92577b26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28798-cwe-918-server-side-request-forgery-eeb1458a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28798%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20IceWhaleTech%20ZimaOS&amp;severity=critical&amp;id=69d01fe40a160ebd92561113</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5484-improper-access-controls-in-bookstac-dec9933e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5484%3A%20Improper%20Access%20Controls%20in%20BookStackApp%20BookStack&amp;severity=medium&amp;id=69d01c5f0a160ebd9254ff70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3184-authentication-bypass-by-alternate-n-f2f54bad</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3184%3A%20Authentication%20Bypass%20by%20Alternate%20Name%20in%20Red%20Hat%20Red%20Hat%20Hardened%20Images&amp;severity=low&amp;id=69d011d20a160ebd9251326c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2625-improper-verification-of-cryptograph-ee8d8567</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2625%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69d00aca0a160ebd924e2a81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5476-integer-overflow-in-nasa-cfs-5bb1bd57</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5476%3A%20Integer%20Overflow%20in%20NASA%20cFS&amp;severity=low&amp;id=69cffcbb0a160ebd924911a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32186-cwe-918-server-side-request-forgery-56097844</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32186%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Microsoft%20Bing&amp;severity=critical&amp;id=69cffcbb0a160ebd9249119e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5475-memory-corruption-in-nasa-cfs-13fbb9f6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5475%3A%20Memory%20Corruption%20in%20NASA%20cFS&amp;severity=medium&amp;id=69cff9360a160ebd9247d56a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0545-cwe-306-missing-authentication-for-c-c182a1fe</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0545%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20mlflow%20mlflow%2Fmlflow&amp;severity=critical&amp;id=69cff9360a160ebd9247d567</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5474-heap-based-buffer-overflow-in-nasa-c-f6b3acaa</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5474%3A%20Heap-based%20Buffer%20Overflow%20in%20NASA%20cFS&amp;severity=medium&amp;id=69cff5b20a160ebd92462686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5473-deserialization-in-nasa-cfs-3e2a874c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5473%3A%20Deserialization%20in%20NASA%20cFS&amp;severity=low&amp;id=69cff2300a160ebd92448b92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/managing-open-source-vulnerabilities-kaspersky-off-55d6c244</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Managing%20open-source%20vulnerabilities%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69cfeb2e0a160ebd9241ea44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5472-unrestricted-upload-in-projectsandpr-0cc309bc</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5472%3A%20Unrestricted%20Upload%20in%20ProjectsAndPrograms%20School%20Management%20System&amp;severity=medium&amp;id=69cfe7a20a160ebd9240d447</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25118-cwe-598-use-of-get-request-method-w-96ae0d1a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25118%3A%20CWE-598%3A%20Use%20of%20GET%20Request%20Method%20With%20Sensitive%20Query%20Strings%20in%20immich-app%20immich&amp;severity=medium&amp;id=69cfe4200a160ebd923f9c75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5471-use-of-hard-coded-cryptographic-key--5760eb8c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5471%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Investory%20Toy%20Planet%20Trouble%20App&amp;severity=medium&amp;id=69cfe4200a160ebd923f9c7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5470-server-side-request-forgery-in-mixel-d7026a99</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5470%3A%20Server-Side%20Request%20Forgery%20in%20mixelpixx%20Google-Research-MCP&amp;severity=medium&amp;id=69cfe09b0a160ebd923e33cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27124-cwe-441-unintended-proxy-or-interme-8aae3b75</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27124%3A%20CWE-441%3A%20Unintended%20Proxy%20or%20Intermediary%20(&apos;Confused%20Deputy&apos;)%20in%20jlowin%20fastmcp&amp;severity=high&amp;id=69cfdd290a160ebd923d52c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64340-cwe-78-improper-neutralization-of-s-051e5da6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64340%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20jlowin%20fastmcp&amp;severity=medium&amp;id=69cfdd290a160ebd923d52bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23471-bbdc30cf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23471&amp;severity=null&amp;id=69dcf3cf82d89c981fee9b23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5469-server-side-request-forgery-in-casdo-a22db068</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5469%3A%20Server-Side%20Request%20Forgery%20in%20Casdoor&amp;severity=medium&amp;id=69d01fe40a160ebd92561117</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dprk-related-campaigns-with-lnk-and-github-c2-91573c21</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DPRK-Related%20Campaigns%20with%20LNK%20and%20GitHub%20C2&amp;severity=medium&amp;id=69cff22d0a160ebd924486ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5468-cross-site-scripting-in-casdoor-7e8a0a24</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5468%3A%20Cross%20Site%20Scripting%20in%20Casdoor&amp;severity=medium&amp;id=69cfc47e0a160ebd922338ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28736-cwe-639-authorization-bypass-throug-75f52a86</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28736%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Mattermost%20Focalboard&amp;severity=medium&amp;id=69cfc47e0a160ebd922338cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25773-cwe-89-improper-neutralization-of-s-43bf0e92</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25773%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Mattermost%20Focalboard&amp;severity=high&amp;id=69cfc47e0a160ebd922338c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/teampcp-supply-chain-campaign-update-006-cert-eu-c-06f851f5</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TeamPCP%20Supply%20Chain%20Campaign%3A%20Update%20006%20-%20CERT-EU%20Confirms%20European%20Commission%20Cloud%20Breach%2C%20Sportradar%20Details%20Emerge%2C%20and%20Mandiant%20Quantifies%20Campaign%20at%201%2C000%26%23x2b%3B%20SaaS%20Environments%2C%20(Fri%2C%20Apr%203rd)&amp;severity=medium&amp;id=69cfc0f60a160ebd9221d9f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trueconf-zero-day-exploited-in-asian-government-at-c6827a67</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TrueConf%20Zero-Day%20Exploited%20in%20Asian%20Government%20Attacks&amp;severity=medium&amp;id=69cfb9ee0a160ebd921e736a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-chatgpt-data-leak-android-rootkit-wa-e5dd880b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20ChatGPT%20Data%20Leak%2C%20Android%20Rootkit%2C%20Water%20Facility%20Hit%20by%20Ransomware&amp;severity=medium&amp;id=69cfb66a0a160ebd921d0eb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27655-cwe-79-improper-neutralization-of-i-6c9ead92</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27655%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Zohocorp%20ManageEngine%20Exchange%20Reporter%20Plus&amp;severity=high&amp;id=69cfb2e50a160ebd921b3d03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-sharefile-flaws-lead-to-unauthenticated-r-db626a4f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20ShareFile%20Flaws%20Lead%20to%20Unauthenticated%20RCE&amp;severity=critical&amp;id=69cfaf620a160ebd9219b6b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4108-cwe-79-improper-neutralization-of-in-77d35d30</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4108%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Zohocorp%20ManageEngine%20Exchange%20Reporter%20Plus&amp;severity=high&amp;id=69cfb2e50a160ebd921b3d06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5467-open-redirect-in-casdoor-d92e6490</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5467%3A%20Open%20Redirect%20in%20Casdoor&amp;severity=medium&amp;id=69cfabde0a160ebd92184cfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4107-cwe-79-improper-neutralization-of-in-b7a2b682</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4107%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Zohocorp%20ManageEngine%20Exchange%20Reporter%20Plus&amp;severity=high&amp;id=69cfabde0a160ebd92184cf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3880-cwe-79-improper-neutralization-of-in-4115e272</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3880%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Zohocorp%20ManageEngine%20Exchange%20Reporter%20Plus&amp;severity=high&amp;id=69cfabde0a160ebd92184cf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3879-cwe-79-improper-neutralization-of-in-2109c30e</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3879%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Zohocorp%20ManageEngine%20Exchange%20Reporter%20Plus&amp;severity=high&amp;id=69cfabde0a160ebd92184cf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28703-cwe-79-improper-neutralization-of-i-105fef78</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28703%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Zohocorp%20ManageEngine%20Exchange%20Reporter%20Plus&amp;severity=high&amp;id=69cfabde0a160ebd92184cef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28756-cwe-79-improper-neutralization-of-i-95c85518</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28756%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Zohocorp%20ManageEngine%20Exchange%20Reporter%20Plus&amp;severity=high&amp;id=69cfa1520a160ebd92140866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mobile-attack-surface-expands-as-enterprises-lose--2062976c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mobile%20Attack%20Surface%20Expands%20as%20Enterprises%20Lose%20Control&amp;severity=medium&amp;id=69cfc4ba0a160ebd9223c7cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/react2shell-exploited-in-large-scale-credential-ha-710eb52c</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=React2Shell%20Exploited%20in%20Large-Scale%20Credential%20Harvesting%20Campaign&amp;severity=medium&amp;id=69cf9dce0a160ebd92126582</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/t-mobile-sets-the-record-straight-on-latest-data-b-a56c8b52</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=T-Mobile%20Sets%20the%20Record%20Straight%20on%20Latest%20Data%20Breach%20Filing&amp;severity=medium&amp;id=69cf96c60a160ebd920f4081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28754-cwe-79-improper-neutralization-of-i-6d918354</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28754%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Zohocorp%20ManageEngine%20Exchange%20Reporter%20Plus&amp;severity=high&amp;id=69cf96cc0a160ebd920f4a99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-technique-based-approach-to-hunting-web-delivere-aa216956</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20Technique-Based%20Approach%20to%20Hunting%20Web-Delivered%20Malware&amp;severity=medium&amp;id=69cff22d0a160ebd924486f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-hackers-drain-285-million-from-drift--80bba754</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20Hackers%20Drain%20%24285%20Million%20From%20Drift%20in%2010%20Seconds&amp;severity=medium&amp;id=69cf8fbe0a160ebd920b65a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7024-cwe-276-incorrect-default-permission-97c73fb0</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7024%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20AIRBUS%20TETRA%20Connectivity%20Server%20(TCS)&amp;severity=medium&amp;id=69cf701a0a160ebd92f9a4a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5462-use-of-hard-coded-cryptographic-key--cec5a6d5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5462%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Wahoo%20Fitness%20SYSTM%20App&amp;severity=medium&amp;id=69cf701a0a160ebd92f9a4ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5458-use-of-hard-coded-cryptographic-key--9ad81a24</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5458%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Noelse%20Individuals%20%26%20Pro%20App&amp;severity=medium&amp;id=69cf69120a160ebd92df90e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5457-use-of-hard-coded-cryptographic-key--4bb86ba2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5457%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20PropertyGuru%20AgentNet%20Singapore%20App&amp;severity=medium&amp;id=69cf658d0a160ebd92dcb2cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5456-use-of-hard-coded-cryptographic-key--a777f37c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5456%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Align%20Technology%20My%20Invisalign%20App&amp;severity=medium&amp;id=69cf5e850a160ebd92d5742c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5455-use-of-hard-coded-cryptographic-key--ff603c53</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5455%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Dialogue%20App&amp;severity=medium&amp;id=69cf5e850a160ebd92d57426</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5454-use-of-hard-coded-cryptographic-key--c7599b26</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5454%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20GRID%20Organiser%20App&amp;severity=medium&amp;id=69cf4ec6e6bfc5ba1d76734c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5463-cwe-77-improper-neutralization-of-sp-6f7ed040</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5463%3A%20CWE-77%20Improper%20neutralization%20of%20special%20elements%20leading%20to%20command%20injection%20in%20Dan%20McInerney%20pymetasploit3&amp;severity=critical&amp;id=69cf4ec6e6bfc5ba1d767352</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5453-use-of-hard-coded-cryptographic-key--eebd2c8c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5453%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Rico%20s%C3%B3%20vantagem%20pra%20investir%20App&amp;severity=medium&amp;id=69cf4ec6e6bfc5ba1d767346</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35545-cwe-669-incorrect-resource-transfer-4f9b63c9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35545%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20Roundcube%20Webmail&amp;severity=medium&amp;id=69cf565a0a160ebd92cd3eac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35544-cwe-669-incorrect-resource-transfer-3cfa2528</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35544%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20Roundcube%20Webmail&amp;severity=medium&amp;id=69cf565a0a160ebd92cd3ea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35543-cwe-669-incorrect-resource-transfer-2e3eea55</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35543%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20Roundcube%20Webmail&amp;severity=medium&amp;id=69cf565a0a160ebd92cd3e99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35542-cwe-669-incorrect-resource-transfer-1ee1fdc5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35542%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20Roundcube%20Webmail&amp;severity=medium&amp;id=69cf565a0a160ebd92cd3e90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35541-cwe-843-access-of-resource-using-in-6cfb8571</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35541%3A%20CWE-843%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Roundcube%20Webmail&amp;severity=medium&amp;id=69cf565a0a160ebd92cd3e87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35540-cwe-669-incorrect-resource-transfer-d7e9fcf3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35540%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20Roundcube%20Webmail&amp;severity=medium&amp;id=69cf565a0a160ebd92cd3e80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35539-cwe-79-improper-neutralization-of-i-c4f66e2b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35539%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Roundcube%20Webmail&amp;severity=medium&amp;id=69cf565a0a160ebd92cd3e77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35538-cwe-88-improper-neutralization-of-a-9cd34ca9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35538%3A%20CWE-88%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Roundcube%20Webmail&amp;severity=low&amp;id=69cf56590a160ebd92cd3e6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35537-cwe-502-deserialization-of-untruste-e3e5ffd4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35537%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Roundcube%20Webmail&amp;severity=low&amp;id=69cf362ae6bfc5ba1d4c9706</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5452-use-of-hard-coded-cryptographic-key--d5424d8d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5452%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20UCC%20CampusConnect%20App&amp;severity=medium&amp;id=69cf362ae6bfc5ba1d4c970f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35536-cwe-159-improper-handling-of-invali-02ebbe3e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35536%3A%20CWE-159%20Improper%20Handling%20of%20Invalid%20Use%20of%20Special%20Elements%20in%20tornadoweb%20Tornado&amp;severity=high&amp;id=69cf362ae6bfc5ba1d4c9702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35535-cwe-271-privilege-dropping-lowering-83309c2a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35535%3A%20CWE-271%20Privilege%20Dropping%20%2F%20Lowering%20Errors%20in%20Sudo%20project%20Sudo&amp;severity=high&amp;id=69cf565a0a160ebd92cd3eb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28815-a-remote-attacker-can-supply-a-shor-45198375</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28815%3A%20A%20remote%20attacker%20can%20supply%20a%20short%20X-Wing%20HPKE%20encapsulated%20key%20and%20trigger%20an%20out-of-bounds%20read%20in%20the%20C%20decapsulation%20path%2C%20potentially%20causing%20a%20crash%20or%20memory%20disclosure%20depending%20on%20runtime%20protections.%20in%20Apple%20macOS&amp;severity=high&amp;id=69cf565a0a160ebd92cd3eb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35508-cwe-79-improper-neutralization-of-i-2b165f2c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35508%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20milesmcc%20Shynet&amp;severity=medium&amp;id=69cf1a09e6bfc5ba1d18739d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35507-cwe-348-use-of-less-trusted-source--3dfca42c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35507%3A%20CWE-348%20Use%20of%20Less%20Trusted%20Source%20in%20milesmcc%20Shynet&amp;severity=medium&amp;id=69cf1a09e6bfc5ba1d187399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/securing-the-supply-chain-how-sentinelones-ai-edr--ae921dbc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Securing%20the%20Supply%20Chain%3A%20How%20SentinelOne&apos;s%20AI%20EDR%20Stops%20the%20...&amp;severity=medium&amp;id=69cff22d0a160ebd92448702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-04-86c459c4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-04&amp;severity=medium&amp;id=69d15c420a160ebd92fdc245</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59710-na-3fafd6d9</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59710%3A%20n%2Fa&amp;severity=high&amp;id=69d0a7090a160ebd92cef529</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59709-na-482aa39f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59709%3A%20n%2Fa&amp;severity=medium&amp;id=69d0a7090a160ebd92cef51f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-03-448d30f3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-03&amp;severity=medium&amp;id=69d058190a160ebd9267d399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28373-na-09617547</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28373%3A%20n%2Fa&amp;severity=critical&amp;id=69cff2300a160ebd92448b8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26477-na-a491f893</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26477%3A%20n%2Fa&amp;severity=high&amp;id=69cfdd290a160ebd923d52c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59711-na-4eeb3c1b</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59711%3A%20n%2Fa&amp;severity=high&amp;id=69cfdd290a160ebd923d52c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-03-d6f01094</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-03&amp;severity=low&amp;id=69cf1d84e6bfc5ba1d1ded65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32211-cwe-306-missing-authentication-for--955487bc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32211%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Microsoft%20Azure%20Web%20Apps&amp;severity=critical&amp;id=69cefde9e6bfc5ba1d07550c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32173-cwe-287-improper-authentication-in--faaed594</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32173%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Azure%20SRE%20Agent%20Gateway%20-%20SignalR%20Hub&amp;severity=high&amp;id=69cefde9e6bfc5ba1d075509</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33105-cwe-285-improper-authorization-in-m-73a608f8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33105%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Azure%20Kubernetes%20Service&amp;severity=critical&amp;id=69cefde9e6bfc5ba1d075512</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26135-cwe-918-server-side-request-forgery-b7428a35</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26135%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Azure%20Custom%20Locations%20Resource%20Provider&amp;severity=critical&amp;id=69cefde9e6bfc5ba1d075506</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33107-cwe-918-server-side-request-forgery-97f03653</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33107%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Azure%20Databricks&amp;severity=critical&amp;id=69cefde9e6bfc5ba1d075515</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32213-cwe-285-improper-authorization-in-m-b7cd2d00</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32213%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Azure%20AI%20Foundry&amp;severity=critical&amp;id=69cefde9e6bfc5ba1d07550f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14033-cwe-122-heap-based-buffer-overflow--5ba0f01c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14033%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Belden%20Hirschmann%20EagleSDV&amp;severity=high&amp;id=69ceed4ae6bfc5ba1d039aaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/risks-emerging-when-developing-or-using-open-sourc-65bd61cf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Risks%2C%20emerging%20when%20developing%20or%20using%20open-source%20software&amp;severity=medium&amp;id=69cef91ee6bfc5ba1d055051</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15620-cwe-306-missing-authentication-for--3a8bc232</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15620%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Belden%20Hirschmann%20HiOS%20Switch%20Platform&amp;severity=critical&amp;id=69cef2c1e6bfc5ba1d03d79c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35467-cwe-522-insufficiently-protected-cr-7c0849fb</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35467%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20CERT%2FCC%20cveClient%2Fencrypt-storage.js&amp;severity=high&amp;id=69cef558e6bfc5ba1d04a7f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35466-cwe-79-improper-neutralization-of-i-561895ed</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35466%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CERT%2FCC%20cveClient%2FcveInterface.js&amp;severity=medium&amp;id=69cef472e6bfc5ba1d047ef1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14034-improper-authentication-cwe-287-in--177567d9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14034%3A%20Improper%20Authentication%20(CWE-287)%20in%20Belden%20Hirschmann%20HiEOS%20LRS11&amp;severity=critical&amp;id=69cef608e6bfc5ba1d04c2eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34838-cwe-502-deserialization-of-untruste-f6c31d56</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34838%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Intermesh%20groupoffice&amp;severity=critical&amp;id=69cec5aae6bfc5ba1dfbd82c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34834-cwe-287-improper-authentication-in--289edfd2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34834%3A%20CWE-287%3A%20Improper%20Authentication%20in%20bulwarkmail%20webmail&amp;severity=high&amp;id=69cec5aae6bfc5ba1dfbd828</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34833-cwe-312-cleartext-storage-of-sensit-b51ce693</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34833%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20bulwarkmail%20webmail&amp;severity=high&amp;id=69cec5aae6bfc5ba1dfbd823</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34832-cwe-639-authorization-bypass-throug-53bea463</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34832%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Erudika%20scoold&amp;severity=medium&amp;id=69cec5aae6bfc5ba1dfbd81e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35383-cwe-540-inclusion-of-sensitive-info-d7621abd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35383%3A%20CWE-540%20Inclusion%20of%20Sensitive%20Information%20in%20Source%20Code%20in%20Bentley%20Systems%20iTwin%20Platform&amp;severity=medium&amp;id=69cec5aae6bfc5ba1dfbd832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34762-cwe-20-improper-input-validation-in-7e4100c1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34762%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20ellanetworks%20core&amp;severity=low&amp;id=69cec5aae6bfc5ba1dfbd81a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34761-cwe-476-null-pointer-dereference-in-5e11ac55</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34761%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20ellanetworks%20core&amp;severity=medium&amp;id=69cec5aae6bfc5ba1dfbd816</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5420-use-of-hard-coded-cryptographic-key--225a1021</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5420%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Shinrays%20Games%20Goods%20Triple%20App&amp;severity=low&amp;id=69cec5aae6bfc5ba1dfbd837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34760-cwe-20-improper-input-validation-in-9529c1a4</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34760%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20vllm-project%20vllm&amp;severity=medium&amp;id=69cec5aae6bfc5ba1dfbd810</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34745-cwe-22-improper-limitation-of-a-pat-3a68f043</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34745%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ShaneIsrael%20fireshare&amp;severity=critical&amp;id=69cec35ae6bfc5ba1dfb4cde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5429-cwe-79-improper-neutralization-of-in-0dc227b2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5429%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20AWS%20Kiro%20IDE&amp;severity=high&amp;id=69cec35ae6bfc5ba1dfb4ce4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34743-cwe-122-heap-based-buffer-overflow--7a101be3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34743%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20tukaani-project%20xz&amp;severity=low&amp;id=69cec35ae6bfc5ba1dfb4cd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34742-cwe-1188-insecure-default-initializ-4e5c2196</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34742%3A%20CWE-1188%3A%20Insecure%20Default%20Initialization%20of%20Resource%20in%20modelcontextprotocol%20go-sdk&amp;severity=high&amp;id=69cec35ae6bfc5ba1dfb4cd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5418-server-side-request-forgery-in-appsm-c094f40b</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5418%3A%20Server-Side%20Request%20Forgery%20in%20appsmithorg%20appsmith&amp;severity=medium&amp;id=69ceb81be6bfc5ba1df6dea8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34736-cwe-287-improper-authentication-in--80eaaffe</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34736%3A%20CWE-287%3A%20Improper%20Authentication%20in%20openedx%20openedx-platform&amp;severity=medium&amp;id=69ceb81be6bfc5ba1df6de9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43236-an-attacker-may-be-able-to-cause-un-e92b7e14</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43236%3A%20An%20attacker%20may%20be%20able%20to%20cause%20unexpected%20app%20termination%20in%20Apple%20macOS&amp;severity=low&amp;id=69ceb81ae6bfc5ba1df6de14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43257-an-app-may-be-able-to-break-out-of--e2aaec50</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43257%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=high&amp;id=69ceb81be6bfc5ba1df6de85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34735-cwe-434-unrestricted-upload-of-file-f5d45c4f</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34735%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20HytaleModding%20wiki&amp;severity=high&amp;id=69ceb81be6bfc5ba1df6de9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40849-an-app-may-be-able-to-break-out-of--c169fbdd</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40849%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=high&amp;id=69ceb81ae6bfc5ba1df6ddf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44303-a-malicious-application-may-be-able-5e1d5890</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44303%3A%20A%20malicious%20application%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=high&amp;id=69ceb81ae6bfc5ba1df6de00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43210-processing-a-maliciously-crafted-me-956bf5fc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43210%3A%20Processing%20a%20maliciously%20crafted%20media%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20corrupt%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69ceb81ae6bfc5ba1df6de07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44250-an-app-may-be-able-to-execute-arbit-072a711f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44250%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20out%20of%20its%20sandbox%20or%20with%20certain%20elevated%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=69ceb81ae6bfc5ba1df6ddfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40858-an-app-may-be-able-to-access-contac-99748021</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40858%3A%20An%20app%20may%20be%20able%20to%20access%20Contacts%20without%20user%20consent%20in%20Apple%20macOS&amp;severity=high&amp;id=69ceb81ae6bfc5ba1df6ddf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5417-server-side-request-forgery-in-datae-d5f83fe0</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5417%3A%20Server-Side%20Request%20Forgery%20in%20Dataease%20SQLbot&amp;severity=medium&amp;id=69ceb81be6bfc5ba1df6dea1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43264-processing-a-maliciously-crafted-im-3fa309fa</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43264%3A%20Processing%20a%20maliciously%20crafted%20image%20may%20corrupt%20process%20memory%20in%20Apple%20macOS&amp;severity=high&amp;id=69ceb81be6bfc5ba1df6de88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44286-an-attacker-with-physical-access-ca-66c9dde5</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44286%3A%20An%20attacker%20with%20physical%20access%20can%20input%20keyboard%20events%20to%20apps%20running%20on%20a%20locked%20device%20in%20Apple%20macOS&amp;severity=high&amp;id=69ceb81ae6bfc5ba1df6ddfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44219-a-malicious-application-with-root-p-e93f0a1d</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44219%3A%20A%20malicious%20application%20with%20root%20privileges%20may%20be%20able%20to%20access%20private%20information%20in%20Apple%20macOS&amp;severity=high&amp;id=69ceb81ae6bfc5ba1df6ddf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43202-processing-a-file-may-lead-to-memor-9e453001</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43202%3A%20Processing%20a%20file%20may%20lead%20to%20memory%20corruption%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69ceb81ae6bfc5ba1df6de03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43238-an-app-may-be-able-to-cause-unexpec-cb9a7852</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43238%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20macOS&amp;severity=medium&amp;id=69ceb81be6bfc5ba1df6de80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34730-cwe-22-improper-limitation-of-a-pat-0c6f1997</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34730%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20copier-org%20copier&amp;severity=medium&amp;id=69ceb81be6bfc5ba1df6de95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34726-cwe-22-improper-limitation-of-a-pat-facde2ea</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34726%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20copier-org%20copier&amp;severity=medium&amp;id=69ceb81be6bfc5ba1df6de90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43219-processing-a-maliciously-crafted-im-6b401487</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43219%3A%20Processing%20a%20maliciously%20crafted%20image%20may%20corrupt%20process%20memory%20in%20Apple%20macOS&amp;severity=high&amp;id=69ceb81ae6bfc5ba1df6de11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34581-cwe-288-authentication-bypass-using-897021e1</loc>
    <lastmod>2026-04-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34581%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20patrickhener%20goshs&amp;severity=high&amp;id=69ceb81be6bfc5ba1df6de8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-vulnerability-in-claude-code-emerges-days-2c1b21d5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Vulnerability%20in%20Claude%20Code%20Emerges%20Days%20After%20Source%20Leak&amp;severity=critical&amp;id=69ceb091e6bfc5ba1df36caa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5414-improper-control-of-resource-identif-fcd854c5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5414%3A%20Improper%20Control%20of%20Resource%20Identifiers%20in%20Newgen%20OmniDocs&amp;severity=medium&amp;id=69ceb0a7e6bfc5ba1df381f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34717-cwe-89-improper-neutralization-of-s-63776762</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34717%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20opf%20openproject&amp;severity=critical&amp;id=69ceb0a7e6bfc5ba1df381ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34715-cwe-113-improper-neutralization-of--5927154c</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34715%3A%20CWE-113%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20in%20HTTP%20Headers%20(&apos;HTTP%20Request%2FResponse%20Splitting&apos;)%20in%20vshakitskiy%20ewe&amp;severity=medium&amp;id=69ceb0a7e6bfc5ba1df381ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34610-cwe-681-incorrect-conversion-betwee-3f84b0e0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34610%3A%20CWE-681%3A%20Incorrect%20Conversion%20between%20Numeric%20Types%20in%20smuellerDD%20leancrypto&amp;severity=medium&amp;id=69ceb0a7e6bfc5ba1df381e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34606-cwe-79-improper-neutralization-of-i-a9d7fe2f</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34606%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20frappe%20lms&amp;severity=medium&amp;id=69ceb0a7e6bfc5ba1df381df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5413-information-disclosure-in-newgen-omn-d0dfc533</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5413%3A%20Information%20Disclosure%20in%20Newgen%20OmniDocs&amp;severity=medium&amp;id=69ceb0a7e6bfc5ba1df381f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34593-cwe-400-uncontrolled-resource-consu-4a24c715</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34593%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20ash-project%20ash&amp;severity=high&amp;id=69cead0fe6bfc5ba1df180ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34591-cwe-22-improper-limitation-of-a-pat-b3677cbb</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34591%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20python-poetry%20poetry&amp;severity=high&amp;id=69cead0fe6bfc5ba1df180a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34828-cwe-613-insufficient-session-expira-ea1d03d9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34828%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20knadh%20listmonk&amp;severity=high&amp;id=69cead0fe6bfc5ba1df180b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34584-cwe-639-authorization-bypass-throug-6b5821ab</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34584%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20knadh%20listmonk&amp;severity=medium&amp;id=69cead0fe6bfc5ba1df1809d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5370-cross-site-scripting-in-krayin-larav-5380aa7b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5370%3A%20Cross%20Site%20Scripting%20in%20krayin%20laravel-crm&amp;severity=medium&amp;id=69cead0fe6bfc5ba1df180b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34590-cwe-918-server-side-request-forgery-eeb7f30d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34590%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20gitroomhq%20postiz-app&amp;severity=medium&amp;id=69cead0fe6bfc5ba1df180a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34577-cwe-918-server-side-request-forgery-909b76e6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34577%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20gitroomhq%20postiz-app&amp;severity=high&amp;id=69cea98de6bfc5ba1defd63e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/blurred-lines-adtech-abuse-delivers-browser-hijack-17589a6b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Blurred%20Lines%3A%20AdTech%20Abuse%20Delivers%20Browser%20Hijackers%20Through%20the%20Microsoft%20Store&amp;severity=medium&amp;id=69cea988e6bfc5ba1defd25c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34576-cwe-918-server-side-request-forgery-b2391ee3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34576%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20gitroomhq%20postiz-app&amp;severity=high&amp;id=69cea98ae6bfc5ba1defd477</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34124-cwe-120-buffer-copy-without-checkin-3bdb564c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34124%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20in%20TP-Link%20Systems%20Inc.%20Tapo%20C520WS%20v2.6&amp;severity=high&amp;id=69cea98ae6bfc5ba1defd472</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34122-cwe-121-stack-based-buffer-overflow-417d8ccf</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34122%3A%20CWE-121%20Stack-based%20buffer%20overflow%20in%20TP-Link%20Systems%20Inc.%20Tapo%20C520WS%20v2.6&amp;severity=high&amp;id=69cea98ae6bfc5ba1defd46d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34121-cwe-287-improper-authentication-in--70bb008f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34121%3A%20CWE-287%20Improper%20Authentication%20in%20TP-Link%20Systems%20Inc.%20Tapo%20C520WS%20v2.6&amp;severity=high&amp;id=69cea98ae6bfc5ba1defd468</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34120-cwe-122-heap-based-buffer-overflow--ac6e1997</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34120%3A%20CWE-122%20Heap-based%20buffer%20overflow%20in%20TP-Link%20Systems%20Inc.%20Tapo%20C520WS%20v2.6&amp;severity=high&amp;id=69cea98ae6bfc5ba1defd463</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34119-cwe-122-heap-based-buffer-overflow--623c460c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34119%3A%20CWE-122%20Heap-based%20buffer%20overflow%20in%20TP-Link%20Systems%20Inc.%20Tapo%20C520WS%20v2.6&amp;severity=high&amp;id=69cea98ae6bfc5ba1defd45e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34118-cwe-122-heap-based-buffer-overflow--89dd0897</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34118%3A%20CWE-122%20Heap-based%20buffer%20overflow%20in%20TP-Link%20Systems%20Inc.%20Tapo%20C520WS%20v2.6&amp;severity=high&amp;id=69cea98ae6bfc5ba1defd459</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5368-sql-injection-in-projectworlds-car-r-e18e0ca8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5368%3A%20SQL%20Injection%20in%20projectworlds%20Car%20Rental%20Project&amp;severity=medium&amp;id=69cea98de6bfc5ba1defd647</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35414-cwe-670-always-incorrect-control-fl-e4d4c1c7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35414%3A%20CWE-670%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20OpenBSD%20OpenSSH&amp;severity=medium&amp;id=69cea98de6bfc5ba1defd642</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33271-cwe-732-in-acronis-acronis-true-ima-83d3446e</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33271%3A%20CWE-732%20in%20Acronis%20Acronis%20True%20Image&amp;severity=medium&amp;id=69cea98ae6bfc5ba1defd456</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27774-cwe-427-in-acronis-acronis-true-ima-f5d81d91</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27774%3A%20CWE-427%20in%20Acronis%20Acronis%20True%20Image&amp;severity=medium&amp;id=69cea98ae6bfc5ba1defd450</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28728-cwe-427-in-acronis-acronis-true-ima-d8de14ba</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28728%3A%20CWE-427%20in%20Acronis%20Acronis%20True%20Image&amp;severity=medium&amp;id=69cea98ae6bfc5ba1defd453</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5360-type-confusion-in-free5gc-b6640c32</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5360%3A%20Type%20Confusion%20in%20Free5GC&amp;severity=medium&amp;id=69cea282e6bfc5ba1ded3a6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35388-cwe-420-unprotected-alternate-chann-db477462</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35388%3A%20CWE-420%20Unprotected%20Alternate%20Channel%20in%20OpenBSD%20OpenSSH&amp;severity=low&amp;id=69cea282e6bfc5ba1ded3a61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35387-cwe-670-always-incorrect-control-fl-852141e1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35387%3A%20CWE-670%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20OpenBSD%20OpenSSH&amp;severity=low&amp;id=69cea282e6bfc5ba1ded3a5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5355-os-command-injection-in-trendnet-tew-5919378b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5355%3A%20OS%20Command%20Injection%20in%20Trendnet%20TEW-657BRM&amp;severity=medium&amp;id=69cea282e6bfc5ba1ded3a66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35386-cwe-696-incorrect-behavior-order-in-646d5041</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35386%3A%20CWE-696%20Incorrect%20Behavior%20Order%20in%20OpenBSD%20OpenSSH&amp;severity=low&amp;id=69cea282e6bfc5ba1ded3a57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35385-cwe-281-improper-preservation-of-pe-48960da7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35385%3A%20CWE-281%20Improper%20Preservation%20of%20Permissions%20in%20OpenBSD%20OpenSSH&amp;severity=high&amp;id=69cea98de6bfc5ba1defd64d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5354-os-command-injection-in-trendnet-tew-c979efcf</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5354%3A%20OS%20Command%20Injection%20in%20Trendnet%20TEW-657BRM&amp;severity=medium&amp;id=69cec35ae6bfc5ba1dfb4cf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35038-cwe-20-improper-input-validation-in-8b5fa3f6</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35038%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20SignalK%20signalk-server&amp;severity=low&amp;id=69cec35ae6bfc5ba1dfb4ce8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-rolls-out-darksword-exploit-protection-to-mo-bc92c3b6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Rolls%20Out%20DarkSword%20Exploit%20Protection%20to%20More%20Devices&amp;severity=medium&amp;id=69ce97f5e6bfc5ba1dea5515</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5353-os-command-injection-in-trendnet-tew-9f4b903f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5353%3A%20OS%20Command%20Injection%20in%20Trendnet%20TEW-657BRM&amp;severity=medium&amp;id=69ce9803e6bfc5ba1dea5adb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34083-cwe-346-origin-validation-error-in--ca18c573</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34083%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20SignalK%20signalk-server&amp;severity=medium&amp;id=69ce9803e6bfc5ba1dea5ad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33951-cwe-284-improper-access-control-in--c9ec4f21</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33951%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20SignalK%20signalk-server&amp;severity=medium&amp;id=69ce9803e6bfc5ba1dea5acd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33950-cwe-285-improper-authorization-in-s-42d339ad</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33950%3A%20CWE-285%3A%20Improper%20Authorization%20in%20SignalK%20signalk-server&amp;severity=critical&amp;id=69ce9803e6bfc5ba1dea5ac9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5352-os-command-injection-in-trendnet-tew-dda530c3</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5352%3A%20OS%20Command%20Injection%20in%20Trendnet%20TEW-657BRM&amp;severity=medium&amp;id=69ce9803e6bfc5ba1dea5ad5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65114-cwe-444-inconsistent-interpretation-24bc4154</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65114%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Traffic%20Server&amp;severity=high&amp;id=69ce9803e6bfc5ba1dea5ac2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58136-cwe-670-always-incorrect-control-fl-428e4957</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58136%3A%20CWE-670%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20Apache%20Software%20Foundation%20Apache%20Traffic%20Server&amp;severity=high&amp;id=69ce9803e6bfc5ba1dea5abf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5351-os-command-injection-in-trendnet-tew-74359ae2</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5351%3A%20OS%20Command%20Injection%20in%20Trendnet%20TEW-657BRM&amp;severity=medium&amp;id=69ce9471e6bfc5ba1de9346c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5350-stack-based-buffer-overflow-in-trend-f5ac4019</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5350%3A%20Stack-based%20Buffer%20Overflow%20in%20Trendnet%20TEW-657BRM&amp;severity=high&amp;id=69ce8d6ee6bfc5ba1de64e31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-talos-qilin-edr-killer-infection-chain-0d9ac91a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Talos%3A%20Qilin%20EDR%20killer%20infection%20chain&amp;severity=medium&amp;id=69cea988e6bfc5ba1defd24d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5349-stack-based-buffer-overflow-in-trend-1ea24dda</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5349%3A%20Stack-based%20Buffer%20Overflow%20in%20Trendnet%20TEW-657BRM&amp;severity=high&amp;id=69ce8d6ee6bfc5ba1de64e2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33746-cwe-287-improper-authentication-in--78811956</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33746%3A%20CWE-287%3A%20Improper%20Authentication%20in%20ConvoyPanel%20panel&amp;severity=critical&amp;id=69ce8d6ee6bfc5ba1de64e23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33544-cwe-362-concurrent-execution-using--60e2872c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33544%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20steveiliop56%20tinyauth&amp;severity=high&amp;id=69ce866ce6bfc5ba1de33608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5346-server-side-request-forgery-in-huime-f002dac4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5346%3A%20Server-Side%20Request%20Forgery%20in%20huimeicloud%20hm_editor&amp;severity=medium&amp;id=69ce8676e6bfc5ba1de33855</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33641-cwe-78-improper-neutralization-of-s-214e76d2</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33641%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20nicolargo%20glances&amp;severity=high&amp;id=69ce866ce6bfc5ba1de3360d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33533-cwe-942-permissive-cross-domain-pol-c2e5f1b2</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33533%3A%20CWE-942%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20nicolargo%20glances&amp;severity=high&amp;id=69ce866ce6bfc5ba1de33603</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32871-cwe-918-server-side-request-forgery-0687fde2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32871%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20PrefectHQ%20fastmcp&amp;severity=critical&amp;id=69ce866ce6bfc5ba1de335fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/attempts-to-exploit-exposed-vite-installs-cve-2025-827c1913</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Attempts%20to%20Exploit%20Exposed%20%22Vite%22%20Installs%20(CVE-2025-30208)%2C%20(Thu%2C%20Apr%202nd)&amp;severity=medium&amp;id=69ce82dde6bfc5ba1de1d284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34974-cwe-79-improper-neutralization-of-i-8de569da</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34974%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thorsten%20phpMyFAQ&amp;severity=medium&amp;id=69ce8676e6bfc5ba1de3384b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34973-cwe-943-improper-neutralization-of--0361ce91</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34973%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20thorsten%20phpMyFAQ&amp;severity=medium&amp;id=69ce8676e6bfc5ba1de33847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34729-cwe-79-improper-neutralization-of-i-ff1a0323</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34729%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thorsten%20phpMyFAQ&amp;severity=medium&amp;id=69ce866ce6bfc5ba1de33616</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34823-cwe-79-improper-neutralization-of-i-852fe0d8</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34823%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8676e6bfc5ba1de33843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34822-cwe-79-improper-neutralization-of-i-a1876c88</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34822%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8673e6bfc5ba1de337fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34821-cwe-79-improper-neutralization-of-i-29b5152c</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34821%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8673e6bfc5ba1de337f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34820-cwe-79-improper-neutralization-of-i-bd60eac2</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34820%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8673e6bfc5ba1de337f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34819-cwe-79-improper-neutralization-of-i-8942aadd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34819%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8673e6bfc5ba1de337f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34818-cwe-79-improper-neutralization-of-i-61c0ae4b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34818%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8673e6bfc5ba1de337ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34817-cwe-79-improper-neutralization-of-i-1a0bd2b0</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34817%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8673e6bfc5ba1de337e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34816-cwe-79-improper-neutralization-of-i-bf596a93</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34816%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8673e6bfc5ba1de337e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34815-cwe-79-improper-neutralization-of-i-02ff92e0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34815%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8673e6bfc5ba1de337e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34814-cwe-79-improper-neutralization-of-i-8d8fa93e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34814%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8673e6bfc5ba1de337dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34813-cwe-79-improper-neutralization-of-i-a451dc1f</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34813%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8673e6bfc5ba1de337d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34812-cwe-79-improper-neutralization-of-i-921e323c</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34812%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8671e6bfc5ba1de33787</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34811-cwe-79-improper-neutralization-of-i-22dddd64</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34811%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8671e6bfc5ba1de33783</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34810-cwe-79-improper-neutralization-of-i-3fae305a</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34810%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8671e6bfc5ba1de3377f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34809-cwe-79-improper-neutralization-of-i-c8f386bc</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34809%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8671e6bfc5ba1de3377b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34808-cwe-79-improper-neutralization-of-i-5f915904</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34808%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8671e6bfc5ba1de33777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34807-cwe-79-improper-neutralization-of-i-424a2944</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34807%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8671e6bfc5ba1de33773</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34806-cwe-79-improper-neutralization-of-i-da867409</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34806%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8671e6bfc5ba1de3376f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34805-cwe-79-improper-neutralization-of-i-d35ef2fd</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34805%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8671e6bfc5ba1de3376b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34804-cwe-79-improper-neutralization-of-i-4100c6c4</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34804%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8671e6bfc5ba1de33767</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34803-cwe-79-improper-neutralization-of-i-c5a9c48d</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34803%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8671e6bfc5ba1de33763</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34802-cwe-79-improper-neutralization-of-i-9839a241</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34802%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce866ee6bfc5ba1de336cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34801-cwe-79-improper-neutralization-of-i-ef5dac74</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34801%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce866ee6bfc5ba1de336c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34800-cwe-79-improper-neutralization-of-i-483fe746</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34800%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce866ee6bfc5ba1de336c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34799-cwe-79-improper-neutralization-of-i-efa3f37c</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34799%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce866ee6bfc5ba1de336c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34798-cwe-79-improper-neutralization-of-i-cc36ce0b</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34798%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce866ee6bfc5ba1de336bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34797-improper-neutralization-of-special--ffdcbce6</loc>
    <lastmod>2026-04-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34797%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20Endian%20Endian%20Firewall&amp;severity=high&amp;id=69ce866ee6bfc5ba1de336b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34796-improper-neutralization-of-special--79152788</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34796%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20Endian%20Endian%20Firewall&amp;severity=high&amp;id=69ce866ee6bfc5ba1de336b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34795-improper-neutralization-of-special--f96f1d2e</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34795%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20Endian%20Endian%20Firewall&amp;severity=high&amp;id=69ce866ee6bfc5ba1de336b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34794-improper-neutralization-of-special--d12f875a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34794%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20Endian%20Endian%20Firewall&amp;severity=high&amp;id=69ce866ee6bfc5ba1de336ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34793-improper-neutralization-of-special--725bdc11</loc>
    <lastmod>2026-04-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34793%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20Endian%20Endian%20Firewall&amp;severity=high&amp;id=69ce866ee6bfc5ba1de336a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34792-improper-neutralization-of-special--ef0a7278</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34792%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20Endian%20Endian%20Firewall&amp;severity=high&amp;id=69ce866ce6bfc5ba1de33622</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34791-improper-neutralization-of-special--46bc51d8</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34791%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20Endian%20Endian%20Firewall&amp;severity=high&amp;id=69ce866ce6bfc5ba1de3361e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34790-cwe-22-improper-limitation-of-a-pat-061f357f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34790%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=high&amp;id=69ce866ce6bfc5ba1de3361a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5344-path-traversal-in-textpattern-f83f8ea6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5344%3A%20Path%20Traversal%20in%20Textpattern&amp;severity=medium&amp;id=69ce8676e6bfc5ba1de3384f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34728-cwe-22-improper-limitation-of-a-pat-020b73b9</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34728%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20thorsten%20phpMyFAQ&amp;severity=high&amp;id=69ce866ce6bfc5ba1de33612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32629-cwe-20-improper-input-validation-in-98592881</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32629%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20thorsten%20phpMyFAQ&amp;severity=medium&amp;id=69ce866ce6bfc5ba1de335f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31937-cwe-407-inefficient-algorithmic-com-baa4c414</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31937%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20OISF%20suricata&amp;severity=high&amp;id=69ce82f2e6bfc5ba1de1d94b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31935-cwe-400-uncontrolled-resource-consu-a13b1298</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31935%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20OISF%20suricata&amp;severity=high&amp;id=69ce82f2e6bfc5ba1de1d947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5342-out-of-bounds-read-in-libraw-6fbc52cd</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5342%3A%20Out-of-Bounds%20Read%20in%20LibRaw&amp;severity=medium&amp;id=69ce82f2e6bfc5ba1de1d95d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31934-cwe-407-inefficient-algorithmic-com-b2d2eef9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31934%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20OISF%20suricata&amp;severity=high&amp;id=69ce82f2e6bfc5ba1de1d943</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5339-command-injection-in-tenda-g103-5eb39526</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5339%3A%20Command%20Injection%20in%20Tenda%20G103&amp;severity=medium&amp;id=69ce82f2e6bfc5ba1de1d94f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31933-cwe-407-inefficient-algorithmic-com-ddce571b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31933%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20OISF%20suricata&amp;severity=high&amp;id=69ce7bd9e6bfc5ba1ddfe6da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31932-cwe-407-inefficient-algorithmic-com-f6b065e8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31932%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20OISF%20suricata&amp;severity=high&amp;id=69ce7bd9e6bfc5ba1ddfe6d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26928-cwe-354-improper-validation-of-inte-78673667</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26928%3A%20CWE-354%20Improper%20Validation%20of%20Integrity%20Check%20Value%20in%20Krajowa%20Izba%20Rozliczeniowa%20SzafirHost&amp;severity=high&amp;id=69ce7bd9e6bfc5ba1ddfe6bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26927-cwe-348-use-of-less-trusted-source--37ed82cf</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26927%3A%20CWE-348%20Use%20of%20Less%20Trusted%20Source%20in%20Krajowa%20Izba%20Rozliczeniowa%20Szafir%20SDK%20Web&amp;severity=medium&amp;id=69ce7bd9e6bfc5ba1ddfe6b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31931-cwe-476-null-pointer-dereference-in-9e69cdc4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31931%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20OISF%20suricata&amp;severity=high&amp;id=69ce7bd9e6bfc5ba1ddfe6d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5338-command-injection-in-tenda-g103-b6ed48f6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5338%3A%20Command%20Injection%20in%20Tenda%20G103&amp;severity=medium&amp;id=69ce7bdce6bfc5ba1ddfe78c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30867-cwe-617-reachable-assertion-in-emqx-785033b8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30867%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20emqx%20CocoaMQTT&amp;severity=medium&amp;id=69ce7bd9e6bfc5ba1ddfe6cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35168-cwe-89-improper-neutralization-of-s-d5a2d66d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35168%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20devcode-it%20openstamanager&amp;severity=high&amp;id=69ce7bd9e6bfc5ba1ddfe6de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5334-sql-injection-in-itsourcecode-online-d20cf182</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5334%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Enrollment%20System&amp;severity=medium&amp;id=69ce7bd9e6bfc5ba1ddfe6e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28805-cwe-89-improper-neutralization-of-s-ce15ee60</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28805%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20devcode-it%20openstamanager&amp;severity=high&amp;id=69ce7bd9e6bfc5ba1ddfe6c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29782-cwe-502-deserialization-of-untruste-274e1222</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29782%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20devcode-it%20openstamanager&amp;severity=high&amp;id=69ce7bd9e6bfc5ba1ddfe6c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5333-command-injection-in-defaultfuction--b5a483d7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5333%3A%20Command%20Injection%20in%20DefaultFuction%20Content-Management-System&amp;severity=medium&amp;id=69ce74d2e6bfc5ba1ddd16c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2737-cwe-79-improper-neutralization-of-in-4a30897e</loc>
    <lastmod>2026-04-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2737%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Progress%20Software%20Flowmon&amp;severity=high&amp;id=69ce74d2e6bfc5ba1ddd16b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3692-cwe-78-improper-neutralization-of-sp-3f6ac794</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3692%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Progress%20Software%20Flowmon&amp;severity=high&amp;id=69ce74d2e6bfc5ba1ddd16bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5332-cross-site-scripting-in-xiaopi-panel-53e8a11b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5332%3A%20Cross%20Site%20Scripting%20in%20Xiaopi%20Panel&amp;severity=medium&amp;id=69ce74d2e6bfc5ba1ddd16bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2701-cwe-434-unrestricted-upload-of-file--41b41e42</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2701%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Progress%20ShareFile%20Storage%20Zones%20Controller&amp;severity=critical&amp;id=69ce74d2e6bfc5ba1ddd16b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2699-cwe-698-execution-after-redirect-ear-4b64a3dc</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2699%3A%20CWE-698%3A%20Execution%20After%20Redirect%20(EAR)%20in%20Progress%20ShareFile%20Storage%20Zones%20Controller&amp;severity=critical&amp;id=69ce74d2e6bfc5ba1ddd16b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5331-path-traversal-in-opencart-5c3ce989</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5331%3A%20Path%20Traversal%20in%20OpenCart&amp;severity=medium&amp;id=69ce6a44e6bfc5ba1dd993bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34890-cwe-79-improper-neutralization-of-i-c66c3461</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34890%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mark%20O%E2%80%99Donnell%20MSTW%20League%20Manager&amp;severity=medium&amp;id=69ce6a44e6bfc5ba1dd993a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5330-improper-access-controls-in-sourceco-8bbff6ea</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5330%3A%20Improper%20Access%20Controls%20in%20SourceCodester%20Best%20Courier%20Management%20System&amp;severity=medium&amp;id=69ce6a44e6bfc5ba1dd993b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4636-incorrect-behavior-order-authorizati-0cc8b635</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4636%3A%20Incorrect%20Behavior%20Order%3A%20Authorization%20Before%20Parsing%20and%20Canonicalization%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.2&amp;severity=high&amp;id=69ce6a44e6bfc5ba1dd993b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4634-excessive-platform-resource-consumpt-e63a2b27</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4634%3A%20Excessive%20Platform%20Resource%20Consumption%20within%20a%20Loop%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.2&amp;severity=high&amp;id=69ce6a44e6bfc5ba1dd993af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4325-improper-isolation-or-compartmentali-bba41b6c</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4325%3A%20Improper%20Isolation%20or%20Compartmentalization%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.2&amp;severity=medium&amp;id=69ce6a44e6bfc5ba1dd993ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4282-improper-isolation-or-compartmentali-80ba9520</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4282%3A%20Improper%20Isolation%20or%20Compartmentalization%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.2&amp;severity=high&amp;id=69ce6a44e6bfc5ba1dd993a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3872-url-redirection-to-untrusted-site-op-f57a586d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3872%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.2&amp;severity=high&amp;id=69ce6a44e6bfc5ba1dd993a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-patches-critical-and-high-severity-vulnerabi-87970731</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Patches%20Critical%20and%20High-Severity%20Vulnerabilities&amp;severity=critical&amp;id=69ce6339e6bfc5ba1dd727e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5328-sql-injection-in-shsuishang-modulith-d2e7674c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5328%3A%20SQL%20Injection%20in%20shsuishang%20modulithshop&amp;severity=medium&amp;id=69ce634be6bfc5ba1dd72c7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/250000-affected-by-data-breach-at-nacogdoches-memo-e5c6e74a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=250%2C000%20Affected%20by%20Data%20Breach%20at%20Nacogdoches%20Memorial%20Hospital&amp;severity=medium&amp;id=69ce5c31e6bfc5ba1dd4377d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5327-command-injection-in-efforthye-fast--2095b670</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5327%3A%20Command%20Injection%20in%20efforthye%20fast-filesystem-mcp&amp;severity=medium&amp;id=69ce5c3fe6bfc5ba1dd43aa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5326-authorization-bypass-in-sourcecodest-1e83e563</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5326%3A%20Authorization%20Bypass%20in%20SourceCodester%20Leave%20Application%20System&amp;severity=medium&amp;id=69ce4e22e6bfc5ba1dced15f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mercor-hit-by-litellm-supply-chain-attack-7b85edb5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mercor%20Hit%20by%20LiteLLM%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=69ce4a9ee6bfc5ba1dcd4fb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32145-cwe-770-allocation-of-resources-wit-10bb908a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32145%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20gleam-wisp%20wisp&amp;severity=high&amp;id=69ce471be6bfc5ba1dcbccc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sophisticated-crystalx-rat-emerges-1eb51c44</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sophisticated%20CrystalX%20RAT%20Emerges&amp;severity=medium&amp;id=69ce3c8de6bfc5ba1dc7d5b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5246-authorization-bypass-in-cesanta-mong-ae6eeaf9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5246%3A%20Authorization%20Bypass%20in%20Cesanta%20Mongoose&amp;severity=medium&amp;id=69ce3c9ae6bfc5ba1dc7d953</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5245-stack-based-buffer-overflow-in-cesan-37061058</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5245%3A%20Stack-based%20Buffer%20Overflow%20in%20Cesanta%20Mongoose&amp;severity=medium&amp;id=69ce82f2e6bfc5ba1de1d976</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33617-cwe-497-exposure-of-sensitive-syste-9798356f</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33617%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20MB%20connect%20line%20mbCONNECT24&amp;severity=medium&amp;id=69cec35ce6bfc5ba1dfb4d59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33616-cwe-89-improper-neutralization-of-s-b558174c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33616%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20MB%20connect%20line%20mbCONNECT24&amp;severity=high&amp;id=69ce74d2e6bfc5ba1ddd16d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33615-cwe-89-improper-neutralization-of-s-cc89f560</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33615%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20MB%20connect%20line%20mbCONNECT24&amp;severity=critical&amp;id=69ce82f2e6bfc5ba1de1d972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33614-cwe-89-improper-neutralization-of-s-efad6d82</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33614%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20MB%20connect%20line%20mbCONNECT24&amp;severity=high&amp;id=69ce74d2e6bfc5ba1ddd16d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33613-cwe-78-improper-neutralization-of-s-0a03d240</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33613%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20MB%20connect%20line%20mbCONNECT24&amp;severity=high&amp;id=69ce7bdce6bfc5ba1ddfe79e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29136-cwe-79-improper-neutralization-of-i-7ca90c9a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29136%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-Site%20Scripting&apos;)%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=medium&amp;id=69ce3203e6bfc5ba1dc418a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29139-cwe-288-authentication-bypass-using-94a56236</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29139%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=high&amp;id=69ce3203e6bfc5ba1dc418ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29144-cwe-20-improper-input-validation-in-ad573e10</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29144%3A%20CWE-20%20Improper%20Input%20Validation%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=high&amp;id=69ce3203e6bfc5ba1dc418ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29143-cwe-20-improper-input-validation-in-1fea5cad</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29143%3A%20CWE-20%20Improper%20Input%20Validation%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=high&amp;id=69ce3203e6bfc5ba1dc418b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0634-cwe-88-improper-neutralization-of-ar-70949bd3</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0634%3A%20CWE-88%20Improper%20neutralization%20of%20argument%20delimiters%20in%20a%20command%20(&apos;argument%20injection&apos;)%20in%20TECNO%20Mobile%20TECNO%20Pova7%20Pro%205G&amp;severity=high&amp;id=69ce3203e6bfc5ba1dc4189f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29138-cwe-90-improper-neutralization-of-s-69352f09</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29138%3A%20CWE-90%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20LDAP%20Query%20(&apos;LDAP%20Injection&apos;)%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=medium&amp;id=69ce3203e6bfc5ba1dc418ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29131-cwe-90-improper-neutralization-of-s-69785704</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29131%3A%20CWE-90%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20LDAP%20Query%20(&apos;LDAP%20Injection&apos;)%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=medium&amp;id=69ce3203e6bfc5ba1dc418a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29142-cwe-325-missing-cryptographic-step--10414bc1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29142%3A%20CWE-325%20Missing%20Cryptographic%20Step%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=medium&amp;id=69ce3203e6bfc5ba1dc418b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29137-cwe-20-improper-input-validation-in-7d8ef09b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29137%3A%20CWE-20%20Improper%20Input%20Validation%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=medium&amp;id=69ce3203e6bfc5ba1dc418a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29141-cwe-20-improper-input-validation-in-35e12996</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29141%3A%20CWE-20%20Improper%20Input%20Validation%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=high&amp;id=69ce3203e6bfc5ba1dc418b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29135-cwe-20-improper-input-validation-in-531384d3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29135%3A%20CWE-20%20Improper%20Input%20Validation%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=medium&amp;id=69ce2afae6bfc5ba1dc065e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29134-cwe-807-reliance-on-untrusted-input-0711a551</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29134%3A%20CWE-807%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=medium&amp;id=69ce2afae6bfc5ba1dc065e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29140-cwe-295-improper-certificate-valida-1bda9135</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29140%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=high&amp;id=69ce2afae6bfc5ba1dc065e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29133-cwe-20-improper-input-validation-in-6d190327</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29133%3A%20CWE-20%20Improper%20Input%20Validation%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=medium&amp;id=69ce2afae6bfc5ba1dc065e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29132-cwe-306-missing-authentication-for--afdaff4e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29132%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=medium&amp;id=69ce2afae6bfc5ba1dc065dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5244-heap-based-buffer-overflow-in-cesant-a31023f5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5244%3A%20Heap-based%20Buffer%20Overflow%20in%20Cesanta%20Mongoose&amp;severity=medium&amp;id=69ce74d2e6bfc5ba1ddd16d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5032-cwe-200-exposure-of-sensitive-inform-e8a1194d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5032%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20boldgrid%20W3%20Total%20Cache&amp;severity=high&amp;id=69ce206de6bfc5ba1dba1550</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0686-cwe-918-server-side-request-forgery--ae91b1ca</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0686%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20pfefferle%20Webmention&amp;severity=high&amp;id=69ce206de6bfc5ba1dba1543</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0688-cwe-918-server-side-request-forgery--d72e0c85</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0688%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20pfefferle%20Webmention&amp;severity=medium&amp;id=69ce206de6bfc5ba1dba154a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5325-cross-site-scripting-in-sourcecodest-0e3910bc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5325%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Simple%20Customer%20Relationship%20Management%20System&amp;severity=medium&amp;id=69ce1964e6bfc5ba1db608a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5323-server-side-request-forgery-in-priya-eb225e7e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5323%3A%20Server-Side%20Request%20Forgery%20in%20priyankark%20a11y-mcp&amp;severity=medium&amp;id=69ce125de6bfc5ba1db26106</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1540-cwe-94-improper-control-of-generatio-c59967f8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1540%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Spam%20Protect%20for%20Contact%20Form%207&amp;severity=high&amp;id=69ce74d2e6bfc5ba1ddd16cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5322-sql-injection-in-alejandroarciniegas-379e6975</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5322%3A%20SQL%20Injection%20in%20AlejandroArciniegas%20mcp-data-vis&amp;severity=medium&amp;id=69ce044ee6bfc5ba1dac2508</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4347-cwe-22-improper-limitation-of-a-path-17e5576b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4347%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20inc2734%20MW%20WP%20Form&amp;severity=high&amp;id=69ce044ee6bfc5ba1dac2503</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5321-permissive-cross-domain-policy-with--484deffd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5321%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20vanna-ai%20vanna&amp;severity=medium&amp;id=69cdf9c0e6bfc5ba1d93594a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5320-missing-authentication-in-vanna-ai-v-27b068c0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5320%3A%20Missing%20Authentication%20in%20vanna-ai%20vanna&amp;severity=medium&amp;id=69cdef39e6bfc5ba1d8a4eb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5319-cross-site-scripting-in-itsourcecode-b7657577</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5319%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20Payroll%20Management%20System&amp;severity=medium&amp;id=69cde4a8e6bfc5ba1d70ae32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5318-out-of-bounds-write-in-libraw-d90882c4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5318%3A%20Out-of-bounds%20Write%20in%20LibRaw&amp;severity=medium&amp;id=69cdd316e6bfc5ba1d496d13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5317-out-of-bounds-write-in-nothings-stb-3bd2dfb1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5317%3A%20Out-of-bounds%20Write%20in%20Nothings%20stb&amp;severity=medium&amp;id=69ce74d5e6bfc5ba1ddd1777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1243-vulnerability-in-ibm-content-navigat-a8af920e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1243%3A%20Vulnerability%20in%20IBM%20Content%20Navigator&amp;severity=medium&amp;id=69ce7bdce6bfc5ba1ddfe79b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5316-allocation-of-resources-in-nothings--e599e034</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5316%3A%20Allocation%20of%20Resources%20in%20Nothings%20stb&amp;severity=medium&amp;id=69cdb370e6bfc5ba1d0f636a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-03-8dc929ad</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-03&amp;severity=medium&amp;id=69d03bf90a160ebd92602460</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-04-02-5aedb171</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-04-02&amp;severity=medium&amp;id=69cfc4810a160ebd9223393f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-02-f161eb17</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-02&amp;severity=medium&amp;id=69cf04e8e6bfc5ba1d090aeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30252-na-03589a2b</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30252%3A%20n%2Fa&amp;severity=medium&amp;id=69cef3d9e6bfc5ba1d047235</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30251-na-e36bdc8d</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30251%3A%20n%2Fa&amp;severity=medium&amp;id=69cef356e6bfc5ba1d045060</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26895-na-47bf4a92</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26895%3A%20n%2Fa&amp;severity=medium&amp;id=69ceb836e6bfc5ba1df6ef62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30603-na-ae538424</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30603%3A%20n%2Fa&amp;severity=medium&amp;id=69ceb0a7e6bfc5ba1df381ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34877-na-4fa5c075</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34877%3A%20n%2Fa&amp;severity=critical&amp;id=69cea282e6bfc5ba1ded3a53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25212-na-87cac814</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25212%3A%20n%2Fa&amp;severity=critical&amp;id=69ce9803e6bfc5ba1dea5ac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30332-na-a0fa4c0e</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30332%3A%20n%2Fa&amp;severity=high&amp;id=69ce9471e6bfc5ba1de93467</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34876-na-d655599d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34876%3A%20n%2Fa&amp;severity=high&amp;id=69ce8d6ee6bfc5ba1de64e27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21767-cwe-306-missing-authentication-for--f30553f8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21767%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20HCLSoftware%20BigFix%20Platform&amp;severity=medium&amp;id=69cdb370e6bfc5ba1d0f6370</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21765-cwe-732-incorrect-permission-assign-d20224ef</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21765%3A%20CWE-732%20%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20HCLSoftware%20BigFix%20Platform&amp;severity=high&amp;id=69cdafeee6bfc5ba1d0e2130</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5315-out-of-bounds-read-in-nothings-stb-e375c1ac</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5315%3A%20Out-of-Bounds%20Read%20in%20Nothings%20stb&amp;severity=medium&amp;id=69cdac8de6bfc5ba1d0c8246</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66487-cwe-770-allocation-of-resources-wit-66913c96</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66487%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20IBM%20Aspera%20Shares&amp;severity=low&amp;id=69cda8e6e6bfc5ba1d0b5794</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66486-cwe-80-improper-neutralization-of-s-dec075eb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66486%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20IBM%20Aspera%20Shares&amp;severity=medium&amp;id=69cda8e6e6bfc5ba1d0b5791</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66485-cwe-644-improper-neutralization-of--f6e8158d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66485%3A%20CWE-644%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20IBM%20Aspera%20Shares&amp;severity=medium&amp;id=69cda8e6e6bfc5ba1d0b578e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32929-out-of-bounds-read-in-fuji-electric-599bf79b</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32929%3A%20Out-of-bounds%20Read%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20%2F%20Hakko%20Electronics%20Co.%2C%20Ltd.%20V-SFT&amp;severity=high&amp;id=69cda8e6e6bfc5ba1d0b57a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32928-stack-based-buffer-overflow-in-fuji-f84a5b5b</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32928%3A%20Stack-based%20buffer%20overflow%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20%2F%20Hakko%20Electronics%20Co.%2C%20Ltd.%20V-SFT&amp;severity=high&amp;id=69cda8e6e6bfc5ba1d0b57a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66484-vulnerability-in-ibm-aspera-shares-ad9e1822</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66484%3A%20Vulnerability%20in%20IBM%20Aspera%20Shares&amp;severity=medium&amp;id=69cda8e6e6bfc5ba1d0b578b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32927-out-of-bounds-read-in-fuji-electric-a25c3241</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32927%3A%20Out-of-bounds%20Read%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20%2F%20Hakko%20Electronics%20Co.%2C%20Ltd.%20V-SFT&amp;severity=high&amp;id=69cda8e6e6bfc5ba1d0b579f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32926-out-of-bounds-read-in-fuji-electric-9a1a91dd</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32926%3A%20Out-of-bounds%20Read%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20%2F%20Hakko%20Electronics%20Co.%2C%20Ltd.%20V-SFT&amp;severity=high&amp;id=69cda8e6e6bfc5ba1d0b579b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32925-stack-based-buffer-overflow-in-fuji-6dac82d2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32925%3A%20Stack-based%20buffer%20overflow%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20%2F%20Hakko%20Electronics%20Co.%2C%20Ltd.%20V-SFT&amp;severity=high&amp;id=69cda8e6e6bfc5ba1d0b5797</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66483-cwe-613-insufficient-session-expira-ee16a507</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66483%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20IBM%20Aspera%20Shares&amp;severity=medium&amp;id=69cda8e6e6bfc5ba1d0b5788</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36375-cwe-352-cross-site-request-forgery--28f4e6e3</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36375%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20IBM%20DataPower%20Gateway%2010.6CD&amp;severity=medium&amp;id=69cec35ce6bfc5ba1dfb4d5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5314-out-of-bounds-read-in-nothings-stb-bdde5681</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5314%3A%20Out-of-Bounds%20Read%20in%20Nothings%20stb&amp;severity=medium&amp;id=69cd9ad5e6bfc5ba1d063678</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34572-cwe-284-improper-access-control-in--63f77787</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34572%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20ci4-cms-erp%20ci4ms&amp;severity=high&amp;id=69cd93efe6bfc5ba1d0036ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3987-cwe-22-improper-limitation-of-a-path-318a1a63</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3987%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WatchGuard%20Fireware%20OS&amp;severity=high&amp;id=69cd93efe6bfc5ba1d0036f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34571-cwe-79-improper-neutralization-of-i-055c896a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34571%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=critical&amp;id=69cd93efe6bfc5ba1d0036ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34570-cwe-284-improper-access-control-in--917f2c32</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34570%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20ci4-cms-erp%20ci4ms&amp;severity=high&amp;id=69cd93ece6bfc5ba1d00363a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5313-denial-of-service-in-nothings-stb-3f5b6ef3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5313%3A%20Denial%20of%20Service%20in%20Nothings%20stb&amp;severity=medium&amp;id=69cd93efe6bfc5ba1d0036f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34569-cwe-79-improper-neutralization-of-i-ebe55431</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34569%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=critical&amp;id=69cd93ece6bfc5ba1d003636</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34568-cwe-79-improper-neutralization-of-i-ae5d4369</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34568%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=critical&amp;id=69cd93ece6bfc5ba1d003632</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34567-cwe-79-improper-neutralization-of-i-5c12fe3e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34567%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=critical&amp;id=69cd93ece6bfc5ba1d00362e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34566-cwe-79-improper-neutralization-of-i-937ed996</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34566%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=critical&amp;id=69cd93ece6bfc5ba1d00362a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34565-cwe-79-improper-neutralization-of-i-f662be7e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34565%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=critical&amp;id=69cd93ece6bfc5ba1d003626</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34564-cwe-79-improper-neutralization-of-i-8f6e6ad8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34564%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=critical&amp;id=69cd93ece6bfc5ba1d003621</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34563-cwe-79-improper-neutralization-of-i-e0cd90ea</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34563%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=critical&amp;id=69cd93ece6bfc5ba1d00361d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34562-cwe-79-improper-neutralization-of-i-b2a73cac</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34562%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=medium&amp;id=69cd93ece6bfc5ba1d003619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34561-cwe-79-improper-neutralization-of-i-b2df19ae</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34561%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=medium&amp;id=69cd93ece6bfc5ba1d003615</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34560-cwe-79-improper-neutralization-of-i-f9f46ebc</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34560%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=critical&amp;id=69ce7bdce6bfc5ba1ddfe7ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34559-cwe-79-improper-neutralization-of-i-7054532f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34559%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=critical&amp;id=69cec35ae6bfc5ba1dfb4d0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2475-cwe-601-url-redirection-to-untrusted-81d4cc07</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2475%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20IBM%20Verify%20Identity%20Access%20Container&amp;severity=low&amp;id=69cd8944e6bfc5ba1dfc32df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34543-cwe-908-use-of-uninitialized-resour-86e5cef9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34543%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20AcademySoftwareFoundation%20openexr&amp;severity=high&amp;id=69cd8944e6bfc5ba1dfc32ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34544-cwe-190-integer-overflow-or-wraparo-efaa8782</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34544%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20AcademySoftwareFoundation%20openexr&amp;severity=high&amp;id=69cd8944e6bfc5ba1dfc32ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4820-cwe-614-sensitive-cookie-in-https-se-fb43e146</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4820%3A%20CWE-614%20Sensitive%20Cookie%20in%20HTTPS%20Session%20Without%20&apos;Secure&apos;%20Attribute%20in%20IBM%20Maximo%20Application%20Suite&amp;severity=medium&amp;id=69cd8944e6bfc5ba1dfc32f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34545-cwe-122-heap-based-buffer-overflow--18796f81</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34545%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20AcademySoftwareFoundation%20openexr&amp;severity=high&amp;id=69cd8944e6bfc5ba1dfc32f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36373-cwe-497-exposure-of-sensitive-syste-8d6a2629</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36373%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20IBM%20DataPower%20Gateway%2010.6CD&amp;severity=medium&amp;id=69cd8944e6bfc5ba1dfc32d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13916-cwe-327-use-of-a-broken-or-risky-cr-094ead12</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13916%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20IBM%20Aspera%20Shares&amp;severity=medium&amp;id=69cd8944e6bfc5ba1dfc32d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1491-cwe-444-inconsistent-interpretation--f859d77e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1491%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20IBM%20Verify%20Identity%20Access%20Container&amp;severity=medium&amp;id=69cd8944e6bfc5ba1dfc32dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34531-cwe-287-improper-authentication-in--374da8b6</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34531%3A%20CWE-287%3A%20Improper%20Authentication%20in%20miguelgrinberg%20Flask-HTTPAuth&amp;severity=medium&amp;id=69cd8944e6bfc5ba1dfc32e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2862-cwe-444-inconsistent-interpretation--f24cc938</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2862%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20IBM%20Verify%20Identity%20Access%20Container&amp;severity=medium&amp;id=69cd8944e6bfc5ba1dfc32e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1345-cwe-78-improper-neutralization-of-sp-ed530469</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1345%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20IBM%20Verify%20Identity%20Access%20Container&amp;severity=high&amp;id=69cd85bee6bfc5ba1df9d438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4101-cwe-287-improper-authentication-in-i-7c1be3e5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4101%3A%20CWE-287%20Improper%20Authentication%20in%20IBM%20Verify%20Identity%20Access%20Container&amp;severity=high&amp;id=69cd85bee6bfc5ba1df9d44b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4364-cwe-79-improper-neutralization-of-in-1bd7f249</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4364%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Verify%20Identity%20Access%20Container&amp;severity=medium&amp;id=69cd85bee6bfc5ba1df9d44e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5312-improper-access-controls-in-d-link-d-cb27ea75</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5312%3A%20Improper%20Access%20Controls%20in%20D-Link%20DNS-120&amp;severity=medium&amp;id=69cd85bee6bfc5ba1df9d451</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34525-cwe-20-improper-input-validation-in-e9b20bba</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34525%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20aio-libs%20aiohttp&amp;severity=medium&amp;id=69cd85bee6bfc5ba1df9d445</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34520-cwe-113-improper-neutralization-of--111721c0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34520%3A%20CWE-113%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20in%20HTTP%20Headers%20(&apos;HTTP%20Request%2FResponse%20Splitting&apos;)%20in%20aio-libs%20aiohttp&amp;severity=low&amp;id=69cd85bee6bfc5ba1df9d440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34519-cwe-113-improper-neutralization-of--70b3077a</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34519%3A%20CWE-113%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20in%20HTTP%20Headers%20(&apos;HTTP%20Request%2FResponse%20Splitting&apos;)%20in%20aio-libs%20aiohttp&amp;severity=low&amp;id=69cd85bee6bfc5ba1df9d43b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34518-cwe-200-exposure-of-sensitive-infor-10190518</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34518%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20aio-libs%20aiohttp&amp;severity=low&amp;id=69ce7bdce6bfc5ba1ddfe7a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34517-cwe-770-allocation-of-resources-wit-505e0ade</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34517%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20aio-libs%20aiohttp&amp;severity=low&amp;id=69cec35ae6bfc5ba1dfb4d05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34516-cwe-770-allocation-of-resources-wit-8668224c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34516%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20aio-libs%20aiohttp&amp;severity=medium&amp;id=69cec35ce6bfc5ba1dfb4d65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34515-cwe-36-absolute-path-traversal-in-a-c7316820</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34515%3A%20CWE-36%3A%20Absolute%20Path%20Traversal%20in%20aio-libs%20aiohttp&amp;severity=medium&amp;id=69ce9471e6bfc5ba1de93472</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34514-cwe-113-improper-neutralization-of--4f1fe682</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34514%3A%20CWE-113%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20in%20HTTP%20Headers%20(&apos;HTTP%20Request%2FResponse%20Splitting&apos;)%20in%20aio-libs%20aiohttp&amp;severity=low&amp;id=69ce7bdce6bfc5ba1ddfe7a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-script-that-gets-rid-of-ads-wed-apr-1st-503f23d0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Script%20That%20Gets%20Rid%20of%20ADS%2C%20(Wed%2C%20Apr%201st)&amp;severity=medium&amp;id=69ccf91de6bfc5ba1dc22852</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22815-cwe-400-uncontrolled-resource-consu-c8acea99</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22815%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20aio-libs%20aiohttp&amp;severity=medium&amp;id=69cec35ce6bfc5ba1dfb4d60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34513-cwe-770-allocation-of-resources-wit-a8a2860e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34513%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20aio-libs%20aiohttp&amp;severity=low&amp;id=69cec35ae6bfc5ba1dfb4d00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34456-cwe-284-improper-access-control-in--99ed6793</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34456%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20reviactyl%20panel&amp;severity=critical&amp;id=69cd7b33e6bfc5ba1df4980f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34455-cwe-89-improper-neutralization-of-s-b655e030</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34455%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20HiEventsDev%20Hi.Events&amp;severity=high&amp;id=69cd7b33e6bfc5ba1df49809</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34750-cwe-22-improper-limitation-of-a-pat-b466bdec</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34750%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20payloadcms%20payload&amp;severity=medium&amp;id=69cd7b33e6bfc5ba1df49823</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34749-cwe-352-cross-site-request-forgery--8eac2e30</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34749%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20payloadcms%20payload&amp;severity=medium&amp;id=69cd7b33e6bfc5ba1df4981f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34748-cwe-79-improper-neutralization-of-i-edb944a9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34748%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20payloadcms%20payload&amp;severity=high&amp;id=69cd7b33e6bfc5ba1df4981c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34747-cwe-89-improper-neutralization-of-s-6146081e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34747%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20payloadcms%20payload&amp;severity=high&amp;id=69cd7b33e6bfc5ba1df49818</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5311-improper-access-controls-in-d-link-d-528d6a16</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5311%3A%20Improper%20Access%20Controls%20in%20D-Link%20DNS-120&amp;severity=medium&amp;id=69cd7b33e6bfc5ba1df49826</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34746-cwe-918-server-side-request-forgery-27aa2220</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34746%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20payloadcms%20payload&amp;severity=high&amp;id=69cd7b33e6bfc5ba1df49814</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stranger-strings-yurei-ransomware-operator-toolkit-b88717bf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Stranger%20Strings%3A%20Yurei%20Ransomware%20Operator%20Toolkit%20Exposed&amp;severity=medium&amp;id=69cd7428e6bfc5ba1def5b1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35000-cwe-184-incomplete-list-of-disallow-5d5e7007</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35000%3A%20CWE-184%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20dgtlmoon%20ChangeDetection.io&amp;severity=high&amp;id=69cd661ee6bfc5ba1de9caef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5199-cwe-639-authorization-bypass-through-f024480b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5199%3A%20CWE-639%20Authorization%20bypass%20through%20User-Controlled%20key%20in%20Temporal%20Technologies%2C%20Inc.%20temporal&amp;severity=low&amp;id=69cd5f13e6bfc5ba1de6e545</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34751-cwe-472-external-control-of-assumed-7a45aec3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34751%3A%20CWE-472%3A%20External%20Control%20of%20Assumed-Immutable%20Web%20Parameter%20in%20payloadcms%20payload&amp;severity=critical&amp;id=69cd5f13e6bfc5ba1de6e53d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34397-cwe-269-improper-privilege-manageme-ac0f8ecc</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34397%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20himmelblau-idm%20himmelblau&amp;severity=medium&amp;id=69cd7224e6bfc5ba1dee83e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34376-cwe-863-incorrect-authorization-in--58a5425c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34376%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20mrmn2%20PdfDing&amp;severity=high&amp;id=69cd5809e6bfc5ba1de493d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34236-cwe-331-insufficient-entropy-in-aut-5b5ef4db</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34236%3A%20CWE-331%3A%20Insufficient%20Entropy%20in%20auth0%20auth0-PHP&amp;severity=high&amp;id=69cd5809e6bfc5ba1de493cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34159-cwe-119-improper-restriction-of-ope-71d608e0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34159%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20ggml-org%20llama.cpp&amp;severity=critical&amp;id=69cd7224e6bfc5ba1dee83e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34076-cwe-918-server-side-request-forgery-66475961</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34076%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20clerk%20javascript&amp;severity=high&amp;id=69cd6623e6bfc5ba1de9cbea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34072-cwe-287-improper-authentication-in--c977ac52</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34072%3A%20CWE-287%3A%20Improper%20Authentication%20in%20fccview%20cronmaster&amp;severity=high&amp;id=69cd5f16e6bfc5ba1de6e60a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20090-improper-neutralization-of-input-du-c35f3078</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20090%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Enterprise%20NFV%20Infrastructure%20Software&amp;severity=medium&amp;id=69cd5f13e6bfc5ba1de6e552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20089-improper-neutralization-of-input-du-ca0d51f4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20089%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Enterprise%20NFV%20Infrastructure%20Software&amp;severity=medium&amp;id=69cd5f13e6bfc5ba1de6e54f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20087-improper-neutralization-of-input-du-35f27bdb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20087%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Enterprise%20NFV%20Infrastructure%20Software&amp;severity=medium&amp;id=69cd5f13e6bfc5ba1de6e549</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20088-improper-neutralization-of-input-du-02bcc2a1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20088%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Enterprise%20NFV%20Infrastructure%20Software&amp;severity=medium&amp;id=69cd5f13e6bfc5ba1de6e54c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5310-use-of-hard-coded-cryptographic-key--f3646b0c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5310%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Enter%20Software%20Iperius%20Backup&amp;severity=low&amp;id=69cd5f16e6bfc5ba1de6e60e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20160-exposure-of-resource-to-wrong-spher-3290e5d7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20160%3A%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20Cisco%20Cisco%20Smart%20Software%20Manager%20On-Prem&amp;severity=critical&amp;id=69cd6621e6bfc5ba1de9cb54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20174-improper-limitation-of-a-pathname-t-f29065ed</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20174%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Cisco%20Cisco%20Nexus%20Dashboard&amp;severity=medium&amp;id=69cd6621e6bfc5ba1de9cb57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20151-insertion-of-sensitive-information--d4761117</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20151%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Cisco%20Cisco%20Smart%20Software%20Manager%20On-Prem&amp;severity=high&amp;id=69cd6621e6bfc5ba1de9cb4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20155-missing-authorization-in-cisco-cisc-f689f549</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20155%3A%20Missing%20Authorization%20in%20Cisco%20Cisco%20Evolved%20Programmable%20Network%20Manager%20(EPNM)&amp;severity=high&amp;id=69cd6621e6bfc5ba1de9cb51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20096-improper-neutralization-of-special--255348b1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20096%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Cisco%20Cisco%20Enterprise%20NFV%20Infrastructure%20Software&amp;severity=medium&amp;id=69cd6621e6bfc5ba1de9cb48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20097-out-of-bounds-write-in-cisco-cisco--549f74cf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20097%3A%20Out-of-bounds%20Write%20in%20Cisco%20Cisco%20Unified%20Computing%20System%20(Standalone)&amp;severity=medium&amp;id=69cd6621e6bfc5ba1de9cb4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20094-improper-neutralization-of-special--15156e9c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20094%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Cisco%20Cisco%20Unified%20Computing%20System%20(Standalone)&amp;severity=high&amp;id=69cd661ee6bfc5ba1de9cb00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20095-improper-neutralization-of-special--1a61b766</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20095%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Cisco%20Cisco%20Enterprise%20NFV%20Infrastructure%20Software&amp;severity=medium&amp;id=69cd661ee6bfc5ba1de9cb03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20093-improper-input-validation-in-cisco--4922ce7a</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20093%3A%20Improper%20Input%20Validation%20in%20Cisco%20Cisco%20Enterprise%20NFV%20Infrastructure%20Software&amp;severity=critical&amp;id=69cd661ee6bfc5ba1de9cafd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20085-improper-neutralization-of-input-du-1da11352</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20085%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Enterprise%20NFV%20Infrastructure%20Software&amp;severity=medium&amp;id=69cd661ee6bfc5ba1de9cafa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20041-server-side-request-forgery-ssrf-in-eabba642</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20041%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Cisco%20Cisco%20Nexus%20Dashboard&amp;severity=medium&amp;id=69cd661ee6bfc5ba1de9caf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20042-improper-certificate-validation-in--1a05cd72</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20042%3A%20Improper%20Certificate%20Validation%20in%20Cisco%20Cisco%20Nexus%20Dashboard&amp;severity=medium&amp;id=69cd661ee6bfc5ba1de9caf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33990-cwe-918-server-side-request-forgery-02c9c2d8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33990%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20docker%20model-runner&amp;severity=medium&amp;id=69cd7224e6bfc5ba1dee83ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33978-cwe-79-improper-neutralization-of-i-39c40437</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33978%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20streetwriters%20notesnook&amp;severity=medium&amp;id=69cd7224e6bfc5ba1dee83ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35099-cwe-362-concurrent-execution-using--a2f5c300</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35099%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Lakeside%20Software%20SysTrack%20Agent&amp;severity=high&amp;id=69cd69c0e6bfc5ba1deb926c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/toy-giant-hasbro-hit-by-cyberattack-6970d5a3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Toy%20Giant%20Hasbro%20Hit%20by%20Cyberattack&amp;severity=medium&amp;id=69cd3be9e6bfc5ba1ddce51b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4989-cwe-918-server-side-request-forgery--2822c454</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4989%3A%20CWE-918%20Server-Side%20request%20forgery%20(SSRF)%20in%20Devolutions%20Server&amp;severity=medium&amp;id=69cd3867e6bfc5ba1ddc2e4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/crystalx-rat-a-trojan-for-pranks-remote-access-and-e7339edb</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CrystalX%20RAT%3A%20a%20Trojan%20for%20pranks%2C%20remote%20access%2C%20and%20cryptocurrency%20theft%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69cd34fae6bfc5ba1dda8bb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-deepload-malware-dropped-in-clickfix-attacks-bb581dea</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20DeepLoad%20Malware%20Dropped%20in%20ClickFix%20Attacks&amp;severity=medium&amp;id=69cd34e1e6bfc5ba1dda7e4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5175-cwe-862-in-devolutions-server-45e43dc2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5175%3A%20CWE-862%20in%20Devolutions%20Server&amp;severity=medium&amp;id=69cd3867e6bfc5ba1ddc2e52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4925-cwe-862-in-devolutions-server-8fd83451</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4925%3A%20CWE-862%20in%20Devolutions%20Server&amp;severity=medium&amp;id=69cd3867e6bfc5ba1ddc2e49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4927-cwe-201-insertion-of-sensitive-infor-7cf72305</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4927%3A%20CWE-201%20Insertion%20of%20sensitive%20information%20into%20sent%20data%20in%20Devolutions%20Server&amp;severity=medium&amp;id=69cd3867e6bfc5ba1ddc2e4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4924-cwe-1390-in-devolutions-server-d7d2eda8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4924%3A%20CWE-1390%20in%20Devolutions%20Server&amp;severity=high&amp;id=69cd3867e6bfc5ba1ddc2e45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4828-cwe-1390-in-devolutions-server-596962b9</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4828%3A%20CWE-1390%20in%20Devolutions%20Server&amp;severity=high&amp;id=69cd3867e6bfc5ba1ddc2e3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4829-cwe-287-in-devolutions-server-b2e61b41</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4829%3A%20CWE-287%20in%20Devolutions%20Server&amp;severity=medium&amp;id=69cd3867e6bfc5ba1ddc2e41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13535-cwe-79-improper-neutralization-of-i-e707a4a5</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13535%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kingaddons%20King%20Addons%20for%20Elementor%20%E2%80%93%2080%2B%20Elementor%20Widgets%2C%204%20000%2B%20Elementor%20Templates%2C%20WooCommerce%2C%20Mega%20Menu%2C%20Popup%20Builder&amp;severity=medium&amp;id=69cd74cfe6bfc5ba1df01051</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exploited-zero-day-among-21-vulnerabilities-patche-54fdc91f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exploited%20Zero-Day%20Among%2021%20Vulnerabilities%20Patched%20in%20Chrome&amp;severity=medium&amp;id=69cd2dd9e6bfc5ba1dd7270c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-warns-of-data-security-risks-from-china-made-m-6fc1b458</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20Warns%20of%20Data%20Security%20Risks%20From%20China-Made%20Mobile%20Apps&amp;severity=medium&amp;id=69cd26d2e6bfc5ba1dd450e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35094-expired-pointer-dereference-in-red--f22d2f86</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35094%3A%20Expired%20Pointer%20Dereference%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=low&amp;id=69cd26f5e6bfc5ba1dd45f44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35093-improper-control-of-generation-of-c-7b21388e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35093%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=69cd26f5e6bfc5ba1dd45f3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5271-vulnerability-in-python-software-fou-bed2426b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5271%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20pymanager&amp;severity=medium&amp;id=69cd26f5e6bfc5ba1dd45f49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34430-cwe-184-incomplete-list-of-disallow-3e65c84f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34430%3A%20CWE-184%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20Bytedance%20Inc.%20DeerFlow&amp;severity=high&amp;id=69cd26f5e6bfc5ba1dd45f34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34999-cwe-306-missing-authentication-for--59ead885</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34999%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Volcengine%20OpenViking&amp;severity=medium&amp;id=69cd26f5e6bfc5ba1dd45f39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-charges-uranium-crypto-exchange-hacker-59d7b087</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Charges%20Uranium%20Crypto%20Exchange%20Hacker&amp;severity=medium&amp;id=69cd1fc9e6bfc5ba1dd1955e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korea-nexus-threat-actor-compromises-widely--67b5ee00</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korea-Nexus%20Threat%20Actor%20Compromises%20Widely%20Used%20Axios%20NPM%20Package%20in%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=69cd70a4e6bfc5ba1ded84d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unpacking-augmented-marauders-multi-pronged-casban-0e495343</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unpacking%20Augmented%20Marauder%E2%80%99s%20Multi-Pronged%20Casbaneiro%20Campaigns&amp;severity=medium&amp;id=69cd3864e6bfc5ba1ddc2cfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-the-axios-supply-chain-compromise-one-rat-t-38259c89</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20the%20Axios%20supply%20chain%20compromise%20-%20one%20RAT%20to%20rule%20them%20all&amp;severity=medium&amp;id=69cd70a4e6bfc5ba1ded84c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35092-integer-overflow-or-wraparound-in-r-1580859a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35092%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=69cd1fdee6bfc5ba1dd19c10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35091-incorrect-check-of-function-return--9c3dab2b</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35091%3A%20Incorrect%20Check%20of%20Function%20Return%20Value%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=69cd1fdee6bfc5ba1dd19c0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/latest-xloader-obfuscation-methods-and-network-pro-08dbc5b8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Latest%20Xloader%20Obfuscation%20Methods%20and%20Network%20Protocol&amp;severity=medium&amp;id=69cd7428e6bfc5ba1def5b23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-inbox-to-intrusion-multistage-remcos-rat-and--59cdc1b2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Inbox%20to%20Intrusion%3A%20Multi%E2%80%91Stage%20Remcos%20RAT%20and%20C2%E2%80%91Delivered%20Payloads%20in%20Network&amp;severity=medium&amp;id=69cd3864e6bfc5ba1ddc2ceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/axios-front-end-library-npm-supply-chain-poisoning-9eef9940</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Axios%20Front-End%20Library%20npm%20Supply%20Chain%20Poisoning%20Alert&amp;severity=medium&amp;id=69cd34f2e6bfc5ba1dda89f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3877-cwe-79-improper-neutralization-of-in-2906697a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3877%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20VertiGIS%20VertiGIS%20FM&amp;severity=high&amp;id=69cd1fdee6bfc5ba1dd19c15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0522-cwe-610-externally-controlled-refere-a44134fc</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0522%3A%20CWE-610%20Externally%20Controlled%20Reference%20to%20a%20Resource%20in%20Another%20Sphere%20in%20VertiGIS%20VertiGIS%20FM&amp;severity=high&amp;id=69cd1fdee6bfc5ba1dd19c06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/teampcp-supply-chain-campaign-update-005-first-con-187893ea</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TeamPCP%20Supply%20Chain%20Campaign%3A%20Update%20005%20-%20First%20Confirmed%20Victim%20Disclosure%2C%20Post-Compromise%20Cloud%20Enumeration%20Documented%2C%20and%20Axios%20Attribution%20Narrows%2C%20(Wed%2C%20Apr%201st)&amp;severity=medium&amp;id=69cd1c4fe6bfc5ba1dcfe81a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22768-cwe-732-incorrect-permission-assign-6516d813</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22768%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Dell%20AppSync&amp;severity=high&amp;id=69cd11c0e6bfc5ba1dcba0c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22767-cwe-61-unix-symbolic-link-symlink-f-7f0a5250</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22767%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20Dell%20AppSync&amp;severity=high&amp;id=69cd11c0e6bfc5ba1dcba0c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25601-cwe-798-use-of-hard-coded-credentia-f6a1fb4a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25601%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20Metronik%20d.o.o.%20MEPIS%20RM&amp;severity=medium&amp;id=69cd7651e6bfc5ba1df0b2d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24096-cwe-280-improper-handling-of-insuff-7723b1ef</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24096%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=medium&amp;id=69ccf599e6bfc5ba1dc10444</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0932-cwe-918-server-side-request-forgery--a1ba07b0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0932%3A%20CWE-918%20Server-Side%20request%20forgery%20(SSRF)%20in%20M-Files%20Corporation%20M-Files%20Server&amp;severity=medium&amp;id=69ccf599e6bfc5ba1dc10440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1879-unrestricted-upload-in-harvard-unive-0364b373</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1879%3A%20Unrestricted%20Upload%20in%20Harvard%20University%20IQSS%20Dataverse&amp;severity=medium&amp;id=69ccee90e6bfc5ba1dbeb780</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53828-cwe-228-in-ericsson-packet-core-con-8d45fc72</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53828%3A%20CWE-228%20in%20Ericsson%20Packet%20Core%20Controller%20(PCC)&amp;severity=medium&amp;id=69ccee90e6bfc5ba1dbeb77c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21630-cwe-89-improper-neutralization-of-s-f9ffd8d6</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21630%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Joomla!%20Project%20Joomla!%20CMS&amp;severity=medium&amp;id=69cce78be6bfc5ba1dbc6714</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23898-cwe-73-destructive-file-deletion-an-4b16a48a</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23898%3A%20CWE-73%20Destructive%20File%20Deletion%20and%20Potential%20System%20Compromise%20in%20Joomla!%20Project%20Joomla!%20CMS&amp;severity=high&amp;id=69cce78be6bfc5ba1dbc671d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21629-cwe-284-improper-access-control-in--ffadd50c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21629%3A%20CWE-284%20Improper%20Access%20Control%20in%20Joomla!%20Project%20Joomla!%20CMS&amp;severity=medium&amp;id=69cce78be6bfc5ba1dbc670f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23899-cwe-284-improper-access-control-in--4257ef69</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23899%3A%20CWE-284%20Improper%20Access%20Control%20in%20Joomla!%20Project%20Joomla!%20CMS&amp;severity=high&amp;id=69cce78be6bfc5ba1dbc6720</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21631-cwe-79-improper-neutralization-of-i-92d153db</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21631%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Joomla!%20Project%20Joomla!%20CMS&amp;severity=medium&amp;id=69cce78be6bfc5ba1dbc6717</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21632-cwe-79-improper-neutralization-of-i-cb31d573</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21632%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Joomla!%20Project%20Joomla!%20CMS&amp;severity=medium&amp;id=69cce78be6bfc5ba1dbc671a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34889-cwe-79-improper-neutralization-of-i-fc72ebe4</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34889%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Brainstorm%20Force%20Ultimate%20Addons%20for%20WPBakery%20Page%20Builder&amp;severity=medium&amp;id=69cce0a2e6bfc5ba1db4f246</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/axios-npm-package-breached-in-north-korean-supply--46479264</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Axios%20NPM%20Package%20Breached%20in%20North%20Korean%20Supply%20Chain%20Attack&amp;severity=low&amp;id=69ccdcfde6bfc5ba1daf8eb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5261-unrestricted-upload-in-shandong-hote-e305c3a8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5261%3A%20Unrestricted%20Upload%20in%20Shandong%20Hoteam%20InforCenter%20PLM&amp;severity=medium&amp;id=69ccd979e6bfc5ba1dae0250</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4370-cwe-295-improper-certificate-validat-9bb2b3b6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4370%3A%20CWE-295%20Improper%20certificate%20validation%20in%20Canonical%20Juju&amp;severity=critical&amp;id=69ccd979e6bfc5ba1dae024d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-addresses-vertex-security-issues-after-rese-8ede5828</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Addresses%20Vertex%20Security%20Issues%20After%20Researchers%20Weaponize%20AI%20Agents&amp;severity=medium&amp;id=69ccceede6bfc5ba1da7e8d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28265-cwe-35-path-traversal-in-dell-power-95e5b4b4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28265%3A%20CWE-35%3A%20Path%20Traversal%20in%20Dell%20PowerStore&amp;severity=medium&amp;id=69ccd270e6bfc5ba1daa6537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5259-server-side-request-forgery-in-autoh-263f25bc</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5259%3A%20Server-Side%20Request%20Forgery%20in%20AutohomeCorp%20frostmourne&amp;severity=medium&amp;id=69ccd270e6bfc5ba1daa653a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27101-cwe-22-improper-limitation-of-a-pat-91a08efa</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27101%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20Path%20Traversal%20in%20Dell%20Secure%20Connect%20Gateway&amp;severity=medium&amp;id=69ccd270e6bfc5ba1daa6534</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5258-path-traversal-in-sanster-iopaint-674463db</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5258%3A%20Path%20Traversal%20in%20Sanster%20IOPaint&amp;severity=medium&amp;id=69cd74cfe6bfc5ba1df01078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-laughing-rat-crystalx-combines-spyware-stealer-a-5579cd12</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20laughing%20RAT%3A%20CrystalX%20combines%20spyware%3B%20stealer%3B%20and%20prankware%20features&amp;severity=medium&amp;id=69ccf214e6bfc5ba1dbff3a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5257-sql-injection-in-code-projects-simpl-d962b8c6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5257%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69ccb9d5e6bfc5ba1da0d491</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5256-sql-injection-in-code-projects-simpl-cd4b413e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5256%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69ccb9d5e6bfc5ba1da0d48a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2696-cwe-200-information-exposure-in-expo-c6c7420f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2696%3A%20CWE-200%20Information%20Exposure%20in%20Export%20All%20URLs&amp;severity=medium&amp;id=69ccb9d5e6bfc5ba1da0d487</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15484-cwe-287-improper-authentication-in--ce94ec07</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15484%3A%20CWE-287%20Improper%20Authentication%20in%20Order%20Notification%20for%20WooCommerce&amp;severity=critical&amp;id=69ccb9d5e6bfc5ba1da0d484</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5255-cross-site-scripting-in-code-project-b81dbea2</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5255%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69ccaf49e6bfc5ba1d9c9961</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5292-out-of-bounds-read-in-google-chrome-b15ff9cd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5292%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=high&amp;id=69cca4c4e6bfc5ba1d993171</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5291-inappropriate-implementation-in-goog-a4be30b8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5291%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=69cca4c4e6bfc5ba1d99316d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5290-use-after-free-in-google-chrome-83e792f4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5290%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=critical&amp;id=69cca4c2e6bfc5ba1d9930fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5289-use-after-free-in-google-chrome-b3278917</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5289%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=critical&amp;id=69cca4c2e6bfc5ba1d9930fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5288-use-after-free-in-google-chrome-8b1fddc3</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5288%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=critical&amp;id=69cca4c2e6bfc5ba1d9930f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5287-use-after-free-in-google-chrome-0142d8c0</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5287%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69cca4c2e6bfc5ba1d9930f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5273-use-after-free-in-google-chrome-9e1d72d0</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5273%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=medium&amp;id=69cca4c0e6bfc5ba1d993049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5286-use-after-free-in-google-chrome-34aabe80</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5286%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69cca4c2e6bfc5ba1d9930ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5285-use-after-free-in-google-chrome-1cf97b5a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5285%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69cca4c2e6bfc5ba1d9930e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5284-use-after-free-in-google-chrome-08b3d1bf</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5284%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69cca4c2e6bfc5ba1d9930e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5283-inappropriate-implementation-in-goog-8cbcc8fc</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5283%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=69cca4c2e6bfc5ba1d9930e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5272-heap-buffer-overflow-in-google-chrom-fc402e90</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5272%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69cca4c0e6bfc5ba1d993045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5282-out-of-bounds-read-in-google-chrome-c48d1b96</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5282%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=high&amp;id=69cca4c2e6bfc5ba1d9930dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5281-use-after-free-in-google-chrome-a3c95c50</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5281%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69cca4c2e6bfc5ba1d9930d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5280-use-after-free-in-google-chrome-f1defb35</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5280%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69cca4c0e6bfc5ba1d993065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5279-object-corruption-in-google-chrome-1e2351f0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5279%3A%20Object%20corruption%20in%20Google%20Chrome&amp;severity=high&amp;id=69cca4c0e6bfc5ba1d993061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5278-use-after-free-in-google-chrome-795bf565</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5278%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69cca4c0e6bfc5ba1d99305d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5277-integer-overflow-in-google-chrome-895e8161</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5277%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69cca4c0e6bfc5ba1d993059</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5276-insufficient-policy-enforcement-in-g-312e0a64</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5276%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=medium&amp;id=69cca4c0e6bfc5ba1d993055</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5275-heap-buffer-overflow-in-google-chrom-6d922d63</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5275%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69cca4c0e6bfc5ba1d993051</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5274-integer-overflow-in-google-chrome-7a8b6e09</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5274%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69cca4c0e6bfc5ba1d99304d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5254-cross-site-scripting-in-welovemedia--c4c3c5aa</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5254%3A%20Cross%20Site%20Scripting%20in%20welovemedia%20FFmate&amp;severity=medium&amp;id=69cca4c0e6bfc5ba1d99303e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5253-cross-site-scripting-in-bufanyun-hot-0cbc0137</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5253%3A%20Cross%20Site%20Scripting%20in%20bufanyun%20HotGo&amp;severity=medium&amp;id=69cc96ade6bfc5ba1d9413ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5252-cross-site-scripting-in-z-9527-admin-c0179b5d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5252%3A%20Cross%20Site%20Scripting%20in%20z-9527%20admin&amp;severity=medium&amp;id=69cc96ade6bfc5ba1d9413a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5251-dynamically-determined-object-attrib-a89ddae1</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5251%3A%20Dynamically-Determined%20Object%20Attributes%20in%20z-9527%20admin&amp;severity=medium&amp;id=69cc889de6bfc5ba1d8929e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3774-cwe-200-exposure-of-sensitive-inform-09cde688</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3774%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Editor&amp;severity=medium&amp;id=69cc7a8ee6bfc5ba1d854111</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3775-cwe-427-dll-hijacking-in-foxit-softw-ab6d3970</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3775%3A%20CWE-427%3A%20DLL%20Hijacking%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Editor&amp;severity=high&amp;id=69cc7a8ee6bfc5ba1d854114</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3776-cwe-476-null-pointer-dereference-in--9dd0d0dc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3776%3A%20CWE-476%20NULL%20pointer%20dereference%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Editor&amp;severity=medium&amp;id=69cc7a8ee6bfc5ba1d854117</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3780-cwe-426-untrusted-search-path-in-fox-e264b801</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3780%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=69cc7a8ee6bfc5ba1d854123</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3778-cwe-674-uncontrolled-recursion-in-fo-3d872c30</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3778%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Editor&amp;severity=medium&amp;id=69cc7a8ee6bfc5ba1d85411d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3779-cwe-416-use-after-free-in-foxit-soft-0f3310c5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3779%3A%20CWE-416%20Use%20after%20free%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Editor&amp;severity=high&amp;id=69cc7a8ee6bfc5ba1d854120</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3777-cwe-416-use-after-free-in-foxit-soft-29267dd3</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3777%3A%20CWE-416%20Use%20after%20free%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Editor&amp;severity=medium&amp;id=69cc7a8ee6bfc5ba1d85411a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4947-cwe-284-improper-access-control-in-f-dce1d63f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4947%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Foxit%20Software%20Inc.%20na1.foxitesign.foxit.com&amp;severity=high&amp;id=69cc7a8ee6bfc5ba1d85412d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5249-cross-site-scripting-in-gougucms-9a138dfd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5249%3A%20Cross%20Site%20Scripting%20in%20gougucms&amp;severity=medium&amp;id=69cc7a90e6bfc5ba1d854169</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3831-cwe-862-missing-authorization-in-crm-eaf2a059</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3831%3A%20CWE-862%20Missing%20Authorization%20in%20crmperks%20Database%20for%20Contact%20Form%207%2C%20WPforms%2C%20Elementor%20forms&amp;severity=medium&amp;id=69cc7a8ee6bfc5ba1d854126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4374-cwe-611-improper-restriction-of-xml--8bd180bb</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4374%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20RTI%20Connext%20Professional&amp;severity=high&amp;id=69cc7a8ee6bfc5ba1d85412a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2394-cwe-126-buffer-over-read-in-rti-conn-3e28938c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2394%3A%20CWE-126%20Buffer%20Over-read%20in%20RTI%20Connext%20Professional&amp;severity=medium&amp;id=69cc7001e6bfc5ba1d749755</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5248-dynamically-determined-object-attrib-f8b4af24</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5248%3A%20Dynamically-Determined%20Object%20Attributes%20in%20gougucms&amp;severity=medium&amp;id=69cc7001e6bfc5ba1d749758</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13855-cwe-89-improper-neutralization-of-s-df457862</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13855%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20IBM%20Storage%20Protect%20Server&amp;severity=high&amp;id=69cc7001e6bfc5ba1d749752</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34873-na-4c47360d</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34873%3A%20n%2Fa&amp;severity=critical&amp;id=69cec35ce6bfc5ba1dfb4d55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-01-7d540e8f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-01&amp;severity=medium&amp;id=69cdb368e6bfc5ba1d0f530e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66442-na-f8572be5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66442%3A%20n%2Fa&amp;severity=medium&amp;id=69cd77b1e6bfc5ba1df19f74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30291-na-ebb091ac</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30291%3A%20n%2Fa&amp;severity=high&amp;id=69cd74cfe6bfc5ba1df01063</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29598-na-2d280f25</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29598%3A%20n%2Fa&amp;severity=medium&amp;id=69cd74cfe6bfc5ba1df0105e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34872-na-52cdc6bd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34872%3A%20n%2Fa&amp;severity=critical&amp;id=69cd74cfe6bfc5ba1df0104d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67807-na-3cdb3a2c</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67807%3A%20n%2Fa&amp;severity=medium&amp;id=69cd7413e6bfc5ba1def511f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43028-na-a438d685</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43028%3A%20n%2Fa&amp;severity=critical&amp;id=69cd7224e6bfc5ba1dee83f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40489-na-a97611df</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40489%3A%20n%2Fa&amp;severity=critical&amp;id=69cd7224e6bfc5ba1dee83f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34871-na-0e98fe73</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34871%3A%20n%2Fa&amp;severity=medium&amp;id=69cd69c0e6bfc5ba1deb9268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31027-na-43cb3480</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31027%3A%20n%2Fa&amp;severity=critical&amp;id=69cd6621e6bfc5ba1de9cb68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30643-na-324a0dae</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30643%3A%20n%2Fa&amp;severity=critical&amp;id=69cd6621e6bfc5ba1de9cb64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30292-na-9c827e2f</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30292%3A%20n%2Fa&amp;severity=high&amp;id=69cd6621e6bfc5ba1de9cb5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30273-na-53a2c388</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30273%3A%20n%2Fa&amp;severity=high&amp;id=69cd6621e6bfc5ba1de9cb5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34874-na-20e195fa</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34874%3A%20n%2Fa&amp;severity=high&amp;id=69cd661ee6bfc5ba1de9caeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25835-na-c7115649</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25835%3A%20n%2Fa&amp;severity=high&amp;id=69cd661ee6bfc5ba1de9cae7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25833-na-39fc498d</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25833%3A%20n%2Fa&amp;severity=high&amp;id=69cd661ee6bfc5ba1de9cae3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30573-na-074185c8</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30573%3A%20n%2Fa&amp;severity=high&amp;id=69cd5f13e6bfc5ba1de6e558</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30523-na-e91f0ac3</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30523%3A%20n%2Fa&amp;severity=medium&amp;id=69cd5f13e6bfc5ba1de6e555</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34875-na-87e74112</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34875%3A%20n%2Fa&amp;severity=critical&amp;id=69cd5f13e6bfc5ba1de6e541</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25834-na-b6e432ef</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25834%3A%20n%2Fa&amp;severity=medium&amp;id=69cd5f13e6bfc5ba1de6e539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30526-na-bfd1e890</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30526%3A%20n%2Fa&amp;severity=medium&amp;id=69cd3867e6bfc5ba1ddc2e55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67806-na-fbbc0c48</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67806%3A%20n%2Fa&amp;severity=low&amp;id=69cd3867e6bfc5ba1ddc2e38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67805-na-26c76182</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67805%3A%20n%2Fa&amp;severity=medium&amp;id=69cd3867e6bfc5ba1ddc2e34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30522-na-da16853b</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30522%3A%20n%2Fa&amp;severity=medium&amp;id=69cd26f5e6bfc5ba1dd45f31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30289-na-3270a501</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30289%3A%20n%2Fa&amp;severity=high&amp;id=69cd26f5e6bfc5ba1dd45f2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30287-na-8263b233</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30287%3A%20n%2Fa&amp;severity=high&amp;id=69cd26f5e6bfc5ba1dd45f25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5240-cross-site-scripting-in-code-project-c4b471da</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5240%3A%20Cross%20Site%20Scripting%20in%20code-projects%20BloodBank%20Managing%20System&amp;severity=medium&amp;id=69cc5e6ee6bfc5ba1d4effb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5238-sql-injection-in-itsourcecode-payrol-9ef6c417</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5238%3A%20SQL%20Injection%20in%20itsourcecode%20Payroll%20Management%20System&amp;severity=medium&amp;id=69cc5e6ee6bfc5ba1d4effaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4668-cwe-89-improper-neutralization-of-sp-1cc6ecba</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4668%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ameliabooking%20Booking%20for%20Appointments%20and%20Events%20Calendar%20%E2%80%93%20Amelia&amp;severity=medium&amp;id=69cc5aeae6bfc5ba1d4dd37c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5237-sql-injection-in-itsourcecode-payrol-8d912d8a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5237%3A%20SQL%20Injection%20in%20itsourcecode%20Payroll%20Management%20System&amp;severity=medium&amp;id=69cd1fdee6bfc5ba1dd19c25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5236-heap-based-buffer-overflow-in-axioma-029b3e7d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5236%3A%20Heap-based%20Buffer%20Overflow%20in%20Axiomatic%20Bento4&amp;severity=medium&amp;id=69cd7651e6bfc5ba1df0b2e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2480-cwe-79-improper-neutralization-of-in-6b3f465a</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2480%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gn_themes%20WP%20Shortcodes%20Plugin%20%E2%80%94%20Shortcodes%20Ultimate&amp;severity=medium&amp;id=69cd7410e6bfc5ba1def5047</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34556-cwe-125-out-of-bounds-read-in-inter-6e7c0da0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34556%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cd74cfe6bfc5ba1df01073</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34555-cwe-121-stack-based-buffer-overflow-c10bc34d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34555%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cd1fdee6bfc5ba1dd19c1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34554-cwe-125-out-of-bounds-read-in-inter-aafb7891</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34554%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cd7413e6bfc5ba1def511a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34553-cwe-562-return-of-stack-variable-ad-2c16da57</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34553%3A%20CWE-562%3A%20Return%20of%20Stack%20Variable%20Address%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cd7651e6bfc5ba1df0b2fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34552-cwe-476-null-pointer-dereference-in-4bc7aebe</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34552%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cd74cfe6bfc5ba1df0106e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5235-heap-based-buffer-overflow-in-axioma-070dd75a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5235%3A%20Heap-based%20Buffer%20Overflow%20in%20Axiomatic%20Bento4&amp;severity=medium&amp;id=69cd11c0e6bfc5ba1dcba0cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34551-cwe-476-null-pointer-dereference-in-6e2f2b29</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34551%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cd1fdee6bfc5ba1dd19c18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34550-cwe-681-incorrect-conversion-betwee-7e7c75d5</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34550%3A%20CWE-681%3A%20Incorrect%20Conversion%20between%20Numeric%20Types%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cd7410e6bfc5ba1def5052</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34549-cwe-758-reliance-on-undefined-unspe-a6e68408</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34549%3A%20CWE-758%3A%20Reliance%20on%20Undefined%2C%20Unspecified%2C%20or%20Implementation-Defined%20Behavior%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cd7651e6bfc5ba1df0b2f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34548-cwe-681-incorrect-conversion-betwee-65343c71</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34548%3A%20CWE-681%3A%20Incorrect%20Conversion%20between%20Numeric%20Types%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cd74cfe6bfc5ba1df01069</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34547-cwe-758-reliance-on-undefined-unspe-51bc6a5b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34547%3A%20CWE-758%3A%20Reliance%20on%20Undefined%2C%20Unspecified%2C%20or%20Implementation-Defined%20Behavior%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cd26f8e6bfc5ba1dd46493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34546-cwe-369-divide-by-zero-in-internati-ab0b32a6</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34546%3A%20CWE-369%3A%20Divide%20By%20Zero%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cd7410e6bfc5ba1def504d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34542-cwe-121-stack-based-buffer-overflow-3dc3f0d3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34542%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cc45d1e6bfc5ba1d47e0f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34541-cwe-476-null-pointer-dereference-in-97376314</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34541%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cc45d1e6bfc5ba1d47e0f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34540-cwe-122-heap-based-buffer-overflow--6ae50b02</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34540%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cc45d1e6bfc5ba1d47e0ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34539-cwe-122-heap-based-buffer-overflow--a5ea5a6b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34539%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cc45d1e6bfc5ba1d47e0e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34537-cwe-758-reliance-on-undefined-unspe-8300a004</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34537%3A%20CWE-758%3A%20Reliance%20on%20Undefined%2C%20Unspecified%2C%20or%20Implementation-Defined%20Behavior%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cc45d1e6bfc5ba1d47e0e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34536-cwe-674-uncontrolled-recursion-in-i-aa01237b</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34536%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cc45d1e6bfc5ba1d47e0cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34535-cwe-122-heap-based-buffer-overflow--68816653</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34535%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cc45d1e6bfc5ba1d47e0c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34534-cwe-122-heap-based-buffer-overflow--984e044e</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34534%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cc45d1e6bfc5ba1d47e0c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34533-cwe-758-reliance-on-undefined-unspe-384b4f8b</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34533%3A%20CWE-758%3A%20Reliance%20on%20Undefined%2C%20Unspecified%2C%20or%20Implementation-Defined%20Behavior%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cc45d1e6bfc5ba1d47e0bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34605-cwe-79-improper-neutralization-of-i-fae01986</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34605%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=69cc424fe6bfc5ba1d44f4c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34585-cwe-79-improper-neutralization-of-i-e55ddbb4</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34585%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=69cc424fe6bfc5ba1d44f4c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34449-cwe-942-permissive-cross-domain-pol-0cb7b35e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34449%3A%20CWE-942%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20siyuan-note%20siyuan&amp;severity=critical&amp;id=69cc424fe6bfc5ba1d44f4aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34448-cwe-79-improper-neutralization-of-i-36bc82a3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34448%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=critical&amp;id=69cc424fe6bfc5ba1d44f4a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34453-cwe-863-incorrect-authorization-in--a00bf5be</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34453%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=69cc424fe6bfc5ba1d44f4be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34451-cwe-22-improper-limitation-of-a-pat-34e7a1b6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34451%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20anthropics%20anthropic-sdk-typescript&amp;severity=medium&amp;id=69cc424fe6bfc5ba1d44f4b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34450-cwe-276-incorrect-default-permissio-e2dd2ab0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34450%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20anthropics%20anthropic-sdk-python&amp;severity=medium&amp;id=69cc424fe6bfc5ba1d44f4af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34452-cwe-59-improper-link-resolution-bef-645fcbd8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34452%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20anthropics%20anthropic-sdk-python&amp;severity=medium&amp;id=69cc424fe6bfc5ba1d44f4b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34442-cwe-20-improper-input-validation-in-98638d4f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34442%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=69cc3ec9e6bfc5ba1d43dab3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34443-cwe-918-server-side-request-forgery-82314a2d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34443%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=69cc3ec9e6bfc5ba1d43dab8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34441-cwe-444-inconsistent-interpretation-822278a8</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34441%3A%20CWE-444%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20yhirose%20cpp-httplib&amp;severity=medium&amp;id=69cc3ec9e6bfc5ba1d43daaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34405-cwe-79-improper-neutralization-of-i-b15ea7cf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34405%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nuxt-modules%20og-image&amp;severity=medium&amp;id=69cc3ec9e6bfc5ba1d43daab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34404-cwe-400-uncontrolled-resource-consu-46d515e7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34404%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20nuxt-modules%20og-image&amp;severity=medium&amp;id=69cc3ec9e6bfc5ba1d43daa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5215-improper-access-controls-in-d-link-d-79f88c69</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5215%3A%20Improper%20Access%20Controls%20in%20D-Link%20DNS-120&amp;severity=medium&amp;id=69cc3b45e6bfc5ba1d430caa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5214-stack-based-buffer-overflow-in-d-lin-fc01fc98</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5214%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DNS-120&amp;severity=high&amp;id=69cc3b45e6bfc5ba1d430ca3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34401-cwe-611-improper-restriction-of-xml-a60b8584</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34401%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20microsoft%20XmlNotepad&amp;severity=medium&amp;id=69cc3b45e6bfc5ba1d430c9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34740-cwe-918-server-side-request-forgery-237de682</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34740%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69cc37c3e6bfc5ba1d418a5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34739-cwe-79-improper-neutralization-of-i-3c670ea4</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34739%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69cc37c1e6bfc5ba1d418a10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34738-cwe-285-improper-authorization-in-w-0862147d</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34738%3A%20CWE-285%3A%20Improper%20Authorization%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69cc37c1e6bfc5ba1d418a0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34737-cwe-862-missing-authorization-in-ww-4c620e5a</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34737%3A%20CWE-862%3A%20Missing%20Authorization%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69cc37c1e6bfc5ba1d418a0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34733-cwe-284-improper-access-control-in--135c5460</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34733%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69cc37c1e6bfc5ba1d418a07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34732-cwe-306-missing-authentication-for--f0ad5c69</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34732%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69cc37c1e6bfc5ba1d418a04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34731-cwe-306-missing-authentication-for--e79ff8e1</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34731%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69cc37c1e6bfc5ba1d418a01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34716-cwe-79-improper-neutralization-of-i-9ebc5823</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34716%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69cc37c1e6bfc5ba1d4189fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34613-cwe-352-cross-site-request-forgery--11c5e554</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34613%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69cc37c1e6bfc5ba1d4189fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34611-cwe-352-cross-site-request-forgery--4e180877</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34611%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69cc37c1e6bfc5ba1d4189f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34396-cwe-79-improper-neutralization-of-i-d8a298c2</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34396%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69cc37c1e6bfc5ba1d4189f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34394-cwe-352-cross-site-request-forgery--35460bbd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34394%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69cc343ee6bfc5ba1d4033d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34395-cwe-862-missing-authorization-in-ww-1d4fc49d</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34395%3A%20CWE-862%3A%20Missing%20Authorization%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69cc343ee6bfc5ba1d4033d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34586-cwe-863-incorrect-authorization-in--54e3e32d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34586%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20mrmn2%20PdfDing&amp;severity=medium&amp;id=69cc343ee6bfc5ba1d4033d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1579-cwe-306-in-px4-autopilot-77f763f3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1579%3A%20CWE-306%20in%20PX4%20Autopilot&amp;severity=critical&amp;id=69cc2d39e6bfc5ba1d3ba360</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3470-cwe-20-improper-input-validation-in--65b0c784</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3470%3A%20CWE-20%20Improper%20input%20validation%20in%20SonicWall%20Email%20Security&amp;severity=low&amp;id=69cc2d39e6bfc5ba1d3ba36c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3469-cwe-20-improper-input-validation-in--eaa3f9df</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3469%3A%20CWE-20%20Improper%20input%20validation%20in%20SonicWall%20Email%20Security&amp;severity=low&amp;id=69cc2d39e6bfc5ba1d3ba369</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3468-cwe-79-improper-neutralization-of-in-b52440e6</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3468%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SonicWall%20Email%20Security&amp;severity=medium&amp;id=69cc2d39e6bfc5ba1d3ba366</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5213-stack-based-buffer-overflow-in-d-lin-5302c1ec</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5213%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DNS-120&amp;severity=high&amp;id=69cc2d39e6bfc5ba1d3ba377</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5212-stack-based-buffer-overflow-in-d-lin-c2d1e0da</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5212%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DNS-120&amp;severity=high&amp;id=69cc2d39e6bfc5ba1d3ba36f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34784-cwe-285-improper-authorization-in-p-66d533fa</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34784%3A%20CWE-285%3A%20Improper%20Authorization%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69cc2635e6bfc5ba1d366733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34215-cwe-200-exposure-of-sensitive-infor-5ac81827</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34215%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69cc2635e6bfc5ba1d36672c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34206-cwe-79-improper-neutralization-of-i-ce9b1789</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34206%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20libops%20captcha-protect&amp;severity=medium&amp;id=69cc2635e6bfc5ba1d366727</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5211-stack-based-buffer-overflow-in-d-lin-71b7c6f6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5211%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DNS-120&amp;severity=high&amp;id=69cc2635e6bfc5ba1d36673a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3356-cwe-306-missing-authentication-for-c-80869dad</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3356%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20Anritsu%20Remote%20Spectrum%20Monitor%20MS27100A&amp;severity=critical&amp;id=69cc1babe6bfc5ba1d32cc1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5210-file-inclusion-in-sourcecodester-lea-7ae37a06</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5210%3A%20File%20Inclusion%20in%20SourceCodester%20Leave%20Application%20System&amp;severity=medium&amp;id=69cc149be6bfc5ba1d3026d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5209-cross-site-scripting-in-sourcecodest-a847cd41</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5209%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Leave%20Application%20System&amp;severity=medium&amp;id=69cc149be6bfc5ba1d3026cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62184-cwe-79-improper-neutralization-of-i-9654bd5d</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62184%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pegasystems%20Pega%20Infinity&amp;severity=medium&amp;id=69cc1babe6bfc5ba1d32cc1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5206-sql-injection-in-code-projects-simpl-4acdb68f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5206%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Gym%20Management%20System&amp;severity=medium&amp;id=69cc0a0fe6bfc5ba1d2cf77e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2123-cwe-280-improper-handling-of-insuffi-ea54619e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2123%3A%20CWE-280%20Improper%20handling%20of%20insufficient%20permissions%20or%20privileges%20in%20OpenText%20Operations%20Agent&amp;severity=high&amp;id=69cc068ae6bfc5ba1d2beed1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5190-cwe-787-out-of-bounds-write-in-aws-a-7d1c9bb7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5190%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20AWS%20aws-c-event-stream&amp;severity=high&amp;id=69cc068ae6bfc5ba1d2beeed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32725-cwe-23-relative-path-traversal-in-s-31b04076</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32725%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20scitokens%20scitokens-cpp&amp;severity=high&amp;id=69cc068ae6bfc5ba1d2beee5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32726-cwe-863-incorrect-authorization-in--de3b423f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32726%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20scitokens%20scitokens-cpp&amp;severity=high&amp;id=69cc068ae6bfc5ba1d2beee9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34361-cwe-552-files-or-directories-access-66cb8838</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34361%3A%20CWE-552%3A%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20hapifhir%20org.hl7.fhir.core&amp;severity=critical&amp;id=69cbff80e6bfc5ba1d29f7c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34360-cwe-918-server-side-request-forgery-5862110a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34360%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20hapifhir%20org.hl7.fhir.core&amp;severity=medium&amp;id=69cbff80e6bfc5ba1d29f7c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34359-cwe-346-origin-validation-error-in--7ddd6ff0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34359%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20hapifhir%20org.hl7.fhir.core&amp;severity=high&amp;id=69cbff80e6bfc5ba1d29f7bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/whatsapp-malware-campaign-delivers-vbscript-and-ms-ae2a5fd4</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WhatsApp%20malware%20campaign%20delivers%20VBScript%20and%20MSI%20backdoors&amp;severity=medium&amp;id=69cc1498e6bfc5ba1d3022ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/supply-chain-compromise-of-axios-npm-package-c65fd242</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Supply-Chain%20Compromise%20of%20axios%20npm%20Package&amp;severity=medium&amp;id=69cc1498e6bfc5ba1d3022df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5205-server-side-request-forgery-in-chatw-40f6084d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5205%3A%20Server-Side%20Request%20Forgery%20in%20chatwoot&amp;severity=medium&amp;id=69cbf879e6bfc5ba1d2801af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24165-cwe-502-deserialization-of-untruste-abf108db</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24165%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20BioNeMo%20Framework&amp;severity=high&amp;id=69cbf879e6bfc5ba1d2801aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24164-cwe-502-deserialization-of-untruste-8f050d1b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24164%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20BioNeMo%20Framework&amp;severity=high&amp;id=69cbf879e6bfc5ba1d2801a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24154-cwe-78-improper-neutralization-of-s-e4e69e90</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24154%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20NVIDIA%20Jetson%20Xavier%20Series%2C%20Jetson%20Orin%20Series%20and%20Jetson%20Thor&amp;severity=high&amp;id=69cbf879e6bfc5ba1d2801a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24153-cwe-501-trust-boundary-violation-in-e7a82e21</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24153%3A%20CWE-501%20Trust%20Boundary%20Violation%20in%20NVIDIA%20Jetson%20Xavier%20Series%2C%20Jetson%20Orin%20Series%20and%20Jetson%20Thor&amp;severity=medium&amp;id=69cbf879e6bfc5ba1d28019b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24148-cwe-1188-initialization-of-a-resour-b1f9912a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24148%3A%20CWE-1188%20Initialization%20of%20a%20Resource%20with%20an%20Insecure%20Default%20in%20NVIDIA%20Jetson%20Xavier%20Series%20and%20Jetson%20Orin%20Series&amp;severity=high&amp;id=69cbf879e6bfc5ba1d280196</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-widespread-eviltokens-kit-device-code-phishing-38053c6e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20widespread%20EvilTokens%20kit%3A%20device%20code%20phishing%20as-a-service&amp;severity=medium&amp;id=69cc1498e6bfc5ba1d3022bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phantom-footprints-tracking-ghostsocks-malware-88b2ff6b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phantom%20Footprints%3A%20Tracking%20GhostSocks%20Malware&amp;severity=medium&amp;id=69cc181be6bfc5ba1d31dd3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/crysome-rat-an-advanced-persistent-net-remote-acce-50137084</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CrySome%20RAT%20%3A%20An%20Advanced%20Persistent%20.NET%20Remote%20Access%20Trojan&amp;severity=medium&amp;id=69cc181be6bfc5ba1d31dd33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/one-click-away-inside-a-linkedin-phishing-attack-fb385e9c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=One%20Click%20Away%3A%20Inside%20a%20LinkedIn%20Phishing%20Attack&amp;severity=medium&amp;id=69cc181be6bfc5ba1d31dd2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ringing-in-chaos-how-teampcp-weaponized-the-telnyx-877e2dda</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ringing%20in%20Chaos%3A%20How%20TeamPCP%20Weaponized%20the%20Telnyx%20Python%20SDK&amp;severity=medium&amp;id=69d636951cc7ad14da612bca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5087-cwe-338-use-of-cryptographically-wea-f1ae242d</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5087%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20in%20JJNAPIORK%20PAGI%3A%3AMiddleware%3A%3ASession%3A%3AStore%3A%3ACookie&amp;severity=high&amp;id=69cbf4f5e6bfc5ba1d2745d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34243-cwe-77-improper-neutralization-of-s-be7fa18e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34243%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20njzjz%20wenxian&amp;severity=critical&amp;id=69cbf4f5e6bfc5ba1d2745cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34219-cwe-190-integer-overflow-or-wraparo-4cd76bc0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34219%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20libp2p%20rust-libp2p&amp;severity=high&amp;id=69cbf4f5e6bfc5ba1d2745ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5204-stack-based-buffer-overflow-in-tenda-1d07a571</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5204%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=69cbedf2e6bfc5ba1d248110</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5203-path-traversal-in-cms-made-simple-8956ef9c</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5203%3A%20Path%20Traversal%20in%20CMS%20Made%20Simple&amp;severity=medium&amp;id=69cbedf2e6bfc5ba1d24810a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34240-cwe-347-improper-verification-of-cr-4aef725b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34240%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20appsup-dart%20jose&amp;severity=high&amp;id=69cbedf2e6bfc5ba1d248106</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34237-cwe-942-permissive-cross-domain-pol-df6035ea</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34237%3A%20CWE-942%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20modelcontextprotocol%20java-sdk&amp;severity=medium&amp;id=69cbedf2e6bfc5ba1d248101</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34235-cwe-125-out-of-bounds-read-in-pjsip-64e6e86d</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34235%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20pjsip%20pjproject&amp;severity=medium&amp;id=69cbedf2e6bfc5ba1d2480fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-next-cybersecurity-crisis-isnt-breachesits-dat-617ce088</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Next%20Cybersecurity%20Crisis%20Isn%E2%80%99t%20Breaches%E2%80%94It%E2%80%99s%20Data%20You%20Can%E2%80%99t%20Trust&amp;severity=medium&amp;id=69cbea6ae6bfc5ba1d226c08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34231-cwe-79-improper-neutralization-of-i-a3811ee5</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34231%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mixxorz%20slippers&amp;severity=medium&amp;id=69cbedf2e6bfc5ba1d2480f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22561-vulnerability-in-anthropic-claude-d-f8757e77</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22561%3A%20Vulnerability%20in%20Anthropic%20Claude%20Desktop%20-%20Windows&amp;severity=medium&amp;id=69cbedf2e6bfc5ba1d2480e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34227-cwe-306-missing-authentication-for--8ac78b6f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34227%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20BishopFox%20sliver&amp;severity=medium&amp;id=69cbedf2e6bfc5ba1d2480f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34218-cwe-269-improper-privilege-manageme-5469040d</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34218%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20craigjbass%20clearancekit&amp;severity=medium&amp;id=69cbe700e6bfc5ba1d219514</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34595-cwe-843-access-of-resource-using-in-a99e068c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34595%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69cbe700e6bfc5ba1d219527</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34574-cwe-697-incorrect-comparison-in-par-52fbaa27</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34574%3A%20CWE-697%3A%20Incorrect%20Comparison%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69cbe700e6bfc5ba1d219520</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34573-cwe-407-inefficient-algorithmic-com-0c0c9664</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34573%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69cbe700e6bfc5ba1d219519</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stolen-logins-are-fueling-everything-from-ransomwa-1ac187c2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Stolen%20Logins%20Are%20Fueling%20Everything%20From%20Ransomware%20to%20Nation-State%20Cyberattacks&amp;severity=medium&amp;id=69cbe361e6bfc5ba1d2085e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4819-cwe-532-in-floragunn-search-guard-fl-c836b24f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4819%3A%20CWE-532%20in%20floragunn%20Search%20Guard%20FLX&amp;severity=medium&amp;id=69cbe700e6bfc5ba1d219532</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22569-cwe-1289-improper-validation-of-uns-79b5145f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22569%3A%20CWE-1289%20Improper%20validation%20of%20unsafe%20equivalence%20in%20input%20in%20Zscaler%20Zscaler%20Client%20Connector&amp;severity=medium&amp;id=69cbe700e6bfc5ba1d219511</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4818-cwe-285-in-floragunn-search-guard-fl-352b80c7</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4818%3A%20CWE-285%20in%20floragunn%20Search%20Guard%20FLX&amp;severity=medium&amp;id=69cbe700e6bfc5ba1d21952e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/venom-stealer-raises-stakes-with-continuous-creden-8197636e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Venom%20Stealer%20Raises%20Stakes%20With%20Continuous%20Credential%20Harvesting&amp;severity=medium&amp;id=69cbdfdde6bfc5ba1d1e5b85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34532-cwe-863-incorrect-authorization-in--d438f9ed</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34532%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20parse-community%20parse-server&amp;severity=critical&amp;id=69cbdff9e6bfc5ba1d1e69d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4799-cwe-601-url-redirection-to-untrusted-e7eb6ba1</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4799%3A%20CWE-601%20URL%20redirection%20to%20untrusted%20site%20(&apos;open%20redirect&apos;)%20in%20floragunn%20Search%20Guard%20FLX&amp;severity=medium&amp;id=69cbdff9e6bfc5ba1d1e69d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34373-cwe-346-origin-validation-error-in--b9034bc6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34373%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69cbdff9e6bfc5ba1d1e69c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34363-cwe-362-concurrent-execution-using--0173ea9b</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34363%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69cbdff9e6bfc5ba1d1e69c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0596-cwe-78-improper-neutralization-of-sp-7a9aeb7a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0596%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20in%20mlflow%20mlflow%2Fmlflow&amp;severity=critical&amp;id=69cbdff9e6bfc5ba1d1e69b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34224-cwe-367-time-of-check-time-of-use-t-04fec12b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34224%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20parse-community%20parse-server&amp;severity=low&amp;id=69cbdff9e6bfc5ba1d1e69bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34214-cwe-212-improper-removal-of-sensiti-fe343f70</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34214%3A%20CWE-212%3A%20Improper%20Removal%20of%20Sensitive%20Information%20Before%20Storage%20or%20Transfer%20in%20trinodb%20trino&amp;severity=high&amp;id=69cbd8dce6bfc5ba1d1c31a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34209-cwe-294-authentication-bypass-by-ca-ae7e0cd6</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34209%3A%20CWE-294%3A%20Authentication%20Bypass%20by%20Capture-replay%20in%20wevm%20mppx&amp;severity=high&amp;id=69cbd8dae6bfc5ba1d1c3123</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34210-cwe-697-incorrect-comparison-in-wev-005026cd</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34210%3A%20CWE-697%3A%20Incorrect%20Comparison%20in%20wevm%20mppx&amp;severity=medium&amp;id=69cbd8dce6bfc5ba1d1c31a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34377-cwe-347-improper-verification-of-cr-961af0bd</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34377%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20ZcashFoundation%20zebra&amp;severity=high&amp;id=69cbd8dce6bfc5ba1d1c31ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34202-cwe-1336-improper-neutralization-of-80a87c57</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34202%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20ZcashFoundation%20zebra&amp;severity=critical&amp;id=69cbd8dae6bfc5ba1d1c311e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/teampcp-moves-from-oss-to-aws-environments-ec10ca3b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TeamPCP%20Moves%20From%20OSS%20to%20AWS%20Environments&amp;severity=medium&amp;id=69cbd551e6bfc5ba1d1b0977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20915-cwe-79-improper-neutralization-of-i-9c8aeba6</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20915%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=high&amp;id=69cbd8dae6bfc5ba1d1c30fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34172-cwe-1336-improper-neutralization-of-1aeae384</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34172%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20Giskard-AI%20giskard-oss&amp;severity=high&amp;id=69cbd8dae6bfc5ba1d1c311b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33276-cwe-79-improper-neutralization-of-i-3ffa7566</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33276%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=high&amp;id=69cbd8dae6bfc5ba1d1c310c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34162-cwe-306-missing-authentication-for--6cb44fc6</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34162%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20labring%20FastGPT&amp;severity=critical&amp;id=69cbd8dae6bfc5ba1d1c310f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34163-cwe-918-server-side-request-forgery-df36ec79</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34163%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20labring%20FastGPT&amp;severity=high&amp;id=69cbd8dae6bfc5ba1d1c3115</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/crewai-vulnerabilities-expose-devices-to-hacking-845e6a48</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CrewAI%20Vulnerabilities%20Expose%20Devices%20to%20Hacking&amp;severity=medium&amp;id=69cbce49e6bfc5ba1d18329f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/why-ransomware-is-now-after-your-data-and-how-to-p-6fc7d779</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Why%20ransomware%20is%20now%20after%20your%20data%20%E2%80%94%20and%20how%20to%20protect%20your%20home%20storage%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69cbce5ee6bfc5ba1d1838db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-truechaos-0-day-exploitation-against-sou-08e18aae</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20TrueChaos%3A%200-Day%20Exploitation%20Against%20Southeast%20Asian%20Government%20Targets&amp;severity=medium&amp;id=69cc30c3e6bfc5ba1d3e44b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3308-cwe-190-integer-overflow-or-wraparou-b1a7029f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3308%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Artifex%20Software%20Inc.%20*PyMuPDF*%20MuPDF&amp;severity=high&amp;id=69cbd1cfe6bfc5ba1d19baec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27854-use-after-free-in-powerdns-dnsdist-e6e09fac</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27854%3A%20Use%20After%20Free%20in%20PowerDNS%20DNSdist&amp;severity=medium&amp;id=69cbbcb5e6bfc5ba1d1244f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27853-out-of-bounds-write-in-powerdns-dns-ccd834c5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27853%3A%20Out-of-bounds%20Write%20in%20PowerDNS%20DNSdist&amp;severity=medium&amp;id=69cbbcb5e6bfc5ba1d1244f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24030-uncontrolled-memory-allocation-in-p-60254c6e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24030%3A%20Uncontrolled%20Memory%20Allocation%20in%20PowerDNS%20DNSdist&amp;severity=medium&amp;id=69cbbcb5e6bfc5ba1d1244f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24029-incorrect-authorization-in-powerdns-a9ec0de4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24029%3A%20Incorrect%20Authorization%20in%20PowerDNS%20DNSdist&amp;severity=medium&amp;id=69cbbcb5e6bfc5ba1d1244ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24028-buffer-over-read-in-powerdns-dnsdis-62e4a5a1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24028%3A%20Buffer%20Over-read%20in%20PowerDNS%20DNSdist&amp;severity=medium&amp;id=69cbbcb5e6bfc5ba1d1244ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/axios-npm-distribution-compromised-in-supply-chain-c5ee45b1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Axios%20NPM%20Distribution%20Compromised%20in%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=69cd1c4ee6bfc5ba1dcfe7d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0397-overly-permissive-cross-domain-white-800b174d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0397%3A%20Overly%20Permissive%20Cross-domain%20Whitelist%20in%20PowerDNS%20DNSdist&amp;severity=low&amp;id=69cbb931e6bfc5ba1d10da47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-slashes-quantum-resource-requirements-for-b-41cc00eb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Slashes%20Quantum%20Resource%20Requirements%20for%20Breaking%20Cryptocurrency%20Encryption&amp;severity=medium&amp;id=69cbb5afe6bfc5ba1d0f3172</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0396-improper-neutralization-of-script-re-f60b6be7</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0396%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20PowerDNS%20DNSdist&amp;severity=low&amp;id=69cbb931e6bfc5ba1d10da44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exploitation-of-critical-fortinet-forticlient-ems--a7f71706</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exploitation%20of%20Critical%20Fortinet%20FortiClient%20EMS%20Flaw%20Begins&amp;severity=critical&amp;id=69cbb5afe6bfc5ba1d0f3176</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14213-cwe-78-improper-neutralization-of-s-115c4b1c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14213%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Cato%20Networks%20Socket&amp;severity=high&amp;id=69cbb930e6bfc5ba1d10da40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14031-cwe-1395-dependency-on-vulnerable-t-b96af189</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14031%3A%20CWE-1395%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20YVES%20Sereal%3A%3AEncoder&amp;severity=high&amp;id=69cbb22ae6bfc5ba1d0de955</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14030-cwe-1395-dependency-on-vulnerable-t-a55e9ce0</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14030%3A%20CWE-1395%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20YVES%20Sereal%3A%3ADecoder&amp;severity=high&amp;id=69cbb22ae6bfc5ba1d0de950</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4267-cwe-79-improper-neutralization-of-in-3a3951a7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4267%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20johnbillion%20Query%20Monitor&amp;severity=high&amp;id=69cbb22ae6bfc5ba1d0de963</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3191-cwe-352-cross-site-request-forgery-c-188285cf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3191%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20teckel%20Minify%20HTML&amp;severity=medium&amp;id=69cbb22ae6bfc5ba1d0de95e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3139-cwe-639-authorization-bypass-through-8b75f73d</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3139%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20cozmoslabs%20User%20Profile%20Builder%20%E2%80%93%20Beautiful%20User%20Registration%20Forms%2C%20User%20Profiles%20%26%20User%20Role%20Editor&amp;severity=medium&amp;id=69cbb22ae6bfc5ba1d0de95a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34509-88c32a04</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34509&amp;severity=null&amp;id=69cd26f5e6bfc5ba1dd45f4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34508-6ec16998</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34508&amp;severity=null&amp;id=69cd26f5e6bfc5ba1dd45f4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5198-sql-injection-in-code-projects-stude-8e459cec</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5198%3A%20SQL%20Injection%20in%20code-projects%20Student%20Membership%20System&amp;severity=medium&amp;id=69cbaea5e6bfc5ba1d0cfdee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/strongswan-flaw-allows-unauthenticated-attackers-t-6c936cd5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=StrongSwan%20Flaw%20Allows%20Unauthenticated%20Attackers%20to%20Crash%20VPNs&amp;severity=low&amp;id=69cba095e6bfc5ba1d069829</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34887-cwe-79-improper-neutralization-of-i-959708a0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34887%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Extend%20Themes%20Kubio%20AI%20Page%20Builder&amp;severity=medium&amp;id=69cba419e6bfc5ba1d08ffa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4400-cwe-639-authorization-bypass-through-c221da90</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4400%3A%20CWE-639%20Authorization%20bypass%20through%20User-Controlled%20key%20in%201millionbot%20Millie%20chat&amp;severity=high&amp;id=69cba419e6bfc5ba1d08ffa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4399-cwe-1427-improper-neutralization-of--6d726c1d</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4399%3A%20CWE-1427%20Improper%20neutralization%20of%20input%20used%20for%20LLM%20prompting%20in%201millionbot%20Millie%20chat&amp;severity=high&amp;id=69cba419e6bfc5ba1d08ffa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lloyds-data-security-incident-impacts-450000-indiv-bf5b7289</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lloyds%20Data%20Security%20Incident%20Impacts%20450%2C000%20Individuals&amp;severity=medium&amp;id=69cb9d11e6bfc5ba1d05291b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15618-cwe-338-use-of-cryptographically-we-19be4bf3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15618%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20in%20MOCK%20Business%3A%3AOnlinePayment%3A%3AStoredTransaction&amp;severity=critical&amp;id=69cba419e6bfc5ba1d08ff9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5197-sql-injection-in-code-projects-stude-35da754e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5197%3A%20SQL%20Injection%20in%20code-projects%20Student%20Membership%20System&amp;severity=medium&amp;id=69cb9d1de6bfc5ba1d052b2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4317-cwe-89-improper-neutralization-of-sp-e769b7b4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4317%3A%20CWE-89%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20injection&apos;)%20in%20Umami%20Software%20application%20Umami%20Software&amp;severity=critical&amp;id=69cb9d1de6bfc5ba1d052b29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5196-sql-injection-in-code-projects-stude-b73c09b5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5196%3A%20SQL%20Injection%20in%20code-projects%20Student%20Membership%20System&amp;severity=medium&amp;id=69cc1e09e6bfc5ba1d33b7ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10559-cwe-22-improper-limitation-of-a-pat-a46b0034</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10559%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Dassault%20Syst%C3%A8mes%20DELMIA%20Factory%20Resource%20Manager&amp;severity=high&amp;id=69cc1e09e6bfc5ba1d33b7e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10553-cwe-79-improper-neutralization-of-i-0ca743a3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10553%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dassault%20Syst%C3%A8mes%20DELMIA%20Factory%20Resource%20Manager&amp;severity=high&amp;id=69cbd1cfe6bfc5ba1d19baf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10551-cwe-79-improper-neutralization-of-i-5b79fb83</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10551%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dassault%20Syst%C3%A8mes%20ENOVIA%20Collaborative%20Industry%20Innovator&amp;severity=high&amp;id=69cb8b7de6bfc5ba1df48222</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5201-heap-based-buffer-overflow-in-red-ha-598a08d4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5201%3A%20Heap-based%20Buffer%20Overflow%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=69cb8b7de6bfc5ba1df48225</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5195-sql-injection-in-code-projects-stude-bc053e71</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5195%3A%20SQL%20Injection%20in%20code-projects%20Student%20Membership%20System&amp;severity=medium&amp;id=69cb8475e6bfc5ba1df0b3b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/application-control-bypass-for-data-exfiltration-t-88c48161</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Application%20Control%20Bypass%20for%20Data%20Exfiltration%2C%20(Tue%2C%20Mar%2031st)&amp;severity=medium&amp;id=69cb79e9e6bfc5ba1deaad81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5186-double-free-in-nothings-stb-9e4c2f49</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5186%3A%20Double%20Free%20in%20Nothings%20stb&amp;severity=medium&amp;id=69cbedf4e6bfc5ba1d248139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-dualscript-multi-stage-powershell-malwar-63268769</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20DualScript%3A%20Multi-Stage%20PowerShell%20Malware%20Targets%20Crypto&amp;severity=medium&amp;id=69cc1b98e6bfc5ba1d32c553</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5185-heap-based-buffer-overflow-in-nothin-14d54f9b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5185%3A%20Heap-based%20Buffer%20Overflow%20in%20Nothings%20stb_image&amp;severity=medium&amp;id=69cb6f5ce6bfc5ba1de4b856</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5184-command-injection-in-trendnet-tew-71-9fc19bda</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5184%3A%20Command%20Injection%20in%20TRENDnet%20TEW-713RE&amp;severity=medium&amp;id=69cb6f5ce6bfc5ba1de4b850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-vulnerability-in-openai-codex-allowed-git-19b187ba</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Vulnerability%20in%20OpenAI%20Codex%20Allowed%20GitHub%20Token%20Compromise&amp;severity=critical&amp;id=69cb6bd9e6bfc5ba1de2b835</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3881-cwe-918-server-side-request-forgery--b7cb0fc0</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3881%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Performance%20Monitor&amp;severity=medium&amp;id=69cb6857e6bfc5ba1de0b6fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5183-command-injection-in-trendnet-tew-71-6f0fe0f9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5183%3A%20Command%20Injection%20in%20TRENDnet%20TEW-713RE&amp;severity=medium&amp;id=69cb614de6bfc5ba1ddc7ed2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5182-sql-injection-in-sourcecodester-teac-5602a1a6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5182%3A%20SQL%20Injection%20in%20SourceCodester%20Teacher%20Record%20System&amp;severity=medium&amp;id=69cb614de6bfc5ba1ddc7ecb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34881-cwe-918-server-side-request-forgery-4eec20a5</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34881%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20OpenStack%20Glance&amp;severity=medium&amp;id=69cb614de6bfc5ba1ddc7ec7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1877-cwe-79-improper-neutralization-of-in-a66dc075</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1877%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20johnh10%20Auto%20Post%20Scheduler&amp;severity=medium&amp;id=69cb614de6bfc5ba1ddc7ec2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1834-cwe-80-improper-neutralization-of-sc-8611fff6</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1834%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20vowelweb%20Ibtana%20%E2%80%93%20WordPress%20Website%20Builder&amp;severity=medium&amp;id=69cb614de6bfc5ba1ddc7ebb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5181-unrestricted-upload-in-sourcecodeste-d1cc0456</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5181%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Simple%20Doctors%20Appointment%20System&amp;severity=medium&amp;id=69cb5a45e6bfc5ba1dd9ced5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4146-cwe-79-improper-neutralization-of-in-f54775f2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4146%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20timwhitlock%20Loco%20Translate&amp;severity=medium&amp;id=69cb5a45e6bfc5ba1dd9cecf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1710-cwe-285-improper-authorization-in-wo-825159fc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1710%3A%20CWE-285%20Improper%20Authorization%20in%20woocommerce%20WooPayments%3A%20Integrated%20WooCommerce%20Payments&amp;severity=medium&amp;id=69cb5a45e6bfc5ba1dd9cec6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1797-cwe-862-missing-authorization-in-the-54e9e4f2</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1797%3A%20CWE-862%20Missing%20Authorization%20in%20themetechmount%20TrueBooker%20%E2%80%93%20Appointment%20Booking%20and%20Scheduler%20System&amp;severity=medium&amp;id=69cb5a45e6bfc5ba1dd9cecb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5180-sql-injection-in-sourcecodester-simp-c8e12654</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5180%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20Doctors%20Appointment%20System&amp;severity=medium&amp;id=69cb4fb9e6bfc5ba1dc69fdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5179-sql-injection-in-sourcecodester-simp-4bb61a7e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5179%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20Doctors%20Appointment%20System&amp;severity=medium&amp;id=69cb4fb9e6bfc5ba1dc69fd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5178-command-injection-in-totolink-a3300r-d158d31b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5178%3A%20Command%20Injection%20in%20Totolink%20A3300R&amp;severity=medium&amp;id=69cb41a9e6bfc5ba1dadee2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34073-cwe-295-improper-certificate-valida-10885c91</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34073%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20pyca%20cryptography&amp;severity=low&amp;id=69cbd8dce6bfc5ba1d1c31b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34070-cwe-22-improper-limitation-of-a-pat-ac8541ac</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34070%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20langchain-ai%20langchain&amp;severity=high&amp;id=69cc1e09e6bfc5ba1d33b7e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5177-command-injection-in-totolink-a3300r-dabb0ca9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5177%3A%20Command%20Injection%20in%20Totolink%20A3300R&amp;severity=medium&amp;id=69cbd1cfe6bfc5ba1d19baf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34060-cwe-94-improper-control-of-generati-bee34109</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34060%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Shopify%20ruby-lsp&amp;severity=high&amp;id=69cc1e09e6bfc5ba1d33b7f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34054-cwe-427-uncontrolled-search-path-el-04e663ed</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34054%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20microsoft%20vcpkg&amp;severity=high&amp;id=69cbedf4e6bfc5ba1d248134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34043-cwe-400-uncontrolled-resource-consu-3f949807</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34043%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20yahoo%20serialize-javascript&amp;severity=medium&amp;id=69cbd8dce6bfc5ba1d1c31b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34042-cwe-862-missing-authorization-in-ne-c419b6c5</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34042%3A%20CWE-862%3A%20Missing%20Authorization%20in%20nektos%20act&amp;severity=high&amp;id=69cc1babe6bfc5ba1d32cc20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34041-cwe-74-improper-neutralization-of-s-7d4e514b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34041%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20nektos%20act&amp;severity=high&amp;id=69cc1e09e6bfc5ba1d33b7f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3300-cwe-94-improper-control-of-generatio-6c6e7217</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3300%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20WPEverest%20Everest%20Forms%20Pro&amp;severity=critical&amp;id=69cb25a7e6bfc5ba1d9a95b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4020-cwe-200-exposure-of-sensitive-inform-b98091d8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4020%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20RocketGenius%20Gravity%20SMTP&amp;severity=high&amp;id=69cb25a7e6bfc5ba1d9a95b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5176-command-injection-in-totolink-a3300r-0198ea25</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5176%3A%20Command%20Injection%20in%20Totolink%20A3300R&amp;severity=medium&amp;id=69cb25a7e6bfc5ba1d9a95c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5115-cwe-319-cleartext-transmission-of-se-7a72caea</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5115%3A%20CWE-319%20Cleartext%20transmission%20of%20sensitive%20information%20in%20PaperCut%20Papercut%20NG%2FMF&amp;severity=low&amp;id=69cb1e83e6bfc5ba1d972340</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/teampcp-supply-chain-campaign-update-004-databrick-d60c6a86</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TeamPCP%20Supply%20Chain%20Campaign%3A%20Update%20004%20-%20Databricks%20Investigating%20Alleged%20Compromise%2C%20TeamPCP%20Runs%20Dual%20Ransomware%20Operations%2C%20and%20AstraZeneca%20Data%20Released%2C%20(Mon%2C%20Mar%2030th)&amp;severity=medium&amp;id=69ca91e1e6bfc5ba1d4195f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32734-cwe-79-improper-neutralization-of-i-5b4bf0b6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32734%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20baserproject%20basercms&amp;severity=high&amp;id=69cb1e82e6bfc5ba1d9722cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30879-cwe-79-improper-neutralization-of-i-315a156d</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30879%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20baserproject%20basercms&amp;severity=medium&amp;id=69cb1e82e6bfc5ba1d9722bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30940-cwe-22-improper-limitation-of-a-pat-4cf3d0c8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30940%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20baserproject%20basercms&amp;severity=high&amp;id=69cb1e82e6bfc5ba1d9722c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30878-cwe-285-improper-authorization-in-b-0d863f22</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30878%3A%20CWE-285%3A%20Improper%20Authorization%20in%20baserproject%20basercms&amp;severity=medium&amp;id=69cb1e82e6bfc5ba1d9722b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30877-cwe-78-improper-neutralization-of-s-36a348b4</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30877%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20baserproject%20basercms&amp;severity=critical&amp;id=69cb1e82e6bfc5ba1d9722b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30880-cwe-78-improper-neutralization-of-s-5ac38c48</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30880%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20baserproject%20basercms&amp;severity=critical&amp;id=69cb1e82e6bfc5ba1d9722c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27697-cwe-89-improper-neutralization-of-s-4a7e4478</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27697%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20baserproject%20basercms&amp;severity=medium&amp;id=69cb1e82e6bfc5ba1d9722ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21861-cwe-78-improper-neutralization-of-s-7b86deef</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21861%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20baserproject%20basercms&amp;severity=critical&amp;id=69cb1e82e6bfc5ba1d9722a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32957-cwe-434-unrestricted-upload-of-file-07ed5ff8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32957%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20baserproject%20basercms&amp;severity=high&amp;id=69cb1e82e6bfc5ba1d9722a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4794-cwe-79-improper-neutralization-of-in-b1682948</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4794%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20PaperCut%20PaperCut%20NG%2FMF&amp;severity=low&amp;id=69cb1e82e6bfc5ba1d9722d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-31-b94f0480</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-31&amp;severity=medium&amp;id=69cc61e8e6bfc5ba1d50ebb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30290-na-d795f9fa</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30290%3A%20n%2Fa&amp;severity=high&amp;id=69cc2635e6bfc5ba1d366722</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30285-na-6a2d5cfa</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30285%3A%20n%2Fa&amp;severity=critical&amp;id=69cc1f3ce6bfc5ba1d342c7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30280-na-e7f28f90</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30280%3A%20n%2Fa&amp;severity=medium&amp;id=69cc1f3ce6bfc5ba1d342c78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30520-na-d7a777db</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30520%3A%20n%2Fa&amp;severity=medium&amp;id=69cc1e09e6bfc5ba1d33b7e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30286-na-fbc0b73a</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30286%3A%20n%2Fa&amp;severity=critical&amp;id=69cc1e09e6bfc5ba1d33b7dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30521-na-03f608fc</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30521%3A%20n%2Fa&amp;severity=medium&amp;id=69cc149be6bfc5ba1d3026cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30283-na-ed1a86e8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30283%3A%20n%2Fa&amp;severity=critical&amp;id=69cc0a0fe6bfc5ba1d2cf778</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30279-na-8a3ec826</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30279%3A%20n%2Fa&amp;severity=high&amp;id=69cc0a0fe6bfc5ba1d2cf772</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30282-na-2cce3cba</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30282%3A%20n%2Fa&amp;severity=critical&amp;id=69cc068ae6bfc5ba1d2beedf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30278-na-bacab0cb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30278%3A%20n%2Fa&amp;severity=critical&amp;id=69cc068ae6bfc5ba1d2beeda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30277-na-d58dc8e2</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30277%3A%20n%2Fa&amp;severity=high&amp;id=69cc068ae6bfc5ba1d2beed4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30284-na-5be1bb53</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30284%3A%20n%2Fa&amp;severity=high&amp;id=69cbf4f5e6bfc5ba1d2745c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30281-na-48ac7389</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30281%3A%20n%2Fa&amp;severity=critical&amp;id=69cbedf2e6bfc5ba1d2480ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30276-na-932d5438</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30276%3A%20n%2Fa&amp;severity=critical&amp;id=69cbedf2e6bfc5ba1d2480ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30314-na-bc561faf</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30314%3A%20n%2Fa&amp;severity=critical&amp;id=69cbdff9e6bfc5ba1d1e69b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29870-na-e9224b82</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29870%3A%20n%2Fa&amp;severity=high&amp;id=69cbdff9e6bfc5ba1d1e69b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30312-na-6798d69d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30312%3A%20n%2Fa&amp;severity=critical&amp;id=69cbd8dae6bfc5ba1d1c3108</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30311-na-afb7abcc</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30311%3A%20n%2Fa&amp;severity=critical&amp;id=69cbd8dae6bfc5ba1d1c3104</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30309-na-5d9d5ab8</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30309%3A%20n%2Fa&amp;severity=high&amp;id=69cbd8dae6bfc5ba1d1c3100</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30310-na-ded13cc8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30310%3A%20n%2Fa&amp;severity=critical&amp;id=69cbd1cfe6bfc5ba1d19bae8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-31-e1bb4eef</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-31&amp;severity=low&amp;id=69cb3714e6bfc5ba1da38cbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5157-cross-site-scripting-in-code-project-fa8372fe</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5157%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Online%20Food%20Ordering%20System&amp;severity=medium&amp;id=69cb096be6bfc5ba1d7e1fbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5156-stack-based-buffer-overflow-in-tenda-95d1a648</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5156%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=69cb096be6bfc5ba1d7e1fb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5155-stack-based-buffer-overflow-in-tenda-42fe2620</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5155%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=69cafedde6bfc5ba1d798140</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5154-stack-based-buffer-overflow-in-tenda-0a4a9773</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5154%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=69cafedde6bfc5ba1d798139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5130-cwe-565-reliance-on-cookies-without--7fe086b5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5130%3A%20CWE-565%20Reliance%20on%20Cookies%20without%20Validation%20and%20Integrity%20Checking%20in%20jhimross%20Debugger%20%26%20Troubleshooter&amp;severity=high&amp;id=69cafb5ae6bfc5ba1d780867</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32794-cwe-295-improper-certificate-valida-33e2597e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32794%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20Airflow%20Provider%20for%20Databricks&amp;severity=medium&amp;id=69caf451e6bfc5ba1d7409b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5153-command-injection-in-tenda-ch22-ee0fb20b</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5153%3A%20Command%20Injection%20in%20Tenda%20CH22&amp;severity=medium&amp;id=69caf0cde6bfc5ba1d729540</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4257-cwe-94-improper-control-of-generatio-c9e2f160</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4257%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20supsysticcom%20Contact%20Form%20by%20Supsystic&amp;severity=critical&amp;id=69caf0cde6bfc5ba1d72953b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32877-cwe-125-out-of-bounds-read-in-rando-f9a11963</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32877%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20randombit%20botan&amp;severity=high&amp;id=69cae2bce6bfc5ba1d6c3e42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32883-cwe-347-improper-verification-of-cr-1af6174a</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32883%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20randombit%20botan&amp;severity=medium&amp;id=69cae2bce6bfc5ba1d6c3e45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32884-cwe-295-improper-certificate-valida-f12891c4</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32884%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20randombit%20botan&amp;severity=medium&amp;id=69cae2bce6bfc5ba1d6c3e48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5152-stack-based-buffer-overflow-in-tenda-50cbb48f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5152%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=69cae2bce6bfc5ba1d6c3e51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34558-cwe-79-improper-neutralization-of-i-198231a4</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34558%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=critical&amp;id=69cae2bce6bfc5ba1d6c3e4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34557-cwe-79-improper-neutralization-of-i-f3fef655</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34557%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=critical&amp;id=69cae2bce6bfc5ba1d6c3e4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27599-cwe-79-improper-neutralization-of-i-cb40a560</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27599%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=medium&amp;id=69cae2bce6bfc5ba1d6c3e36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5150-sql-injection-in-code-projects-accou-ec58ae08</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5150%3A%20SQL%20Injection%20in%20code-projects%20Accounting%20System&amp;severity=medium&amp;id=69cad830e6bfc5ba1d66dc17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5148-sql-injection-in-yunaiv-yudao-cloud-5dc94026</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5148%3A%20SQL%20Injection%20in%20YunaiV%20yudao-cloud&amp;severity=medium&amp;id=69cad830e6bfc5ba1d66dc10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33026-cwe-312-cleartext-storage-of-sensit-de36c61f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33026%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%200xJacky%20nginx-ui&amp;severity=critical&amp;id=69cad4ace6bfc5ba1d65117d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21710-vulnerability-in-nodejs-node-028748b1</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21710%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=high&amp;id=69cacda7e6bfc5ba1d6188a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21716-vulnerability-in-nodejs-node-e1c41615</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21716%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=low&amp;id=69cacda7e6bfc5ba1d6188b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21711-vulnerability-in-nodejs-node-ddaccfa2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21711%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=medium&amp;id=69cacda7e6bfc5ba1d6188a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21715-vulnerability-in-nodejs-node-14042404</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21715%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=low&amp;id=69cacda7e6bfc5ba1d6188ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21717-vulnerability-in-nodejs-node-70bc0aac</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21717%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=medium&amp;id=69cacda7e6bfc5ba1d6188b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21713-vulnerability-in-nodejs-node-4458c2af</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21713%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=medium&amp;id=69cacda7e6bfc5ba1d6188a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21714-vulnerability-in-nodejs-node-a0eb338f</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21714%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=medium&amp;id=69cacda7e6bfc5ba1d6188ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dshield-cowrie-honeypot-stats-and-when-sessions-di-88050524</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DShield%20(Cowrie)%20Honeypot%20Stats%20and%20When%20Sessions%20Disconnect%2C%20(Mon%2C%20Mar%2030th)&amp;severity=medium&amp;id=69c9bef1e6bfc5ba1d521ff2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5147-sql-injection-in-yunaiv-yudao-cloud-16d2d339</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5147%3A%20SQL%20Injection%20in%20YunaiV%20yudao-cloud&amp;severity=medium&amp;id=69caca21e6bfc5ba1d5f423b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3991-cwe-829-inclusion-of-functionality-f-131dca0a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3991%3A%20CWE-829%20Inclusion%20of%20functionality%20from%20untrusted%20control%20sphere%20in%20Broadcom%20Data%20Loss%20Prevention&amp;severity=high&amp;id=69cac31de6bfc5ba1d5bec86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/teampcps-telnyx-attack-marks-a-shift-in-tactics-be-49f2484d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TeamPCP%E2%80%99s%20Telnyx%20Attack%20Marks%20a%20Shift%20in%20Tactics%20Beyond%20LiteLLM&amp;severity=medium&amp;id=69caed48e6bfc5ba1d70eba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3502-cwe-494-download-of-code-without-int-45ea491d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3502%3A%20CWE-494%3A%20Download%20of%20Code%20Without%20Integrity%20Check.%20in%20TrueConf%20TrueConf%20Client&amp;severity=high&amp;id=69cac31de6bfc5ba1d5bec83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5126-server-side-request-forgery-in-sourc-39062150</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5126%3A%20Server-Side%20Request%20Forgery%20in%20SourceCodester%20RSS%20Feed%20Parser&amp;severity=medium&amp;id=69cabc11e6bfc5ba1d596e05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33027-cwe-22-improper-limitation-of-a-pat-c07fecd3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33027%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%200xJacky%20nginx-ui&amp;severity=medium&amp;id=69cabc11e6bfc5ba1d596df3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33028-cwe-362-concurrent-execution-using--15669eaf</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33028%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%200xJacky%20nginx-ui&amp;severity=high&amp;id=69cabc11e6bfc5ba1d596df7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33029-cwe-20-improper-input-validation-in-e829da5c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33029%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%200xJacky%20nginx-ui&amp;severity=medium&amp;id=69cabc11e6bfc5ba1d596dfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33030-cwe-78-improper-neutralization-of-s-ce389835</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33030%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%200xJacky%20nginx-ui&amp;severity=high&amp;id=69cabc11e6bfc5ba1d596dff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33032-cwe-306-missing-authentication-for--2512a116</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33032%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%200xJacky%20nginx-ui&amp;severity=critical&amp;id=69cabc11e6bfc5ba1d596e02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4046-cwe-617-reachable-assertion-in-the-g-18e966bb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4046%3A%20CWE-617%20Reachable%20assertion%20in%20The%20GNU%20C%20Library%20glibc&amp;severity=high&amp;id=69cab88de6bfc5ba1d56ff2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5125-os-command-injection-in-raine-consul-50411acc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5125%3A%20OS%20Command%20Injection%20in%20raine%20consult-llm-mcp&amp;severity=medium&amp;id=69cacae6e6bfc5ba1d5fd380</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27508-cwe-79-improper-neutralization-of-i-f32f18c8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27508%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Smoothwall%20Express&amp;severity=medium&amp;id=69caae00e6bfc5ba1d516fa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26352-cwe-79-improper-neutralization-of-i-77ac9a7e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26352%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Smoothwall%20Express&amp;severity=medium&amp;id=69caae00e6bfc5ba1d516fa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5124-improper-access-controls-in-osrg-gob-b46befd3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5124%3A%20Improper%20Access%20Controls%20in%20osrg%20GoBGP&amp;severity=medium&amp;id=69caa6f9e6bfc5ba1d4dfd86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5170-cwe-617-reachable-assertion-in-mongo-3f604185</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5170%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20MongoDB%20MongoDB%20Server&amp;severity=medium&amp;id=69ca9c71e6bfc5ba1d472626</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5123-off-by-one-in-osrg-gobgp-3ed023a0</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5123%3A%20Off-by-One%20in%20osrg%20GoBGP&amp;severity=medium&amp;id=69ca9c6fe6bfc5ba1d4725b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21712-vulnerability-in-nodejs-node-52636af1</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21712%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=medium&amp;id=69ca9c6fe6bfc5ba1d472595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5165-expired-pointer-dereference-in-red-h-b327eb88</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5165%3A%20Expired%20Pointer%20Dereference%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69ca9568e6bfc5ba1d43cfdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5164-buffer-copy-without-checking-size-of-dd5cb921</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5164%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69ca9568e6bfc5ba1d43cfd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/healthcare-it-platform-carecloud-probing-potential-568e92da</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Healthcare%20IT%20Platform%20CareCloud%20Probing%20Potential%20Data%20Breach&amp;severity=medium&amp;id=69ca8756e6bfc5ba1d3aa7d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5122-improper-access-controls-in-osrg-gob-ec99131e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5122%3A%20Improper%20Access%20Controls%20in%20osrg%20GoBGP&amp;severity=medium&amp;id=69ca8e5fe6bfc5ba1d3ebe50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/silent-drift-how-llms-are-quietly-breaking-organiz-e69f5f70</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Silent%20Drift%3A%20How%20LLMs%20Are%20Quietly%20Breaking%20Organizational%20Access%20Control&amp;severity=medium&amp;id=69ca8756e6bfc5ba1d3aa7d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28528-cwe-125-out-of-bounds-read-in-bluek-e98e0a75</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28528%3A%20CWE-125%20Out-of-bounds%20Read%20in%20BlueKitchen%20GmbH%20BTstack&amp;severity=low&amp;id=69ca8777e6bfc5ba1d3aaeb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28527-cwe-125-out-of-bounds-read-in-bluek-bcfc2127</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28527%3A%20CWE-125%20Out-of-bounds%20Read%20in%20BlueKitchen%20GmbH%20BTstack&amp;severity=low&amp;id=69ca8777e6bfc5ba1d3aaeb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28526-cwe-125-out-of-bounds-read-in-bluek-5b117bbe</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28526%3A%20CWE-125%20Out-of-bounds%20Read%20in%20BlueKitchen%20GmbH%20BTstack&amp;severity=low&amp;id=69ca8777e6bfc5ba1d3aaeb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/an-iron-curtain-for-ai-how-to-improve-autonomous-a-a6c72dc8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=An%20iron%20curtain%20for%20AI%3A%20how%20to%20improve%20autonomous%20AI%20agent%20security%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69ca8053e6bfc5ba1d368b44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3321-cwe-639-authorization-bypass-through-c880c1c8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3321%3A%20CWE-639%20Authorization%20bypass%20through%20User-Controlled%20key%20in%20ON24%20ON24%20Q%26A%20chat&amp;severity=high&amp;id=69ca7cd8e6bfc5ba1d314847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chatgpt-data-leakage-via-a-hidden-outbound-channel-77d73958</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ChatGPT%20Data%20Leakage%20via%20a%20Hidden%20Outbound%20Channel%20in%20the%20Code%20Execution%20Runtime&amp;severity=medium&amp;id=69ca7944e6bfc5ba1d2fc939</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/30th-march-threat-intelligence-report-e05488d6</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=30th%20March%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=low&amp;id=69cae257e6bfc5ba1d6c0684</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4315-cwe-352-cross-site-request-forgery-c-3da322ba</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4315%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WatchGuard%20Fireware%20OS&amp;severity=high&amp;id=69ca75c0e6bfc5ba1d2d9bef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4266-cwe-502-deserialization-of-untrusted-985082ee</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4266%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20WatchGuard%20Fireware%20OS&amp;severity=high&amp;id=69ca75c0e6bfc5ba1d2d9beb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-apt-star-blizzard-adopts-darksword-ios-exp-08457acb</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20APT%20Star%20Blizzard%20Adopts%20DarkSword%20iOS%20Exploit%20Kit&amp;severity=high&amp;id=69ca67b1e6bfc5ba1d24dab8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/european-commission-reports-cyber-intrusion-and-da-712b39a1</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=European%20Commission%20Reports%20Cyber%20Intrusion%20and%20Data%20Theft&amp;severity=medium&amp;id=69ca60a9e6bfc5ba1d1f9640</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacked-hospitals-hidden-spyware-iran-conflict-show-960e3022</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacked%20Hospitals%2C%20Hidden%20Spyware%3A%20Iran%20Conflict%20Shows%20How%20Digital%20Fight%20Is%20Ingrained%20in%20Warfare&amp;severity=high&amp;id=69ca5d25e6bfc5ba1d1d6402</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/telnyx-targeted-in-growing-teampcp-supply-chain-at-3b995e80</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Telnyx%20Targeted%20in%20Growing%20TeamPCP%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=69ca59a1e6bfc5ba1d18f925</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1612-cwe-798-use-of-hard-coded-credential-4f82f25a</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1612%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20AL-KO%20Robolinho%20Update%20Software&amp;severity=medium&amp;id=69ca4f15e6bfc5ba1d110ba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exploitation-of-fresh-citrix-netscaler-vulnerabili-cb88742d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exploitation%20of%20Fresh%20Citrix%20NetScaler%20Vulnerability%20Begins&amp;severity=critical&amp;id=69ca4489e6bfc5ba1d06497d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5128-cwe-200-exposure-of-sensitive-inform-adf68c3e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5128&amp;severity=null&amp;id=69ca480ee6bfc5ba1d09ad0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/security-brief-tax-scams-aim-to-steal-funds-from-t-4f3af72b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Security%20brief%3A%20tax%20scams%20aim%20to%20steal%20funds%20from%20taxpayers&amp;severity=medium&amp;id=69ca4b8fe6bfc5ba1d0d7d66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-confirms-kash-patel-email-hack-as-us-offers-10-48617ffa</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20Confirms%20Kash%20Patel%20Email%20Hack%20as%20US%20Offers%20%2410M%20Reward%20for%20Hackers&amp;severity=medium&amp;id=69ca2f74e6bfc5ba1dec291a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4416-cwe-502-deserialization-of-untrusted-7c234af9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4416%3A%20CWE-502%20Deserialization%20of%20untrusted%20data%20in%20GIGABYTE%20Performance%20Library&amp;severity=high&amp;id=69ca2f86e6bfc5ba1dec601b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5121-vulnerability-in-red-hat-red-hat-ent-8ecef880</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5121%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%207%20Extended%20Lifecycle%20Support&amp;severity=high&amp;id=69ca2f86e6bfc5ba1dec601f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25704-cwe-271-privilege-dropping-lowering-9551ffdb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25704%3A%20CWE-271%3A%20Privilege%20Dropping%20%2F%20Lowering%20Errors%20in%20pop-os%20cosmic-greeter&amp;severity=medium&amp;id=69ca2f86e6bfc5ba1dec6014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4415-cwe-23-relative-path-traversal-in-gi-d148431b</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4415%3A%20CWE-23%20Relative%20path%20traversal%20in%20GIGABYTE%20Gigabyte%20Control%20Center&amp;severity=critical&amp;id=69ca2f86e6bfc5ba1dec6017</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3716-cwe-204-observable-response-discrepa-19d0288d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3716%3A%20CWE-204%20Observable%20response%20discrepancy%20in%20ESET%2C%20spol.%20s.r.o%20ESET%20Protect%20(on-prem)&amp;severity=medium&amp;id=69ca2f86e6bfc5ba1dec6011</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15379-cwe-77-improper-neutralization-of-s-6f707b63</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15379%3A%20CWE-77%20%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20mlflow%20mlflow%2Fmlflow&amp;severity=critical&amp;id=69ca2868e6bfc5ba1de5eb91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/f5-big-ip-dos-flaw-upgraded-to-critical-rce-now-ex-7117a302</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=F5%20BIG-IP%20DoS%20Flaw%20Upgraded%20to%20Critical%20RCE%2C%20Now%20Exploited%20in%20the%20Wild&amp;severity=critical&amp;id=69ca2161e6bfc5ba1de1970a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2328-cwe-790-improper-filtering-of-specia-345e5887</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2328%3A%20CWE-790%20Improper%20Filtering%20of%20Special%20Elements%20in%20WAGO%20Device%20Sphere&amp;severity=high&amp;id=69ca2868e6bfc5ba1de5eb96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5119-cleartext-transmission-of-sensitive--a5271c6f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5119%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69ca16d5e6bfc5ba1dd8ea87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5107-improper-access-controls-in-frroutin-1c6243fd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5107%3A%20Improper%20Access%20Controls%20in%20FRRouting%20FRR&amp;severity=low&amp;id=69ca0c48e6bfc5ba1dd16be4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5106-cross-site-scripting-in-code-project-9b1a6ed5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5106%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=69ca9568e6bfc5ba1d43cfe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5105-command-injection-in-totolink-a3300r-3ffece95</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5105%3A%20Command%20Injection%20in%20Totolink%20A3300R&amp;severity=medium&amp;id=69c9f3ace6bfc5ba1da3b131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5104-command-injection-in-totolink-a3300r-967faa0c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5104%3A%20Command%20Injection%20in%20Totolink%20A3300R&amp;severity=medium&amp;id=69c9e219e6bfc5ba1d89ce55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3124-cwe-639-authorization-bypass-through-6397300c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3124%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wpchill%20Download%20Monitor&amp;severity=high&amp;id=69c9d408e6bfc5ba1d7f34a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15036-cwe-29-path-traversal-filename-in-m-bf2c3022</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15036%3A%20CWE-29%20Path%20Traversal%3A%20&apos;%5C..%5Cfilename&apos;%20in%20mlflow%20mlflow%2Fmlflow&amp;severity=critical&amp;id=69c9d408e6bfc5ba1d7f349e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5103-command-injection-in-totolink-a3300r-8a4403a5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5103%3A%20Command%20Injection%20in%20Totolink%20A3300R&amp;severity=medium&amp;id=69c9d408e6bfc5ba1d7f34a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7741-cwe-259-use-of-hard-coded-password-i-5fed7c83</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7741%3A%20CWE-259%20Use%20of%20hard-coded%20password%20in%20Yokogawa%20Electric%20Corporation%20CENTUM%20VP&amp;severity=low&amp;id=69c9befee6bfc5ba1d524370</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5102-command-injection-in-totolink-a3300r-fdb9f73a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5102%3A%20Command%20Injection%20in%20Totolink%20A3300R&amp;severity=medium&amp;id=69c9befee6bfc5ba1d524373</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-30-728f86ae</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-30&amp;severity=medium&amp;id=69cb1068e6bfc5ba1d83cbdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30306-na-f64a590d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30306%3A%20n%2Fa&amp;severity=critical&amp;id=69cae2bce6bfc5ba1d6c3e58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30313-na-8166a460</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30313%3A%20n%2Fa&amp;severity=critical&amp;id=69cae2bce6bfc5ba1d6c3e3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30308-na-5353a88a</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30308%3A%20n%2Fa&amp;severity=critical&amp;id=69cae2bce6bfc5ba1d6c3e39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30305-na-259404ea</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30305%3A%20n%2Fa&amp;severity=critical&amp;id=69cad4ace6bfc5ba1d651178</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30307-na-4ce41ceb</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30307%3A%20n%2Fa&amp;severity=critical&amp;id=69cacda7e6bfc5ba1d6188b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29872-na-eca84de0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29872%3A%20n%2Fa&amp;severity=high&amp;id=69cac31de6bfc5ba1d5bec98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29925-na-684bc216</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29925%3A%20n%2Fa&amp;severity=high&amp;id=69cac31de6bfc5ba1d5bec7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29924-na-58efd28c</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29924%3A%20n%2Fa&amp;severity=high&amp;id=69cac31de6bfc5ba1d5bec7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30077-na-c0138794</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30077%3A%20n%2Fa&amp;severity=high&amp;id=69cab88de6bfc5ba1d56ff26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29954-na-ffb2524c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29954%3A%20n%2Fa&amp;severity=high&amp;id=69caa6f9e6bfc5ba1d4dfd82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29909-na-552e3807</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29909%3A%20n%2Fa&amp;severity=medium&amp;id=69caa6f9e6bfc5ba1d4dfd7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-30-67c01efa</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-30&amp;severity=low&amp;id=69caa6f0e6bfc5ba1d4dfb47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33643-na-14732c9d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33643%3A%20n%2Fa&amp;severity=high&amp;id=69caa378e6bfc5ba1d4bb8c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30556-na-352c7804</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30556%3A%20n%2Fa&amp;severity=medium&amp;id=69caa378e6bfc5ba1d4bb8be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29953-na-34aa1f9b</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29953%3A%20n%2Fa&amp;severity=high&amp;id=69caa378e6bfc5ba1d4bb8b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34472-na-951eb9f4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34472%3A%20n%2Fa&amp;severity=high&amp;id=69ca9c6fe6bfc5ba1d4725b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30562-na-d8e97f9d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30562%3A%20n%2Fa&amp;severity=critical&amp;id=69ca9c6fe6bfc5ba1d4725ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30561-na-7eb11893</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30561%3A%20n%2Fa&amp;severity=medium&amp;id=69ca9c6fe6bfc5ba1d4725aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30560-na-da409bb0</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30560%3A%20n%2Fa&amp;severity=medium&amp;id=69ca9c6fe6bfc5ba1d4725a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30559-na-24a2fd68</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30559%3A%20n%2Fa&amp;severity=medium&amp;id=69ca9c6fe6bfc5ba1d4725a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30558-na-d1116e3c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30558%3A%20n%2Fa&amp;severity=medium&amp;id=69ca9c6fe6bfc5ba1d4725a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30557-na-4d52faa3</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30557%3A%20n%2Fa&amp;severity=medium&amp;id=69ca9c6fe6bfc5ba1d47259e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29597-na-2ce820bf</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29597%3A%20n%2Fa&amp;severity=medium&amp;id=69ca9c6fe6bfc5ba1d472599</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33373-na-22e2186d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33373%3A%20n%2Fa&amp;severity=high&amp;id=69ca9568e6bfc5ba1d43cfd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30566-na-30d77aa8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30566%3A%20n%2Fa&amp;severity=medium&amp;id=69ca9568e6bfc5ba1d43cfcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30565-na-d2474f6a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30565%3A%20n%2Fa&amp;severity=medium&amp;id=69ca9568e6bfc5ba1d43cfca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30564-na-dd3b9500</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30564%3A%20n%2Fa&amp;severity=medium&amp;id=69ca9568e6bfc5ba1d43cfc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30563-na-22b162a2</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30563%3A%20n%2Fa&amp;severity=medium&amp;id=69ca9568e6bfc5ba1d43cfc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30082-na-75c73eab</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30082%3A%20n%2Fa&amp;severity=medium&amp;id=69ca9568e6bfc5ba1d43cfbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5101-command-injection-in-totolink-a3300r-08bf6741</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5101%3A%20Command%20Injection%20in%20Totolink%20A3300R&amp;severity=medium&amp;id=69ca9568e6bfc5ba1d43cfe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4176-cwe-1395-dependency-on-vulnerable-th-556b643e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4176%3A%20CWE-1395%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20SHAY%20perl&amp;severity=critical&amp;id=69c994c1e6bfc5ba1d0997a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4946-cwe-78-improper-neutralization-of-sp-c53cae64</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4946%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20NSA%20Ghidra&amp;severity=high&amp;id=69c9832de6bfc5ba1dd34820</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0558-cwe-287-improper-authentication-in-p-51fddf90</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0558%3A%20CWE-287%20Improper%20Authentication%20in%20parisneo%20parisneo%2Flollms&amp;severity=high&amp;id=69c97a88e6bfc5ba1dc8618d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0560-cwe-918-server-side-request-forgery--5103940b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0560%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20parisneo%20parisneo%2Flollms&amp;severity=high&amp;id=69c97a88e6bfc5ba1dc86191</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0562-cwe-863-incorrect-authorization-in-p-77e45474</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0562%3A%20CWE-863%20Incorrect%20Authorization%20in%20parisneo%20parisneo%2Flollms&amp;severity=high&amp;id=69c97a88e6bfc5ba1dc86195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34005-cwe-78-improper-neutralization-of-s-b117df4c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34005%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Xiongmai%20DVR%2FNVR%20devices&amp;severity=high&amp;id=69c95e2e919ccadcdf40cfd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5046-stack-based-buffer-overflow-in-tenda-7d25f76d</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5046%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1201&amp;severity=high&amp;id=69c93781919ccadcdf2a290a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5045-stack-based-buffer-overflow-in-tenda-2a8bfe4e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5045%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1201&amp;severity=high&amp;id=69c92cf6919ccadcdf22c137</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5044-stack-based-buffer-overflow-in-belki-0a467880</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5044%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1122&amp;severity=high&amp;id=69c91b64919ccadcdf191739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5043-stack-based-buffer-overflow-in-belki-d08945f4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5043%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1122&amp;severity=high&amp;id=69c90d85919ccadcdf10f5d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5042-stack-based-buffer-overflow-in-belki-bbfacd19</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5042%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1122&amp;severity=high&amp;id=69c902c8919ccadcdf09eac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-threat-landscape-digest-january-february-2026-5b11ad26</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20Threat%20Landscape%20Digest%20January-February%202026&amp;severity=medium&amp;id=69c9885ae6bfc5ba1ddc37cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5041-command-injection-in-code-projects-c-82c5a99c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5041%3A%20Command%20Injection%20in%20code-projects%20Chamber%20of%20Commerce%20Membership%20Management%20System&amp;severity=medium&amp;id=69c8f839919ccadcdf040e9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5037-stack-based-buffer-overflow-in-mxml-e2721322</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5037%3A%20Stack-based%20Buffer%20Overflow%20in%20mxml&amp;severity=medium&amp;id=69c8ea29919ccadcdffae6e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5036-stack-based-buffer-overflow-in-tenda-210df5d9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5036%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%204G06&amp;severity=high&amp;id=69c8dc1a919ccadcdfea42e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5035-sql-injection-in-code-projects-accou-b844fbad</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5035%3A%20SQL%20Injection%20in%20code-projects%20Accounting%20System&amp;severity=medium&amp;id=69c8d18d919ccadcdfe4513a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5034-sql-injection-in-code-projects-accou-4be3d339</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5034%3A%20SQL%20Injection%20in%20code-projects%20Accounting%20System&amp;severity=medium&amp;id=69c8c37e919ccadcdfda1ab2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5033-sql-injection-in-code-projects-accou-9e1a8bbd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5033%3A%20SQL%20Injection%20in%20code-projects%20Accounting%20System&amp;severity=medium&amp;id=69c8bc76919ccadcdfd4fa04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5031-improper-control-of-resource-identif-e4390a28</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5031%3A%20Improper%20Control%20of%20Resource%20Identifiers%20in%20BichitroGan%20ISP%20Billing%20Software&amp;severity=medium&amp;id=69c8b56e919ccadcdfd0c4f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5030-command-injection-in-totolink-nr1800-e137d8f9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5030%3A%20Command%20Injection%20in%20Totolink%20NR1800X&amp;severity=medium&amp;id=69c8aaee919ccadcdfb97398</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5024-stack-based-buffer-overflow-in-d-lin-e70f155a</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5024%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-513&amp;severity=high&amp;id=69c89cd1919ccadcdfa20329</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5023-os-command-injection-in-dedeveloper2-cc03c992</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5023%3A%20OS%20Command%20Injection%20in%20DeDeveloper23%20codebase-mcp&amp;severity=medium&amp;id=69c88b3d919ccadcdf8ee47e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2602-cwe-79-improper-neutralization-of-in-4cab52e7</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2602%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20twentig%20Twentig%20Supercharged%20Block%20Editor%20%E2%80%93%20Blocks%2C%20Patterns%2C%20Starter%20Sites%2C%20Portfolio&amp;severity=medium&amp;id=69c88b3d919ccadcdf8ee47a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5021-stack-based-buffer-overflow-in-tenda-f1fb8811</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5021%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69c880b1919ccadcdf7c0d1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5020-command-injection-in-totolink-a3600r-b468734a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5020%3A%20Command%20Injection%20in%20Totolink%20A3600R&amp;severity=medium&amp;id=69c879aa919ccadcdf6dd167</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4851-cwe-502-deserialization-of-untrusted-4ee6eb90</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4851%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20CASIANO%20GRID%3A%3AMachine&amp;severity=critical&amp;id=69c879aa919ccadcdf6dd163</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-29-3c380d68</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-29&amp;severity=medium&amp;id=69c9bee8e6bfc5ba1d520a8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-29-d62cc526</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-29&amp;severity=medium&amp;id=69c98a2ce6bfc5ba1dddddec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-29-d4ae1112</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-29&amp;severity=low&amp;id=69c8fbb6919ccadcdf066a9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5019-sql-injection-in-code-projects-simpl-bb8230db</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5019%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Food%20Order%20System&amp;severity=medium&amp;id=69c86817919ccadcdf560eef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5018-sql-injection-in-code-projects-simpl-fa1c2f64</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5018%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Food%20Order%20System&amp;severity=medium&amp;id=69c85a06919ccadcdf4a2818</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5017-sql-injection-in-code-projects-simpl-b274ffdd</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5017%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Food%20Order%20System&amp;severity=medium&amp;id=69c85a06919ccadcdf4a2811</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5016-server-side-request-forgery-in-elecv-d734b993</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5016%3A%20Server-Side%20Request%20Forgery%20in%20elecV2%20elecV2P&amp;severity=medium&amp;id=69c84f7c919ccadcdf355adb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5015-cross-site-scripting-in-elecv2-elecv-a07712f4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5015%3A%20Cross%20Site%20Scripting%20in%20elecV2%20elecV2P&amp;severity=medium&amp;id=69c844ee919ccadcdf10d93e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5014-path-traversal-in-elecv2-elecv2p-4b247b7d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5014%3A%20Path%20Traversal%20in%20elecV2%20elecV2P&amp;severity=medium&amp;id=69c844ee919ccadcdf10d937</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5013-path-traversal-in-elecv2-elecv2p-4c235acc</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5013%3A%20Path%20Traversal%20in%20elecV2%20elecV2P&amp;severity=medium&amp;id=69c83c4f919ccadcdf051ab2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5012-os-command-injection-in-elecv2-elecv-a675e27e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5012%3A%20OS%20Command%20Injection%20in%20elecV2%20elecV2P&amp;severity=medium&amp;id=69c82a1b2b68dbd88eb19d48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3256-cwe-340-generation-of-predictable-nu-ad49460d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3256%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20KTAT%20HTTP%3A%3ASession&amp;severity=critical&amp;id=69c826972b68dbd88eafb4bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15604-cwe-340-generation-of-predictable-n-ca970ba1</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15604%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20TOKUHIROM%20Amon2&amp;severity=critical&amp;id=69c823142b68dbd88eadbff7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5011-code-injection-in-elecv2-elecv2p-e0ba6ef3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5011%3A%20Code%20Injection%20in%20elecV2%20elecV2P&amp;severity=medium&amp;id=69c823142b68dbd88eadc006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5007-os-command-injection-in-kazuph-mcp-d-8c5548a0</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5007%3A%20OS%20Command%20Injection%20in%20kazuph%20mcp-docs-rag&amp;severity=medium&amp;id=69c823142b68dbd88eadbffe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5004-stack-based-buffer-overflow-in-wavli-7ae39014</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5004%3A%20Stack-based%20Buffer%20Overflow%20in%20Wavlink%20WL-WN579X3-C&amp;severity=high&amp;id=69c811842b68dbd88ea326b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5003-information-disclosure-in-promtengin-b6513727</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5003%3A%20Information%20Disclosure%20in%20PromtEngineer%20localGPT&amp;severity=medium&amp;id=69c811842b68dbd88ea326aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5002-injection-in-promtengineer-localgpt-1aabfd3d</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5002%3A%20Injection%20in%20PromtEngineer%20localGPT&amp;severity=medium&amp;id=69c80a782b68dbd88e9f987c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-cunning-predator-how-silver-fox-preys-on-japanes-697603f7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20cunning%20predator%3A%20How%20Silver%20Fox%20preys%20on%20Japanese%20firms%20this%20tax%20season&amp;severity=medium&amp;id=69ca4b8fe6bfc5ba1d0d7d14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5001-unrestricted-upload-in-promtengineer-271f0511</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5001%3A%20Unrestricted%20Upload%20in%20PromtEngineer%20localGPT&amp;severity=medium&amp;id=69c7ffec2b68dbd88e794fbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/teampcp-supply-chain-campaign-update-003-operation-0ad14f82</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TeamPCP%20Supply%20Chain%20Campaign%3A%20Update%20003%20-%20Operational%20Tempo%20Shift%20as%20Campaign%20Enters%20Monetization%20Phase%20With%20No%20New%20Compromises%20in%2048%20Hours%2C%20(Sat%2C%20Mar%2028th)&amp;severity=medium&amp;id=69c7f1db2b68dbd88e3e35d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5000-missing-authentication-in-promtengin-3eea2599</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5000%3A%20Missing%20Authentication%20in%20PromtEngineer%20localGPT&amp;severity=medium&amp;id=69c7ee562b68dbd88e316160</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4999-path-traversal-in-z-9527-admin-04e5407b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4999%3A%20Path%20Traversal%20in%20z-9527%20admin&amp;severity=medium&amp;id=69c7ee562b68dbd88e31615a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4998-code-injection-in-sinaptik-ai-pandas-fd0c98b8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4998%3A%20Code%20Injection%20in%20Sinaptik%20AI%20PandasAI&amp;severity=medium&amp;id=69c7d9402b68dbd88efcd7f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4997-path-traversal-in-sinaptik-ai-pandas-33b63c5c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4997%3A%20Path%20Traversal%20in%20Sinaptik%20AI%20PandasAI&amp;severity=medium&amp;id=69c7ceb42b68dbd88ef8dca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4996-sql-injection-in-sinaptik-ai-pandasa-a62f3dcb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4996%3A%20SQL%20Injection%20in%20Sinaptik%20AI%20PandasAI&amp;severity=medium&amp;id=69c7c0a42b68dbd88ef18cee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2595-cwe-79-improper-neutralization-of-in-ec76e7d0</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2595%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpquads%20Quads%20Ads%20Manager%20for%20Google%20AdSense&amp;severity=medium&amp;id=69c7bd322b68dbd88eeee801</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9497-cwe-798-use-of-hard-coded-credential-05235081</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9497%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20Microchip%20Time%20Provider%204100&amp;severity=medium&amp;id=69c7b6162b68dbd88eeae170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4995-cross-site-scripting-in-wandb-openui-72ab2620</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4995%3A%20Cross%20Site%20Scripting%20in%20wandb%20OpenUI&amp;severity=medium&amp;id=69c7b2942b68dbd88ee17702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cloudflare-themed-clickfix-attack-drops-infiniti-s-89c85cac</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cloudflare-Themed%20ClickFix%20Attack%20Drops%20Infiniti%20Stealer%20on%20Macs&amp;severity=medium&amp;id=69c7af0f2b68dbd88edf21e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2442-cwe-93-improper-neutralization-of-cr-39aa3590</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2442%3A%20CWE-93%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20softaculous%20Page%20Builder%3A%20Pagelayer%20%E2%80%93%20Drag%20and%20Drop%20website%20builder&amp;severity=medium&amp;id=69c7a4822b68dbd88ed883f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4994-information-exposure-through-error-m-a1e2e3d2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4994%3A%20Information%20Exposure%20Through%20Error%20Message%20in%20wandb%20OpenUI&amp;severity=medium&amp;id=69c83c4f919ccadcdf051abf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4993-hard-coded-credentials-in-wandb-open-34206a49</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4993%3A%20Hard-coded%20Credentials%20in%20wandb%20OpenUI&amp;severity=medium&amp;id=69c83c4f919ccadcdf051ab9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/telnyx-python-sdk-compromised-to-deliver-credentia-c990c297</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Telnyx%20Python%20SDK%20Compromised%20to%20Deliver%20Credential-Stealing%20Malware&amp;severity=medium&amp;id=69ca4b8fe6bfc5ba1d0d7d0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/breachforums-data-leaks-technical-analysis-and-tim-0df146b7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BreachForums%20Data%20Leaks%3A%20Technical%20Analysis%20and%20Timeline%20Attribution%20(2022%E2%80%932026)&amp;severity=medium&amp;id=69ca4b8fe6bfc5ba1d0d7d00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1307-cwe-200-exposure-of-sensitive-inform-15467f36</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1307%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20kstover%20Ninja%20Forms%20%E2%80%93%20The%20Contact%20Form%20Builder%20That%20Grows%20With%20You&amp;severity=medium&amp;id=69c77dd62b68dbd88eb19528</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15445-cwe-862-missing-authorization-in-re-ebaf3148</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15445%3A%20CWE-862%20Missing%20Authorization%20in%20Restaurant%20Cafeteria&amp;severity=medium&amp;id=69c7734a2b68dbd88eabfb65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12886-cwe-918-server-side-request-forgery-f4b6fece</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12886%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Laborator%20Oxygen%20-%20WooCommerce%20WordPress%20Theme&amp;severity=high&amp;id=69c74c9e2b68dbd88e79ce13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4987-cwe-20-improper-input-validation-in--6438ea07</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4987%3A%20CWE-20%20Improper%20Input%20Validation%20in%20brainstormforce%20SureForms%20%E2%80%93%20Contact%20Form%2C%20Payment%20Form%20%26%20Other%20Custom%20Form%20Builder&amp;severity=high&amp;id=69c7307f2b68dbd88e6742d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-28-cf9131f5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-28&amp;severity=medium&amp;id=69c86f15919ccadcdf5b95ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-28-e71c94e0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-28&amp;severity=medium&amp;id=69c7e03f2b68dbd88effa8b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-28-c40eedd1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-28&amp;severity=low&amp;id=69c7501a2b68dbd88e7d74a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1679-buffer-copy-without-checking-size-of-5ca8f17f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1679%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20zephyrproject-rtos%20Zephyr&amp;severity=high&amp;id=69c7145f2b68dbd88e5638f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4248-cwe-285-improper-authorization-in-ul-0446e863</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4248%3A%20CWE-285%20Improper%20Authorization%20in%20ultimatemember%20Ultimate%20Member%20%E2%80%93%20User%20Profile%2C%20Registration%2C%20Login%2C%20Member%20Directory%2C%20Content%20Restriction%20%26%20Membership%20Plugin&amp;severity=high&amp;id=69c706502b68dbd88e324709</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33996-cwe-476-null-pointer-dereference-in-d8cb8d7c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33996%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20benmcollins%20libjwt&amp;severity=medium&amp;id=69c706502b68dbd88e324705</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33994-cwe-1321-improperly-controlled-modi-7ca08c52</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33994%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20locutusjs%20locutus&amp;severity=medium&amp;id=69c702cd2b68dbd88e2edf94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33993-cwe-1321-improperly-controlled-modi-474a6f4d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33993%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20locutusjs%20locutus&amp;severity=medium&amp;id=69c702cd2b68dbd88e2edf8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33991-cwe-89-improper-neutralization-of-s-585124c0</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33991%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=69c702cd2b68dbd88e2edf8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33936-cwe-20-improper-input-validation-in-2b6599fa</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33936%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20tlsfuzzer%20python-ecdsa&amp;severity=medium&amp;id=69c702cd2b68dbd88e2edf86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4992-cross-site-scripting-in-wandb-openui-e8f6e690</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4992%3A%20Cross%20Site%20Scripting%20in%20wandb%20OpenUI&amp;severity=medium&amp;id=69c702cd2b68dbd88e2edf9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4991-cross-site-scripting-in-qdocs-smart--297c25d4</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4991%3A%20Cross%20Site%20Scripting%20in%20QDOCS%20Smart%20School%20Management%20System&amp;severity=medium&amp;id=69c702cd2b68dbd88e2edf9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33989-cwe-22-improper-limitation-of-a-pat-761e1467</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33989%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20mobile-next%20mobile-mcp&amp;severity=high&amp;id=69c6ff482b68dbd88e2a92a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33981-cwe-200-exposure-of-sensitive-infor-608754f6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33981%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20dgtlmoon%20changedetection.io&amp;severity=high&amp;id=69c6ff482b68dbd88e2a929d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33980-cwe-943-improper-neutralization-of--dc16a759</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33980%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20pab1it0%20adx-mcp-server&amp;severity=high&amp;id=69c6fa4f3c064ed76ffa5f1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33979-cwe-183-permissive-list-of-allowed--75ae3464</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33979%3A%20CWE-183%3A%20Permissive%20List%20of%20Allowed%20Inputs%20in%20AhmedAdelFahim%20express-xss-sanitizer&amp;severity=high&amp;id=69c6fa4f3c064ed76ffa5f18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33955-cwe-79-improper-neutralization-of-i-04111b1f</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33955%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20streetwriters%20Notesnook%20Web%2FDesktop&amp;severity=high&amp;id=69c6fa4f3c064ed76ffa5f12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4990-improper-authorization-in-chatwoot-9cefc3d2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4990%3A%20Improper%20Authorization%20in%20chatwoot&amp;severity=medium&amp;id=69c6fa4f3c064ed76ffa5f32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4988-denial-of-service-in-open5gs-42cbf14d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4988%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=69c6fa4f3c064ed76ffa5f2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4985-integer-overflow-in-dloebl-cgif-5e373785</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4985%3A%20Integer%20Overflow%20in%20dloebl%20CGIF&amp;severity=medium&amp;id=69c6fa4f3c064ed76ffa5f21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33976-cwe-79-improper-neutralization-of-i-cedece5d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33976%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20streetwriters%20Notesnook%20Web%2FDesktop&amp;severity=critical&amp;id=69c6fa4f3c064ed76ffa5f15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33954-cwe-285-improper-authorization-in-k-60cf3f7a</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33954%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Kovah%20LinkAce&amp;severity=medium&amp;id=69c6fa4f3c064ed76ffa5f0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33953-cwe-918-server-side-request-forgery-aa47dbeb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33953%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Kovah%20LinkAce&amp;severity=high&amp;id=69c6f6ca3c064ed76ff81bbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27309-use-after-free-cwe-416-in-adobe-sub-e8186d78</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27309%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=69c6f6ca3c064ed76ff81b9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33946-cwe-384-session-fixation-in-modelco-507e7510</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33946%3A%20CWE-384%3A%20Session%20Fixation%20in%20modelcontextprotocol%20ruby-sdk&amp;severity=high&amp;id=69c6f6ca3c064ed76ff81bb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34226-cwe-201-insertion-of-sensitive-info-59be2af2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34226%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20capricorn86%20happy-dom&amp;severity=high&amp;id=69c6f6ca3c064ed76ff81bc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33943-cwe-94-improper-control-of-generati-83e18bd5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33943%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20capricorn86%20happy-dom&amp;severity=high&amp;id=69c6f6ca3c064ed76ff81bae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33941-cwe-79-improper-neutralization-of-i-0c3a00bd</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33941%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20handlebars-lang%20handlebars.js&amp;severity=high&amp;id=69c6f6ca3c064ed76ff81ba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33940-cwe-94-improper-control-of-generati-e76af596</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33940%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20handlebars-lang%20handlebars.js&amp;severity=high&amp;id=69c6f6ca3c064ed76ff81ba4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33939-cwe-754-improper-check-for-unusual--3cf356be</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33939%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20handlebars-lang%20handlebars.js&amp;severity=high&amp;id=69c6f6ca3c064ed76ff81b9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33938-cwe-94-improper-control-of-generati-a3f5c858</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33938%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20handlebars-lang%20handlebars.js&amp;severity=high&amp;id=69c6f3473c064ed76ff618a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33937-cwe-843-access-of-resource-using-in-5708b559</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33937%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20handlebars-lang%20handlebars.js&amp;severity=critical&amp;id=69c6f3473c064ed76ff618a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33916-cwe-79-improper-neutralization-of-i-5e8c53a1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33916%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20handlebars-lang%20handlebars.js&amp;severity=medium&amp;id=69c6f3473c064ed76ff6189c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33907-cwe-476-null-pointer-dereference-in-c5f76ee9</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33907%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20ellanetworks%20core&amp;severity=medium&amp;id=69c6f3473c064ed76ff61897</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33906-cwe-269-improper-privilege-manageme-512598f2</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33906%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20ellanetworks%20core&amp;severity=high&amp;id=69c6f3473c064ed76ff61892</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33904-cwe-833-deadlock-in-ellanetworks-co-00359507</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33904%3A%20CWE-833%3A%20Deadlock%20in%20ellanetworks%20core&amp;severity=medium&amp;id=69c6f3473c064ed76ff6188d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33903-cwe-476-null-pointer-dereference-in-3ccc04e0</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33903%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20ellanetworks%20core&amp;severity=medium&amp;id=69c6efd03c064ed76ff473fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33896-cwe-295-improper-certificate-valida-cdbadd36</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33896%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20digitalbazaar%20forge&amp;severity=high&amp;id=69c6efd03c064ed76ff473f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33895-cwe-347-improper-verification-of-cr-95f9ae6f</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33895%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20digitalbazaar%20forge&amp;severity=high&amp;id=69c6efce3c064ed76ff462eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33894-cwe-347-improper-verification-of-cr-a7043394</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33894%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20digitalbazaar%20forge&amp;severity=high&amp;id=69c6efce3c064ed76ff462e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33891-cwe-835-loop-with-unreachable-exit--0b104492</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33891%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20digitalbazaar%20forge&amp;severity=high&amp;id=69c6efce3c064ed76ff462e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32187-defense-in-depth-in-microsoft-micro-ee466c6b</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32187&amp;severity=null&amp;id=69c6efce3c064ed76ff462cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33887-cwe-862-missing-authorization-in-st-d67a668d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33887%3A%20CWE-862%3A%20Missing%20Authorization%20in%20statamic%20cms&amp;severity=medium&amp;id=69c6efce3c064ed76ff462de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33886-cwe-200-exposure-of-sensitive-infor-6b040762</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33886%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20statamic%20cms&amp;severity=medium&amp;id=69c6efce3c064ed76ff462db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33885-cwe-601-url-redirection-to-untruste-93d7d876</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33885%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20statamic%20cms&amp;severity=medium&amp;id=69c6efce3c064ed76ff462d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33884-cwe-863-incorrect-authorization-in--b5e8a17b</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33884%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20statamic%20cms&amp;severity=medium&amp;id=69c6efce3c064ed76ff462d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33883-cwe-79-improper-neutralization-of-i-0694226b</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33883%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20statamic%20cms&amp;severity=medium&amp;id=69c6efce3c064ed76ff462d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33882-cwe-20-improper-input-validation-in-7a276760</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33882%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20statamic%20cms&amp;severity=medium&amp;id=69c6efce3c064ed76ff462cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33881-cwe-94-improper-control-of-generati-d4c95438</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33881%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20windmill-labs%20windmill&amp;severity=high&amp;id=69c6ec5f3c064ed76ff25048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33879-cwe-307-improper-restriction-of-exc-fb0fa8de</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33879%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20londonaicentre%20FLIP&amp;severity=low&amp;id=69c6ec5f3c064ed76ff25045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4976-buffer-overflow-in-totolink-lr350-f0bc237b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4976%3A%20Buffer%20Overflow%20in%20Totolink%20LR350&amp;severity=high&amp;id=69c6ec5f3c064ed76ff2504b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33875-cwe-940-improper-verification-of-so-189b5f61</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33875%3A%20CWE-940%3A%20Improper%20Verification%20of%20Source%20of%20a%20Communication%20Channel%20in%20gematik%20app-Authenticator&amp;severity=critical&amp;id=69c6ec5f3c064ed76ff25042</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33874-cwe-78-improper-neutralization-of-s-4c942ed9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33874%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20gematik%20app-Authenticator&amp;severity=high&amp;id=69c6ec5f3c064ed76ff2503c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34046-cwe-639-authorization-bypass-throug-a0ee16dd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34046%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20langflow-ai%20langflow&amp;severity=high&amp;id=69c6e8bb3c064ed76ff077d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33873-cwe-94-improper-control-of-generati-cafbe4ee</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33873%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20langflow-ai%20langflow&amp;severity=critical&amp;id=69c6e8bb3c064ed76ff077be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33872-cwe-362-concurrent-execution-using--727f216c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33872%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20revelrylabs%20elixir-nodejs&amp;severity=high&amp;id=69c6e53a3c064ed76fede072</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4975-stack-based-buffer-overflow-in-tenda-817f95ef</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4975%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC15&amp;severity=high&amp;id=69c6e53a3c064ed76fede086</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4974-stack-based-buffer-overflow-in-tenda-15d8d9aa</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4974%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC7&amp;severity=high&amp;id=69c6e53a3c064ed76fede07f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4973-cross-site-scripting-in-sourcecodest-f50d41d0</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4973%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Online%20Quiz%20System&amp;severity=medium&amp;id=69c6e53a3c064ed76fede078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33765-cwe-78-improper-neutralization-of-s-3a7427e3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33765%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20pi-hole%20web&amp;severity=high&amp;id=69c6e1b93c064ed76febd417</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33654-cwe-94-improper-control-of-generati-c2cfed7a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33654%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20HKUDS%20nanobot&amp;severity=high&amp;id=69c6e1b93c064ed76febd414</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34205-cwe-923-improper-restriction-of-com-dfad0bbb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34205%3A%20CWE-923%3A%20Improper%20Restriction%20of%20Communication%20Channel%20to%20Intended%20Endpoints%20in%20home-assistant%20Home%20Assistant%20Operating%20System&amp;severity=critical&amp;id=69c6e1b93c064ed76febd41a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34475-cwe-180-incorrect-behavior-order-va-77fc7370</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34475%3A%20CWE-180%20Incorrect%20Behavior%20Order%3A%20Validate%20Before%20Canonicalize%20in%20varnish-software%20Varnish%20Cache&amp;severity=medium&amp;id=69c6e1b93c064ed76febd41d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33045-cwe-79-improper-neutralization-of-i-245e58ec</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33045%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20home-assistant%20core&amp;severity=high&amp;id=69c6e1b93c064ed76febd410</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33044-cwe-79-improper-neutralization-of-i-8931a13c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33044%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20home-assistant%20core&amp;severity=high&amp;id=69c6e1b93c064ed76febd40d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32241-cwe-77-improper-neutralization-of-s-5b167894</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32241%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20flannel-io%20flannel&amp;severity=high&amp;id=69c6de373c064ed76fea1d6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31951-cwe-200-exposure-of-sensitive-infor-2658a252</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31951%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20danny-avila%20LibreChat&amp;severity=medium&amp;id=69c6de373c064ed76fea1d6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31950-cwe-284-improper-access-control-in--9692bdfc</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31950%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20danny-avila%20LibreChat&amp;severity=medium&amp;id=69c6de373c064ed76fea1d68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31945-cwe-918-server-side-request-forgery-6d761e69</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31945%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20danny-avila%20LibreChat&amp;severity=high&amp;id=69c6de373c064ed76fea1d65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31943-cwe-918-server-side-request-forgery-37c34fc7</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31943%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20danny-avila%20LibreChat&amp;severity=high&amp;id=69c6de373c064ed76fea1d62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34391-cwe-488-exposure-of-data-element-to-d0ca6277</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34391%3A%20CWE-488%3A%20Exposure%20of%20Data%20Element%20to%20Wrong%20Session%20in%20fleetdm%20fleet&amp;severity=medium&amp;id=69c6de373c064ed76fea1d75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34389-cwe-287-improper-authentication-in--a644a652</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34389%3A%20CWE-287%3A%20Improper%20Authentication%20in%20fleetdm%20fleet&amp;severity=medium&amp;id=69c6de373c064ed76fea1d72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4972-cross-site-scripting-in-code-project-71861764</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4972%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Online%20Reviewer%20System&amp;severity=medium&amp;id=69c6daaa3c064ed76fe814bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4971-cross-site-request-forgery-in-source-69d6fee6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4971%3A%20Cross-Site%20Request%20Forgery%20in%20SourceCodester%20Note%20Taking%20App&amp;severity=medium&amp;id=69c6daaa3c064ed76fe814b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34388-cwe-703-improper-check-or-handling--939ff080</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34388%3A%20CWE-703%3A%20Improper%20Check%20or%20Handling%20of%20Exceptional%20Conditions%20in%20fleetdm%20fleet&amp;severity=medium&amp;id=69c6daaa3c064ed76fe814b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-infrastructure-supply-chain-poisoning-alert-0bea3b94</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20Infrastructure%20Supply%20Chain%20Poisoning%20Alert&amp;severity=medium&amp;id=69c6de343c064ed76fea1bee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aitm-phishing-targets-tiktok-business-accounts-usi-bb5b2f91</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AitM%20Phishing%20Targets%20TikTok%20Business%20Accounts%20Using%20Cloudflare%20Turnstile%20Evasion&amp;severity=medium&amp;id=69c6de343c064ed76fea1be2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bogus-website-fakes-virus-scan-installs-venom-stea-59949404</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bogus%20website%20fakes%20virus%20scan%2C%20installs%20Venom%20Stealer%20instead&amp;severity=medium&amp;id=69d636951cc7ad14da612bfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34387-cwe-78-improper-neutralization-of-s-b0d45cde</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34387%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20fleetdm%20fleet&amp;severity=medium&amp;id=69c6d01e3c064ed76fe28e22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34386-cwe-89-improper-neutralization-of-s-4c1e8f40</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34386%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20fleetdm%20fleet&amp;severity=medium&amp;id=69c6d01e3c064ed76fe28e1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34385-cwe-89-improper-neutralization-of-s-b5e82d09</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34385%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20fleetdm%20fleet&amp;severity=medium&amp;id=69c6d01e3c064ed76fe28e1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29180-cwe-862-missing-authorization-in-fl-da4570c6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29180%3A%20CWE-862%3A%20Missing%20Authorization%20in%20fleetdm%20fleet&amp;severity=medium&amp;id=69c6d01e3c064ed76fe28e0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4970-sql-injection-in-code-projects-socia-1b1f86da</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4970%3A%20SQL%20Injection%20in%20code-projects%20Social%20Networking%20Site&amp;severity=medium&amp;id=69c6d0203c064ed76fe28e7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4969-cross-site-scripting-in-code-project-e2e4a1f5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4969%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Social%20Networking%20Site&amp;severity=medium&amp;id=69c6d0203c064ed76fe28e75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26061-cwe-770-allocation-of-resources-wit-73916d43</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26061%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20fleetdm%20fleet&amp;severity=high&amp;id=69c6d01e3c064ed76fe28e0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26060-cwe-613-insufficient-session-expira-e9113065</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26060%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20fleetdm%20fleet&amp;severity=medium&amp;id=69c6d01e3c064ed76fe28e08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34375-cwe-79-improper-neutralization-of-i-f0b41eba</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34375%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c6d01e3c064ed76fe28e18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34374-cwe-89-improper-neutralization-of-s-171f2208</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34374%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=critical&amp;id=69c6d01e3c064ed76fe28e15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15612-cwe-295-improper-certificate-valida-2a970739</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15612%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Wazuh%20Wazuh%20Provisioning%20Scripts%20(Agent%20Build%20Environment)&amp;severity=medium&amp;id=69c6d01e3c064ed76fe28e04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34369-cwe-862-missing-authorization-in-ww-b48b43d7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34369%3A%20CWE-862%3A%20Missing%20Authorization%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c6d01e3c064ed76fe28e11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34368-cwe-362-concurrent-execution-using--5d1f951f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34368%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c6c9173c064ed76fdf38a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34364-cwe-863-incorrect-authorization-in--077b2b46</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34364%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c6c9173c064ed76fdf389d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15617-cwe-522-insufficiently-protected-cr-9454fac7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15617%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Wazuh%20Wazuh%20(GitHub%20Actions)&amp;severity=medium&amp;id=69c6c9173c064ed76fdf3893</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4968-cross-site-request-forgery-in-source-af9ec2e0</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4968%3A%20Cross-Site%20Request%20Forgery%20in%20SourceCodester%20Diary%20App&amp;severity=medium&amp;id=69c6c5913c064ed76fdb1782</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4966-sql-injection-in-itsourcecode-free-h-6dc1800b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4966%3A%20SQL%20Injection%20in%20itsourcecode%20Free%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=69c6c5913c064ed76fdb177b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4965-improper-neutralization-of-directive-9aea4106</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4965%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20in%20letta-ai%20letta&amp;severity=medium&amp;id=69c6c5913c064ed76fdb1775</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4964-server-side-request-forgery-in-letta-1bb98fde</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4964%3A%20Server-Side%20Request%20Forgery%20in%20letta-ai%20letta&amp;severity=medium&amp;id=69c6c6913c064ed76fdc2946</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4963-code-injection-in-huggingface-smolag-98db0746</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4963%3A%20Code%20Injection%20in%20huggingface%20smolagents&amp;severity=medium&amp;id=69c6c6913c064ed76fdc293d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4962-uncontrolled-search-path-in-ultravnc-34124aea</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4962%3A%20Uncontrolled%20Search%20Path%20in%20UltraVNC&amp;severity=high&amp;id=69c6c5913c064ed76fdb178d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34362-cwe-613-insufficient-session-expira-8dde0450</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34362%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c6b7823c064ed76fc77db6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pro-iranian-hacking-group-claims-credit-for-hack-o-60a43961</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pro-Iranian%20Hacking%20Group%20Claims%20Credit%20for%20Hack%20of%20FBI%20Director%20Kash%20Patel%E2%80%99s%20Personal%20Account&amp;severity=medium&amp;id=69c6b3fd3c064ed76fc55bc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34247-cwe-862-missing-authorization-in-ww-01b2864d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34247%3A%20CWE-862%3A%20Missing%20Authorization%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c6b7823c064ed76fc77db2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15616-cwe-94-improper-control-of-generati-f69b8211</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15616%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Wazuh%20wazuh-agent&amp;severity=high&amp;id=69c6b7823c064ed76fc77d9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34245-cwe-862-missing-authorization-in-ww-218357cf</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34245%3A%20CWE-862%3A%20Missing%20Authorization%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c6b7823c064ed76fc77dae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33867-cwe-312-cleartext-storage-of-sensit-e9914632</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33867%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20WWBN%20AVideo&amp;severity=critical&amp;id=69c6b7823c064ed76fc77daa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15615-cwe-276-incorrect-default-permissio-6c55aec2</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15615%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20Wazuh%20wazuh-manager&amp;severity=medium&amp;id=69c6c5913c064ed76fdb1789</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15381-cwe-200-exposure-of-sensitive-infor-58cdecb0</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15381%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20mlflow%20mlflow%2Fmlflow&amp;severity=high&amp;id=69c6c6913c064ed76fdc294c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33770-cwe-89-improper-neutralization-of-s-48be2040</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33770%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c6c6913c064ed76fdc2961</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28369-inconsistent-interpretation-of-http-710a6b03</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28369%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Apache%20Camel%20for%20Spring%20Boot%204&amp;severity=high&amp;id=69c6c6913c064ed76fdc2957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28367-inconsistent-interpretation-of-http-86cc39b5</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28367%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Apache%20Camel%20for%20Spring%20Boot%204&amp;severity=high&amp;id=69c6c6913c064ed76fdc294f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28368-inconsistent-interpretation-of-http-8e8a214c</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28368%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Apache%20Camel%20for%20Spring%20Boot%204&amp;severity=high&amp;id=69c6c6913c064ed76fdc2953</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33767-cwe-89-improper-neutralization-of-s-be3257f6</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33767%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c6c20e3c064ed76fce99b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4961-stack-based-buffer-overflow-in-tenda-7613bc02</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4961%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC6&amp;severity=high&amp;id=69c6c20e3c064ed76fce99b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4960-stack-based-buffer-overflow-in-tenda-f1d5709e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4960%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC6&amp;severity=high&amp;id=69c6c6913c064ed76fdc2965</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32983-cwe-276-incorrect-default-permissio-2038176e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32983%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20Wazuh%20wazuh-manager&amp;severity=medium&amp;id=69c6a9723c064ed76fbf9381</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4959-missing-authentication-in-openbmb-xa-57f06968</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4959%3A%20Missing%20Authentication%20in%20OpenBMB%20XAgent&amp;severity=medium&amp;id=69c6a9723c064ed76fbf938c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4958-authorization-bypass-in-openbmb-xage-e355a4dd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4958%3A%20Authorization%20Bypass%20in%20OpenBMB%20XAgent&amp;severity=low&amp;id=69c6a9723c064ed76fbf9385</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/most-notable-supply-chain-attacks-of-2025-kaspersk-65bf714a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Most%20notable%20supply-chain%20attacks%20of%202025%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69c69b673c064ed76fb8319c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5027-cwe-22-improper-limitation-of-a-path-965c6426</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5027%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20in%20langflow-ai%20langflow&amp;severity=high&amp;id=69c69ee73c064ed76fb956b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4957-sensitive-information-in-log-files-i-50f0bde8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4957%3A%20Sensitive%20Information%20in%20Log%20Files%20in%20OpenBMB%20XAgent&amp;severity=medium&amp;id=69c69ee73c064ed76fb956aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4956-sql-injection-in-shenzhen-ruiming-te-2de04042</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4956%3A%20SQL%20Injection%20in%20Shenzhen%20Ruiming%20Technology%20Streamax%20Crocus&amp;severity=medium&amp;id=69c69ee73c064ed76fb956a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4955-sql-injection-in-shenzhen-ruiming-te-8eb7713e</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4955%3A%20SQL%20Injection%20in%20Shenzhen%20Ruiming%20Technology%20Streamax%20Crocus&amp;severity=medium&amp;id=69c69ee73c064ed76fb9569d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5026-cwe-79-improper-neutralization-of-in-c75988b1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5026%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20langflow-ai%20langflow&amp;severity=high&amp;id=69c69ee73c064ed76fb956b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5025-cwe-862-missing-authorization-in-lan-fcc5962e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5025%3A%20CWE-862%20Missing%20Authorization%20in%20langflow-ai%20langflow&amp;severity=medium&amp;id=69c69ee73c064ed76fb956b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5010-cwe-79-improper-neutralization-of-in-055aca8f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5010%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Sanoma%20Clickedu&amp;severity=medium&amp;id=69c697e13c064ed76fb722b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/teampcp-supply-chain-campaign-update-002-telnyx-py-dd315e4a</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TeamPCP%20Supply%20Chain%20Campaign%3A%20Update%20002%20-%20Telnyx%20PyPI%20Compromise%2C%20Vect%20Ransomware%20Mass%20Affiliate%20Program%2C%20and%20First%20Named%20Victim%20Claim%2C%20(Fri%2C%20Mar%2027th)&amp;severity=medium&amp;id=69c694683c064ed76fb59f86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5022-cwe-862-missing-authorization-in-lan-00d95863</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5022%3A%20CWE-862%20Missing%20Authorization%20in%20langflow-ai%20langflow&amp;severity=medium&amp;id=69c697e33c064ed76fb722dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33766-cwe-918-server-side-request-forgery-f241f712</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33766%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c697e13c064ed76fb722ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33764-cwe-639-authorization-bypass-throug-9632a444</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33764%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c697e13c064ed76fb722a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-palo-alto-recruiter-scam-anti-deepfa-9f373486</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20Palo%20Alto%20Recruiter%20Scam%2C%20Anti-Deepfake%20Chip%2C%20Google%20Sets%202029%20Quantum%20Deadline&amp;severity=medium&amp;id=69c6945a3c064ed76fb59acd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33763-cwe-307-improper-restriction-of-exc-a4e305cb</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33763%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c697e13c064ed76fb722a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27876-vulnerability-in-grafana-grafana-en-b51cbbf8</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27876%3A%20Vulnerability%20in%20Grafana%20Grafana%20Enterprise&amp;severity=critical&amp;id=69c697e13c064ed76fb72296</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33761-cwe-862-missing-authorization-in-ww-8ddf3006</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33761%3A%20CWE-862%3A%20Missing%20Authorization%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c697e13c064ed76fb722a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33759-cwe-862-missing-authorization-in-ww-e274f6e1</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33759%3A%20CWE-862%3A%20Missing%20Authorization%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c697e13c064ed76fb7229c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1496-cwe-639-authorization-bypass-through-d8c09de9</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1496%3A%20CWE-639%20Authorization%20bypass%20through%20User-Controlled%20key%20in%20Black%20Duck%20Coverity&amp;severity=critical&amp;id=69c694993c064ed76fb5b666</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4954-sql-injection-in-mingsoft-mcms-4f540294</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4954%3A%20SQL%20Injection%20in%20mingSoft%20MCMS&amp;severity=medium&amp;id=69c6949b3c064ed76fb5b75c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4953-server-side-request-forgery-in-mings-e5843174</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4953%3A%20Server-Side%20Request%20Forgery%20in%20mingSoft%20MCMS&amp;severity=medium&amp;id=69c6949b3c064ed76fb5b756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11604-cwe-532-insertion-of-sensitive-info-df89216d</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11604%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20OpenText%20IDM%20Driver%20and%20Extensions&amp;severity=high&amp;id=69c694993c064ed76fb5b65f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33755-cwe-89-improper-neutralization-of-s-75a40d5b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33755%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Intermesh%20groupoffice&amp;severity=high&amp;id=69c6949b3c064ed76fb5b753</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33750-cwe-400-uncontrolled-resource-consu-59607088</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33750%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20juliangruber%20brace-expansion&amp;severity=medium&amp;id=69c6949b3c064ed76fb5b747</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33748-cwe-22-improper-limitation-of-a-pat-59db9529</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33748%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20moby%20buildkit&amp;severity=high&amp;id=69c6949b3c064ed76fb5b742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33284-cwe-20-improper-input-validation-in-ead42146</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33284%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20globaleaks%20globaleaks-whistleblowing-software&amp;severity=low&amp;id=69c694993c064ed76fb5b681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33206-cwe-23-relative-path-traversal-in-k-107aaef1</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33206%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20kovidgoyal%20calibre&amp;severity=high&amp;id=69c694993c064ed76fb5b67e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33205-cwe-918-server-side-request-forgery-a841d997</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33205%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20kovidgoyal%20calibre&amp;severity=medium&amp;id=69c694993c064ed76fb5b67b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13478-cwe-522-insufficiently-protected-cr-a00443b7</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13478%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20OpenText%20Identity%20Manager&amp;severity=high&amp;id=69c68d533c064ed76fb2aba2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32859-cwe-79-improper-neutralization-of-i-bce14615</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32859%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Bytedance%20Inc.%20DeerFlow&amp;severity=medium&amp;id=69c68d533c064ed76fb2aba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4982-cwe-20-improper-input-validation-in--05602973</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4982%3A%20CWE-20%20Improper%20input%20validation%20in%20pretix%20Venueless&amp;severity=high&amp;id=69c67f433c064ed76facb4e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4620-cwe-78-improper-neutralization-of-sp-aca82dd8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4620%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20NEC%20Platforms%2C%20Ltd.%20Aterm%20WX1500HP&amp;severity=high&amp;id=69c674b53c064ed76fa619de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4622-cwe-78-improper-neutralization-of-sp-3939268a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4622%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20NEC%20Platforms%2C%20Ltd.%20Aterm%20WG2600HS&amp;severity=high&amp;id=69c674b53c064ed76fa619e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4621-cwe-912-hidden-functionality-in-nec--04a5c93b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4621%3A%20CWE-912%3A%20Hidden%20Functionality%20in%20NEC%20Platforms%2C%20Ltd.%20Aterm%20W1200EX(-MS)&amp;severity=medium&amp;id=69c674b53c064ed76fa619e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4619-cwe-22-improper-limitation-of-a-path-83322c52</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4619%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20NEC%20Platforms%2C%20Ltd.%20Aterm%20WX3600HP&amp;severity=medium&amp;id=69c671313c064ed76fa3fd88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4309-cwe-862-missing-authorization-in-nec-06bc0ccd</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4309%3A%20CWE-862%3A%20Missing%20Authorization%20in%20NEC%20Platforms%2C%20Ltd.%20Aterm%20W1200EX(-MS)&amp;severity=medium&amp;id=69c671313c064ed76fa3fd84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tp-link-patches-high-severity-router-vulnerabiliti-8c193f30</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TP-Link%20Patches%20High-Severity%20Router%20Vulnerabilities&amp;severity=high&amp;id=69c66dad3c064ed76fa11cd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/coruna-ios-exploit-kit-likely-an-update-to-operati-9113ab40</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Coruna%20iOS%20Exploit%20Kit%20Likely%20an%20Update%20to%20Operation%20Triangulation&amp;severity=medium&amp;id=69c65f9d3c064ed76f950c56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-flags-critical-ptc-vulnerability-that-had-ger-e5854258</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Flags%20Critical%20PTC%20Vulnerability%20That%20Had%20German%20Police%20Mobilized&amp;severity=critical&amp;id=69c64e093c064ed76f7d2b51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3457-cwe-79-improper-neutralization-of-in-6c12ff4f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3457%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Thales%20Sentinel%20LDK%20Runtime&amp;severity=high&amp;id=69c64a8f3c064ed76f7aa1a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-keitaro-abuse-part-2-one-platform-many-thre-3d831901</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20Keitaro%20Abuse%20Part%202%3A%20One%20Platform%2C%20Many%20Threats&amp;severity=medium&amp;id=69c6518c3c064ed76f7f61aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/brushworm-and-brushlogger-uncovered-415a1fb0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BRUSHWORM%20and%20BRUSHLOGGER%20uncovered&amp;severity=medium&amp;id=69c6518c3c064ed76f7f6213</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27860-improper-neutralization-of-special--6360e1c2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27860%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20LDAP%20Query%20(&apos;LDAP%20Injection&apos;)%20in%20Open-Xchange%20GmbH%20OX%20Dovecot%20Pro&amp;severity=low&amp;id=69c63ffd3c064ed76f701ae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27859-uncontrolled-resource-consumption-i-fe0e60ad</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27859%3A%20Uncontrolled%20Resource%20Consumption%20in%20Open-Xchange%20GmbH%20OX%20Dovecot%20Pro&amp;severity=medium&amp;id=69c63ffa3c064ed76f701a60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27858-uncontrolled-resource-consumption-i-4ea18f33</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27858%3A%20Uncontrolled%20Resource%20Consumption%20in%20Open-Xchange%20GmbH%20OX%20Dovecot%20Pro&amp;severity=high&amp;id=69c63ffa3c064ed76f701a5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27857-uncontrolled-resource-consumption-i-0011fc23</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27857%3A%20Uncontrolled%20Resource%20Consumption%20in%20Open-Xchange%20GmbH%20OX%20Dovecot%20Pro&amp;severity=medium&amp;id=69c63ffa3c064ed76f701a5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27856-improper-authentication-in-open-xch-d601837d</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27856%3A%20Improper%20Authentication%20in%20Open-Xchange%20GmbH%20OX%20Dovecot%20Pro&amp;severity=high&amp;id=69c63ffa3c064ed76f701a57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27855-authentication-bypass-by-capture-re-77b5e888</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27855%3A%20Authentication%20Bypass%20by%20Capture-replay%20in%20Open-Xchange%20GmbH%20OX%20Dovecot%20Pro&amp;severity=medium&amp;id=69c63ffa3c064ed76f701a54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24031-improper-neutralization-of-special--f2f4e9b3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24031%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Open-Xchange%20GmbH%20OX%20Dovecot%20Pro&amp;severity=high&amp;id=69c63ffa3c064ed76f701a51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0394-improper-limitation-of-a-pathname-to-145c4555</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0394%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Open-Xchange%20GmbH%20OX%20Dovecot%20Pro&amp;severity=medium&amp;id=69c63ffa3c064ed76f701a4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59032-improper-input-validation-in-open-x-bd435fc8</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59032%3A%20Improper%20Input%20Validation%20in%20Open-Xchange%20GmbH%20OX%20Dovecot%20Pro&amp;severity=high&amp;id=69c63ffa3c064ed76f701a4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59031-exposure-of-sensitive-information-t-20c26aad</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59031%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Open-Xchange%20GmbH%20OX%20Dovecot%20Pro&amp;severity=medium&amp;id=69c63ffa3c064ed76f701a48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59028-improper-input-validation-in-open-x-87a912ee</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59028%3A%20Improper%20Input%20Validation%20in%20Open-Xchange%20GmbH%20OX%20Dovecot%20Pro&amp;severity=medium&amp;id=69c63ffa3c064ed76f701a45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14028-cwe-416-use-after-free-in-softing-s-b6d4a86a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14028%3A%20CWE-416%20Use%20after%20free%20in%20Softing%20smartLink%20HW-DP&amp;severity=medium&amp;id=69c61cf33c064ed76f58580c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22744-vulnerability-in-spring-spring-ai-8d7a4912</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22744%3A%20Vulnerability%20in%20Spring%20Spring%20AI&amp;severity=high&amp;id=69c61cf33c064ed76f585816</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22743-vulnerability-in-spring-spring-ai-78da137c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22743%3A%20Vulnerability%20in%20Spring%20Spring%20AI&amp;severity=high&amp;id=69c61cf33c064ed76f585813</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4948-incorrect-execution-assigned-permiss-0bd6a078</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4948%3A%20Incorrect%20Execution-Assigned%20Permissions%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69c61cf33c064ed76f58582d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22742-vulnerability-in-spring-spring-ai-76d7852f</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22742%3A%20Vulnerability%20in%20Spring%20Spring%20AI&amp;severity=high&amp;id=69c61cf33c064ed76f585810</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33366-missing-authentication-for-critical-004c493d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33366%3A%20Missing%20authentication%20for%20critical%20function%20in%20BUFFALO%20INC.%20BUFFALO%20Wi-Fi%20router%20products&amp;severity=medium&amp;id=69c61cf33c064ed76f585829</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33280-hidden-functionality-in-buffalo-inc-cfe45036</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33280%3A%20Hidden%20functionality%20in%20BUFFALO%20INC.%20BUFFALO%20Wi-Fi%20router%20products&amp;severity=high&amp;id=69c61cf33c064ed76f585825</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32678-authentication-bypass-using-an-alte-3ed7b3d7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32678%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20BUFFALO%20INC.%20BUFFALO%20Wi-Fi%20router%20products&amp;severity=high&amp;id=69c61cf33c064ed76f585821</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32669-code-injection-in-buffalo-inc-buffa-9c341c29</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32669%3A%20Code%20injection%20in%20BUFFALO%20INC.%20BUFFALO%20Wi-Fi%20router%20products&amp;severity=high&amp;id=69c61cf33c064ed76f58581d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27650-improper-neutralization-of-special--be872db1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27650%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20BUFFALO%20INC.%20BUFFALO%20Wi-Fi%20router%20products&amp;severity=high&amp;id=69c61cf33c064ed76f585819</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22738-vulnerability-in-spring-spring-ai-473dec2d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22738%3A%20Vulnerability%20in%20Spring%20Spring%20AI&amp;severity=critical&amp;id=69c615c93c064ed76f536685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33559-cross-site-scripting-xss-in-mika-op-88322545</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33559%3A%20Cross-site%20scripting%20(XSS)%20in%20MiKa%20OpenStreetMap&amp;severity=medium&amp;id=69c615c93c064ed76f536688</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3098-cwe-862-missing-authorization-in-nex-82bd35df</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3098%3A%20CWE-862%20Missing%20Authorization%20in%20nextendweb%20Smart%20Slider%203&amp;severity=medium&amp;id=69c6c6933c064ed76fdc2987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4910-sql-injection-in-shenzhen-ruiming-te-af03ad8b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4910%3A%20SQL%20Injection%20in%20Shenzhen%20Ruiming%20Technology%20Streamax%20Crocus&amp;severity=medium&amp;id=69c66dbb3c064ed76fa122ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4909-cross-site-scripting-in-code-project-c59d5b0e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4909%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=69c5ef1e3c064ed76f1376f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4908-sql-injection-in-code-projects-simpl-05928344</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4908%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69c5ef1e3c064ed76f1376e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4907-server-side-request-forgery-in-page--8799229c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4907%3A%20Server-Side%20Request%20Forgery%20in%20Page-Replica%20Page%20Replica&amp;severity=medium&amp;id=69c6949d3c064ed76fb5b813</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4906-stack-based-buffer-overflow-in-tenda-f24bafca</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4906%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC5&amp;severity=high&amp;id=69c5da053c064ed76f01c452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33747-cwe-22-improper-limitation-of-a-pat-6a030cf7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33747%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20moby%20buildkit&amp;severity=high&amp;id=69c5da053c064ed76f01c442</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33745-cwe-200-exposure-of-sensitive-infor-23c6c791</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33745%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20yhirose%20cpp-httplib&amp;severity=high&amp;id=69c5da053c064ed76f01c43f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33935-cwe-307-improper-restriction-of-exc-874ceb6e</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33935%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20franklioxygen%20MyTube&amp;severity=high&amp;id=69c5da053c064ed76f01c44a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33890-cwe-284-improper-access-control-in--d138f9e1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33890%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20franklioxygen%20MyTube&amp;severity=high&amp;id=69c5da053c064ed76f01c446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33735-cwe-285-improper-authorization-in-f-ea8d45fd</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33735%3A%20CWE-285%3A%20Improper%20Authorization%20in%20franklioxygen%20MyTube&amp;severity=high&amp;id=69c5da053c064ed76f01c43a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33728-cwe-502-deserialization-of-untruste-d41c376a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33728%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20DataDog%20dd-trace-java&amp;severity=critical&amp;id=69c5d2fe3c064ed76ff4048b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33693-cwe-918-server-side-request-forgery-0d7a70f3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33693%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20LemmyNet%20lemmy&amp;severity=medium&amp;id=69c5d2fe3c064ed76ff4047c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33701-cwe-502-deserialization-of-untruste-08578920</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33701%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20open-telemetry%20opentelemetry-java-instrumentation&amp;severity=critical&amp;id=69c5d2fe3c064ed76ff40486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30568-na-c7d5136b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30568%3A%20n%2Fa&amp;severity=medium&amp;id=69c6c9173c064ed76fdf389a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30567-na-34ea507a</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30567%3A%20n%2Fa&amp;severity=medium&amp;id=69c6c9173c064ed76fdf3897</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30576-na-4a704b17</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30576%3A%20n%2Fa&amp;severity=high&amp;id=69c6c6913c064ed76fdc295e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30574-na-1948478e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30574%3A%20n%2Fa&amp;severity=high&amp;id=69c6c6913c064ed76fdc295b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-27-783cd3d7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-27&amp;severity=medium&amp;id=69c6c2053c064ed76fce23f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30575-na-ce7a4259</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30575%3A%20n%2Fa&amp;severity=high&amp;id=69c6b7823c064ed76fc77da7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30571-na-aad3cfe6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30571%3A%20n%2Fa&amp;severity=medium&amp;id=69c6b7823c064ed76fc77da4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30570-na-90f13cf1</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30570%3A%20n%2Fa&amp;severity=medium&amp;id=69c6b7823c064ed76fc77da1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30569-na-778534d9</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30569%3A%20n%2Fa&amp;severity=medium&amp;id=69c6b7823c064ed76fc77d9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30530-na-d795d87c</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30530%3A%20n%2Fa&amp;severity=critical&amp;id=69c6acf53c064ed76fc0f14f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30529-na-6d76fbec</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30529%3A%20n%2Fa&amp;severity=high&amp;id=69c6acf53c064ed76fc0f14c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30527-na-0e4ae47d</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30527%3A%20n%2Fa&amp;severity=medium&amp;id=69c6acf53c064ed76fc0f149</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30531-na-688119ea</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30531%3A%20n%2Fa&amp;severity=high&amp;id=69c6a9723c064ed76fbf937e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30302-na-b059f73c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30302%3A%20n%2Fa&amp;severity=critical&amp;id=69c6a9723c064ed76fbf937b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30534-na-ad84f286</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30534%3A%20n%2Fa&amp;severity=high&amp;id=69c6a26b3c064ed76fbc6561</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30533-na-901e8879</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30533%3A%20n%2Fa&amp;severity=critical&amp;id=69c6a26b3c064ed76fbc655e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30532-na-be24c2b9</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30532%3A%20n%2Fa&amp;severity=critical&amp;id=69c6a26b3c064ed76fbc655b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29871-na-8b7078d3</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29871%3A%20n%2Fa&amp;severity=high&amp;id=69c69ee73c064ed76fb9569a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30637-na-e7b36711</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30637%3A%20n%2Fa&amp;severity=high&amp;id=69c697e13c064ed76fb72299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69988-na-4a2623b9</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69988%3A%20n%2Fa&amp;severity=medium&amp;id=69c697e13c064ed76fb72293</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61190-na-08db7991</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61190%3A%20n%2Fa&amp;severity=medium&amp;id=69c697e13c064ed76fb7228e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30689-na-60d2c934</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30689%3A%20n%2Fa&amp;severity=high&amp;id=69c694993c064ed76fb5b676</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30304-na-c6885618</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30304%3A%20n%2Fa&amp;severity=critical&amp;id=69c694993c064ed76fb5b670</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30303-na-37247ce6</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30303%3A%20n%2Fa&amp;severity=critical&amp;id=69c694993c064ed76fb5b66c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69986-na-107043d7</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69986%3A%20n%2Fa&amp;severity=high&amp;id=69c694993c064ed76fb5b663</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-27-89ac2f2e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-27&amp;severity=low&amp;id=69c635653c064ed76f6845e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33699-cwe-835-loop-with-unreachable-exit--d1313b63</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33699%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=69c5d2fe3c064ed76ff40481</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27893-cwe-693-protection-mechanism-failur-a0dfde92</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27893%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20vllm-project%20vllm&amp;severity=high&amp;id=69c5c8713c064ed76fe63c5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33697-cwe-322-key-exchange-without-entity-b574293b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33697%3A%20CWE-322%3A%20Key%20Exchange%20without%20Entity%20Authentication%20in%20ultravioletrs%20cocos&amp;severity=high&amp;id=69c5c8713c064ed76fe63c63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33945-cwe-22-improper-limitation-of-a-pat-4b327a65</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33945%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20lxc%20incus&amp;severity=critical&amp;id=69c5c16a3c064ed76fe46d14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33898-cwe-287-improper-authentication-in--26104083</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33898%3A%20CWE-287%3A%20Improper%20Authentication%20in%20lxc%20incus&amp;severity=high&amp;id=69c5c16a3c064ed76fe46d11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4905-stack-based-buffer-overflow-in-tenda-a658b06f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4905%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC5&amp;severity=high&amp;id=69c66dbb3c064ed76fa122e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4904-stack-based-buffer-overflow-in-tenda-f869e792</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4904%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC5&amp;severity=high&amp;id=69c6c6933c064ed76fdc298c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33897-cwe-1336-improper-neutralization-of-fafd9faa</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33897%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20lxc%20incus&amp;severity=critical&amp;id=69c5ba613c064ed76fe1f5d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33743-cwe-770-allocation-of-resources-wit-4c38ea14</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33743%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20lxc%20incus&amp;severity=medium&amp;id=69c5ba613c064ed76fe1f5d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33711-cwe-61-unix-symbolic-link-symlink-f-631adb75</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33711%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20lxc%20incus&amp;severity=medium&amp;id=69c5ba613c064ed76fe1f5ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33542-cwe-295-improper-certificate-valida-feeb9042</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33542%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20lxc%20incus&amp;severity=medium&amp;id=69c5ba613c064ed76fe1f5cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4903-stack-based-buffer-overflow-in-tenda-b9940a9a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4903%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC5&amp;severity=high&amp;id=69c5ba613c064ed76fe1f5de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4902-stack-based-buffer-overflow-in-tenda-94214df0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4902%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC5&amp;severity=high&amp;id=69c5ba613c064ed76fe1f5d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4900-files-or-directories-accessible-in-c-df08f42b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4900%3A%20Files%20or%20Directories%20Accessible%20in%20code-projects%20Online%20Food%20Ordering%20System&amp;severity=medium&amp;id=69c5ac523c064ed76fd41c3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4899-cross-site-scripting-in-code-project-58c2a264</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4899%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Online%20Food%20Ordering%20System&amp;severity=medium&amp;id=69c5ac523c064ed76fd41c35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33686-cwe-22-improper-limitation-of-a-pat-5344035e</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33686%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20code16%20sharp&amp;severity=high&amp;id=69c5ac523c064ed76fd41c2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12805-improper-isolation-or-compartmental-96bbe2f0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12805%3A%20Improper%20Isolation%20or%20Compartmentalization%20in%20Red%20Hat%20Red%20Hat%20OpenShift%20AI%202.25&amp;severity=high&amp;id=69c5ac523c064ed76fd41c25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33687-cwe-434-unrestricted-upload-of-file-ceb5ec07</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33687%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20code16%20sharp&amp;severity=high&amp;id=69c5ac523c064ed76fd41c2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28377-vulnerability-in-grafana-tempo-a7a1aaaf</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28377%3A%20Vulnerability%20in%20Grafana%20Tempo&amp;severity=high&amp;id=69c5ac523c064ed76fd41c44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33672-cwe-1321-improperly-controlled-modi-73dc059c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33672%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20micromatch%20picomatch&amp;severity=medium&amp;id=69c5ac523c064ed76fd41c47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33671-cwe-1333-inefficient-regular-expres-753ec15d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33671%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20micromatch%20picomatch&amp;severity=high&amp;id=69c5a8ce3c064ed76fd1dae2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0748-cwe-284-improper-access-control-in-d-2bf828b8</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0748%3A%20CWE-284%20Improper%20Access%20Control%20in%20Drupal%20Internationalization%20(i18n)%20-%20i18n_node%20submodule&amp;severity=medium&amp;id=69c5a8ce3c064ed76fd1dade</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4346-cwe-312-cleartext-storage-of-sensiti-056ca912</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4346%3A%20CWE-312%20Cleartext%20storage%20of%20sensitive%20information%20in%20TP-Link%20Systems%20Inc.%20TL-WR850N%20v3&amp;severity=medium&amp;id=69c5a8ce3c064ed76fd1dae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33670-cwe-22-improper-limitation-of-a-pat-0880f67a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33670%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20siyuan-note%20siyuan&amp;severity=critical&amp;id=69c5a54b3c064ed76fcfc833</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33669-cwe-125-out-of-bounds-read-in-siyua-064aace2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33669%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20siyuan-note%20siyuan&amp;severity=critical&amp;id=69c5a54b3c064ed76fcfc830</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1556-cwe-200-exposure-of-sensitive-inform-0daf77f9</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1556%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Drupal%20Drupal%20File%20(Field)%20Paths&amp;severity=medium&amp;id=69c5a54b3c064ed76fcfc818</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33664-cwe-79-improper-neutralization-of-i-c3eb5eac</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33664%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kestra-io%20kestra&amp;severity=high&amp;id=69c5a54b3c064ed76fcfc82d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3650-cwe-401-in-grassroots-grassroots-dic-a3ef7ceb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3650%3A%20CWE-401%20in%20Grassroots%20Grassroots%20DICOM%20(GDCM)&amp;severity=high&amp;id=69c5a54b3c064ed76fcfc836</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/etherrat-sysinfo-module-c2-on-ethereum-etherhiding-38f718e9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=EtherRAT%20%26%20SYS_INFO%20Module%3A%20C2%20on%20Ethereum%20(EtherHiding)%2C%20Target%20Selection%2C%20CDN-Like%20Beacons&amp;severity=medium&amp;id=69c5a8cd3c064ed76fd1d915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4898-cross-site-scripting-in-code-project-dc1fb1e1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4898%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Online%20Food%20Ordering%20System&amp;severity=medium&amp;id=69c5a54b3c064ed76fcfc83b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33661-cwe-290-authentication-bypass-by-sp-0af23ed1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33661%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20yansongda%20pay&amp;severity=high&amp;id=69c5a54b3c064ed76fcfc828</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33658-cwe-770-allocation-of-resources-wit-31281ecb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33658%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20rails%20activestorage&amp;severity=low&amp;id=69c5a54b3c064ed76fcfc821</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33653-cwe-79-improper-neutralization-of-i-1514e992</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33653%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20farisc0de%20Uploady&amp;severity=medium&amp;id=69c5a54b3c064ed76fcfc81c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33645-cwe-22-improper-limitation-of-a-pat-2ac3bb97</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33645%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ShaneIsrael%20fireshare&amp;severity=high&amp;id=69c5a1c53c064ed76fce0c46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33638-cwe-862-missing-authorization-in-li-48adeeb6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33638%3A%20CWE-862%3A%20Missing%20Authorization%20in%20lin-snow%20Ech0&amp;severity=medium&amp;id=69c5a1c53c064ed76fce0c41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/glassworm-attack-installs-fake-browser-extension-f-658dbe72</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GlassWorm%20attack%20installs%20fake%20browser%20extension%20for%20surveillance&amp;severity=medium&amp;id=69c5a8cd3c064ed76fd1d9de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3622-cwe-125-out-of-bounds-read-in-tp-lin-e6d670e5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3622%3A%20CWE-125%20Out-of-bounds%20read%20in%20TP-Link%20Systems%20Inc.%20TL-WR841N%20v14&amp;severity=high&amp;id=69c59e483c064ed76fcd549a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33545-cwe-89-improper-neutralization-of-s-5827a82d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33545%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20MobSF%20Mobile-Security-Framework-MobSF&amp;severity=medium&amp;id=69c59e483c064ed76fcd5495</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33541-cwe-400-uncontrolled-resource-consu-40a6ca87</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33541%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20miraheze%20TSPortal&amp;severity=medium&amp;id=69c5973e3c064ed76fca3c24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33738-cwe-79-improper-neutralization-of-i-ce3958ae</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33738%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LycheeOrg%20Lychee&amp;severity=medium&amp;id=69c5973e3c064ed76fca3c27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4393-cwe-352-cross-site-request-forgery-c-f8a6aee5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4393%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Drupal%20Automated%20Logout&amp;severity=medium&amp;id=69c6c6943c064ed76fdc29fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4933-cwe-863-incorrect-authorization-in-d-e659c429</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4933%3A%20CWE-863%20Incorrect%20Authorization%20in%20Drupal%20Unpublished%20Node%20Permissions&amp;severity=high&amp;id=69c6c6943c064ed76fdc2a00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3573-cwe-863-incorrect-authorization-in-d-6fdb0f15</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3573%3A%20CWE-863%20Incorrect%20Authorization%20in%20Drupal%20AI%20(Artificial%20Intelligence)&amp;severity=high&amp;id=69c6c6943c064ed76fdc29fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0965-external-control-of-file-name-or-pat-52e92e8d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0965%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=low&amp;id=69c6c6933c064ed76fdc2993</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0967-inefficient-regular-expression-compl-86bb3a06</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0967%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=low&amp;id=69c5a54c3c064ed76fcfc863</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0968-null-pointer-dereference-in-red-hat--d915bdc4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0968%3A%20NULL%20Pointer%20Dereference%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=low&amp;id=69c5a54c3c064ed76fcfc868</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0964-improper-limitation-of-a-pathname-to-2ae13e3e</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0964%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69c59e483c064ed76fcd549f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0966-buffer-underwrite-buffer-underflow-i-79e9d10d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0966%3A%20Buffer%20Underwrite%20(&apos;Buffer%20Underflow&apos;)%20in%20Red%20Hat%20Red%20Hat%20Hardened%20Images&amp;severity=medium&amp;id=69c5a54b3c064ed76fcfc842</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21724-vulnerability-in-grafana-grafana-os-3abea496</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21724%3A%20Vulnerability%20in%20Grafana%20Grafana%20OSS&amp;severity=medium&amp;id=69c5a54c3c064ed76fcfc86d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33375-vulnerability-in-grafana-grafana-os-67e46cbf</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33375%3A%20Vulnerability%20in%20Grafana%20Grafana%20OSS&amp;severity=medium&amp;id=69c5ac523c064ed76fd41c4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33644-cwe-918-server-side-request-forgery-18b4775d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33644%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20LycheeOrg%20Lychee&amp;severity=low&amp;id=69c6c6933c064ed76fdc299b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3532-cwe-178-improper-handling-of-case-se-f8b1305e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3532%3A%20CWE-178%20Improper%20Handling%20of%20Case%20Sensitivity%20in%20Drupal%20OpenID%20Connect%20%2F%20OAuth%20client&amp;severity=medium&amp;id=69c6949d3c064ed76fb5b810</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3531-cwe-288-authentication-bypass-using--7f0de8f7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3531%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Drupal%20OpenID%20Connect%20%2F%20OAuth%20client&amp;severity=medium&amp;id=69c6c6943c064ed76fdc29f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3530-cwe-918-server-side-request-forgery--497953a6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3530%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Drupal%20OpenID%20Connect%20%2F%20OAuth%20client&amp;severity=medium&amp;id=69c6c6943c064ed76fdc29f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3529-cwe-79-improper-neutralization-of-in-db408486</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3529%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(%22Cross-site%20Scripting%22)%20in%20Drupal%20Google%20Analytics%20GA4&amp;severity=medium&amp;id=69c6c6933c064ed76fdc29ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3528-cwe-79-improper-neutralization-of-in-0832454b</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3528%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(%22Cross-site%20Scripting%22)%20in%20Drupal%20Calculation%20Fields&amp;severity=medium&amp;id=69c6c6933c064ed76fdc29a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3527-cwe-306-missing-authentication-for-c-8c4d2498</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3527%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Drupal%20AJAX%20Dashboard&amp;severity=medium&amp;id=69c6c6933c064ed76fdc29a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3526-cwe-863-incorrect-authorization-in-d-45205db2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3526%3A%20CWE-863%20Incorrect%20Authorization%20in%20Drupal%20File%20Access%20Fix%20(deprecated)&amp;severity=medium&amp;id=69c6c6933c064ed76fdc29a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3525-cwe-863-incorrect-authorization-in-d-79c13952</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3525%3A%20CWE-863%20Incorrect%20Authorization%20in%20Drupal%20File%20Access%20Fix%20(deprecated)&amp;severity=medium&amp;id=69c6c6933c064ed76fdc299f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2100-access-of-uninitialized-pointer-in-r-70c93daf</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2100%3A%20Access%20of%20Uninitialized%20Pointer%20in%20Red%20Hat%20Red%20Hat%20Hardened%20Images&amp;severity=medium&amp;id=69c59e483c064ed76fcd54a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33537-cwe-918-server-side-request-forgery-7e8f2ade</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33537%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20LycheeOrg%20Lychee&amp;severity=medium&amp;id=69c6c6933c064ed76fdc2997</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2239-improper-null-termination-in-red-hat-7affad82</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2239%3A%20Improper%20Null%20Termination%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%207&amp;severity=low&amp;id=69c5a54c3c064ed76fcfc870</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2272-integer-overflow-or-wraparound-in-re-e752abf5</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2272%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=medium&amp;id=69c5a54c3c064ed76fcfc87a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2271-integer-overflow-or-wraparound-in-re-3121f72b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2271%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=low&amp;id=69c5a54c3c064ed76fcfc875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33532-cwe-674-uncontrolled-recursion-in-e-41e4ce98</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33532%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20eemeli%20yaml&amp;severity=medium&amp;id=69c590393c064ed76fc7fe87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33632-cwe-862-missing-authorization-in-cr-df2ceb79</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33632%3A%20CWE-862%3A%20Missing%20Authorization%20in%20craigjbass%20clearancekit&amp;severity=high&amp;id=69c58caf3c064ed76fc67000</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2436-expired-pointer-dereference-in-red-h-af2e8042</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2436%3A%20Expired%20Pointer%20Dereference%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69c58caf3c064ed76fc66fee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33631-cwe-862-missing-authorization-in-cr-914bd25a</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33631%3A%20CWE-862%3A%20Missing%20Authorization%20in%20craigjbass%20clearancekit&amp;severity=high&amp;id=69c58caf3c064ed76fc66ffc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33529-cwe-22-improper-limitation-of-a-pat-7d574b44</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33529%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20tobychui%20zoraxy&amp;severity=low&amp;id=69c58caf3c064ed76fc66ff7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33528-cwe-22-improper-limitation-of-a-pat-44f0b1de</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33528%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20yusing%20godoxy&amp;severity=medium&amp;id=69c58caf3c064ed76fc66ff2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3121-incorrect-privilege-assignment-in-re-84c0c7ab</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3121%3A%20Incorrect%20Privilege%20Assignment%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=medium&amp;id=69c589333c064ed76fb16803</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3190-improper-handling-of-insufficient-pe-09076be7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3190%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=medium&amp;id=69c589333c064ed76fb16807</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33152-cwe-307-improper-restriction-of-exc-e7cae15a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33152%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20TandoorRecipes%20recipes&amp;severity=critical&amp;id=69c589313c064ed76fb167cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33153-cwe-89-improper-neutralization-of-s-5b9303b4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33153%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TandoorRecipes%20recipes&amp;severity=high&amp;id=69c589313c064ed76fb167d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33148-cwe-74-improper-neutralization-of-s-a7637ce2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33148%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20TandoorRecipes%20recipes&amp;severity=medium&amp;id=69c589313c064ed76fb167c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29055-cwe-1230-exposure-of-sensitive-info-58c6e1d8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29055%3A%20CWE-1230%3A%20Exposure%20of%20Sensitive%20Information%20Through%20Metadata%20in%20TandoorRecipes%20recipes&amp;severity=medium&amp;id=69c589313c064ed76fb167bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26213-cwe-78-improper-neutralization-of-s-27248bb9</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26213%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20themactep%20thingino-firmware&amp;severity=high&amp;id=69c589313c064ed76fb167b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28503-cwe-639-authorization-bypass-throug-c45a9219</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28503%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20TandoorRecipes%20recipes&amp;severity=medium&amp;id=69c589313c064ed76fb167b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33149-cwe-644-improper-neutralization-of--6d2eec85</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33149%3A%20CWE-644%3A%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20TandoorRecipes%20recipes&amp;severity=high&amp;id=69c589313c064ed76fb167ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33506-cwe-87-improper-neutralization-of-a-799c9e0e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33506%3A%20CWE-87%3A%20Improper%20Neutralization%20of%20Alternate%20XSS%20Syntax%20in%20ory%20polis&amp;severity=high&amp;id=69c589313c064ed76fb167d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33491-cwe-121-stack-based-buffer-overflow-786fa8ef</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33491%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20zenc-lang%20zenc&amp;severity=high&amp;id=69c582253c064ed76fa7cc7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33505-cwe-89-improper-neutralization-of-s-7dc3388c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33505%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ory%20keto&amp;severity=high&amp;id=69c582253c064ed76fa7cc80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/teampcp-supply-chain-campaign-update-001-x3f-check-550ef483</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TeamPCP%20Supply%20Chain%20Campaign%3A%20Update%20001%20-%20Checkmarx%20Scope%20Wider%20Than%20Reported%2C%20CISA%20KEV%20Entry%2C%20and%20Detection%20Tools%20Available%2C%20(Thu%2C%20Mar%2026th)&amp;severity=medium&amp;id=69c56d4ef4197a8e3bec2651</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33504-cwe-89-improper-neutralization-of-s-f2d530e4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33504%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ory%20hydra&amp;severity=high&amp;id=69c574363c064ed76f96818a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33503-cwe-89-improper-neutralization-of-s-32e281db</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33503%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ory%20kratos&amp;severity=high&amp;id=69c570d8f4197a8e3bef1f0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33496-cwe-1289-improper-validation-of-uns-bd9362c1</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33496%3A%20CWE-1289%3A%20Improper%20Validation%20of%20Unsafe%20Equivalence%20in%20Input%20in%20ory%20oathkeeper&amp;severity=high&amp;id=69c570d8f4197a8e3bef1f0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33495-cwe-862-missing-authorization-in-or-b18fe7c3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33495%3A%20CWE-862%3A%20Missing%20Authorization%20in%20ory%20oathkeeper&amp;severity=medium&amp;id=69c570d8f4197a8e3bef1f06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33494-cwe-23-relative-path-traversal-in-o-d845cb54</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33494%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20ory%20oathkeeper&amp;severity=critical&amp;id=69c570d8f4197a8e3bef1f02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33732-cwe-706-use-of-incorrectly-resolved-ec758fd5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33732%3A%20CWE-706%3A%20Use%20of%20Incorrectly-Resolved%20Name%20or%20Reference%20in%20h3js%20srvx&amp;severity=medium&amp;id=69c570d8f4197a8e3bef1f11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33490-cwe-706-use-of-incorrectly-resolved-76c4af93</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33490%3A%20CWE-706%3A%20Use%20of%20Incorrectly-Resolved%20Name%20or%20Reference%20in%20h3js%20h3&amp;severity=low&amp;id=69c570d8f4197a8e3bef1eff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33487-cwe-347-improper-verification-of-cr-33820af1</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33487%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20russellhaering%20goxmldsig&amp;severity=high&amp;id=69c570d8f4197a8e3bef1efc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33486-cwe-918-server-side-request-forgery-62a4e798</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33486%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20roadiz%20core-bundle-dev-app&amp;severity=medium&amp;id=69c570d8f4197a8e3bef1ef8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33481-cwe-460-improper-cleanup-on-thrown--43cd4c99</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33481%3A%20CWE-460%3A%20Improper%20Cleanup%20on%20Thrown%20Exception%20in%20anchore%20syft&amp;severity=medium&amp;id=69c570d8f4197a8e3bef1ef2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33477-cwe-863-incorrect-authorization-in--b8176694</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33477%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20error311%20FileRise&amp;severity=medium&amp;id=69c570d8f4197a8e3bef1eee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33470-cwe-862-missing-authorization-in-bl-cf242ca5</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33470%3A%20CWE-862%3A%20Missing%20Authorization%20in%20blakeblackshear%20frigate&amp;severity=medium&amp;id=69c569d6f4197a8e3be94d95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33469-cwe-863-incorrect-authorization-in--e8c6070a</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33469%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20blakeblackshear%20frigate&amp;severity=medium&amp;id=69c569d6f4197a8e3be94d92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33468-cwe-89-improper-neutralization-of-s-c6315e5d</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33468%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20kysely-org%20kysely&amp;severity=high&amp;id=69c569d6f4197a8e3be94d8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33442-cwe-89-improper-neutralization-of-s-f971cd6e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33442%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20kysely-org%20kysely&amp;severity=high&amp;id=69c569d6f4197a8e3be94d8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34071-cwe-79-improper-neutralization-of-i-7eb8f515</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34071%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Stirling-Tools%20Stirling-PDF&amp;severity=medium&amp;id=69c569d8f4197a8e3be94dc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33438-cwe-770-allocation-of-resources-wit-1428d408</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33438%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Stirling-Tools%20Stirling-PDF&amp;severity=medium&amp;id=69c569d6f4197a8e3be94d89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33430-cwe-732-incorrect-permission-assign-a2e24fdd</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33430%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20beeware%20briefcase&amp;severity=high&amp;id=69c569d6f4197a8e3be94d83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33636-cwe-125-out-of-bounds-read-in-pnggr-69be97d4</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33636%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20pnggroup%20libpng&amp;severity=high&amp;id=69c569d6f4197a8e3be94d98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33416-cwe-416-use-after-free-in-pnggroup--f5d1ae3b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33416%3A%20CWE-416%3A%20Use%20After%20Free%20in%20pnggroup%20libpng&amp;severity=high&amp;id=69c569d6f4197a8e3be94d7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33402-cwe-79-improper-neutralization-of-i-2723f0f3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33402%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sakaiproject%20sakai&amp;severity=low&amp;id=69c569d6f4197a8e3be94d77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33015-cwe-863-incorrect-authorization-in--329a7ec4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33015%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=69c569d6f4197a8e3be94d74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33014-cwe-863-incorrect-authorization-in--8d9fffcf</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33014%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=69c562cff4197a8e3be49ae2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33009-cwe-362-concurrent-execution-using--5f9e12f3</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33009%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20EVerest%20everest-core&amp;severity=high&amp;id=69c562cdf4197a8e3be49a92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29044-cwe-863-incorrect-authorization-in--4438817d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29044%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=69c562cdf4197a8e3be49a8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27828-cwe-416-use-after-free-in-everest-e-adf48606</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27828%3A%20CWE-416%3A%20Use%20After%20Free%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=69c562cdf4197a8e3be49a87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27816-cwe-787-out-of-bounds-write-in-ever-984d5d0d</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27816%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=69c562cdf4197a8e3be49a84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27815-cwe-787-out-of-bounds-write-in-ever-bbd7f92c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27815%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=69c562cdf4197a8e3be49a81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27814-cwe-362-concurrent-execution-using--ab09716a</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27814%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=69c562cdf4197a8e3be49a7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27813-cwe-416-use-after-free-in-everest-e-c8c578fb</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27813%3A%20CWE-416%3A%20Use%20After%20Free%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=69c562cdf4197a8e3be49a7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26074-cwe-362-concurrent-execution-using--22a9ae97</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26074%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20EVerest%20everest-core&amp;severity=high&amp;id=69c562cdf4197a8e3be49a78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26073-cwe-122-heap-based-buffer-overflow--2f7a5923</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26073%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=69c562cdf4197a8e3be49a75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4897-allocation-of-resources-without-limi-69f0a690</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4897%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69c57a7d3c064ed76f9f9cf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26072-cwe-362-concurrent-execution-using--e4f31acc</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26072%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=69c57a7d3c064ed76f9f9cee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26071-cwe-362-concurrent-execution-using--b57a7aa5</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26071%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=69c57a7d3c064ed76f9f9ceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26070-cwe-362-concurrent-execution-using--18848e3e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26070%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=69c57a7d3c064ed76f9f9d04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26008-cwe-125-out-of-bounds-read-in-evere-7e88bae7</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26008%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20EVerest%20everest-core&amp;severity=high&amp;id=69c57a7d3c064ed76f9f9d01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23995-cwe-121-stack-based-buffer-overflow-522c3df9</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23995%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20EVerest%20everest-core&amp;severity=high&amp;id=69c57a7d3c064ed76f9f9cfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22790-cwe-121-stack-based-buffer-overflow-96e39999</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22790%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20EVerest%20everest-core&amp;severity=high&amp;id=69c5583ef4197a8e3bdf81d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28298-cwe-79-improper-neutralization-of-i-936109e8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28298%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SolarWinds%20SolarWinds%20Observability%20Self-Hosted&amp;severity=medium&amp;id=69c5583ef4197a8e3bdf81d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hightower-holding-data-breach-impacts-130000-86a37b28</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hightower%20Holding%20Data%20Breach%20Impacts%20130%2C000&amp;severity=high&amp;id=69c53f99f4197a8e3bceb0f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27664-cwe-787-out-of-bounds-write-in-siem-ebaa8618</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27664%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Siemens%20CPCI85%20Central%20Processing%2FCommunication&amp;severity=high&amp;id=69c57a7f3c064ed76f9f9d34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27663-cwe-770-allocation-of-resources-wit-e3eb94b5</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27663%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Siemens%20CPCI85%20Central%20Processing%2FCommunication&amp;severity=medium&amp;id=69c57a7f3c064ed76f9f9d31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28297-cwe-79-improper-neutralization-of-i-d551e15a</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28297%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SolarWinds%20SolarWinds%20Observability%20Self-Hosted&amp;severity=medium&amp;id=69c57a7f3c064ed76f9f9d37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22593-cwe-193-off-by-one-error-in-everest-38a504ac</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22593%3A%20CWE-193%3A%20Off-by-one%20Error%20in%20EVerest%20everest-core&amp;severity=high&amp;id=69c57a7f3c064ed76f9f9d2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33397-cwe-601-url-redirection-to-untruste-c4b42fd0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33397%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20angular%20angular-cli&amp;severity=medium&amp;id=69c57a7f3c064ed76f9f9d3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33413-cwe-862-missing-authorization-in-et-61b60199</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33413%3A%20CWE-862%3A%20Missing%20Authorization%20in%20etcd-io%20etcd&amp;severity=high&amp;id=69c53915f4197a8e3bcae392</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bind-updates-patch-high-severity-vulnerabilities-34793081</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BIND%20Updates%20Patch%20High-Severity%20Vulnerabilities&amp;severity=high&amp;id=69c5389ef4197a8e3bcaa6ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2389-cwe-79-improper-neutralization-of-in-e95028db</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2389%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20complianz%20Complianz%20%E2%80%93%20GDPR%2FCCPA%20Cookie%20Consent&amp;severity=medium&amp;id=69c53915f4197a8e3bcae383</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1032-cwe-352-cross-site-request-forgery-c-1b8f5a85</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1032%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20themifyme%20Conditional%20Menus&amp;severity=medium&amp;id=69c53915f4197a8e3bcae374</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2231-cwe-79-improper-neutralization-of-in-d90c4f82</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2231%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20techjewel%20Fluent%20Booking%20%E2%80%93%20The%20Ultimate%20Appointments%20Scheduling%2C%20Events%20Booking%2C%20Events%20Calendar%20Solution&amp;severity=high&amp;id=69c53915f4197a8e3bcae37a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2511-cwe-89-improper-neutralization-of-sp-f3faec51</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2511%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20rabilal%20JS%20Help%20Desk%20%E2%80%93%20AI-Powered%20Support%20%26%20Ticketing%20System&amp;severity=high&amp;id=69c53915f4197a8e3bcae389</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55261-cwe-284-improper-access-control-in--baab77f9</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55261%3A%20CWE-284%3A%20Improper%20Access%20Control.%20in%20HCL%20Aftermarket%20DPC&amp;severity=high&amp;id=69c53915f4197a8e3bcae368</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55262-cwe-798-use-of-hardcoded-credential-37d59e42</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55262%3A%20CWE-798%3A%20Use%20of%20Hardcoded%20Credentials%20in%20HCL%20Aftermarket%20DPC&amp;severity=high&amp;id=69c53915f4197a8e3bcae36b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4877-cross-site-scripting-in-itsourcecode-604d0d38</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4877%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20Payroll%20Management%20System&amp;severity=medium&amp;id=69c53917f4197a8e3bcae3d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4876-sql-injection-in-itsourcecode-free-h-ad659424</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4876%3A%20SQL%20Injection%20in%20itsourcecode%20Free%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=69c53917f4197a8e3bcae3ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55263-cwe-798-use-of-hardcoded-credential-b91db2da</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55263%3A%20CWE-798%3A%20Use%20of%20Hardcoded%20Credentials%20in%20HCL%20Aftermarket%20DPC&amp;severity=high&amp;id=69c53915f4197a8e3bcae36e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55264-cwe-613-insufficient-session-expira-997c0a5b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55264%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20HCL%20Aftermarket%20DPC&amp;severity=medium&amp;id=69c53915f4197a8e3bcae371</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55265-cwe-200-exposure-of-sensitive-infor-68372ff5</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55265%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20HCL%20Aftermarket%20DPC&amp;severity=medium&amp;id=69c5319ff4197a8e3bc7dd31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55266-cwe-384-session-fixation-in-hcl-aft-d67e947d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55266%3A%20CWE-384%3A%20Session%20Fixation%20in%20HCL%20Aftermarket%20DPC&amp;severity=medium&amp;id=69c5319ff4197a8e3bc7dd34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55267-cwe-434-unrestricted-upload-of-file-effaa833</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55267%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20HCL%20Aftermarket%20DPC&amp;severity=medium&amp;id=69c5319ff4197a8e3bc7dd37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55268-cwe-799-improper-control-of-interac-a9785c6b</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55268%3A%20CWE-799%3A%20Improper%20Control%20of%20Interaction%20in%20HCL%20Aftermarket%20DPC&amp;severity=medium&amp;id=69c5319ff4197a8e3bc7dd3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55269-cwe-521-weak-password-requirements--4fb9c015</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55269%3A%20CWE-521%3A%20Weak%20Password%20Requirements%20in%20HCL%20Aftermarket%20DPC&amp;severity=medium&amp;id=69c5319ff4197a8e3bc7dd3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-hackers-caught-deep-within-telecom-backbon-b3568828</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Hackers%20Caught%20Deep%20Within%20Telecom%20Backbone%20Infrastructure&amp;severity=high&amp;id=69c52e06f4197a8e3bc6dce8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55270-cwe-20-improper-input-validation-in-faaf28cf</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55270%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20HCL%20Aftermarket%20DPC&amp;severity=low&amp;id=69c5319ff4197a8e3bc7dd40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55271-cwe-113-improper-control-of-http-me-7d4c8383</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55271%3A%20CWE-113%3A%20Improper%20Control%20of%20HTTP%20Messages%20and%20Headers%20in%20HCL%20Aftermarket%20DPC&amp;severity=low&amp;id=69c5319ff4197a8e3bc7dd43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55272-cwe-200-exposure-of-sensitive-infor-a28716b9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55272%3A%20CWE-200-Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20HCL%20Aftermarket%20DPC&amp;severity=low&amp;id=69c5319ff4197a8e3bc7dd46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1961-vulnerability-in-red-hat-red-hat-sat-9642e238</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1961%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Red%20Hat%20Red%20Hat%20Satellite%206.16%20for%20RHEL%208&amp;severity=high&amp;id=69c531a1f4197a8e3bc7dda8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55273-cwe-829-inclusion-of-functionality--e07fdb4b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55273%3A%20CWE-829%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20HCL%20Aftermarket%20DPC&amp;severity=medium&amp;id=69c5319ff4197a8e3bc7dd49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55274-cwe-942-permissive-cross-domain-sec-e7c033c9</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55274%3A%20CWE-942%3A%20Permissive%20Cross-domain%20Security%20Policy%20with%20Untrusted%20Domains%20in%20HCL%20Aftermarket%20DPC&amp;severity=low&amp;id=69c5319ff4197a8e3bc7dd4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55275-cwe-557-concurrency-issues-is-a-cat-9231170e</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55275%3A%20CWE-557%3A%20Concurrency%20Issues%20is%20a%20Category%20in%20HCL%20Aftermarket%20DPC&amp;severity=low&amp;id=69c531a1f4197a8e3bc7dd9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55276-cwe-200-exposure-of-sensitive-infor-18030854</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55276%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20HCL%20Aftermarket%20DPC&amp;severity=low&amp;id=69c531a1f4197a8e3bc7dda2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55277-cwe-1104-use-of-unmaintained-third--aa83e0be</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55277%3A%20CWE-1104%20Use%20of%20Unmaintained%20Third-Party%20Components%20in%20HCL%20Aftermarket%20DPC&amp;severity=low&amp;id=69c531a1f4197a8e3bc7dda5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-patches-multiple-vulnerabilities-in-ios-soft-c1715c9d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Patches%20Multiple%20Vulnerabilities%20in%20IOS%20Software&amp;severity=high&amp;id=69c52a81f4197a8e3bc08f40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4875-unrestricted-upload-in-itsourcecode--64bdb215</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4875%3A%20Unrestricted%20Upload%20in%20itsourcecode%20Free%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=69c52aaff4197a8e3bc10e01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41359-cwe-428-unquoted-search-path-or-ele-581de0c2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41359%3A%20CWE-428%20Unquoted%20search%20path%20or%20element%20in%20Smallsrv%20Small%20HTTP&amp;severity=high&amp;id=69c52aaff4197a8e3bc10dfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4887-off-by-one-error-in-red-hat-red-hat--b0d53159</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4887%3A%20Off-by-one%20Error%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=medium&amp;id=69c531a1f4197a8e3bc7ddac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/illuminating-voidlink-technical-analysis-of-the-vo-858d2e9f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Illuminating%20VoidLink%3A%20Technical%20analysis%20of%20the%20VoidLink%20rootkit%20framework&amp;severity=medium&amp;id=69c575383c064ed76f98c818</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41368-cwe-428-unquoted-search-path-or-ele-6e2efc0f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41368%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Smallsrv%20Small%20HTTP&amp;severity=high&amp;id=69c51ff3f4197a8e3baa8dee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4809-cwe-434-unrestricted-upload-of-file--9d4d9e8e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4809%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20plank%20laravel-mediable&amp;severity=critical&amp;id=69c57a7f3c064ed76f9f9d50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24068-cwe-306-missing-authentication-for--4e55fde7</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24068%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20Vienna%20Symphonic%20Library%20GmbH%20Vienna%20Assistant&amp;severity=high&amp;id=69c57a7f3c064ed76f9f9d43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/alleged-redline-malware-administrator-extradited-t-54054e19</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Alleged%20RedLine%20Malware%20Administrator%20Extradited%20to%20US&amp;severity=medium&amp;id=69c50757f4197a8e3b57d4ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-scammers-use-legitimate-surveys-to-link-to-mal-1b778cc8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20scammers%20use%20legitimate%20surveys%20to%20link%20to%20malicious%20sites%20%7C%20Kaspersky%20official%20blog&amp;severity=high&amp;id=69c503f9f4197a8e3b5009f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4263-cwe-863-in-hijiffy-hijiffy-chatbot-8b422826</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4263%3A%20CWE-863%20in%20HiJiffy%20HiJiffy%20Chatbot&amp;severity=medium&amp;id=69c5004ef4197a8e3b4e0c43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4262-cwe-863-in-hijiffy-hijiffy-chatbot-f2ca6e4c</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4262%3A%20CWE-863%20in%20HiJiffy%20HiJiffy%20Chatbot&amp;severity=medium&amp;id=69c5004ef4197a8e3b4e0c40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4862-buffer-overflow-in-utt-hiper-1250gw-40a2fb82</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4862%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%201250GW&amp;severity=high&amp;id=69c57a813c064ed76f9f9d82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4861-stack-based-buffer-overflow-in-wavli-146cf306</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4861%3A%20Stack-based%20Buffer%20Overflow%20in%20Wavlink%20WL-NU516U1&amp;severity=high&amp;id=69c57a813c064ed76f9f9d8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4860-deserialization-in-648540858-wvp-gb2-3497b1a4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4860%3A%20Deserialization%20in%20648540858%20wvp-GB28181-pro&amp;severity=medium&amp;id=69c57a813c064ed76f9f9d88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4850-sql-injection-in-code-projects-simpl-7c6222f8</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4850%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69c4eb47f4197a8e3b1b37b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4849-cross-site-scripting-in-code-project-04fed99d</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4849%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69c4eb47f4197a8e3b1b37b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4874-server-side-request-forgery-ssrf-in--bac01e84</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4874%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Red%20Hat%20Red%20Hat%20Build%20of%20Keycloak&amp;severity=low&amp;id=69c4e45ef4197a8e3b077baa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4848-cross-site-scripting-in-dameng100-mu-d6b7d599</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4848%3A%20Cross%20Site%20Scripting%20in%20dameng100%20muucmf&amp;severity=medium&amp;id=69c4dd2ff4197a8e3b036cec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32680-incorrect-default-permissions-in-ra-38982bf7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32680%3A%20Incorrect%20default%20permissions%20in%20RATOC%20Systems%2C%20Inc.%20RATOC%20RAID%20Monitoring%20Manager%20for%20Windows&amp;severity=high&amp;id=69c4dd2ff4197a8e3b036ce8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28760-uncontrolled-search-path-element-in-f4dfdefd</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28760%3A%20Uncontrolled%20Search%20Path%20Element%20in%20RATOC%20Systems%2C%20Inc.%20RATOC%20RAID%20Monitoring%20Manager%20for%20Windows&amp;severity=high&amp;id=69c4dd2ff4197a8e3b036ce4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4847-cross-site-scripting-in-dameng100-mu-5ccb2c60</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4847%3A%20Cross%20Site%20Scripting%20in%20dameng100%20muucmf&amp;severity=medium&amp;id=69c57a813c064ed76f9f9d94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1890-cwe-862-missing-authorization-in-lea-c5d9e609</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1890%3A%20CWE-862%20Missing%20Authorization%20in%20LeadConnector&amp;severity=medium&amp;id=69c53917f4197a8e3bcae3e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1430-cwe-79-cross-site-scripting-xss-in-w-525b9be3</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1430%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20WP%20Lightbox%202&amp;severity=medium&amp;id=69c53917f4197a8e3bcae3e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15488-cwe-863-incorrect-authorization-in--8e7b0524</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15488%3A%20CWE-863%20Incorrect%20Authorization%20in%20Responsive%20Plus&amp;severity=medium&amp;id=69c53917f4197a8e3bcae3df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15433-cwe-22-improper-limitation-of-a-pat-8ca8af04</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15433%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Shared%20Files&amp;severity=medium&amp;id=69c53917f4197a8e3bcae3dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4846-cross-site-scripting-in-dameng100-mu-b3f0d512</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4846%3A%20Cross%20Site%20Scripting%20in%20dameng100%20muucmf&amp;severity=medium&amp;id=69c4cbeaf4197a8e3be7e188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4845-cross-site-scripting-in-dameng100-mu-4a854e54</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4845%3A%20Cross%20Site%20Scripting%20in%20dameng100%20muucmf&amp;severity=medium&amp;id=69c4cbeaf4197a8e3be7e182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1206-cwe-639-authorization-bypass-through-4a5589d1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1206%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20elemntor%20Elementor%20Website%20Builder%20%E2%80%93%20more%20than%20just%20a%20page%20builder&amp;severity=medium&amp;id=69c4cbeaf4197a8e3be7e17e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4844-sql-injection-in-code-projects-onlin-007ab24e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4844%3A%20SQL%20Injection%20in%20code-projects%20Online%20Food%20Ordering%20System&amp;severity=medium&amp;id=69c4c10df4197a8e3be33f13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4842-sql-injection-in-itsourcecode-online-aa2c2ede</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4842%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Enrollment%20System&amp;severity=medium&amp;id=69c4c10df4197a8e3be33f0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4389-cwe-79-improper-neutralization-of-in-91fdf8a7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4389%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hupe13%20DSGVO%20snippet%20for%20Leaflet%20Map%20and%20its%20Extensions&amp;severity=medium&amp;id=69c4c10df4197a8e3be33f04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33201-active-debug-code-in-green-house-co-51d82983</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33201%3A%20Active%20debug%20code%20in%20GREEN%20HOUSE%20CO.%2C%20LTD.%20Digital%20Photo%20Frame%20GH-WDF10A&amp;severity=medium&amp;id=69c4b67cf4197a8e3bc62ac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4841-sql-injection-in-code-projects-onlin-8238b60a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4841%3A%20SQL%20Injection%20in%20code-projects%20Online%20Food%20Ordering%20System&amp;severity=medium&amp;id=69c4b67cf4197a8e3bc62b01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4840-os-command-injection-in-netcore-powe-abf3a5bc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4840%3A%20OS%20Command%20Injection%20in%20Netcore%20Power%2015AX&amp;severity=high&amp;id=69c4b67cf4197a8e3bc62afb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4278-cwe-79-improper-neutralization-of-in-e053026e</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4278%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20specialk%20Simple%20Download%20Counter&amp;severity=medium&amp;id=69c4b67cf4197a8e3bc62ac9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4329-cwe-79-improper-neutralization-of-in-7fadd817</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4329%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20specialk%20Blackhole%20for%20Bad%20Bots&amp;severity=high&amp;id=69c4b67cf4197a8e3bc62ae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4281-cwe-862-missing-authorization-in-tra-3757da8b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4281%3A%20CWE-862%20Missing%20Authorization%20in%20trainingbusinesspros%20FormLift%20for%20Infusionsoft%20Web%20Forms&amp;severity=medium&amp;id=69c4b67cf4197a8e3bc62ad5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2931-cwe-269-improper-privilege-managemen-010fd6d0</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2931%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20ameliabooking%20Booking%20for%20Appointments%20and%20Events%20Calendar%20%E2%80%93%20Amelia&amp;severity=high&amp;id=69c4b67cf4197a8e3bc62abf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4331-cwe-862-missing-authorization-in-pr--0dab2dca</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4331%3A%20CWE-862%20Missing%20Authorization%20in%20pr-gateway%20Blog2Social%3A%20Social%20Media%20Auto%20Post%20%26%20Scheduler&amp;severity=medium&amp;id=69c4b67cf4197a8e3bc62aef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4839-sql-injection-in-sourcecodester-food-e8aa90c0</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4839%3A%20SQL%20Injection%20in%20SourceCodester%20Food%20Ordering%20System&amp;severity=medium&amp;id=69c57a7f3c064ed76f9f9d54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4838-sql-injection-in-sourcecodester-mala-615eeafb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4838%3A%20SQL%20Injection%20in%20SourceCodester%20Malawi%20Online%20Market&amp;severity=medium&amp;id=69c57a813c064ed76f9f9d9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4075-cwe-79-improper-neutralization-of-in-12e2e055</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4075%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xenioushk%20BWL%20Advanced%20FAQ%20Manager%20Lite&amp;severity=medium&amp;id=69c57a7f3c064ed76f9f9d46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1986-cwe-79-improper-neutralization-of-in-080d1d18</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1986%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bakkbone%20FloristPress%20for%20Woo%20%E2%80%93%20Customize%20your%20eCommerce%20store%20for%20your%20Florist&amp;severity=medium&amp;id=69c57a7d3c064ed76f9f9cf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4335-cwe-79-improper-neutralization-of-in-06c1049a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4335%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shortpixel%20ShortPixel%20Image%20Optimizer%20%E2%80%93%20Optimize%20Images%2C%20Convert%20WebP%20%26%20AVIF&amp;severity=medium&amp;id=69c574363c064ed76f968193</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3328-cwe-502-deserialization-of-untrusted-c6e58efd</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3328%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20shabti%20Frontend%20Admin%20by%20DynamiApps&amp;severity=high&amp;id=69c574363c064ed76f96818d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15101-cwe-352-cross-site-request-forgery--69e6a66a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15101%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ASUS%20Router&amp;severity=high&amp;id=69c49a9bf4197a8e3ba4b858</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4836-sql-injection-in-code-projects-accou-316a9d9c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4836%3A%20SQL%20Injection%20in%20code-projects%20Accounting%20System&amp;severity=medium&amp;id=69c49a9bf4197a8e3ba4b863</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4835-cross-site-scripting-in-code-project-fa7a83cf</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4835%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Accounting%20System&amp;severity=medium&amp;id=69c49a9bf4197a8e3ba4b85b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4484-cwe-862-missing-authorization-in-mas-b0ab7a1f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4484%3A%20CWE-862%20Missing%20Authorization%20in%20masteriyo%20Masteriyo%20LMS%20%E2%80%93%20Online%20Course%20Builder%20for%20eLearning%2C%20LMS%20%26%20Education&amp;severity=high&amp;id=69c574363c064ed76f96819b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4833-uncontrolled-recursion-in-orc-discou-358572e8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4833%3A%20Uncontrolled%20Recursion%20in%20Orc%20discount&amp;severity=medium&amp;id=69c57a813c064ed76f9f9da1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4831-improper-authentication-in-kalcaddle-40f256df</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4831%3A%20Improper%20Authentication%20in%20kalcaddle%20kodbox&amp;severity=medium&amp;id=69c57a7d3c064ed76f9f9d0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33285-cwe-20-improper-input-validation-in-e876aad9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33285%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20harttle%20liquidjs&amp;severity=high&amp;id=69c4854ef4197a8e3b9c70ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33287-cwe-20-improper-input-validation-in-8d1f4372</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33287%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20harttle%20liquidjs&amp;severity=high&amp;id=69c4854ef4197a8e3b9c70bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33942-cwe-502-deserialization-of-untruste-6acf0f28</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33942%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20saloonphp%20saloon&amp;severity=high&amp;id=69c4854ef4197a8e3b9c70d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33183-cwe-22-improper-limitation-of-a-pat-6fc6a028</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33183%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20saloonphp%20saloon&amp;severity=high&amp;id=69c4854ef4197a8e3b9c70b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33182-cwe-918-server-side-request-forgery-18e7372d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33182%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20saloonphp%20saloon&amp;severity=medium&amp;id=69c4854ef4197a8e3b9c70b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4830-unrestricted-upload-in-kalcaddle-kod-a213e944</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4830%3A%20Unrestricted%20Upload%20in%20kalcaddle%20kodbox&amp;severity=medium&amp;id=69c4854ef4197a8e3b9c70d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33526-cwe-416-use-after-free-in-squid-cac-5f2ea159</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33526%3A%20CWE-416%3A%20Use%20After%20Free%20in%20squid-cache%20squid&amp;severity=critical&amp;id=69c4854ef4197a8e3b9c70cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33515-cwe-125-out-of-bounds-read-in-squid-bad315ea</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33515%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20squid-cache%20squid&amp;severity=medium&amp;id=69c4854ef4197a8e3b9c70c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32748-cwe-413-improper-resource-locking-i-9668aaa3</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32748%3A%20CWE-413%3A%20Improper%20Resource%20Locking%20in%20squid-cache%20squid&amp;severity=high&amp;id=69c4854ef4197a8e3b9c70ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-26-90d7bb1a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-26&amp;severity=medium&amp;id=69c5cbec3c064ed76fe7358e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30463-na-586b440c</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30463%3A%20n%2Fa&amp;severity=high&amp;id=69c589313c064ed76fb167c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29969-na-1728d200</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29969%3A%20n%2Fa&amp;severity=medium&amp;id=69c589313c064ed76fb167bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30458-na-4904e2a8</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30458%3A%20n%2Fa&amp;severity=critical&amp;id=69c582253c064ed76fa7cc77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30457-na-d7294d25</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30457%3A%20n%2Fa&amp;severity=critical&amp;id=69c582253c064ed76fa7cc71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30162-na-48435b40</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30162%3A%20n%2Fa&amp;severity=medium&amp;id=69c57a7f3c064ed76f9f9d3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29934-na-6cb2fe65</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29934%3A%20n%2Fa&amp;severity=medium&amp;id=69c57a7d3c064ed76f9f9d07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29933-na-76fc1d31</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29933%3A%20n%2Fa&amp;severity=medium&amp;id=69c57a7d3c064ed76f9f9cf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29905-na-f2c91621</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29905%3A%20n%2Fa&amp;severity=medium&amp;id=69c562cdf4197a8e3be49a8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29976-na-cc0463b6</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29976%3A%20n%2Fa&amp;severity=medium&amp;id=69c5583ef4197a8e3bdf81dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-26-e34c1331</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-26&amp;severity=medium&amp;id=69c5155ff4197a8e3b699407</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-26-6fa2acb9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-26&amp;severity=low&amp;id=69c5155ff4197a8e3b6993ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4826-sql-injection-in-sourcecodester-sale-014c0565</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4826%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69c473c4f4197a8e3b95d0ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4758-cwe-22-improper-limitation-of-a-path-df4e4af3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4758%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wpjobportal%20WP%20Job%20Portal%20%E2%80%93%20AI-Powered%20Recruitment%20System%20for%20Company%20or%20Job%20Board%20website&amp;severity=high&amp;id=69c473c4f4197a8e3b95d0a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4825-sql-injection-in-sourcecodester-sale-57e01f2e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4825%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69c465a0f4197a8e3b8c5c45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clickfix-campaigns-targeting-windows-and-macos-c26c50a9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ClickFix%20Campaigns%20Targeting%20Windows%20and%20macOS&amp;severity=medium&amp;id=69c45b4af4197a8e3b8530f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4824-improper-privilege-management-in-ent-256ebce0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4824%3A%20Improper%20Privilege%20Management%20in%20Enter%20Software%20Iperius%20Backup&amp;severity=high&amp;id=69c45b4bf4197a8e3b853230</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4823-information-disclosure-in-enter-soft-fe52e1e0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4823%3A%20Information%20Disclosure%20in%20Enter%20Software%20Iperius%20Backup&amp;severity=low&amp;id=69c45b4bf4197a8e3b853229</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-patches-almost-everything-again-march-2026-e-8a57b153</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Patches%20(almost)%20everything%20again.%20March%202026%20edition.%2C%20(Wed%2C%20Mar%2025th)&amp;severity=medium&amp;id=69c4540cf4197a8e3b8345f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36187-cwe-532-insertion-of-sensitive-info-21a2100b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36187%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20IBM%20Knowledge%20Catalog%20Standard%20Cartridge&amp;severity=medium&amp;id=69c45423f4197a8e3b8350cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14684-cwe-117-improper-output-neutralizat-675e266b</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14684%3A%20CWE-117%20Improper%20Output%20Neutralization%20for%20Logs%20in%20IBM%20Maximo%20Application%20Suite%20-%20Monitor%20Component&amp;severity=medium&amp;id=69c45423f4197a8e3b8350cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14807-cwe-644-improper-neutralization-of--e705d38e</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14807%3A%20CWE-644%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=69c44d04f4197a8e3b816de0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1015-cwe-918-server-side-request-forgery--fe2a9abf</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1015%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=69c44d04f4197a8e3b816de3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1014-cwe-319-cleartext-transmission-of-se-5bb59961</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1014%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=69c44983f4197a8e3b808341</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2483-cwe-79-improper-neutralization-of-in-01b82064</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2483%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=69c44983f4197a8e3b808344</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64648-cwe-319-cleartext-transmission-of-s-948f3d08</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64648%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20IBM%20Concert&amp;severity=medium&amp;id=69c44983f4197a8e3b80833e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64647-cwe-1240-use-of-a-cryptographic-pri-9d2f9c2c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64647%3A%20CWE-1240%20Use%20of%20a%20Cryptographic%20Primitive%20with%20a%20Risky%20Implementation%20in%20IBM%20Concert&amp;severity=medium&amp;id=69c44983f4197a8e3b80833b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2484-cwe-79-improper-neutralization-of-in-8686e32a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2484%3A%20CWE-209%20Generation%20of%20error%20message%20containing%20sensitive%20information%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=69c44983f4197a8e3b808347</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64646-cwe-14-compiler-removal-of-code-to--9d00dd55</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64646%3A%20CWE-14%20Compiler%20Removal%20of%20Code%20to%20Clear%20Buffers%20in%20IBM%20Concert&amp;severity=medium&amp;id=69c44983f4197a8e3b808338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36440-cwe-522-insufficiently-protected-cr-ac354b6d</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36440%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20IBM%20Concert&amp;severity=medium&amp;id=69c44983f4197a8e3b808335</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4822-creation-of-temporary-file-with-inse-2bbaf2cd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4822%3A%20Creation%20of%20Temporary%20File%20With%20Insecure%20Permissions%20in%20Enter%20Software%20Iperius%20Backup&amp;severity=high&amp;id=69c44986f4197a8e3b808396</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36438-cwe-923-improper-restriction-of-com-1070ef1b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36438%3A%20CWE-923%20Improper%20Restriction%20of%20Communication%20Channel%20to%20Intended%20Endpoints%20in%20IBM%20Concert&amp;severity=medium&amp;id=69c44983f4197a8e3b808332</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36422-cwe-352-cross-site-request-forgery--9037caee</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36422%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=69c44983f4197a8e3b80832f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36258-cwe-256-plaintext-storage-of-a-pass-144ff010</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36258%3A%20CWE-256%20Plaintext%20Storage%20of%20a%20Password%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=high&amp;id=69c44983f4197a8e3b80832c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2485-cwe-79-improper-neutralization-of-in-d0e0e6f2</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2485%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=69c44608f4197a8e3b7facd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33249-cwe-863-incorrect-authorization-in--7f6c995e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33249%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20nats-io%20nats-server&amp;severity=medium&amp;id=69c4460af4197a8e3b7fad03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14974-cwe-639-authorization-bypass-throug-7e5352bf</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14974%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=69c44608f4197a8e3b7facc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33223-cwe-290-authentication-bypass-by-sp-e3ccf04a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33223%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20nats-io%20nats-server&amp;severity=medium&amp;id=69c4460af4197a8e3b7facfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1262-cwe-209-generation-of-error-message--4ed78fae</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1262%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=69c44608f4197a8e3b7facca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33248-cwe-287-improper-authentication-in--a81f505e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33248%3A%20CWE-287%3A%20Improper%20Authentication%20in%20nats-io%20nats-server&amp;severity=medium&amp;id=69c4460af4197a8e3b7facff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14917-cwe-1393-use-of-default-password-in-ab8c3ff9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14917%3A%20CWE-1393%20Use%20of%20Default%20Password%20in%20IBM%20WebSphere%20Application%20Server%20-%20Liberty&amp;severity=medium&amp;id=69c44608f4197a8e3b7facc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14912-cwe-918-server-side-request-forgery-cb0e7d2f</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14912%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=69c44608f4197a8e3b7facbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14915-cwe-200-exposure-of-sensitive-infor-533c205b</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14915%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20IBM%20WebSphere%20Application%20Server%20-%20Liberty&amp;severity=medium&amp;id=69c44608f4197a8e3b7facc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14810-cwe-613-insufficient-session-expira-0d27dc5a</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14810%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=69c44608f4197a8e3b7facbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33222-cwe-285-improper-authorization-in-n-d2948671</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33222%3A%20CWE-285%3A%20Improper%20Authorization%20in%20nats-io%20nats-server&amp;severity=medium&amp;id=69c44608f4197a8e3b7facd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1561-cwe-918-server-side-request-forgery--adcc7a2a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1561%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20IBM%20WebSphere%20Application%20Server%20Liberty&amp;severity=medium&amp;id=69c44608f4197a8e3b7faccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14808-cwe-598-use-of-get-request-method-w-b05e7948</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14808%3A%20CWE-598%20Use%20of%20GET%20Request%20Method%20With%20Sensitive%20Query%20Strings%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=low&amp;id=69c44608f4197a8e3b7facb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14790-cwe-522-insufficiently-protected-cr-373250bc</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14790%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=69c4427ef4197a8e3b7e9793</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12708-cwe-798-use-of-hard-coded-credentia-e429c055</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12708%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20IBM%20Concert&amp;severity=medium&amp;id=69c4427ef4197a8e3b7e9790</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33247-cwe-215-insertion-of-sensitive-info-38b359f4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33247%3A%20CWE-215%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Debugging%20Code%20in%20nats-io%20nats-server&amp;severity=high&amp;id=69c4427ef4197a8e3b7e9796</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33219-cwe-770-allocation-of-resources-wit-c95e60aa</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33219%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20nats-io%20nats-server&amp;severity=medium&amp;id=69c43f15f4197a8e3b7dafe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33218-cwe-20-improper-input-validation-in-fea485f8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33218%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20nats-io%20nats-server&amp;severity=high&amp;id=69c43f15f4197a8e3b7dafe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33246-cwe-287-improper-authentication-in--c898d481</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33246%3A%20CWE-287%3A%20Improper%20Authentication%20in%20nats-io%20nats-server&amp;severity=medium&amp;id=69c43f15f4197a8e3b7dafee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33217-cwe-863-incorrect-authorization-in--c7070ad9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33217%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20nats-io%20nats-server&amp;severity=high&amp;id=69c43f15f4197a8e3b7dafe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33216-cwe-256-plaintext-storage-of-a-pass-27b1c15c</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33216%3A%20CWE-256%3A%20Plaintext%20Storage%20of%20a%20Password%20in%20nats-io%20nats-server&amp;severity=high&amp;id=69c43f15f4197a8e3b7dafdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29785-cwe-476-null-pointer-dereference-in-7dd3aed5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29785%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20nats-io%20nats-server&amp;severity=high&amp;id=69c43f15f4197a8e3b7dafd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27889-cwe-190-integer-overflow-or-wraparo-32673245</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27889%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20nats-io%20nats-server&amp;severity=high&amp;id=69c43b99f4197a8e3b7c5650</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33751-cwe-90-improper-neutralization-of-s-b0a156ed</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33751%3A%20CWE-90%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20LDAP%20Query%20(&apos;LDAP%20Injection&apos;)%20in%20n8n-io%20n8n&amp;severity=medium&amp;id=69c430e5f4197a8e3b78e0bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33749-cwe-79-improper-neutralization-of-i-904c9e5c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33749%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20n8n-io%20n8n&amp;severity=medium&amp;id=69c430e5f4197a8e3b78e0b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33724-cwe-639-authorization-bypass-throug-8d5f5a1d</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33724%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20n8n-io%20n8n&amp;severity=medium&amp;id=69c42db5f4197a8e3b77dc26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33809-cwe-400-uncontrolled-resource-consu-beac3202</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33809%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20golang.org%2Fx%2Fimage%20golang.org%2Fx%2Fimage%2Ftiff&amp;severity=medium&amp;id=69c42db5f4197a8e3b77dc29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33722-cwe-863-incorrect-authorization-in--3e68670b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33722%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20n8n-io%20n8n&amp;severity=high&amp;id=69c477fbf4197a8e3b97b114</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33720-cwe-863-incorrect-authorization-in--1556d918</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33720%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20n8n-io%20n8n&amp;severity=medium&amp;id=69c4427ef4197a8e3b7e979a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33713-cwe-89-improper-neutralization-of-s-44a2cba0</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33713%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20n8n-io%20n8n&amp;severity=high&amp;id=69c422f4f4197a8e3b7492f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/smartapesg-campaign-pushes-remcos-rat-netsupport-r-ee8c4812</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SmartApeSG%20campaign%20pushes%20Remcos%20RAT%2C%20NetSupport%20RAT%2C%20StealC%2C%20and%20Sectop%20RAT%20(ArechClient2)%2C%20(Wed%2C%20Mar%2025th)&amp;severity=medium&amp;id=69c33747f4197a8e3bad16e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33696-cwe-1321-improperly-controlled-modi-9ddf2aba</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33696%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=69c422f4f4197a8e3b7492f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33665-cwe-287-improper-authentication-in--29d56016</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33665%3A%20CWE-287%3A%20Improper%20Authentication%20in%20n8n-io%20n8n&amp;severity=high&amp;id=69c422f4f4197a8e3b7492f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33663-cwe-639-authorization-bypass-throug-7119d589</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33663%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20n8n-io%20n8n&amp;severity=high&amp;id=69c41f52f4197a8e3b733a34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33660-cwe-94-improper-control-of-generati-e1c73d20</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33660%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=69c41f52f4197a8e3b733a31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27496-cwe-908-use-of-uninitialized-resour-028f34c7</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27496%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20n8n-io%20n8n&amp;severity=high&amp;id=69c41f52f4197a8e3b733a24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2414-cwe-639-authorization-bypass-through-311195cb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2414%3A%20CWE-639%20Authorization%20bypass%20through%20User-Controlled%20key%20in%20HYPR%20Server&amp;severity=medium&amp;id=69c41848f4197a8e3b706bd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25645-cwe-377-insecure-temporary-file-in--0a7a2193</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25645%3A%20CWE-377%3A%20Insecure%20Temporary%20File%20in%20psf%20requests&amp;severity=medium&amp;id=69c41848f4197a8e3b706bce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29092-cwe-613-insufficient-session-expira-030605f3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29092%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20kiteworks%20Kiteworks%20Email%20Protection%20Gateway&amp;severity=medium&amp;id=69c41848f4197a8e3b706bd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23636-cwe-434-unrestricted-upload-of-file-e86233b9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23636%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20kiteworks%20Secure%20Data%20Forms&amp;severity=medium&amp;id=69c41848f4197a8e3b706bcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23635-cwe-523-unprotected-transport-of-cr-3edcc72b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23635%3A%20CWE-523%3A%20Unprotected%20Transport%20of%20Credentials%20in%20kiteworks%20Secure%20Data%20Forms&amp;severity=medium&amp;id=69c41848f4197a8e3b706bc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1712-cwe-266-incorrect-privilege-assignme-5bbca1c1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1712%3A%20CWE-266%20Incorrect%20privilege%20assignment%20in%20HYPR%20Server&amp;severity=medium&amp;id=69c41848f4197a8e3b706bc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34085-cwe-193-off-by-one-error-in-fontcon-a1337185</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34085%3A%20CWE-193%20Off-by-one%20Error%20in%20fontconfig%20project%20fontconfig&amp;severity=medium&amp;id=69ceb0a7e6bfc5ba1df38204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trojanization-of-trivy-checkmarx-and-litellm-solut-76ab2283</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trojanization%20of%20Trivy%2C%20Checkmarx%2C%20and%20LiteLLM%20solutions%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69c40dfef4197a8e3b6b43ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32573-improper-control-of-generation-of-c-2c0edccd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32573%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Nelio%20Software%20Nelio%20AB%20Testing&amp;severity=critical&amp;id=69c41186f4197a8e3b6d7015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32567-improper-limitation-of-a-pathname-t-3382e216</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32567%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20icopydoc%20YML%20for%20Yandex%20Market&amp;severity=medium&amp;id=69c41186f4197a8e3b6d7012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32562-missing-authorization-in-wp-folio-t-f0e51ed8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32562%3A%20Missing%20Authorization%20in%20WP%20Folio%20Team%20PPWP&amp;severity=medium&amp;id=69c41186f4197a8e3b6d700f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32546-missing-authorization-in-stellarwp--93cf40ac</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32546%3A%20Missing%20Authorization%20in%20StellarWP%20Restrict%20Content&amp;severity=high&amp;id=69c41186f4197a8e3b6d700c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32545-improper-neutralization-of-input-du-8a5633fd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32545%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Taboola%20Taboola%20Pixel&amp;severity=high&amp;id=69c41184f4197a8e3b6d6fee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32544-improper-neutralization-of-input-du-b8adb14f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32544%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OOPSpam%20Team%20OOPSpam%20Anti-Spam&amp;severity=high&amp;id=69c41184f4197a8e3b6d6feb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32542-improper-neutralization-of-input-du-830f7ea0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32542%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeFusion%20Fusion%20Builder&amp;severity=high&amp;id=69c41184f4197a8e3b6d6fe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32541-missing-authorization-in-premmerce--c97b7d13</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32541%3A%20Missing%20Authorization%20in%20Premmerce%20Premmerce%20Redirect%20Manager&amp;severity=medium&amp;id=69c41184f4197a8e3b6d6fe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32539-improper-neutralization-of-special--8d618b97</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32539%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20PublishPress%20PublishPress%20Revisions&amp;severity=critical&amp;id=69c41184f4197a8e3b6d6fe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32538-insertion-of-sensitive-information--6016ed45</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32538%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Noor%20Alam%20SMTP%20Mailer&amp;severity=high&amp;id=69c41184f4197a8e3b6d6fdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32537-improper-control-of-filename-for-in-c5fa8348</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32537%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20nK%20Visual%20Portfolio%2C%20Photo%20Gallery%20%26%20Post%20Grid&amp;severity=high&amp;id=69c41184f4197a8e3b6d6fdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32536-unrestricted-upload-of-file-with-da-30e15f7e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32536%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20halfdata%20Green%20Downloads&amp;severity=critical&amp;id=69c41184f4197a8e3b6d6fd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32535-authorization-bypass-through-user-c-fbf0d9b6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32535%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20JoomSky%20JS%20Help%20Desk&amp;severity=medium&amp;id=69c41184f4197a8e3b6d6fd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32534-improper-neutralization-of-special--17829d2c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32534%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20JoomSky%20JS%20Help%20Desk&amp;severity=high&amp;id=69c41184f4197a8e3b6d6fd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32532-improper-neutralization-of-input-du-ac5edecc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32532%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeHunk%20Contact%20Form%20%26%20Lead%20Form%20Elementor%20Builder&amp;severity=high&amp;id=69c41182f4197a8e3b6d6f77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32531-improper-control-of-filename-for-in-3d6efdb5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32531%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20gavias%20Kunco&amp;severity=high&amp;id=69c41182f4197a8e3b6d6f74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32530-incorrect-privilege-assignment-in-w-8827c7ec</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32530%3A%20Incorrect%20Privilege%20Assignment%20in%20WPFunnels%20Creator%20LMS&amp;severity=high&amp;id=69c41182f4197a8e3b6d6f71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32529-improper-neutralization-of-input-du-a9882ad5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32529%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20don-themes%20Molla&amp;severity=high&amp;id=69c41182f4197a8e3b6d6f6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32528-improper-neutralization-of-input-du-976fcd8a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32528%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20don-themes%20Riode&amp;severity=high&amp;id=69c41182f4197a8e3b6d6f6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32527-missing-authorization-in-crm-perks--eda475e4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32527%3A%20Missing%20Authorization%20in%20CRM%20Perks%20WP%20Insightly%20for%20Contact%20Form%207%2C%20WPForms%2C%20Elementor%2C%20Formidable%20and%20Ninja%20Forms&amp;severity=medium&amp;id=69c41182f4197a8e3b6d6f68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32526-improper-neutralization-of-input-du-eb7cf27d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32526%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20VillaTheme%20Abandoned%20Cart%20Recovery%20for%20WooCommerce&amp;severity=high&amp;id=69c41182f4197a8e3b6d6f65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32525-improper-control-of-generation-of-c-10cda367</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32525%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20jetmonsters%20JetFormBuilder&amp;severity=critical&amp;id=69c41182f4197a8e3b6d6f62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32524-unrestricted-upload-of-file-with-da-ddbe7892</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32524%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Jordy%20Meow%20Photo%20Engine&amp;severity=critical&amp;id=69c41182f4197a8e3b6d6f5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32523-unrestricted-upload-of-file-with-da-30c41908</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32523%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20denishua%20WPJAM%20Basic&amp;severity=critical&amp;id=69c41182f4197a8e3b6d6f5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32522-improper-limitation-of-a-pathname-t-fa6877c5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32522%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20vanquish%20WooCommerce%20Support%20Ticket%20System&amp;severity=high&amp;id=69c41180f4197a8e3b6d6f07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32521-improper-neutralization-of-input-du-4a72f545</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32521%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Northern%20Beaches%20Websites%20WP%20Custom%20Admin%20Interface&amp;severity=medium&amp;id=69c41180f4197a8e3b6d6f04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32520-incorrect-privilege-assignment-in-a-5d9f8707</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32520%3A%20Incorrect%20Privilege%20Assignment%20in%20Andrew%20Munro%20%2F%20AffiliateWP%20RewardsWP&amp;severity=critical&amp;id=69c41180f4197a8e3b6d6f01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32519-incorrect-privilege-assignment-in-b-8aea8889</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32519%3A%20Incorrect%20Privilege%20Assignment%20in%20Bit%20Apps%20Bit%20SMTP&amp;severity=critical&amp;id=69c41180f4197a8e3b6d6efe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32518-improper-neutralization-of-input-du-9053212d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32518%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20imithemes%20Gaea&amp;severity=high&amp;id=69c41180f4197a8e3b6d6efb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32517-improper-neutralization-of-input-du-a0590be1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32517%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kleor%20Contact%20Manager&amp;severity=high&amp;id=69c41180f4197a8e3b6d6ef8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32516-improper-neutralization-of-special--35bb8d98</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32516%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20kamleshyadav%20Miraculous%20Core%20Plugin&amp;severity=high&amp;id=69c41180f4197a8e3b6d6ef5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32515-missing-authorization-in-kamleshyad-ed9cf013</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32515%3A%20Missing%20Authorization%20in%20kamleshyadav%20Miraculous&amp;severity=high&amp;id=69c41180f4197a8e3b6d6ef2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32514-missing-authorization-in-anton-voyt-091d3c0d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32514%3A%20Missing%20Authorization%20in%20Anton%20Voytenko%20Petitioner&amp;severity=medium&amp;id=69c41180f4197a8e3b6d6eef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32513-deserialization-of-untrusted-data-i-d00dee70</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32513%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Miguel%20Useche%20JS%20Archive%20List&amp;severity=high&amp;id=69c41180f4197a8e3b6d6eec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32512-deserialization-of-untrusted-data-i-b9608d49</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32512%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Edge-Themes%20Pelicula&amp;severity=critical&amp;id=69c4117ef4197a8e3b6d6a5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32511-deserialization-of-untrusted-data-i-e2a4eb69</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32511%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Mikado-Themes%20St%C3%A5l&amp;severity=medium&amp;id=69c4117ef4197a8e3b6d6a5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32510-deserialization-of-untrusted-data-i-81fc87c4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32510%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Edge-Themes%20Kamperen&amp;severity=medium&amp;id=69c4117ef4197a8e3b6d6a57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32509-deserialization-of-untrusted-data-i-91be25ca</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32509%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Edge-Themes%20Gracey&amp;severity=medium&amp;id=69c4117ef4197a8e3b6d6a54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32508-deserialization-of-untrusted-data-i-aaac9dad</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32508%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Mikado-Themes%20Halstein&amp;severity=medium&amp;id=69c4117ef4197a8e3b6d6a51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32507-deserialization-of-untrusted-data-i-86a48eec</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32507%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Elated-Themes%20Leroux&amp;severity=medium&amp;id=69c4117ef4197a8e3b6d6a4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32506-deserialization-of-untrusted-data-i-11a3f625</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32506%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Edge-Themes%20Archicon&amp;severity=medium&amp;id=69c4117ef4197a8e3b6d6a49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32505-improper-control-of-filename-for-in-756108d2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32505%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20CreativeWS%20Kiddy&amp;severity=high&amp;id=69c4117ef4197a8e3b6d6a45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32504-improper-control-of-filename-for-in-eb99558c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32504%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20CreativeWS%20VintWood&amp;severity=high&amp;id=69c4117ef4197a8e3b6d6a41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32503-improper-control-of-filename-for-in-db36e62f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32503%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20CreativeWS%20Trendustry&amp;severity=high&amp;id=69c4117ef4197a8e3b6d6a3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32502-deserialization-of-untrusted-data-i-259fb77d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Select-Themes%20Borgholm&amp;severity=critical&amp;id=69c4117bf4197a8e3b6d698e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32501-missing-authorization-in-wp-configu-85e5ff6c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32501%3A%20Missing%20Authorization%20in%20wp-configurator%20WP%20Configurator%20Pro&amp;severity=high&amp;id=69c4117bf4197a8e3b6d698b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32500-improper-control-of-filename-for-in-f87d3394</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32500%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20CreativeWS%20MetaMax&amp;severity=high&amp;id=69c4117bf4197a8e3b6d6988</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32499-improper-neutralization-of-special--f2e4594a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32499%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20QuantumCloud%20ChatBot&amp;severity=critical&amp;id=69c4117bf4197a8e3b6d6985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32498-missing-authorization-in-metagauss--fd323904</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32498%3A%20Missing%20Authorization%20in%20Metagauss%20RegistrationMagic&amp;severity=high&amp;id=69c4117bf4197a8e3b6d6982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32497-weak-authentication-in-pickplugins--65a7d26f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32497%3A%20Weak%20Authentication%20in%20PickPlugins%20User%20Verification&amp;severity=medium&amp;id=69c4117bf4197a8e3b6d697f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32496-improper-limitation-of-a-pathname-t-f9367de2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32496%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20NYSL%20Spam%20Protect%20for%20Contact%20Form%207&amp;severity=medium&amp;id=69c4117bf4197a8e3b6d697c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32495-missing-authorization-in-link-softw-0177db45</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32495%3A%20Missing%20Authorization%20in%20Link%20Software%20LLC%20WP%20Terms%20Popup&amp;severity=high&amp;id=69c4117bf4197a8e3b6d6979</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32494-improper-neutralization-of-input-du-0a3167aa</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32494%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ays%20Pro%20Image%20Slider%20by%20Ays&amp;severity=high&amp;id=69c4117bf4197a8e3b6d6976</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32493-improper-neutralization-of-input-du-7e045118</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32493%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eyecix%20JobSearch&amp;severity=high&amp;id=69c4117bf4197a8e3b6d6973</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32492-authentication-bypass-by-spoofing-i-48fca6f2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32492%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20Joe%20Dolson%20My%20Tickets&amp;severity=medium&amp;id=69c41179f4197a8e3b6d6948</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32491-improper-neutralization-of-input-du-4b1d4953</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32491%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jgwhite33%20WP%20Review%20Slider&amp;severity=medium&amp;id=69c41179f4197a8e3b6d6945</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32490-improper-neutralization-of-input-du-a19709b2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32490%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jgwhite33%20WP%20TripAdvisor%20Review%20Slider&amp;severity=medium&amp;id=69c41179f4197a8e3b6d6942</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32489-missing-authorization-in-bplugins-b-e50c755d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32489%3A%20Missing%20Authorization%20in%20bPlugins%20B%20Blocks&amp;severity=medium&amp;id=69c41179f4197a8e3b6d693f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32488-incorrect-privilege-assignment-in-w-e8ce43f2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32488%3A%20Incorrect%20Privilege%20Assignment%20in%20wpeverest%20User%20Registration&amp;severity=high&amp;id=69c41179f4197a8e3b6d693c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32485-missing-authorization-in-wedevs-wp--d23f13b1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32485%3A%20Missing%20Authorization%20in%20weDevs%20WP%20User%20Frontend&amp;severity=high&amp;id=69c41179f4197a8e3b6d6939</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32484-deserialization-of-untrusted-data-i-c5fa625c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32484%3A%20Deserialization%20of%20Untrusted%20Data%20in%20BoldGrid%20weForms&amp;severity=high&amp;id=69c41179f4197a8e3b6d6936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32483-missing-authorization-in-codepeople-f65c56f6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32483%3A%20Missing%20Authorization%20in%20codepeople%20Contact%20Form%20Email&amp;severity=medium&amp;id=69c41179f4197a8e3b6d6933</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32482-unrestricted-upload-of-file-with-da-5ecc0844</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32482%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20deothemes%20Ona&amp;severity=critical&amp;id=69c41179f4197a8e3b6d6930</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32441-missing-authorization-in-webtoffee--d04ac58b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32441%3A%20Missing%20Authorization%20in%20WebToffee%20Comments%20Import%20%26%20Export&amp;severity=high&amp;id=69c41179f4197a8e3b6d692d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31921-missing-authorization-in-devteam-ha-ce279ec3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31921%3A%20Missing%20Authorization%20in%20Devteam%20HaywoodTech%20Product%20Rearrange%20for%20WooCommerce&amp;severity=high&amp;id=69c41177f4197a8e3b6d6918</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31920-improper-neutralization-of-special--f0f4e53d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31920%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Devteam%20HaywoodTech%20Product%20Rearrange%20for%20WooCommerce&amp;severity=critical&amp;id=69c41177f4197a8e3b6d6915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31914-improper-neutralization-of-input-du-4e199ded</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31914%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hookandhook%20WP%20Courses%20LMS&amp;severity=medium&amp;id=69c41177f4197a8e3b6d6912</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31913-improper-limitation-of-a-pathname-t-190f10fa</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31913%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Whitebox-Studio%20Scape&amp;severity=high&amp;id=69c41177f4197a8e3b6d690f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27095-deserialization-of-untrusted-data-i-3a0c4341</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27095%3A%20Deserialization%20of%20Untrusted%20Data%20in%20magepeopleteam%20Bus%20Ticket%20Booking%20with%20Seat%20Reservation&amp;severity=critical&amp;id=69c41177f4197a8e3b6d690c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27088-improper-neutralization-of-input-du-10a8339d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27088%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20G5Theme%20Darna%20Framework&amp;severity=high&amp;id=69c41177f4197a8e3b6d6909</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27087-improper-neutralization-of-input-du-c3c61ba6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27087%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20G5Theme%20Wolverine%20Framework&amp;severity=high&amp;id=69c41177f4197a8e3b6d6906</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27084-deserialization-of-untrusted-data-i-e6ad1406</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27084%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Buisson&amp;severity=critical&amp;id=69c41177f4197a8e3b6d6903</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27083-deserialization-of-untrusted-data-i-fb46cf45</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27083%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Work%20%26%20Travel%20Company&amp;severity=critical&amp;id=69c41177f4197a8e3b6d6900</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27082-deserialization-of-untrusted-data-i-3c16b289</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27082%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Love%20Story&amp;severity=critical&amp;id=69c41177f4197a8e3b6d68fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27081-improper-control-of-filename-for-in-b9e8b6ae</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27081%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Rosebud&amp;severity=high&amp;id=69c41174f4197a8e3b6d686b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27080-improper-control-of-filename-for-in-dd489a67</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27080%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Deston&amp;severity=high&amp;id=69c41174f4197a8e3b6d6868</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27079-improper-control-of-filename-for-in-5336a0a5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27079%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Amfissa&amp;severity=high&amp;id=69c41174f4197a8e3b6d6865</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27078-improper-control-of-filename-for-in-72ce9988</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27078%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Emaurri&amp;severity=high&amp;id=69c41174f4197a8e3b6d6862</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27077-improper-control-of-filename-for-in-40b7dc68</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27077%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20MultiOffice&amp;severity=high&amp;id=69c41174f4197a8e3b6d685f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27076-improper-control-of-filename-for-in-b31dff94</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27076%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20LuxeDrive&amp;severity=high&amp;id=69c41174f4197a8e3b6d685c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27075-improper-control-of-filename-for-in-9116c16b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27075%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Belfort&amp;severity=high&amp;id=69c41174f4197a8e3b6d6859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27073-use-of-hard-coded-credentials-in-ad-760a6dc7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27073%3A%20Use%20of%20Hard-coded%20Credentials%20in%20Addi%20Addi%20%E2%80%93%20Cuotas%20que%20se%20adaptan%20a%20ti&amp;severity=high&amp;id=69c41174f4197a8e3b6d6856</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27071-missing-authorization-in-arraytics--f16ab7b1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27071%3A%20Missing%20Authorization%20in%20Arraytics%20WPCafe&amp;severity=critical&amp;id=69c41174f4197a8e3b6d6853</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27054-improper-neutralization-of-input-du-761ca3e5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27054%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PenciDesign%20Penci%20Soledad%20Data%20Migrator&amp;severity=high&amp;id=69c41174f4197a8e3b6d6850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27051-incorrect-privilege-assignment-in-u-035d2e67</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27051%3A%20Incorrect%20Privilege%20Assignment%20in%20uxper%20Golo&amp;severity=critical&amp;id=69c41172f4197a8e3b6d683f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27049-authentication-bypass-using-an-alte-24d72b53</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27049%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20NooTheme%20Jobica%20Core&amp;severity=critical&amp;id=69c41172f4197a8e3b6d683c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27048-improper-control-of-filename-for-in-8b7ba223</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27048%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20The%20Aisle%20Core&amp;severity=high&amp;id=69c41172f4197a8e3b6d6839</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27047-improper-control-of-filename-for-in-845e4f48</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27047%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Curly%20Core&amp;severity=high&amp;id=69c41172f4197a8e3b6d6836</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27046-missing-authorization-in-kaira-stor-444e1023</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27046%3A%20Missing%20Authorization%20in%20Kaira%20StoreCustomizer&amp;severity=medium&amp;id=69c41172f4197a8e3b6d6833</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27045-deserialization-of-untrusted-data-i-a6914a73</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27045%3A%20Deserialization%20of%20Untrusted%20Data%20in%20sbthemes%20WooCommerce%20Infinite%20Scroll&amp;severity=high&amp;id=69c41172f4197a8e3b6d6830</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27044-improper-control-of-generation-of-c-c10f38bf</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27044%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20TotalSuite%20Total%20Poll%20Lite&amp;severity=critical&amp;id=69c41172f4197a8e3b6d682d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27040-improper-limitation-of-a-pathname-t-dc8cd6ab</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27040%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20AA-Team%20WZone&amp;severity=high&amp;id=69c41172f4197a8e3b6d682a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27039-improper-neutralization-of-special--9707ccfb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27039%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20AA-Team%20WZone&amp;severity=high&amp;id=69c41172f4197a8e3b6d6827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25469-missing-authorization-in-viabill-fo-0b2405f0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25469%3A%20Missing%20Authorization%20in%20ViaBill%20for%20WooCommerce%20ViaBill%20%E2%80%93%20WooCommerce&amp;severity=medium&amp;id=69c41172f4197a8e3b6d6824</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25465-improper-neutralization-of-input-du-b9f38aef</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25465%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codepeople%20CP%20Multi%20View%20Event%20Calendar&amp;severity=medium&amp;id=69c41170f4197a8e3b6d67ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25464-improper-control-of-filename-for-in-9d7d7430</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25464%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20TieLabs%20Jannah&amp;severity=high&amp;id=69c41170f4197a8e3b6d67e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25461-improper-neutralization-of-input-du-d64bbe4c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25461%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20purethemes%20Listeo%20Core&amp;severity=high&amp;id=69c41170f4197a8e3b6d67e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25460-missing-authorization-in-liquidthem-dc3e13e5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25460%3A%20Missing%20Authorization%20in%20LiquidThemes%20Ave%20Core&amp;severity=medium&amp;id=69c41170f4197a8e3b6d67e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25458-improper-control-of-filename-for-in-993290d7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25458%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Select-Themes%20Moments&amp;severity=high&amp;id=69c41170f4197a8e3b6d67e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25457-improper-control-of-filename-for-in-027ff191</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25457%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Select-Themes%20Mixtape&amp;severity=high&amp;id=69c41170f4197a8e3b6d67dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25456-missing-authorization-in-aarsiv-gro-66b0cf89</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25456%3A%20Missing%20Authorization%20in%20Aarsiv%20Groups%20Automated%20FedEx%20live%2Fmanual%20rates%20with%20shipping%20labels&amp;severity=high&amp;id=69c41170f4197a8e3b6d67da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25455-missing-authorization-in-pickplugin-51114f3a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25455%3A%20Missing%20Authorization%20in%20PickPlugins%20Product%20Slider%20for%20WooCommerce&amp;severity=medium&amp;id=69c41170f4197a8e3b6d67d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25454-missing-authorization-in-mvpthemes--168504b8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25454%3A%20Missing%20Authorization%20in%20MVPThemes%20The%20League&amp;severity=medium&amp;id=69c41170f4197a8e3b6d67d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25452-improper-neutralization-of-input-du-98103dff</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25452%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPDO%20Remoji&amp;severity=high&amp;id=69c41170f4197a8e3b6d67d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25447-improper-control-of-generation-of-c-a962fb02</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25447%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Jonathan%20Daggerhart%20Widget%20Wrangler&amp;severity=critical&amp;id=69c4116ef4197a8e3b6d676b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25437-missing-authorization-in-gzseo-37f57a2b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25437%3A%20Missing%20Authorization%20in%20GZSEO&amp;severity=medium&amp;id=69c4116ef4197a8e3b6d6768</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25435-improper-neutralization-of-input-du-6e8a091b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25435%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevart%20Booking%20calendar%2C%20Appointment%20Booking%20System&amp;severity=high&amp;id=69c4116ef4197a8e3b6d6765</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25430-missing-authorization-in-crm-perks--2f7a8884</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25430%3A%20Missing%20Authorization%20in%20CRM%20Perks%20Integration%20for%20Mailchimp%20and%20Contact%20Form%207%2C%20WPForms%2C%20Elementor%2C%20Ninja%20Forms&amp;severity=medium&amp;id=69c4116ef4197a8e3b6d6762</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25429-deserialization-of-untrusted-data-i-c090ef86</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25429%3A%20Deserialization%20of%20Untrusted%20Data%20in%20wpdive%20Nexa%20Blocks&amp;severity=critical&amp;id=69c4116ef4197a8e3b6d675f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25417-improper-neutralization-of-input-du-db9ee3e5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25417%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Metagauss%20ProfileGrid&amp;severity=medium&amp;id=69c4116ef4197a8e3b6d675c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25414-incorrect-privilege-assignment-in-i-ae58ac67</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25414%3A%20Incorrect%20Privilege%20Assignment%20in%20iqonicdesign%20WPBookit%20Pro&amp;severity=high&amp;id=69c4116ef4197a8e3b6d6759</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25413-unrestricted-upload-of-file-with-da-6b6e6389</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25413%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20iqonicdesign%20WPBookit%20Pro&amp;severity=critical&amp;id=69c4116ef4197a8e3b6d6756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25406-authentication-bypass-using-an-alte-113a07b8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25406%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Themeum%20Tutor%20LMS%20Pro&amp;severity=high&amp;id=69c4116ef4197a8e3b6d6753</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25401-missing-authorization-in-arni-cinco-2a8cc6d3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25401%3A%20Missing%20Authorization%20in%20Arni%20Cinco%20WPCargo%20Track%20%26%20Trace&amp;severity=high&amp;id=69c4116ef4197a8e3b6d6750</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25400-deserialization-of-untrusted-data-i-e01202e9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25400%3A%20Deserialization%20of%20Untrusted%20Data%20in%20thememount%20Apicona&amp;severity=high&amp;id=69c4116bf4197a8e3b6d6697</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25398-missing-authorization-in-webilia-in-56d79e3f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25398%3A%20Missing%20Authorization%20in%20Webilia%20Inc.%20Vertex%20Addons%20for%20Elementor&amp;severity=medium&amp;id=69c4116bf4197a8e3b6d6694</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25397-path-traversal-in-snowray-software--101897ef</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25397%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Snowray%20Software%20File%20Uploader%20for%20WooCommerce&amp;severity=high&amp;id=69c4116bf4197a8e3b6d6691</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25396-missing-authorization-in-coderpress-f1f55866</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25396%3A%20Missing%20Authorization%20in%20CoderPress%20Commerce%20Coinbase%20For%20WooCommerce&amp;severity=high&amp;id=69c4116bf4197a8e3b6d668e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25390-missing-authorization-in-saad-iqbal-30d5d6a8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25390%3A%20Missing%20Authorization%20in%20Saad%20Iqbal%20New%20User%20Approve&amp;severity=medium&amp;id=69c4116bf4197a8e3b6d668b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25383-improper-neutralization-of-input-du-ad52f22e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25383%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Iqonic%20Design%20KiviCare&amp;severity=high&amp;id=69c4116bf4197a8e3b6d6688</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25382-improper-control-of-filename-for-in-b1a3f429</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25382%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20jwsthemes%20IdealAuto&amp;severity=high&amp;id=69c4116bf4197a8e3b6d6685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25381-improper-control-of-filename-for-in-bf3ae8f1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25381%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20jwsthemes%20LoveDate&amp;severity=high&amp;id=69c4116bf4197a8e3b6d6682</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25380-improper-control-of-filename-for-in-4e514365</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25380%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20jwsthemes%20Feedy&amp;severity=high&amp;id=69c4116bf4197a8e3b6d667f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25379-improper-control-of-filename-for-in-41f5b03d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25379%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20jwsthemes%20StreamVid&amp;severity=high&amp;id=69c4116bf4197a8e3b6d667c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25377-improper-neutralization-of-special--774b684d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25377%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20eyecix%20Addon%20Jobsearch%20Chat&amp;severity=critical&amp;id=69c41169f4197a8e3b6d6605</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25376-improper-neutralization-of-input-du-2017ea9a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25376%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eyecix%20Addon%20Jobsearch%20Chat&amp;severity=high&amp;id=69c41169f4197a8e3b6d6602</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25373-improper-neutralization-of-input-du-50c7553d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25373%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ProgressionStudios%20Vayvo&amp;severity=high&amp;id=69c41169f4197a8e3b6d65ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25371-improper-neutralization-of-special--46b7e8b2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25371%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20King-Theme%20Lumise%20Product%20Designer&amp;severity=critical&amp;id=69c41169f4197a8e3b6d65fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25366-improper-control-of-generation-of-c-95f22122</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25366%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Themeisle%20Woody%20ad%20snippets&amp;severity=critical&amp;id=69c41169f4197a8e3b6d65f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25365-missing-authorization-in-zgr-karala-13cb1701</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25365%3A%20Missing%20Authorization%20in%20%C3%96zg%C3%BCr%20KARALAR%20Kargo%20Takip&amp;severity=medium&amp;id=69c41169f4197a8e3b6d65f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25361-improper-neutralization-of-input-du-4f4fc631</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25361%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20magepeopleteam%20WpEvently&amp;severity=high&amp;id=69c41169f4197a8e3b6d65f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25360-deserialization-of-untrusted-data-i-d79678be</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25360%3A%20Deserialization%20of%20Untrusted%20Data%20in%20rascals%20Vex&amp;severity=high&amp;id=69c41169f4197a8e3b6d65f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25359-deserialization-of-untrusted-data-i-e2af6acf</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25359%3A%20Deserialization%20of%20Untrusted%20Data%20in%20rascals%20Pendulum&amp;severity=high&amp;id=69c41169f4197a8e3b6d65ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25358-deserialization-of-untrusted-data-i-869f82c8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25358%3A%20Deserialization%20of%20Untrusted%20Data%20in%20rascals%20Meloo&amp;severity=high&amp;id=69c41169f4197a8e3b6d65e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25357-authentication-bypass-using-an-alte-e7be9ed2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25357%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20azzaroco%20Ultimate%20Membership%20Pro&amp;severity=high&amp;id=69c41167f4197a8e3b6d65d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25356-improper-neutralization-of-input-du-aedbab8d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25356%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20skygroup%20Yobazar&amp;severity=high&amp;id=69c41167f4197a8e3b6d65cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25355-improper-neutralization-of-input-du-75f9668b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25355%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20skygroup%20Sanzo&amp;severity=medium&amp;id=69c41167f4197a8e3b6d65cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25354-improper-neutralization-of-input-du-58fc7554</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25354%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20skygroup%20Reebox&amp;severity=high&amp;id=69c41167f4197a8e3b6d65c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25353-improper-neutralization-of-input-du-b074cc58</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25353%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20skygroup%20Nooni&amp;severity=high&amp;id=69c41167f4197a8e3b6d65c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25352-improper-neutralization-of-input-du-3bf1831f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25352%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20skygroup%20MyDecor&amp;severity=high&amp;id=69c41167f4197a8e3b6d65c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25351-improper-neutralization-of-input-du-ab648dad</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25351%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20skygroup%20MyMedi&amp;severity=high&amp;id=69c41167f4197a8e3b6d65c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25350-improper-neutralization-of-input-du-cf606794</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25350%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20skygroup%20Miti&amp;severity=high&amp;id=69c41167f4197a8e3b6d65bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25349-improper-neutralization-of-input-du-ed2d256e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25349%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20skygroup%20Loobek&amp;severity=high&amp;id=69c41167f4197a8e3b6d65ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25347-improper-neutralization-of-input-du-88ea1079</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25347%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Acato%20WP%20REST%20Cache&amp;severity=high&amp;id=69c41167f4197a8e3b6d65b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25346-improper-neutralization-of-input-du-d7dfaca8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25346%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ays%20Pro%20FAQ%20Builder%20AYS&amp;severity=high&amp;id=69c41165f4197a8e3b6d653d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25345-improper-validation-of-specified-qu-69a2904c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25345%3A%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20GalleryCreator%20SimpLy%20Gallery&amp;severity=critical&amp;id=69c41165f4197a8e3b6d6539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25344-exposure-of-sensitive-system-inform-64e99ef5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25344%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20RadiusTheme%20Review%20Schema&amp;severity=medium&amp;id=69c41165f4197a8e3b6d6536</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25342-improper-neutralization-of-input-du-75a343ec</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25342%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kutethemes%20Boutique&amp;severity=high&amp;id=69c41165f4197a8e3b6d6533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25341-improper-neutralization-of-input-du-de6a8483</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25341%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RSJoomla!%20RSFirewall!&amp;severity=high&amp;id=69c41165f4197a8e3b6d6530</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25340-improper-neutralization-of-special--f22658f3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25340%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20NooTheme%20Jobmonster&amp;severity=critical&amp;id=69c41165f4197a8e3b6d6527</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25339-insertion-of-sensitive-information--fdbd3e98</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25339%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Syed%20Balkhi%20Contact%20Form%20by%20WPForms&amp;severity=medium&amp;id=69c41165f4197a8e3b6d6523</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25334-incorrect-privilege-assignment-in-w-09e2a0d4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25334%3A%20Incorrect%20Privilege%20Assignment%20in%20wordpresschef%20Salon%20Booking%20System%20Pro&amp;severity=high&amp;id=69c41165f4197a8e3b6d6520</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25328-improper-limitation-of-a-pathname-t-501c9a47</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25328%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20add-ons.org%20Product%20File%20Upload%20for%20WooCommerce&amp;severity=medium&amp;id=69c41165f4197a8e3b6d651d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25327-missing-authorization-in-rustaurius-33400d06</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25327%3A%20Missing%20Authorization%20in%20Rustaurius%20Five%20Star%20Restaurant%20Reservations&amp;severity=medium&amp;id=69c41165f4197a8e3b6d651a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25317-missing-authorization-in-tychesoftw-01e3cefb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25317%3A%20Missing%20Authorization%20in%20tychesoftwares%20Print%20Invoice%20%26%20Delivery%20Notes%20for%20WooCommerce&amp;severity=high&amp;id=69c41163f4197a8e3b6d6267</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25309-missing-authorization-in-publishpre-c18d5b56</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25309%3A%20Missing%20Authorization%20in%20PublishPress%20PublishPress%20Authors&amp;severity=high&amp;id=69c41163f4197a8e3b6d6264</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25306-improper-neutralization-of-input-du-407c5d8f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25306%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%208theme%20XStore%20Core&amp;severity=high&amp;id=69c41163f4197a8e3b6d6261</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25304-improper-neutralization-of-input-du-3a5b82f4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25304%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20skygroup%20Jaroti&amp;severity=high&amp;id=69c41163f4197a8e3b6d625e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25035-authentication-bypass-using-an-alte-6dd433fc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25035%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Wasiliy%20Strecker%20%2F%20ContestGallery%20developer%20Contest%20Gallery&amp;severity=critical&amp;id=69c41163f4197a8e3b6d625b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25034-missing-authorization-in-iqonic-des-53bb8eb7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25034%3A%20Missing%20Authorization%20in%20Iqonic%20Design%20KiviCare&amp;severity=medium&amp;id=69c41163f4197a8e3b6d6258</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25033-improper-neutralization-of-input-du-fc49554a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25033%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20uixthemes%20Motta%20Addons&amp;severity=high&amp;id=69c41163f4197a8e3b6d6255</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25032-deserialization-of-untrusted-data-i-9bca17dd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25032%3A%20Deserialization%20of%20Untrusted%20Data%20in%20park_of_ideas%20Ricky&amp;severity=critical&amp;id=69c41163f4197a8e3b6d6252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25031-deserialization-of-untrusted-data-i-4588f14a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25031%3A%20Deserialization%20of%20Untrusted%20Data%20in%20park_of_ideas%20Tasty%20Daily&amp;severity=critical&amp;id=69c41163f4197a8e3b6d624f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25030-deserialization-of-untrusted-data-i-0109f9ad</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25030%3A%20Deserialization%20of%20Untrusted%20Data%20in%20park_of_ideas%20Goldish&amp;severity=critical&amp;id=69c41163f4197a8e3b6d624c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25029-deserialization-of-untrusted-data-i-e68eb6ad</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25029%3A%20Deserialization%20of%20Untrusted%20Data%20in%20park_of_ideas%20KIDZ&amp;severity=critical&amp;id=69c41161f4197a8e3b6d6200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25026-missing-authorization-in-radiusthem-020ee7c9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25026%3A%20Missing%20Authorization%20in%20RadiusTheme%20Team&amp;severity=high&amp;id=69c41161f4197a8e3b6d61fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25025-improper-neutralization-of-input-du-08bd84c1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25025%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20e4jvikwp%20VikRestaurants&amp;severity=high&amp;id=69c41161f4197a8e3b6d61fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25018-improper-neutralization-of-input-du-acecd365</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25018%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20stmcan%20NaturaLife%20Extensions&amp;severity=high&amp;id=69c41161f4197a8e3b6d61f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25017-improper-control-of-filename-for-in-23c8041c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25017%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20stmcan%20NaturaLife%20Extensions&amp;severity=high&amp;id=69c41161f4197a8e3b6d61f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25013-improper-neutralization-of-input-du-5848b46d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25013%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WHMCSdes%20Phox%20Hosting&amp;severity=high&amp;id=69c41161f4197a8e3b6d61f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25009-missing-authorization-in-raratheme--b64d4e55</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25009%3A%20Missing%20Authorization%20in%20raratheme%20Education%20Zone&amp;severity=medium&amp;id=69c41161f4197a8e3b6d61ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25007-improper-neutralization-of-special--a4ed9879</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25007%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Element%20Invader%20ElementInvader%20Addons%20for%20Elementor&amp;severity=high&amp;id=69c41161f4197a8e3b6d61eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25002-authentication-bypass-using-an-alte-c78d2045</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25002%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20ThimPress%20LearnPress%20%E2%80%93%20Sepay%20Payment&amp;severity=high&amp;id=69c41161f4197a8e3b6d61e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25001-improper-control-of-generation-of-c-ae6f032c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25001%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Saad%20Iqbal%20Post%20Snippets&amp;severity=high&amp;id=69c41161f4197a8e3b6d61e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24993-improper-neutralization-of-special--b883dbcf</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24993%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WPFactory%20Advanced%20WooCommerce%20Product%20Sales%20Reporting&amp;severity=critical&amp;id=69c4115ef4197a8e3b6d6123</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24989-deserialization-of-untrusted-data-i-0edb2e84</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24989%3A%20Deserialization%20of%20Untrusted%20Data%20in%20FantasticPlugins%20SUMO%20Affiliates%20Pro&amp;severity=critical&amp;id=69c4115ef4197a8e3b6d6120</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24987-missing-authorization-in-activity-l-48712d63</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24987%3A%20Missing%20Authorization%20in%20activity-log.com%20WP%20System%20Log&amp;severity=medium&amp;id=69c4115ef4197a8e3b6d611d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24983-improper-neutralization-of-input-du-8a35f7d5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24983%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20UpSolution%20UpSolution%20Core&amp;severity=high&amp;id=69c4115ef4197a8e3b6d611a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24981-deserialization-of-untrusted-data-i-1a27f81f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24981%3A%20Deserialization%20of%20Untrusted%20Data%20in%20NooTheme%20Visionary%20Core&amp;severity=high&amp;id=69c4115ef4197a8e3b6d6117</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24980-improper-neutralization-of-input-du-1df2a693</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24980%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NooTheme%20Visionary%20Core&amp;severity=high&amp;id=69c4115ef4197a8e3b6d6114</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24979-improper-neutralization-of-input-du-023f42da</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24979%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NooTheme%20Jobica%20Core&amp;severity=high&amp;id=69c4115ef4197a8e3b6d6111</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24978-deserialization-of-untrusted-data-i-03d2a2f8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24978%3A%20Deserialization%20of%20Untrusted%20Data%20in%20NooTheme%20Jobica%20Core&amp;severity=high&amp;id=69c4115ef4197a8e3b6d610e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24977-improper-neutralization-of-special--9ccd0146</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24977%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20NooTheme%20Organici%20Library&amp;severity=high&amp;id=69c4115ef4197a8e3b6d610b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24976-deserialization-of-untrusted-data-i-46cea663</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24976%3A%20Deserialization%20of%20Untrusted%20Data%20in%20NooTheme%20Organici%20Library&amp;severity=high&amp;id=69c4115ef4197a8e3b6d6108</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24975-improper-neutralization-of-input-du-0f06049c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24975%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NooTheme%20Organici%20Library&amp;severity=high&amp;id=69c4115bf4197a8e3b6d6033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24974-deserialization-of-untrusted-data-i-4f8b54a5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24974%3A%20Deserialization%20of%20Untrusted%20Data%20in%20NooTheme%20CitiLights&amp;severity=high&amp;id=69c4115bf4197a8e3b6d6030</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24973-improper-neutralization-of-input-du-1a6da9e0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24973%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NooTheme%20CitiLights&amp;severity=high&amp;id=69c4115bf4197a8e3b6d602d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24972-missing-authorization-in-elated-the-25a8605d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24972%3A%20Missing%20Authorization%20in%20Elated-Themes%20Elated%20Listing&amp;severity=medium&amp;id=69c4115bf4197a8e3b6d602a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24971-incorrect-privilege-assignment-in-e-e65fc594</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24971%3A%20Incorrect%20Privilege%20Assignment%20in%20Elated-Themes%20Search%20%26%20Go&amp;severity=critical&amp;id=69c4115bf4197a8e3b6d6027</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24970-improper-limitation-of-a-pathname-t-d928e49c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24970%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20designingmedia%20Energox&amp;severity=high&amp;id=69c4115bf4197a8e3b6d6024</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24969-improper-limitation-of-a-pathname-t-073273ca</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24969%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20designingmedia%20Instant%20VA&amp;severity=high&amp;id=69c4115bf4197a8e3b6d6021</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24964-server-side-request-forgery-ssrf-in-d35e9aca</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24964%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Wasiliy%20Strecker%20%2F%20ContestGallery%20developer%20Contest%20Gallery&amp;severity=medium&amp;id=69c4115bf4197a8e3b6d601e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24391-improper-neutralization-of-input-du-8ccacf79</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24391%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeMakers%20Car%20Dealer&amp;severity=high&amp;id=69c4115bf4197a8e3b6d601b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24382-missing-authorization-in-wproyal-ne-1ebfd1e3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24382%3A%20Missing%20Authorization%20in%20wproyal%20News%20Magazine%20X&amp;severity=high&amp;id=69c4115bf4197a8e3b6d6018</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24378-deserialization-of-untrusted-data-i-c4842179</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24378%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Metagauss%20EventPrime&amp;severity=critical&amp;id=69c41159f4197a8e3b6d5335</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24376-missing-authorization-in-javier-cas-3689cba3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24376%3A%20Missing%20Authorization%20in%20Javier%20Casares%20WPVulnerability&amp;severity=medium&amp;id=69c41159f4197a8e3b6d5331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24373-incorrect-privilege-assignment-in-m-6a717786</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24373%3A%20Incorrect%20Privilege%20Assignment%20in%20Metagauss%20RegistrationMagic&amp;severity=high&amp;id=69c41159f4197a8e3b6d532d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24372-authentication-bypass-by-spoofing-i-e801fb02</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24372%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20WP%20Swings%20Subscriptions%20for%20WooCommerce&amp;severity=high&amp;id=69c41159f4197a8e3b6d5329</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24370-improper-neutralization-of-input-du-a2a0caf6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24370%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Theme-one%20The%20Grid&amp;severity=medium&amp;id=69c41159f4197a8e3b6d5325</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24369-missing-authorization-in-theme-one--f3e247a3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24369%3A%20Missing%20Authorization%20in%20Theme-one%20The%20Grid&amp;severity=high&amp;id=69c41159f4197a8e3b6d5322</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24364-missing-authorization-in-wedevs-wp--d6b24059</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24364%3A%20Missing%20Authorization%20in%20weDevs%20WP%20User%20Frontend&amp;severity=medium&amp;id=69c41159f4197a8e3b6d531f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24363-missing-authorization-in-loopus-wp--d34c4544</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24363%3A%20Missing%20Authorization%20in%20loopus%20WP%20Cost%20Estimation%20%26%20Payment%20Forms%20Builder&amp;severity=high&amp;id=69c41159f4197a8e3b6d531c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24362-missing-authorization-in-bdthemes-u-661e960a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24362%3A%20Missing%20Authorization%20in%20bdthemes%20Ultimate%20Post%20Kit&amp;severity=medium&amp;id=69c41159f4197a8e3b6d5319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24359-authentication-bypass-using-an-alte-949b7d59</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24359%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Dokan%2C%20Inc.%20Dokan&amp;severity=high&amp;id=69c41159f4197a8e3b6d5316</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23979-improper-neutralization-of-input-du-b95473dc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23979%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Softwebmedia%20Gyan%20Elements&amp;severity=high&amp;id=69c41156f4197a8e3b6d52a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23977-missing-authorization-in-wpfactory--09d6c217</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23977%3A%20Missing%20Authorization%20in%20WPFactory%20Helpdesk%20Support%20Ticket%20System%20for%20WooCommerce&amp;severity=high&amp;id=69c41156f4197a8e3b6d52a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23973-improper-neutralization-of-input-du-e36b0bae</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23973%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20uxper%20Golo&amp;severity=high&amp;id=69c41156f4197a8e3b6d52a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23972-missing-authorization-in-magepeople-6a39edcf</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23972%3A%20Missing%20Authorization%20in%20magepeopleteam%20Booking%20and%20Rental%20Manager&amp;severity=medium&amp;id=69c41156f4197a8e3b6d529f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23971-deserialization-of-untrusted-data-i-107d0db3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23971%3A%20Deserialization%20of%20Untrusted%20Data%20in%20xtemos%20WoodMart&amp;severity=high&amp;id=69c41156f4197a8e3b6d529c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23807-improper-neutralization-of-input-du-e08c0582</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23807%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Socio%20WP%20Telegram%20Widget%20and%20Join%20Link&amp;severity=high&amp;id=69c41156f4197a8e3b6d5299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23806-missing-authorization-in-blueglass--7be7b6a1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23806%3A%20Missing%20Authorization%20in%20BlueGlass%20Interactive%20AG%20Jobs%20for%20WordPress&amp;severity=high&amp;id=69c41156f4197a8e3b6d5296</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22524-improper-neutralization-of-input-du-722e83cc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22524%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themepassion%20Legacy%20Admin&amp;severity=high&amp;id=69c41156f4197a8e3b6d5293</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22523-improper-neutralization-of-input-du-2f292154</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22523%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themepassion%20Ultra%20WordPress%20Admin&amp;severity=high&amp;id=69c41156f4197a8e3b6d5290</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22520-improper-neutralization-of-input-du-bf44ecfb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22520%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20G5Theme%20Handmade%20Framework&amp;severity=high&amp;id=69c41156f4197a8e3b6d528d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22516-improper-control-of-filename-for-in-411fc406</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22516%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Wizor&apos;s&amp;severity=high&amp;id=69c41154f4197a8e3b6d521d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22515-improper-control-of-filename-for-in-92e1df77</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22515%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20VegaDays&amp;severity=high&amp;id=69c41154f4197a8e3b6d521a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22514-improper-control-of-filename-for-in-20e19566</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22514%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Unica&amp;severity=high&amp;id=69c41154f4197a8e3b6d5217</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22513-improper-control-of-filename-for-in-1c531a8e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22513%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Triompher&amp;severity=high&amp;id=69c41154f4197a8e3b6d5214</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22512-improper-control-of-filename-for-in-602d5c6f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22512%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Roisin&amp;severity=high&amp;id=69c41154f4197a8e3b6d5211</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22511-improper-control-of-filename-for-in-deff7abf</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22511%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20NeoBeat&amp;severity=high&amp;id=69c41154f4197a8e3b6d520e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22510-deserialization-of-untrusted-data-i-194f8c21</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22510%3A%20Deserialization%20of%20Untrusted%20Data%20in%20AncoraThemes%20Melody&amp;severity=high&amp;id=69c41154f4197a8e3b6d520b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22509-improper-control-of-filename-for-in-b5770cc2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22509%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Gioia&amp;severity=high&amp;id=69c41154f4197a8e3b6d5208</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22508-improper-control-of-filename-for-in-57f9b376</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22508%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Dentalux&amp;severity=high&amp;id=69c41154f4197a8e3b6d5205</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22507-deserialization-of-untrusted-data-i-af73ebf3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22507%3A%20Deserialization%20of%20Untrusted%20Data%20in%20AncoraThemes%20Beelove&amp;severity=critical&amp;id=69c41154f4197a8e3b6d5202</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22506-improper-control-of-filename-for-in-9c54f3e7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22506%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Amoli&amp;severity=high&amp;id=69c41151f4197a8e3b6d5199</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22505-deserialization-of-untrusted-data-i-3904281b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22505%3A%20Deserialization%20of%20Untrusted%20Data%20in%20AncoraThemes%20Morning%20Records&amp;severity=high&amp;id=69c41151f4197a8e3b6d5196</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22504-improper-control-of-filename-for-in-e912a8a7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22504%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20ProLingua&amp;severity=high&amp;id=69c41151f4197a8e3b6d5193</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22503-improper-control-of-filename-for-in-7fb487ba</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22503%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Nelson&amp;severity=high&amp;id=69c41151f4197a8e3b6d5190</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22502-improper-control-of-filename-for-in-b429c1bb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22502%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Mr.%20Cobbler&amp;severity=high&amp;id=69c41151f4197a8e3b6d518d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22500-deserialization-of-untrusted-data-i-6b3e8a60</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22500%3A%20Deserialization%20of%20Untrusted%20Data%20in%20axiomthemes%20m2%20%7C%20Construction%20and%20Tools%20Store&amp;severity=critical&amp;id=69c41151f4197a8e3b6d518a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22499-improper-control-of-filename-for-in-e88a1c55</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22499%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Lella&amp;severity=high&amp;id=69c41151f4197a8e3b6d5187</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22498-improper-control-of-filename-for-in-8cb213f8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22498%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Laurent&amp;severity=high&amp;id=69c41151f4197a8e3b6d5184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22496-improper-control-of-filename-for-in-3fd5999d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22496%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Hypnotherapy&amp;severity=high&amp;id=69c41151f4197a8e3b6d5181</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22495-improper-control-of-filename-for-in-e572e336</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22495%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Greenville&amp;severity=high&amp;id=69c41151f4197a8e3b6d517e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22494-improper-control-of-filename-for-in-108280d3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22494%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Good%20Homes&amp;severity=high&amp;id=69c4114ff4197a8e3b6d50bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22493-improper-control-of-filename-for-in-85abbaf4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22493%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Gaspard&amp;severity=high&amp;id=69c4114ff4197a8e3b6d50bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22491-improper-neutralization-of-input-du-c9c8f055</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22491%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wphocus%20My%20auctions%20allegro&amp;severity=high&amp;id=69c4114ff4197a8e3b6d50b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22485-missing-authorization-in-ruhul-amin-fe036a67</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22485%3A%20Missing%20Authorization%20in%20Ruhul%20Amin%20My%20Album%20Gallery&amp;severity=medium&amp;id=69c4114ff4197a8e3b6d50b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22484-improper-neutralization-of-special--ea184701</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22484%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20pebas%20Lisfinity%20Core&amp;severity=critical&amp;id=69c4114ff4197a8e3b6d50b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22480-deserialization-of-untrusted-data-i-beede38d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22480%3A%20Deserialization%20of%20Untrusted%20Data%20in%20WebToffee%20Product%20Feed%20for%20WooCommerce&amp;severity=high&amp;id=69c4114ff4197a8e3b6d50b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22448-improper-limitation-of-a-pathname-t-60ea4cb8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22448%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20flexcubed%20PitchPrint&amp;severity=high&amp;id=69c4114ff4197a8e3b6d50ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69358-missing-authorization-in-metagauss--bf9d4e77</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69358%3A%20Missing%20Authorization%20in%20Metagauss%20EventPrime&amp;severity=high&amp;id=69c4114ff4197a8e3b6d50aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69347-authorization-bypass-through-user-c-13002512</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69347%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Convers%20Lab%20WPSubscription&amp;severity=high&amp;id=69c4114ff4197a8e3b6d50a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69096-improper-neutralization-of-input-du-080c5391</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69096%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20G5Theme%20Zorka&amp;severity=high&amp;id=69c4114ff4197a8e3b6d50a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20108-improper-neutralization-of-input-du-72c89549</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20108%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Catalyst%20SD-WAN%20Manager&amp;severity=medium&amp;id=69c40a64f4197a8e3b6998ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20112-improper-neutralization-of-input-du-a16672bd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20112%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=69c40a64f4197a8e3b699905</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20113-improper-neutralization-of-crlf-seq-c2135bf5</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20113%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=69c40a67f4197a8e3b699a42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20114-improper-validation-of-syntactic-co-57e09085</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20114%3A%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=69c40a67f4197a8e3b699a45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20115-cleartext-transmission-of-sensitive-2338cc47</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20115%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=69c40a67f4197a8e3b699a48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20083-improper-handling-of-extra-paramete-30a02b67</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20083%3A%20Improper%20Handling%20of%20Extra%20Parameters%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=69c40a64f4197a8e3b6998f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20110-incorrect-privilege-assignment-in-c-02a77f10</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20110%3A%20Incorrect%20Privilege%20Assignment%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=69c40a64f4197a8e3b699902</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20104-buffer-underwrite-buffer-underflow--3de1764a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20104%3A%20Buffer%20Underwrite%20(&apos;Buffer%20Underflow&apos;)%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=69c40a64f4197a8e3b6998fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20004-missing-reference-to-active-allocat-e6f24850</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20004%3A%20Missing%20Reference%20to%20Active%20Allocated%20Resource%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=high&amp;id=69c40a64f4197a8e3b6998ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58341-cwe-89-improper-neutralization-of-s-4c430d30</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58341%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Opencart%20OpenCart%20Core&amp;severity=high&amp;id=69c40a64f4197a8e3b6998e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20125-improper-handling-of-syntactically--365ab152</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20125%3A%20Improper%20Handling%20of%20Syntactically%20Invalid%20Structure%20in%20Cisco%20IOS&amp;severity=high&amp;id=69c40a67f4197a8e3b699a4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20012-missing-release-of-memory-after-eff-62169714</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20012%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Cisco%20IOS&amp;severity=high&amp;id=69c40a64f4197a8e3b6998f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20086-improper-handling-of-missing-values-f636f063</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20086%3A%20Improper%20Handling%20of%20Missing%20Values%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=high&amp;id=69c40a64f4197a8e3b6998f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20084-uncontrolled-resource-consumption-i-1bc72f79</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20084%3A%20Uncontrolled%20Resource%20Consumption%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=high&amp;id=69c40a64f4197a8e3b6998f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3218-cwe-79-improper-neutralization-of-in-846bf146</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3218%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(%22Cross-site%20Scripting%22)%20in%20Drupal%20Responsive%20Favicons&amp;severity=medium&amp;id=69c40334f4197a8e3b666f60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3217-cwe-79-improper-neutralization-of-in-91bf5ea2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3217%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(%22Cross-site%20Scripting%22)%20in%20Drupal%20SAML%20SSO%20-%20Service%20Provider&amp;severity=medium&amp;id=69c40334f4197a8e3b666f5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3216-cwe-918-server-side-request-forgery--13e3758e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3216%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Drupal%20Drupal%20Canvas&amp;severity=medium&amp;id=69c40334f4197a8e3b666f5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3215-cwe-79-improper-neutralization-of-in-677d9a3a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3215%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(%22Cross-site%20Scripting%22)%20in%20Drupal%20Islandora&amp;severity=medium&amp;id=69c40331f4197a8e3b666ecc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3214-cwe-288-authentication-bypass-using--0a2b53c0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3214%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Drupal%20CAPTCHA&amp;severity=medium&amp;id=69c40331f4197a8e3b666ec9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3213-cwe-79-improper-neutralization-of-in-bf87487f</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3213%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(%22Cross-site%20Scripting%22)%20in%20Drupal%20Anti-Spam%20by%20CleanTalk&amp;severity=medium&amp;id=69c40331f4197a8e3b666ec6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24750-cwe-79-improper-neutralization-of-i-ce0f5c25</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24750%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kiteworks%20Secure%20Data%20Forms&amp;severity=high&amp;id=69c40331f4197a8e3b666eb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3212-cwe-79-improper-neutralization-of-in-591aa3ee</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3212%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(%22Cross-site%20Scripting%22)%20in%20Drupal%20Tagify&amp;severity=medium&amp;id=69c40331f4197a8e3b666ec3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3211-cwe-352-cross-site-request-forgery-c-81964679</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3211%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Drupal%20Theme%20Negotiation%20by%20Rules&amp;severity=medium&amp;id=69c40331f4197a8e3b666ec0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3210-cwe-863-incorrect-authorization-in-d-21752fb0</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3210%3A%20CWE-863%20Incorrect%20Authorization%20in%20Drupal%20Material%20Icons&amp;severity=medium&amp;id=69c40331f4197a8e3b666ebd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2349-cwe-79-improper-neutralization-of-in-08f298cf</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2349%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(%22Cross-site%20Scripting%22)%20in%20Drupal%20UI%20Icons&amp;severity=medium&amp;id=69c40331f4197a8e3b666eba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2348-cwe-79-improper-neutralization-of-in-8bb7024f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2348%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(%22Cross-site%20Scripting%22)%20in%20Drupal%20Quick%20Edit&amp;severity=medium&amp;id=69c40331f4197a8e3b666eb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1917-cwe-288-authentication-bypass-using--e6ab6029</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1917%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Drupal%20Login%20Disable&amp;severity=medium&amp;id=69c40331f4197a8e3b666eaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-cybercriminal-gets-2-year-prison-sentence--eacebc06</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20Cybercriminal%20Gets%202-Year%20Prison%20Sentence%20in%20US&amp;severity=medium&amp;id=69c3f19cf4197a8e3b553b4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33268-cwe-400-uncontrolled-resource-consu-67964107</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33268%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Nanoleaf%20Lines&amp;severity=medium&amp;id=69c3f1b2f4197a8e3b5542d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23514-cwe-282-improper-ownership-manageme-7a0173a4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23514%3A%20CWE-282%3A%20Improper%20Ownership%20Management%20in%20kiteworks%20core&amp;severity=high&amp;id=69c3f1b2f4197a8e3b5542d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-speeds-attacks-but-identity-remains-cybersecuri-34bed359</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20Speeds%20Attacks%2C%20But%20Identity%20Remains%20Cybersecurity%E2%80%99s%20Weakest%20Link&amp;severity=medium&amp;id=69c3ee18f4197a8e3b53b59e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3591-cwe-562-return-of-stack-variable-add-0a50bc6c</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3591%3A%20CWE-562%20Return%20of%20Stack%20Variable%20Address%20in%20ISC%20BIND%209&amp;severity=medium&amp;id=69c3eaa6f4197a8e3b5259f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3119-cwe-617-reachable-assertion-in-isc-b-7dde1da1</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3119%3A%20CWE-617%20Reachable%20Assertion%20in%20ISC%20BIND%209&amp;severity=medium&amp;id=69c3eaa6f4197a8e3b5259ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4815-cwe-89-improper-neutralization-of-sp-86ce3b3e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4815%3A%20CWE-89%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20injection&apos;)%20in%20Schiocco%20Support%20Board&amp;severity=high&amp;id=69c3eaa6f4197a8e3b5259f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4816-cwe-79-improper-neutralization-of-in-bb35cca3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4816%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Schiocco%20Support%20Board&amp;severity=medium&amp;id=69c3eaa6f4197a8e3b5259fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3104-cwe-772-missing-release-of-resource--9a88f86a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3104%3A%20CWE-772%20Missing%20Release%20of%20Resource%20after%20Effective%20Lifetime%20in%20ISC%20BIND%209&amp;severity=high&amp;id=69c3eaa6f4197a8e3b5259ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ios-macos-264-roll-out-with-fresh-security-patches-b250a770</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=iOS%2C%20macOS%2026.4%20Roll%20Out%20With%20Fresh%20Security%20Patches&amp;severity=medium&amp;id=69c3e38cf4197a8e3b4fd60d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1519-cwe-606-unchecked-input-for-loop-con-5c130d5f</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1519%3A%20CWE-606%20Unchecked%20Input%20for%20Loop%20Condition%20in%20ISC%20BIND%209&amp;severity=high&amp;id=69c3eaa6f4197a8e3b5259e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40842-cwe-79-improper-neutralization-of-i-f4ccbe80</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40842%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Ericsson%20Indoor%20Connect%208855&amp;severity=high&amp;id=69c3e3c7f4197a8e3b4fe9be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40841-cwe-352-cross-site-request-forgery--52cb0b35</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40841%3A%20CWE-352%20Cross-Site%20request%20forgery%20(CSRF)%20in%20Ericsson%20Indoor%20Connect%208855&amp;severity=medium&amp;id=69c3e3c7f4197a8e3b4fe9ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27260-cwe-790-in-ericsson-indoor-connect--70b4897e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27260%3A%20CWE-790%20in%20Ericsson%20Indoor%20Connect%208855&amp;severity=high&amp;id=69c3e3c7f4197a8e3b4fe9b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4761-cwe-732-incorrect-permission-assignm-1eae1c84</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4761%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20CODRA%20Panorama%20Suite&amp;severity=low&amp;id=69c3dca4f4197a8e3b4d5c80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fcc-bans-new-routers-made-outside-the-us-over-nati-0079eee7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FCC%20Bans%20New%20Routers%20Made%20Outside%20the%20US%20Over%20National%20Security%20Risks&amp;severity=medium&amp;id=69c3d900f4197a8e3b4c48ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4760-cwe-552-files-or-directories-accessi-bd7c05a8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4760%3A%20CWE-552%20Files%20or%20directories%20accessible%20to%20external%20parties%20in%20CODRA%20Panorama%20Suite&amp;severity=high&amp;id=69c3e3c7f4197a8e3b4fe9c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-trivy-to-broad-oss-compromise-teampcp-hits-do-703cdc7b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Trivy%20to%20Broad%20OSS%20Compromise%3A%20TeamPCP%20Hits%20Docker%20Hub%2C%20VS%20Code%2C%20PyPI&amp;severity=medium&amp;id=69c3ce74f4197a8e3b4950bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/supply-chain-attack-malicious-pypi-packages-091bfe2a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Supply%20Chain%20Attack%3A%20Malicious%20PyPI%20Packages&amp;severity=medium&amp;id=69c3f1aef4197a8e3b553f9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-pypi-package-litellm-supply-chain-compro-c04058b1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20PyPI%20Package%20-%20LiteLLM%20Supply%20Chain%20Compromise&amp;severity=medium&amp;id=69c3ee28f4197a8e3b53b8b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23333-6b151339</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23333&amp;severity=null&amp;id=69dcf3cf82d89c981fee9b20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23320-fa1f52b5</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23320&amp;severity=null&amp;id=69cfe4200a160ebd923f9c81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-prisons-russian-access-broker-for-aiding-ransom-df65fd02</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Prisons%20Russian%20Access%20Broker%20for%20Aiding%20Ransomware%20Attacks&amp;severity=medium&amp;id=69c3ab4cf4197a8e3b3a1b29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3608-cwe-617-reachable-assertion-in-isc-k-fed4f439</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3608%3A%20CWE-617%20Reachable%20Assertion%20in%20ISC%20Kea&amp;severity=high&amp;id=69c3a455f4197a8e3b370141</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackerone-employee-data-exposed-in-massive-navia-b-c6b11c77</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HackerOne%20Employee%20Data%20Exposed%20in%20Massive%20Navia%20Breach&amp;severity=medium&amp;id=69c3963cf4197a8e3b2f4bfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32326-missing-authentication-for-critical-9a481b76</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32326%3A%20Missing%20authentication%20for%20critical%20function%20in%20Sharp%20Corporation%20home%205G%20HR01&amp;severity=medium&amp;id=69c39653f4197a8e3b2f5482</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2343-cwe-200-information-exposure-in-pepr-b24bfe87</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2343%3A%20CWE-200%20Information%20Exposure%20in%20PeproDev%20Ultimate%20Invoice&amp;severity=medium&amp;id=69c37d98f4197a8e3b0cd267</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26306-uncontrolled-search-path-element-in-ee774158</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26306%3A%20Uncontrolled%20Search%20Path%20Element%20in%20OM%20Digital%20Solutions%20Corporation%20OM%20Workspace%20(Windows%20Edition)&amp;severity=high&amp;id=69c37d98f4197a8e3b0cd263</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33253-unquoted-search-path-or-element-in--97bdffae</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33253%3A%20Unquoted%20search%20path%20or%20element%20in%20SANYO%20DENKI%20CO.%2C%20LTD.%20SANUPS%20SOFTWARE%20STANDALONE&amp;severity=medium&amp;id=69c37690f4197a8e3bfb90e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/guidance-for-detecting-investigating-and-defending-f813b422</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Guidance%20for%20detecting%2C%20investigating%2C%20and%20defending%20against%20the%20Trivy%20supply%20chain%20compromise&amp;severity=medium&amp;id=69c3b5e5f4197a8e3b411ea1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2072-cwe-79-improper-neutralization-of-in-c6f3add7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2072%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Hitachi%20Hitachi%20Infrastructure%20Analytics%20Advisor&amp;severity=high&amp;id=69c34c81f4197a8e3bc565a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1166-cwe-601-url-redirection-to-untrusted-7de2151a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1166%3A%20CWE-601%20URL%20redirection%20to%20untrusted%20site%20(&apos;open%20redirect&apos;)%20in%20Hitachi%20Hitachi%20Ops%20Center%20Administrator&amp;severity=medium&amp;id=69c34c7ef4197a8e3bc56508</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4766-cwe-79-improper-neutralization-of-in-c6d9900c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4766%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devrix%20Easy%20Image%20Gallery&amp;severity=medium&amp;id=69c33e4ff4197a8e3bb9c1b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4784-sql-injection-in-code-projects-simpl-1ba821cd</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4784%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69c33e4ff4197a8e3bb9c1b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28864-a-local-attacker-may-gain-access-to-881070fb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28864%3A%20A%20local%20attacker%20may%20gain%20access%20to%20user&apos;s%20Keychain%20items%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=69c333e1f4197a8e3baaec88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20691-a-maliciously-crafted-webpage-may-b-25f0d1f1</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20691%3A%20A%20maliciously%20crafted%20webpage%20may%20be%20able%20to%20fingerprint%20the%20user%20in%20Apple%20Safari&amp;severity=medium&amp;id=69c333d8f4197a8e3baae891</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28833-an-app-may-be-able-to-enumerate-a-u-fa046f85</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28833%3A%20An%20app%20may%20be%20able%20to%20enumerate%20a%20user&apos;s%20installed%20apps%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333ddf4197a8e3baaeaf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28825-an-app-may-be-able-to-modify-protec-1aa50dd2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28825%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=high&amp;id=69c333dcf4197a8e3baaea7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20668-an-app-may-be-able-to-access-sensit-fb27d790</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20668%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333d8f4197a8e3baae866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20687-an-app-may-be-able-to-cause-unexpec-a39ac789</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20687%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20write%20kernel%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69c333d8f4197a8e3baae878</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20701-an-app-may-be-able-to-connect-to-a--7a65470e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20701%3A%20An%20app%20may%20be%20able%20to%20connect%20to%20a%20network%20share%20without%20user%20consent%20in%20Apple%20macOS&amp;severity=high&amp;id=69c333d9f4197a8e3baae9b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43534-a-user-with-physical-access-to-an-i-a6c8aefa</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43534%3A%20A%20user%20with%20physical%20access%20to%20an%20iOS%20device%20may%20be%20able%20to%20bypass%20Activation%20Lock%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333d6f4197a8e3baae805</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28868-an-app-may-be-able-to-disclose-kern-ac04a2d9</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28868%3A%20An%20app%20may%20be%20able%20to%20disclose%20kernel%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333e1f4197a8e3baaecab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20633-an-app-may-be-able-to-access-user-s-84a84ff2</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20633%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333d6f4197a8e3baae818</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28829-an-app-may-be-able-to-modify-protec-e359e57b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28829%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333ddf4197a8e3baaeae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20664-processing-maliciously-crafted-web--5c90b907</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20664%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69c333d8f4197a8e3baae856</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28891-an-app-may-be-able-to-break-out-of--ee90eae8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28891%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=high&amp;id=69c333e4f4197a8e3baaeda6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28852-an-app-may-be-able-to-cause-a-denia-6621e6ee</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28852%3A%20An%20app%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333dff4197a8e3baaeb2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28844-an-attacker-may-gain-access-to-prot-bb0e69d0</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28844%3A%20An%20attacker%20may%20gain%20access%20to%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333dff4197a8e3baaeb26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28845-an-app-may-be-able-to-access-protec-f04601d9</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28845%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333dff4197a8e3baaeb29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28890-an-app-may-be-able-to-cause-unexpec-f5b333b6</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28890%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20Xcode&amp;severity=medium&amp;id=69c333e4f4197a8e3baaeda3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20665-processing-maliciously-crafted-web--1173ad63</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20665%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20prevent%20Content%20Security%20Policy%20from%20being%20enforced%20in%20Apple%20Safari&amp;severity=medium&amp;id=69c333d8f4197a8e3baae85c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28828-an-app-may-be-able-to-access-sensit-9a0b8461</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28828%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333dcf4197a8e3baaea8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20632-an-app-may-be-able-to-access-sensit-13673933</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20632%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333d6f4197a8e3baae815</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28886-a-user-in-a-privileged-network-posi-e3bd49f5</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28886%3A%20A%20user%20in%20a%20privileged%20network%20position%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333e3f4197a8e3baaed45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20686-an-app-may-be-able-to-access-sensit-9f6a0432</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20686%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333d8f4197a8e3baae875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28824-an-app-may-be-able-to-access-sensit-b959c5c5</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28824%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333dcf4197a8e3baaea79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28832-an-app-may-be-able-to-disclose-kern-40d9ae89</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28832%3A%20An%20app%20may%20be%20able%20to%20disclose%20kernel%20memory%20in%20Apple%20macOS&amp;severity=high&amp;id=69c333ddf4197a8e3baaeaee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20690-processing-an-audio-stream-in-a-mal-83d58a53</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20690%3A%20Processing%20an%20audio%20stream%20in%20a%20maliciously%20crafted%20media%20file%20may%20terminate%20the%20process%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333d8f4197a8e3baae887</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28865-an-attacker-in-a-privileged-network-fc3fc9e2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28865%3A%20An%20attacker%20in%20a%20privileged%20network%20position%20may%20be%20able%20to%20intercept%20network%20traffic%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69c333e1f4197a8e3baaec91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28881-an-app-may-be-able-to-access-sensit-0e9705ef</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28881%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333e3f4197a8e3baaed3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28839-an-app-may-be-able-to-access-sensit-0f2f7834</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28839%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333ddf4197a8e3baaeb0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28878-an-app-may-be-able-to-enumerate-a-u-d79e680b</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28878%3A%20An%20app%20may%20be%20able%20to%20enumerate%20a%20user&apos;s%20installed%20apps%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333e3f4197a8e3baaed20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28842-a-buffer-overflow-may-result-in-mem-7b712ac1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28842%3A%20A%20buffer%20overflow%20may%20result%20in%20memory%20corruption%20and%20unexpected%20app%20termination%20in%20Apple%20macOS&amp;severity=high&amp;id=69c333dff4197a8e3baaeb23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28862-an-app-may-be-able-to-access-user-s-3d9dc891</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28862%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333e1f4197a8e3baaec7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4783-sql-injection-in-itsourcecode-colleg-35d140b0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4783%3A%20SQL%20Injection%20in%20itsourcecode%20College%20Management%20System&amp;severity=medium&amp;id=69c333e4f4197a8e3baaedbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20697-an-app-may-be-able-to-access-sensit-9485ad53</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20697%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333d9f4197a8e3baae98a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28835-mounting-a-maliciously-crafted-smb--0003d53f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28835%3A%20Mounting%20a%20maliciously%20crafted%20SMB%20network%20share%20may%20lead%20to%20system%20termination%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333ddf4197a8e3baaeafd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28823-an-app-with-root-privileges-may-be--b80563d9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28823%3A%20An%20app%20with%20root%20privileges%20may%20be%20able%20to%20delete%20protected%20system%20files%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333dcf4197a8e3baaea76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20639-processing-a-maliciously-crafted-st-e26a8a3e</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20639%3A%20Processing%20a%20maliciously%20crafted%20string%20may%20lead%20to%20heap%20corruption%20in%20Apple%20macOS&amp;severity=high&amp;id=69c333d6f4197a8e3baae827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28874-a-remote-attacker-may-cause-an-unex-410e92ff</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28874%3A%20A%20remote%20attacker%20may%20cause%20an%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69c333e1f4197a8e3baaecc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28858-a-remote-user-may-be-able-to-cause--a262d8bb</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28858%3A%20A%20remote%20user%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20corrupt%20kernel%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=69c333dff4197a8e3baaeb44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28818-an-app-may-be-able-to-access-sensit-ad0b9870</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28818%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333dcf4197a8e3baaea60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28859-a-malicious-website-may-be-able-to--67e98019</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28859%3A%20A%20malicious%20website%20may%20be%20able%20to%20process%20restricted%20web%20content%20outside%20the%20sandbox%20in%20Apple%20Safari&amp;severity=medium&amp;id=69c333dff4197a8e3baaeb47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28875-a-remote-attacker-may-be-able-to-ca-8e041a65</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28875%3A%20A%20remote%20attacker%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69c333e3f4197a8e3baaed0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28822-an-attacker-may-be-able-to-cause-un-ca536b77</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28822%3A%20An%20attacker%20may%20be%20able%20to%20cause%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333dcf4197a8e3baaea6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28834-an-app-may-be-able-to-cause-unexpec-2543d750</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28834%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333ddf4197a8e3baaeaf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28863-an-app-may-be-able-to-fingerprint-t-22945cdf</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28863%3A%20An%20app%20may%20be%20able%20to%20fingerprint%20the%20user%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333e1f4197a8e3baaec82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28855-an-app-may-be-able-to-access-protec-629e8fff</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28855%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69c333dff4197a8e3baaeb35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28879-processing-maliciously-crafted-web--a5982e22</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28879%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333e3f4197a8e3baaed29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28838-an-app-may-be-able-to-break-out-of--321bc65e</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28838%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333ddf4197a8e3baaeb05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20622-an-app-may-be-able-to-capture-a-use-271f13f5</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20622%3A%20An%20app%20may%20be%20able%20to%20capture%20a%20user&apos;s%20screen%20in%20Apple%20macOS&amp;severity=high&amp;id=69c333d6f4197a8e3baae80e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28880-an-app-may-be-able-to-enumerate-a-u-f03c14ba</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28880%3A%20An%20app%20may%20be%20able%20to%20enumerate%20a%20user&apos;s%20installed%20apps%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333e3f4197a8e3baaed33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28817-a-sandboxed-process-may-be-able-to--7f2dd0fb</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28817%3A%20A%20sandboxed%20process%20may%20be%20able%20to%20circumvent%20sandbox%20restrictions%20in%20Apple%20macOS&amp;severity=high&amp;id=69c333d9f4197a8e3baae9bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28856-an-attacker-with-physical-access-to-d9983940</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28856%3A%20An%20attacker%20with%20physical%20access%20to%20a%20locked%20device%20may%20be%20able%20to%20view%20sensitive%20user%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333dff4197a8e3baaeb39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28895-an-attacker-with-physical-access-to-e2dd54e6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28895%3A%20An%20attacker%20with%20physical%20access%20to%20an%20iOS%20device%20with%20Stolen%20Device%20Protection%20enabled%20may%20be%20able%20to%20access%20biometrics-gated%20Protected%20Apps%20with%20the%20passcode%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333e4f4197a8e3baaedb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20637-an-app-may-be-able-to-cause-unexpec-2b4e9d40</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20637%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333d6f4197a8e3baae81d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20699-an-app-may-be-able-to-access-user-s-e0ba9421</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20699%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333d9f4197a8e3baae9ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28876-an-app-may-be-able-to-access-sensit-f8905d44</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28876%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69c333e3f4197a8e3baaed11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28821-an-app-may-be-able-to-gain-elevated-3346a830</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28821%3A%20An%20app%20may%20be%20able%20to%20gain%20elevated%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=69c333dcf4197a8e3baaea68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28837-an-app-may-be-able-to-access-sensit-51de8014</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28837%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=high&amp;id=69c333ddf4197a8e3baaeb02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20695-an-app-may-be-able-to-determine-ker-86e9b47e</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20695%3A%20An%20app%20may%20be%20able%20to%20determine%20kernel%20memory%20layout%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333d9f4197a8e3baae985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28861-a-malicious-website-may-be-able-to--0a3ac84d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28861%3A%20A%20malicious%20website%20may%20be%20able%20to%20access%20script%20message%20handlers%20intended%20for%20other%20origins%20in%20Apple%20Safari&amp;severity=medium&amp;id=69c333dff4197a8e3baaeb4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20694-an-app-may-be-able-to-access-user-s-27d0a0a8</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20694%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333d9f4197a8e3baae97c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28820-an-app-may-be-able-to-access-sensit-892a3022</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28820%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333dcf4197a8e3baaea65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28877-an-app-may-be-able-to-access-sensit-cde6f9f7</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28877%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333e3f4197a8e3baaed19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20657-parsing-a-maliciously-crafted-file--fe48ac48</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20657%3A%20Parsing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20an%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333d6f4197a8e3baae831</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20698-an-app-may-be-able-to-cause-unexpec-ee089061</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20698%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20corrupt%20kernel%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333d9f4197a8e3baae990</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28882-an-app-may-be-able-to-enumerate-a-u-1f178a94</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28882%3A%20An%20app%20may%20be%20able%20to%20enumerate%20a%20user&apos;s%20installed%20apps%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333e3f4197a8e3baaed3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28894-a-remote-attacker-may-be-able-to-ca-94559fd5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28894%3A%20A%20remote%20attacker%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69c333e4f4197a8e3baaedb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28857-processing-maliciously-crafted-web--033a4e0c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28857%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69c333dff4197a8e3baaeb3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28841-a-buffer-overflow-may-result-in-mem-7edff32a</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28841%3A%20A%20buffer%20overflow%20may%20result%20in%20memory%20corruption%20and%20unexpected%20app%20termination%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333ddf4197a8e3baaeb0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28816-an-app-may-be-able-to-delete-files--0d563ae5</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28816%3A%20An%20app%20may%20be%20able%20to%20delete%20files%20for%20which%20it%20does%20not%20have%20permission%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333d9f4197a8e3baae9ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20607-an-app-may-be-able-to-access-protec-e1636f7c</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20607%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333d6f4197a8e3baae809</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28870-an-app-may-be-able-to-access-sensit-61a14a2e</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28870%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333e1f4197a8e3baaecb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28827-an-app-may-be-able-to-break-out-of--866bf185</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28827%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=critical&amp;id=69c333dcf4197a8e3baaea86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28831-an-app-may-be-able-to-access-sensit-0a0d5960</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28831%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333ddf4197a8e3baaeae9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20693-an-attacker-with-root-privileges-ma-fd1df3d2</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20693%3A%20An%20attacker%20with%20root%20privileges%20may%20be%20able%20to%20delete%20protected%20system%20files%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333d9f4197a8e3baae977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28866-an-app-may-be-able-to-access-sensit-e391ed81</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28866%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333e1f4197a8e3baaec9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28889-an-app-may-be-able-to-read-arbitrar-fc523636</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28889%3A%20An%20app%20may%20be%20able%20to%20read%20arbitrary%20files%20as%20root%20in%20Apple%20Xcode&amp;severity=medium&amp;id=69c333e4f4197a8e3baaeda0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28893-a-document-may-be-written-to-a-temp-bf2cd019</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28893%3A%20A%20document%20may%20be%20written%20to%20a%20temporary%20file%20when%20using%20print%20preview%20in%20Apple%20macOS&amp;severity=low&amp;id=69c333e4f4197a8e3baaedb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20631-a-user-may-be-able-to-elevate-privi-d06eaa8b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20631%3A%20A%20user%20may%20be%20able%20to%20elevate%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=69c333d6f4197a8e3baae812</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20670-an-app-may-be-able-to-access-sensit-ebf18b3c</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20670%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333d8f4197a8e3baae86e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20688-an-app-may-be-able-to-break-out-of--e375fe5c</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20688%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=69c333d8f4197a8e3baae880</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28892-an-app-may-be-able-to-modify-protec-85f340ce</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28892%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333e4f4197a8e3baaedab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28867-an-app-may-be-able-to-leak-sensitiv-4e056b54</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28867%3A%20An%20app%20may%20be%20able%20to%20leak%20sensitive%20kernel%20state%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333e1f4197a8e3baaeca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28888-an-app-may-be-able-to-gain-root-pri-ce802b59</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28888%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333e3f4197a8e3baaed4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20692-hide-ip-address-and-block-all-remot-38515bb6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20692%3A%20%22Hide%20IP%20Address%22%20and%20%22Block%20All%20Remote%20Content%22%20may%20not%20apply%20to%20all%20mail%20content%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333d9f4197a8e3baae971</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28826-a-malicious-app-may-be-able-to-brea-b4ee0304</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28826%3A%20A%20malicious%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333dcf4197a8e3baaea83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28871-visiting-a-maliciously-crafted-webs-0bb72ba0</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28871%3A%20Visiting%20a%20maliciously%20crafted%20website%20may%20lead%20to%20a%20cross-site%20scripting%20attack%20in%20Apple%20Safari&amp;severity=medium&amp;id=69c333e1f4197a8e3baaecbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20684-an-app-may-bypass-gatekeeper-checks-adf5ef9f</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20684%3A%20An%20app%20may%20bypass%20Gatekeeper%20checks%20in%20Apple%20macOS&amp;severity=low&amp;id=69c333d8f4197a8e3baae872</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20651-an-app-may-be-able-to-access-sensit-2ad8b257</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20651%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333d6f4197a8e3baae82c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70888-na-374234a8</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70888%3A%20n%2Fa&amp;severity=critical&amp;id=69c437ecf4197a8e3b7b145b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70887-na-c70e4b84</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70887%3A%20n%2Fa&amp;severity=high&amp;id=69c430e5f4197a8e3b78e0b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70952-na-2156d229</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70952%3A%20n%2Fa&amp;severity=high&amp;id=69c42db5f4197a8e3b77dc20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67030-na-afb99fd4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67030%3A%20n%2Fa&amp;severity=high&amp;id=69c422f4f4197a8e3b7492ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30587-na-f23f021a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30587%3A%20n%2Fa&amp;severity=medium&amp;id=69c41f52f4197a8e3b733a29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26833-na-3aff288d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26833%3A%20n%2Fa&amp;severity=critical&amp;id=69c40a67f4197a8e3b699a5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26832-na-97f776ec</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26832%3A%20n%2Fa&amp;severity=critical&amp;id=69c40a67f4197a8e3b699a57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26831-na-efc1cb46</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26831%3A%20n%2Fa&amp;severity=critical&amp;id=69c40a67f4197a8e3b699a4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26830-na-8e48233f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26830%3A%20n%2Fa&amp;severity=critical&amp;id=69c3fc2ef4197a8e3b6310ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59707-na-0e36166b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59707%3A%20n%2Fa&amp;severity=critical&amp;id=69c3f8fbf4197a8e3b5a5697</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59706-na-7647217d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59706%3A%20n%2Fa&amp;severity=critical&amp;id=69c3f8fbf4197a8e3b5a5692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32991-na-ad6453b1</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32991%3A%20n%2Fa&amp;severity=critical&amp;id=69c3f8fbf4197a8e3b5a568e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-25-a4c3da16</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-25&amp;severity=medium&amp;id=69c3f89bf4197a8e3b58cf35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51348-na-49839eae</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51348%3A%20n%2Fa&amp;severity=high&amp;id=69c3eaa6f4197a8e3b5259e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51347-na-d4cb4e6b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51347%3A%20n%2Fa&amp;severity=high&amp;id=69c3eaa6f4197a8e3b5259dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51346-na-9901719e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51346%3A%20n%2Fa&amp;severity=high&amp;id=69c3eaa6f4197a8e3b5259d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-25-79be0e8f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-25&amp;severity=low&amp;id=69c36877f4197a8e3bf0fc7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4781-sql-injection-in-sourcecodester-sale-8fea11d0</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4781%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69c31eacf4197a8e3b930252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4780-sql-injection-in-sourcecodester-sale-0aabb496</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4780%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69c31eacf4197a8e3b93024b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4779-sql-injection-in-sourcecodester-sale-34a97998</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4779%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69c31444f4197a8e3b89c8a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4778-sql-injection-in-sourcecodester-sale-e2f8a6fb</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4778%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69c31444f4197a8e3b89c89f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4777-sql-injection-in-sourcecodester-sale-7679cc78</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4777%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69c30994f4197a8e3b843569</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33215-cwe-287-improper-authentication-in--f98c82ec</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33215%3A%20CWE-287%3A%20Improper%20Authentication%20in%20nats-io%20nats-server&amp;severity=medium&amp;id=69c2ff45f4197a8e3b7e83b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3912-vulnerability-in-tibco-activematrix--51059409</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3912%3A%20Vulnerability%20in%20Tibco%20ActiveMatrix%20BusinessWorks&amp;severity=high&amp;id=69c2fb83f4197a8e3b7c5800</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24159-cwe-502-deserialization-of-untruste-4cf367d5</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24159%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=69c2f483f4197a8e3b756250</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4371-vulnerability-in-mozilla-thunderbird-58e87494</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4371%3A%20Vulnerability%20in%20Mozilla%20Thunderbird&amp;severity=high&amp;id=69c2f483f4197a8e3b75625a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24157-cwe-502-deserialization-of-untruste-51ca158e</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24157%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=69c2f483f4197a8e3b756246</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3889-vulnerability-in-mozilla-thunderbird-acd3fb47</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3889%3A%20Vulnerability%20in%20Mozilla%20Thunderbird&amp;severity=medium&amp;id=69c2f483f4197a8e3b756255</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24141-cwe-502-deserialization-of-untruste-4a313153</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24141%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20NVIDIA%20Model%20Optimizer&amp;severity=high&amp;id=69c2f481f4197a8e3b7561ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24158-cwe-789-memory-allocation-with-exce-76762b56</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24158%3A%20CWE-789%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=high&amp;id=69c2f483f4197a8e3b75624b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4433-cwe-16-configuration-in-tenable-inc--77e088cc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4433%3A%20CWE-16%3A%20Configuration%20in%20Tenable%2C%20Inc.%20Tenable%20Operation%20Technology&amp;severity=low&amp;id=69c2f483f4197a8e3b75625f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33254-cwe-362-concurrent-execution-using--358dfacc</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33254%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=high&amp;id=69c2f481f4197a8e3b7561ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33238-cwe-362-concurrent-execution-using--5023a4c0</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33238%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=high&amp;id=69c2f481f4197a8e3b7561d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33244-cwe-502-deserialization-of-untruste-bbcc3bf7</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33244%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20Apex&amp;severity=critical&amp;id=69c2f481f4197a8e3b7561db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24152-cwe-502-deserialization-of-untruste-f1609282</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24152%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20Megatron%20LM&amp;severity=high&amp;id=69c2f483f4197a8e3b756240</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24151-cwe-502-deserialization-of-untruste-edcc003d</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24151%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20Megatron%20LM&amp;severity=high&amp;id=69c2f483f4197a8e3b75623b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24150-cwe-502-deserialization-of-untruste-7d7967df</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24150%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20Megatron%20LM&amp;severity=high&amp;id=69c2f481f4197a8e3b7561f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33248-cwe-502-deserialization-of-untruste-b308316e</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33248%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20Megatron%20LM&amp;severity=high&amp;id=69c2f481f4197a8e3b7561e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33247-cwe-502-deserialization-of-untruste-7c655a3d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33247%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20Megatron%20LM&amp;severity=high&amp;id=69c2f481f4197a8e3b7561e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33242-cwe-1234-hardware-internal-or-debug-7f05d71a</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33242%3A%20CWE-1234%20Hardware%20Internal%20or%20Debug%20Modes%20Allow%20Override%20of%20Locks%20in%20NVIDIA%20HGX%20and%20DGX%20B300&amp;severity=medium&amp;id=69c2f481f4197a8e3b7561d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33216-cwe-131-incorrect-calculation-of-bu-e9c18c9f</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33216%3A%20CWE-131%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20NVIDIA%20SNAP-4%20Container&amp;severity=medium&amp;id=69c2f481f4197a8e3b7561cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33215-cwe-823-use-of-out-of-range-pointer-770a2bb2</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33215%3A%20CWE-823%20Use%20of%20Out-of-range%20Pointer%20Offset%20in%20NVIDIA%20SNAP-4%20Container&amp;severity=medium&amp;id=69c2f481f4197a8e3b7561c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21790-cwe-346-origin-validation-error-in--93f27af8</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21790%3A%20CWE-346%20Origin%20Validation%20Error%20in%20HCLSoftware%20Traveler&amp;severity=medium&amp;id=69c2f483f4197a8e3b756262</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21783-cwe-209-generation-of-error-message-d80a7b98</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21783%3A%20CWE-209%20Generation%20of%20error%20message%20containing%20sensitive%20information%20in%20HCLSoftware%20Traveler&amp;severity=medium&amp;id=69c2edf6f4197a8e3b721c0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/doe-publishes-5-year-energy-security-plan-6d04c94f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DoE%20Publishes%205-Year%20Energy%20Security%20Plan&amp;severity=critical&amp;id=69c2e9f1f4197a8e3b6b4be9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33353-cwe-200-exposure-of-sensitive-infor-83abbf70</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33353%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20charmbracelet%20soft-serve&amp;severity=high&amp;id=69c2edf6f4197a8e3b721c0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33349-cwe-1284-improper-validation-of-spe-5951d6d1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33349%3A%20CWE-1284%3A%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20NaturalIntelligence%20fast-xml-parser&amp;severity=medium&amp;id=69c2ea08f4197a8e3b6b6441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33345-cwe-639-authorization-bypass-throug-35b2980a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33345%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20solidtime-io%20solidtime&amp;severity=medium&amp;id=69c2ea08f4197a8e3b6b6437</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33347-cwe-79-improper-neutralization-of-i-6f555a6e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33347%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thephpleague%20commonmark&amp;severity=medium&amp;id=69c2ea08f4197a8e3b6b643c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33344-cwe-22-improper-limitation-of-a-pat-0882b1ad</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33344%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20dagu-org%20dagu&amp;severity=high&amp;id=69c2ea08f4197a8e3b6b6433</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33332-cwe-20-improper-input-validation-in-2d869574</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33332%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20zauberzeug%20nicegui&amp;severity=medium&amp;id=69c2ea08f4197a8e3b6b642e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33331-cwe-79-improper-neutralization-of-i-b93f3ccf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33331%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20middleapi%20orpc&amp;severity=high&amp;id=69c2ea08f4197a8e3b6b6429</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33330-cwe-863-incorrect-authorization-in--38a1725c</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33330%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20error311%20FileRise&amp;severity=high&amp;id=69c2e66df4197a8e3b68b9ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33329-cwe-22-improper-limitation-of-a-pat-32ac2e5e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33329%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20error311%20FileRise&amp;severity=high&amp;id=69c2e66df4197a8e3b68b9a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33326-cwe-863-incorrect-authorization-in--8907ce9d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33326%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20keystonejs%20keystone&amp;severity=medium&amp;id=69c2e66df4197a8e3b68b9a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22559-vulnerability-in-ubiquiti-inc-unifi-0f8f5993</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22559%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UniFi%20Network%20Server&amp;severity=high&amp;id=69c2e66df4197a8e3b68b9a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33769-cwe-20-improper-input-validation-in-371658e9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33769%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20withastro%20astro&amp;severity=low&amp;id=69c2dfdbf4197a8e3b622b4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33768-cwe-441-unintended-proxy-or-interme-3218654b</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33768%3A%20CWE-441%3A%20Unintended%20Proxy%20or%20Intermediary%20(&apos;Confused%20Deputy&apos;)%20in%20withastro%20astro&amp;severity=medium&amp;id=69c2dfdbf4197a8e3b622b48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29772-cwe-770-allocation-of-resources-wit-9b870df0</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29772%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20withastro%20astro&amp;severity=medium&amp;id=69c2dfdbf4197a8e3b622b30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33627-cwe-200-exposure-of-sensitive-infor-57b44982</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33627%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69c2dfdbf4197a8e3b622b41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33624-cwe-367-time-of-check-time-of-use-t-3f3de1c7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33624%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20parse-community%20parse-server&amp;severity=low&amp;id=69c2dfdbf4197a8e3b622b3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/why-agentic-ai-systems-need-better-governance-less-960019ac</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Why%20Agentic%20AI%20Systems%20Need%20Better%20Governance%20%E2%80%93%20Lessons%20from%20OpenClaw&amp;severity=medium&amp;id=69c2d85cf4197a8e3b5f901d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33539-cwe-89-improper-neutralization-of-s-dc735645</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33539%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69c2dfdbf4197a8e3b622b33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33538-cwe-400-uncontrolled-resource-consu-c4ec715d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33538%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69c2d885f4197a8e3b5f9731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33527-cwe-863-incorrect-authorization-in--61241643</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33527%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69c2d884f4197a8e3b5f966e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33508-cwe-674-uncontrolled-recursion-in-p-88d9bc87</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33508%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69c2d884f4197a8e3b5f9667</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33498-cwe-674-uncontrolled-recursion-in-p-f531b788</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33498%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69c2d884f4197a8e3b5f9660</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33429-cwe-203-observable-discrepancy-in-p-94a62658</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33429%3A%20CWE-203%3A%20Observable%20Discrepancy%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69c2d884f4197a8e3b5f9659</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33421-cwe-863-incorrect-authorization-in--e6ca8acf</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33421%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69c2d884f4197a8e3b5f9652</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33409-cwe-287-improper-authentication-in--997c90ca</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33409%3A%20CWE-287%3A%20Improper%20Authentication%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69c2d884f4197a8e3b5f9647</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2417-cwe-306-missing-authentication-for-c-51d6a910</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2417%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20Pharos%20Controls%20Mosaic%20Show%20Controller&amp;severity=critical&amp;id=69c2d884f4197a8e3b5f963d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33323-cwe-204-observable-response-discrep-6bee72c1</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33323%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69c2d884f4197a8e3b5f9640</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33417-cwe-613-insufficient-session-expira-936c37e2</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33417%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20ellite%20Wallos&amp;severity=medium&amp;id=69c2d884f4197a8e3b5f964e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1995-cwe-269-improper-privilege-managemen-7a93156b</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1995%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20IDrive%20IDrive%20Cloud%20Backup%20Client%20for%20Windows&amp;severity=high&amp;id=69c2d884f4197a8e3b5f963a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33401-cwe-918-server-side-request-forgery-4e8fa50b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33401%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ellite%20Wallos&amp;severity=high&amp;id=69c2d885f4197a8e3b5f9738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/poland-faced-a-surge-in-cyberattacks-in-2025-inclu-3b57db40</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Poland%20Faced%20a%20Surge%20in%20Cyberattacks%20in%202025%2C%20Including%20a%20Major%20Assault%20on%20the%20Energy%20Sector&amp;severity=medium&amp;id=69c2d155f4197a8e3b5d60aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33400-cwe-79-improper-neutralization-of-i-493e3777</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33400%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ellite%20Wallos&amp;severity=medium&amp;id=69c2f483f4197a8e3b756265</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33399-cwe-918-server-side-request-forgery-cf84da1e</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33399%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ellite%20Wallos&amp;severity=high&amp;id=69c2dfdbf4197a8e3b622b51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33407-cwe-918-server-side-request-forgery-a7731ef1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33407%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ellite%20Wallos&amp;severity=high&amp;id=69c32654f4197a8e3b9def6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33162-cwe-285-improper-authorization-in-c-da1da056</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33162%3A%20CWE-285%3A%20Improper%20Authorization%20in%20craftcms%20cms&amp;severity=medium&amp;id=69c2cdd9f4197a8e3b58a8ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32854-cwe-476-null-pointer-dereference-in-d1594274</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32854%3A%20CWE-476%20NULL%20pointer%20dereference%20in%20LibVNC%20LibVNCServer&amp;severity=medium&amp;id=69c2cdd9f4197a8e3b58a8a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33161-cwe-200-exposure-of-sensitive-infor-cd01c76d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33161%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20craftcms%20cms&amp;severity=low&amp;id=69c2cdd9f4197a8e3b58a8c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32853-cwe-125-out-of-bounds-read-in-libvn-e16c0516</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32853%3A%20CWE-125%20Out-of-bounds%20read%20in%20LibVNC%20LibVNCServer&amp;severity=medium&amp;id=69c2cdd9f4197a8e3b58a89d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33160-cwe-639-authorization-bypass-throug-464a6dc9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33160%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20craftcms%20cms&amp;severity=low&amp;id=69c2cdd9f4197a8e3b58a8bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33159-cwe-306-missing-authentication-for--f5031588</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33159%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20craftcms%20cms&amp;severity=medium&amp;id=69c2cdd9f4197a8e3b58a8b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33158-cwe-639-authorization-bypass-throug-363e3163</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33158%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20craftcms%20cms&amp;severity=medium&amp;id=69c2cdd9f4197a8e3b58a8b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33157-cwe-470-use-of-externally-controlle-3699fcc5</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33157%3A%20CWE-470%3A%20Use%20of%20Externally-Controlled%20Input%20to%20Select%20Classes%20or%20Code%20(&apos;Unsafe%20Reflection&apos;)%20in%20craftcms%20cms&amp;severity=high&amp;id=69c2cdd9f4197a8e3b58a8ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11571-cwe-78-improper-neutralization-of-s-3fc53108</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11571%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20silabs.com%20Simplicity%20Studio%20v5&amp;severity=low&amp;id=69c2c348f4197a8e3b526730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33340-cwe-306-missing-authentication-for--5fb325d8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33340%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20ParisNeo%20lollms-webui&amp;severity=critical&amp;id=69c2bc3ff4197a8e3b4e78c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33700-cwe-639-authorization-bypass-throug-054a316e</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33700%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69c2b56bf4197a8e3b4a082a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33680-cwe-285-improper-authorization-in-g-fb472728</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33680%3A%20CWE-285%3A%20Improper%20Authorization%20in%20go-vikunja%20vikunja&amp;severity=high&amp;id=69c2b56bf4197a8e3b4a0825</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33679-cwe-918-server-side-request-forgery-eaf389a0</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33679%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69c2b56bf4197a8e3b4a0820</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33678-cwe-639-authorization-bypass-throug-7a8fbc15</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33678%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20go-vikunja%20vikunja&amp;severity=high&amp;id=69c2b56bf4197a8e3b4a081c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33677-cwe-200-exposure-of-sensitive-infor-7005c106</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33677%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69c2b56bf4197a8e3b4a0818</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33676-cwe-863-incorrect-authorization-in--430de562</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33676%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69c2b56bf4197a8e3b4a0812</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33675-cwe-918-server-side-request-forgery-a4a2e4ac</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33675%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69c2b1b2f4197a8e3b48d1be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33668-cwe-285-improper-authorization-in-g-db7e34de</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33668%3A%20CWE-285%3A%20Improper%20Authorization%20in%20go-vikunja%20vikunja&amp;severity=high&amp;id=69c2b1b2f4197a8e3b48d1b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33474-cwe-400-uncontrolled-resource-consu-cbc62c26</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33474%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69c2b1b2f4197a8e3b48d1b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71275-improper-neutralization-of-special--43d87f37</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71275&amp;severity=critical&amp;id=69c2b1b2f4197a8e3b48d19c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33473-cwe-287-improper-authentication-in--a2cf1947</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33473%3A%20CWE-287%3A%20Improper%20Authentication%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69c2b1b2f4197a8e3b48d1ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33336-cwe-94-improper-control-of-generati-f13f91f8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33336%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69c2b1b2f4197a8e3b48d1a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33335-cwe-939-improper-authorization-in-h-13d64f3e</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33335%3A%20CWE-939%3A%20Improper%20Authorization%20in%20Handler%20for%20Custom%20URL%20Scheme%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69c2b1b2f4197a8e3b48d1a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33334-cwe-94-improper-control-of-generati-8c4529ce</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33334%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69c2b1b2f4197a8e3b48d1a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33316-cwe-284-improper-access-control-in--e7133b87</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33316%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20go-vikunja%20vikunja&amp;severity=high&amp;id=69c2b1b2f4197a8e3b48d1c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33315-cwe-288-authentication-bypass-using-33a19297</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33315%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69c2b1b2f4197a8e3b48d1c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33313-cwe-639-authorization-bypass-throug-3819a7c9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33313%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69c2cdd9f4197a8e3b58a8cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4775-integer-overflow-or-wraparound-in-re-40cceae4</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4775%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=69c2b1b4f4197a8e3b48d204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27651-cwe-476-null-pointer-dereference-in-912c3cca</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27651%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20F5%20NGINX%20Open%20Source&amp;severity=high&amp;id=69c2a3a3f4197a8e3b3ed938</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27654-cwe-122-heap-based-buffer-overflow--2af0e08b</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27654%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20F5%20NGINX%20Open%20Source&amp;severity=high&amp;id=69c2a3a3f4197a8e3b3ed93b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28755-cwe-863-incorrect-authorization-in--f467972a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28755%3A%20CWE-863%20Incorrect%20Authorization%20in%20F5%20NGINX%20Open%20Source&amp;severity=medium&amp;id=69c2a3a3f4197a8e3b3ed944</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28753-cwe-93-improper-neutralization-of-c-1339d031</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28753%3A%20CWE-93%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20F5%20NGINX%20Open%20Source&amp;severity=low&amp;id=69c2a3a3f4197a8e3b3ed941</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32647-cwe-125-out-of-bounds-read-in-f5-ng-a7252f06</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32647%3A%20CWE-125%20Out-of-bounds%20Read%20in%20F5%20NGINX%20Open%20Source&amp;severity=high&amp;id=69c2a3a3f4197a8e3b3ed94d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27784-cwe-190-integer-overflow-or-wraparo-253e3178</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27784%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20F5%20NGINX%20Open%20Source&amp;severity=high&amp;id=69c2a3a3f4197a8e3b3ed93e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/detecting-ip-kvms-tue-mar-24th-4cc76409</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Detecting%20IP%20KVMs%2C%20(Tue%2C%20Mar%2024th)&amp;severity=medium&amp;id=69c29929f4197a8e3b3ab299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/extortion-group-claims-it-hacked-astrazeneca-c789ce2f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Extortion%20Group%20Claims%20It%20Hacked%20AstraZeneca&amp;severity=medium&amp;id=69c29914f4197a8e3b3aa81e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-146-update-patches-high-severity-vulnerabil-2b284599</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%20146%20Update%20Patches%20High-Severity%20Vulnerabilities&amp;severity=high&amp;id=69c29590f4197a8e3b399a8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33497-cwe-22-improper-limitation-of-a-pat-87983cfc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33497%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20langflow-ai%20langflow&amp;severity=high&amp;id=69c32654f4197a8e3b9def72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33484-cwe-284-improper-access-control-in--12cb985b</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33484%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20langflow-ai%20langflow&amp;severity=high&amp;id=69c29cc3f4197a8e3b3c19e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33475-cwe-74-improper-neutralization-of-s-73b70903</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33475%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20langflow-ai%20langflow&amp;severity=critical&amp;id=69c28b09f4197a8e3b35a4bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33309-cwe-22-improper-limitation-of-a-pat-84fddebc</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33309%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20langflow-ai%20langflow&amp;severity=critical&amp;id=69c28b09f4197a8e3b35a4b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4721-vulnerability-in-mozilla-firefox-6dd025a0</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4721%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28788f4197a8e3b320700</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4729-vulnerability-in-mozilla-firefox-f354bef4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4729%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c2878af4197a8e3b320775</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4720-vulnerability-in-mozilla-firefox-5d43aced</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4720%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28788f4197a8e3b3206fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4719-vulnerability-in-mozilla-firefox-960c9a13</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4719%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28788f4197a8e3b3206f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4718-vulnerability-in-mozilla-firefox-fa7e8262</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4718%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28788f4197a8e3b3206f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4728-vulnerability-in-mozilla-firefox-5ddb899b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4728%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69c2878af4197a8e3b320771</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4727-vulnerability-in-mozilla-firefox-919ac0a3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4727%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c2878af4197a8e3b32076d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4726-vulnerability-in-mozilla-firefox-f6103856</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4726%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c2878af4197a8e3b320769</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4717-vulnerability-in-mozilla-firefox-922cb8a5</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4717%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28788f4197a8e3b3206ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4716-vulnerability-in-mozilla-firefox-a027e1cb</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4716%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28788f4197a8e3b3206e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4715-vulnerability-in-mozilla-firefox-b5163d43</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4715%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28788f4197a8e3b3206e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4714-vulnerability-in-mozilla-firefox-e1e63892</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4714%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28786f4197a8e3b320660</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4713-vulnerability-in-mozilla-firefox-8fab9dfe</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4713%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28786f4197a8e3b32065b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4712-vulnerability-in-mozilla-firefox-09347642</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4712%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28786f4197a8e3b320656</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4725-vulnerability-in-mozilla-firefox-59f68556</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4725%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c2878af4197a8e3b320765</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4711-vulnerability-in-mozilla-firefox-ac9b31bb</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4711%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28786f4197a8e3b320651</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4710-vulnerability-in-mozilla-firefox-a367fc3b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4710%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28786f4197a8e3b32064c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4709-vulnerability-in-mozilla-firefox-72f81ae4</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4709%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28786f4197a8e3b320646</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4708-vulnerability-in-mozilla-firefox-666a9c38</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4708%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28786f4197a8e3b320641</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4707-vulnerability-in-mozilla-firefox-b30575b3</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4707%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28786f4197a8e3b32063b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4706-vulnerability-in-mozilla-firefox-41dc456f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4706%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28786f4197a8e3b320635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4705-vulnerability-in-mozilla-firefox-aebd74cf</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4705%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28786f4197a8e3b320630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4704-vulnerability-in-mozilla-firefox-48a24581</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4704%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28784f4197a8e3b3205d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4724-vulnerability-in-mozilla-firefox-7e256640</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4724%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28788f4197a8e3b32070e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4723-vulnerability-in-mozilla-firefox-de4dae1e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4723%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28788f4197a8e3b32070a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4702-vulnerability-in-mozilla-firefox-7faf28c8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4702%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28784f4197a8e3b3205cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4722-vulnerability-in-mozilla-firefox-76ac478f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4722%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28788f4197a8e3b320706</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4701-vulnerability-in-mozilla-firefox-0c790ff2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4701%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28784f4197a8e3b3205c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4700-vulnerability-in-mozilla-firefox-3c91843a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4700%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28784f4197a8e3b3205c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4699-vulnerability-in-mozilla-firefox-c673b182</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4699%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28784f4197a8e3b3205bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4698-vulnerability-in-mozilla-firefox-d3d4ca52</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4698%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28784f4197a8e3b3205b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4697-vulnerability-in-mozilla-firefox-d3acfb7e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4697%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28784f4197a8e3b3205b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4696-vulnerability-in-mozilla-firefox-8a27d3d7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4696%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28784f4197a8e3b3205ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4695-vulnerability-in-mozilla-firefox-3f6b7028</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4695%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28784f4197a8e3b3205a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4694-vulnerability-in-mozilla-firefox-bf4db9f6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4694%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28784f4197a8e3b3205a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4693-vulnerability-in-mozilla-firefox-eacfa2e0</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4693%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28782f4197a8e3b32057c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4692-vulnerability-in-mozilla-firefox-5fc771f4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4692%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28782f4197a8e3b320576</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4691-vulnerability-in-mozilla-firefox-9174de8f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4691%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28782f4197a8e3b320570</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4690-vulnerability-in-mozilla-firefox-ee977b2a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4690%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28782f4197a8e3b32056a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4689-vulnerability-in-mozilla-firefox-b716733f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4689%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28782f4197a8e3b320564</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4688-vulnerability-in-mozilla-firefox-dfce27ac</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4688%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28782f4197a8e3b32055f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4687-vulnerability-in-mozilla-firefox-56480adc</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4687%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28782f4197a8e3b320559</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4686-vulnerability-in-mozilla-firefox-acd27d6c</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4686%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28782f4197a8e3b320553</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4685-vulnerability-in-mozilla-firefox-5488cd5b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4685%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28782f4197a8e3b32054d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4684-vulnerability-in-mozilla-firefox-c7909fc2</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4684%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28782f4197a8e3b320547</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/31-million-impacted-by-qualderm-data-breach-357a3657</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=3.1%20Million%20Impacted%20by%20QualDerm%20Data%20Breach&amp;severity=medium&amp;id=69c283fef4197a8e3b30f536</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iran-built-a-vast-camera-network-to-control-dissen-3256d1f8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran%20Built%20a%20Vast%20Camera%20Network%20to%20Control%20Dissent.%20Israel%20Turned%20It%20Into%20a%20Targeting%20Tool&amp;severity=medium&amp;id=69c28077f4197a8e3b2f50b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bubbles-role-in-phishing-scams-kaspersky-official--90945582</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bubble%E2%80%99s%20role%20in%20phishing%20scams%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69c28095f4197a8e3b2f5da0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64998-cwe-522-insufficiently-protected-cr-c68fc6ee</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64998%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=high&amp;id=69c2796ff4197a8e3b2bf4d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-citrix-netscaler-vulnerability-poised-for-a0221796</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Citrix%20NetScaler%20Vulnerability%20Poised%20for%20Exploitation%2C%20Security%20Firms%20Warn&amp;severity=critical&amp;id=69c275ecf4197a8e3b2a01dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/canisterworm-gets-teeth-teampcps-kubernetes-wiper--dacfd3cd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CanisterWorm%20Gets%20Teeth%3A%20TeamPCP&apos;s%20Kubernetes%20Wiper%20Targets%20Iran&amp;severity=medium&amp;id=69c27268f4197a8e3b26b87f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mazda-says-employee-partner-information-stolen-in--76691a7e</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mazda%20Says%20Employee%2C%20Partner%20Information%20Stolen%20in%20Cyberattack&amp;severity=medium&amp;id=69c26b5ff4197a8e3b1ca237</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stryker-says-malicious-file-found-during-probe-int-19d82340</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Stryker%20Says%20Malicious%20File%20Found%20During%20Probe%20Into%20Iran-Linked%20Attack&amp;severity=medium&amp;id=69c259ccf4197a8e3b0ee67a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/supply-chain-compromise-spreads-from-trivy-to-chec-c6a7f036</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Supply%20chain%20compromise%20spreads%20from%20Trivy%20to%20Checkmarx%20GitHub%20Actions&amp;severity=medium&amp;id=69c27606f4197a8e3b2a0dec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kics-github-action-compromised-teampcp-supply-chai-d4e55ee8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KICS%20GitHub%20Action%20Compromised%3A%20TeamPCP%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=69c27268f4197a8e3b26b875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tracing-a-multi-vector-malware-campaign-from-vbs-t-a4e44d8f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tracing%20a%20Multi-Vector%20Malware%20Campaign%3A%20From%20VBS%20to%20Open%20Infrastructure&amp;severity=medium&amp;id=69c27606f4197a8e3b2a0df1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4649-cwe-306-missing-authentication-for-c-54868a12</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4649%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20KNIME%20KNIME%20Business%20Hub&amp;severity=medium&amp;id=69c24bbbf4197a8e3b0767dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32642-cwe-863-incorrect-authorization-in--6d40c7c0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32642%3A%20CWE-863%20Incorrect%20Authorization%20in%20Apache%20Software%20Foundation%20Apache%20Artemis&amp;severity=low&amp;id=69c24838f4197a8e3b038194</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3509-cwe-134-use-of-externally-controlled-c3c53097</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3509%3A%20CWE-134%20Use%20of%20Externally-Controlled%20Format%20String%20in%20CODESYS%20CODESYS%20Control%20RTE%20(SL)&amp;severity=high&amp;id=69c244c0f4197a8e3b01d2db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41660-cwe-669-incorrect-resource-transfer-2b926cb7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41660%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20CODESYS%20CODESYS%20Control%20RTE%20(SL)&amp;severity=high&amp;id=69c244c0f4197a8e3b01d2d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4756-cwe-787-out-of-bounds-write-in-molot-3c347234</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4756%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MolotovCherry%20Android-ImageMagick7&amp;severity=high&amp;id=69c2331ef4197a8e3bf9e000</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4755-cwe-20-cwe-20-in-molotovcherry-andro-fb2c95b0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4755%3A%20CWE-20%20CWE-20%20in%20MolotovCherry%20Android-ImageMagick7&amp;severity=critical&amp;id=69c2331ef4197a8e3bf9dffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4754-cwe-79-cwe-79-in-molotovcherry-andro-178e7ad4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4754%3A%20CWE-79%20CWE-79%20in%20MolotovCherry%20Android-ImageMagick7&amp;severity=medium&amp;id=69c2331ef4197a8e3bf9dffa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33852-cwe-401-missing-release-of-memory-a-fe4efbca</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33852%3A%20CWE-401%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20MolotovCherry%20Android-ImageMagick7&amp;severity=high&amp;id=69c2331ef4197a8e3bf9dff7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33856-cwe-401-missing-release-of-memory-a-56d151b0</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33856%3A%20CWE-401%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20MolotovCherry%20Android-ImageMagick7&amp;severity=high&amp;id=69c32654f4197a8e3b9def75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33855-cwe-190-integer-overflow-or-wraparo-ba6009c9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33855%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20MolotovCherry%20Android-ImageMagick7&amp;severity=medium&amp;id=69c2d885f4197a8e3b5f9740</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33854-cwe-787-out-of-bounds-write-in-molo-4afe3ba1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33854%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MolotovCherry%20Android-ImageMagick7&amp;severity=high&amp;id=69c2d885f4197a8e3b5f973d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33853-cwe-476-null-pointer-dereference-in-978106cf</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33853%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20MolotovCherry%20Android-ImageMagick7&amp;severity=medium&amp;id=69c2a3a5f4197a8e3b3eda10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33847-cwe-119-improper-restriction-of-ope-65d3a8ac</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33847%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20linkingvision%20rapidvms&amp;severity=high&amp;id=69c2a3a3f4197a8e3b3ed956</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33849-cwe-119-improper-restriction-of-ope-4e22bddd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33849%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20linkingvision%20rapidvms&amp;severity=high&amp;id=69c2a3a5f4197a8e3b3eda07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33848-cwe-119-improper-restriction-of-ope-37a09f65</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33848%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20linkingvision%20rapidvms&amp;severity=high&amp;id=69c2a3a5f4197a8e3b3eda04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33851-cwe-119-improper-restriction-of-ope-a4819350</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33851%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20joncampbell123%20doslib&amp;severity=high&amp;id=69c2a3a5f4197a8e3b3eda0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33850-cwe-787-out-of-bounds-write-in-wuje-e46fe604</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33850%3A%20CWE-787%20Out-of-bounds%20Write%20in%20WujekFoliarz%20DualSenseY-v2&amp;severity=high&amp;id=69c2a3a5f4197a8e3b3eda0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4753-cwe-125-out-of-bounds-read-in-slajer-90f09ae8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4753%3A%20CWE-125%20Out-of-bounds%20Read%20in%20slajerek%20RetroDebugger&amp;severity=critical&amp;id=69c2a3a7f4197a8e3b3eda43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4752-cwe-416-use-after-free-in-no-chicken-d883c0b3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4752%3A%20CWE-416%20Use%20After%20Free%20in%20No-Chicken%20Echo-Mate&amp;severity=medium&amp;id=69c2a3a5f4197a8e3b3eda21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4751-cwe-476-null-pointer-dereference-in--212babee</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4751%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20tmate-io%20tmate&amp;severity=medium&amp;id=69c2a3a5f4197a8e3b3eda1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4750-cwe-125-out-of-bounds-read-in-fabian-95af46f2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4750%3A%20CWE-125%20Out-of-bounds%20Read%20in%20fabiangreffrath%20woof&amp;severity=critical&amp;id=69c2a3a5f4197a8e3b3eda1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4749-nvd-cwe-noinfo-nvd-cwe-noinfo-in-alb-4161dd2e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4749%3A%20NVD-CWE-noinfo%20NVD-CWE-noinfo%20in%20albfan%20miraclecast&amp;severity=medium&amp;id=69c2250ef4197a8e3bf52229</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4662-cwe-89-improper-neutralization-of-sp-f493c1eb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4662%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Crocoblock%20JetEngine&amp;severity=high&amp;id=69c29cc3f4197a8e3b3c19ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4283-cwe-862-missing-authorization-in-leg-b0b3a8d9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4283%3A%20CWE-862%20Missing%20Authorization%20in%20legalweb%20WP%20DSGVO%20Tools%20(GDPR)&amp;severity=critical&amp;id=69c32654f4197a8e3b9def78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3138-cwe-862-missing-authorization-in-woo-b7898757</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3138%3A%20CWE-862%20Missing%20Authorization%20in%20woobewoo%20Product%20Filter%20for%20WooCommerce%20by%20WBW&amp;severity=medium&amp;id=69c2b1b4f4197a8e3b48d1f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4640-cwe-306-missing-authentication-for-c-99bcad95</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4640%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20Galaxy%20Software%20Services%20Vitals%20ESP&amp;severity=high&amp;id=69c2a3a5f4197a8e3b3eda17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4639-cwe-863-incorrect-authorization-in-g-0d3ccdb7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4639%3A%20CWE-863%20Incorrect%20Authorization%20in%20Galaxy%20Software%20Services%20Vitals%20ESP&amp;severity=high&amp;id=69c2a3a5f4197a8e3b3eda13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3260-allocation-of-resources-without-limi-9c8abed1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3260%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Apache%20Camel%20for%20Spring%20Boot%204&amp;severity=medium&amp;id=69c2137bf4197a8e3be1035e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4632-sql-injection-in-itsourcecode-online-6fae771c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4632%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Enrollment%20System&amp;severity=medium&amp;id=69c2137bf4197a8e3be10369</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4627-os-command-injection-in-d-link-dir-8-f88408e2</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4627%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-825&amp;severity=high&amp;id=69c2137bf4197a8e3be10362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4746-cwe-787-out-of-bounds-write-in-timep-fbe0e14b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4746%3A%20CWE-787%20Out-of-bounds%20Write%20in%20timeplus-io%20proton&amp;severity=critical&amp;id=69c2137bf4197a8e3be10373</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4745-cwe-94-improper-control-of-generatio-1708b5aa</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4745%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20dendibakh%20perf-ninja&amp;severity=critical&amp;id=69c2137bf4197a8e3be10370</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4744-cwe-125-out-of-bounds-read-in-rizone-16fef5f9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4744%3A%20CWE-125%20Out-of-bounds%20Read%20in%20rizonesoft%20Notepad3&amp;severity=critical&amp;id=69c2056ef4197a8e3bc8620e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4743-cwe-476-null-pointer-dereference-in--e4f3d4f7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4743%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20taurusxin%20ncmdump&amp;severity=medium&amp;id=69c2056ef4197a8e3bc8620b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4742-cwe-444-inconsistent-interpretation--085908b0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4742%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20visualfc%20liteide&amp;severity=low&amp;id=69c2056ef4197a8e3bc86208</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4741-cwe-22-improper-limitation-of-a-path-4f50da47</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4741%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20TeamJCD%20JoyConDroid&amp;severity=high&amp;id=69c2056ef4197a8e3bc86205</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4739-cwe-190-integer-overflow-or-wraparou-4dc9a6b8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4739%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20InsightSoftwareConsortium%20ITK&amp;severity=critical&amp;id=69c2056ef4197a8e3bc86201</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4738-cwe-119-improper-restriction-of-oper-a4946c18</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4738%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20OSGeo%20gdal&amp;severity=critical&amp;id=69c2056cf4197a8e3bc861d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4737-cwe-416-use-after-free-in-no-chicken-d056668f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4737%3A%20CWE-416%20Use%20After%20Free%20in%20No-Chicken%20Echo-Mate&amp;severity=high&amp;id=69c2056cf4197a8e3bc861cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4736-cwe-229-improper-handling-of-values--bea050a5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4736%3A%20CWE-229%20Improper%20Handling%20of%20Values%20in%20No-Chicken%20Echo-Mate&amp;severity=high&amp;id=69c2056cf4197a8e3bc861ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4735-cwe-502-deserialization-of-untrusted-f029cb07</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4735%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20DTStack%20chunjun&amp;severity=high&amp;id=69c2056cf4197a8e3bc861c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4734-cwe-119-improper-restriction-of-oper-382b79d4</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4734%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20yoyofr%20modizer&amp;severity=critical&amp;id=69c2056cf4197a8e3bc861c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4733-cwe-200-exposure-of-sensitive-inform-1fe2438a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4733%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20ixray-team%20ixray-1.6-stcop&amp;severity=medium&amp;id=69c2056cf4197a8e3bc861c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4732-cwe-125-out-of-bounds-read-in-tildea-3c7e0e4a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4732%3A%20CWE-125%20Out-of-bounds%20Read%20in%20tildearrow%20furnace&amp;severity=high&amp;id=69c2056cf4197a8e3bc861be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4626-cross-site-scripting-in-projectworld-7ed09412</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4626%3A%20Cross%20Site%20Scripting%20in%20projectworlds%20Lawyer%20Management%20System&amp;severity=medium&amp;id=69c2056cf4197a8e3bc861b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4625-sql-injection-in-sourcecodester-onli-4ad2c890</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4625%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Admission%20System&amp;severity=medium&amp;id=69c2056cf4197a8e3bc861ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4731-cwe-190-integer-overflow-or-wraparou-38be7792</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4731%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20artraweditor%20ART&amp;severity=high&amp;id=69c2056cf4197a8e3bc861bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4624-sql-injection-in-sourcecodester-onli-ea1a8c4c</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4624%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Library%20Management%20System&amp;severity=medium&amp;id=69c2d885f4197a8e3b5f9743</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4623-server-side-request-forgery-in-defau-82e4f91b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4623%3A%20Server-Side%20Request%20Forgery%20in%20DefaultFuction%20Jeson-Customer-Relationship-Management-System&amp;severity=medium&amp;id=69c2b1b4f4197a8e3b48d1fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33308-cwe-295-improper-certificate-valida-88c7e708</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33308%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20airtower-luna%20mod_gnutls&amp;severity=medium&amp;id=69c29cc3f4197a8e3b3c19e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33307-cwe-121-stack-based-buffer-overflow-3ecaed11</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33307%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20airtower-luna%20mod_gnutls&amp;severity=high&amp;id=69c1ecd0f4197a8e3bb7abb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3079-cwe-89-improper-neutralization-of-sp-7040e58f</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3079%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20StellarWP%20LearnDash%20LMS&amp;severity=medium&amp;id=69c1ecd0f4197a8e3bb7abb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4617-improper-authorization-in-sourcecode-a241b185</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4617%3A%20Improper%20Authorization%20in%20SourceCodester%20Patients%20Waiting%20Area%20Queue%20Management%20System&amp;severity=medium&amp;id=69c1e243f4197a8e3baf9862</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4680-use-after-free-in-google-chrome-7b4e006d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4680%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69c1dec2f4197a8e3babfa4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4679-integer-overflow-in-google-chrome-d856ab98</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4679%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69c1dec2f4197a8e3babfa48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4678-use-after-free-in-google-chrome-a69cdcbc</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4678%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69c1debff4197a8e3babf891</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4677-out-of-bounds-read-in-google-chrome-6eb5e212</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4677%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=high&amp;id=69c1debff4197a8e3babf88d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4676-use-after-free-in-google-chrome-4a02e249</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4676%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69c1debff4197a8e3babf889</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4675-heap-buffer-overflow-in-google-chrom-92539054</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4675%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69c1debff4197a8e3babf885</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4674-out-of-bounds-read-in-google-chrome-ba772d3f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4674%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=high&amp;id=69c1debff4197a8e3babf881</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4673-heap-buffer-overflow-in-google-chrom-5351942f</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4673%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69c1debff4197a8e3babf87d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22739-vulnerability-in-spring-spring-clou-8aa646e0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22739%3A%20Vulnerability%20in%20Spring%20Spring%20Cloud&amp;severity=high&amp;id=69c1debff4197a8e3babf86b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4616-cross-site-scripting-in-bolo-blog-12348d86</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4616%3A%20Cross%20Site%20Scripting%20in%20bolo-blog&amp;severity=medium&amp;id=69c1debff4197a8e3babf875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33320-cwe-674-uncontrolled-recursion-in-t-76bc80ce</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33320%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20TomWright%20dasel&amp;severity=medium&amp;id=69c1debff4197a8e3babf872</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33298-cwe-122-heap-based-buffer-overflow--058a7b47</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33298%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20ggml-org%20llama.cpp&amp;severity=high&amp;id=69c1debff4197a8e3babf86e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30655-na-d0820e15</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30655%3A%20n%2Fa&amp;severity=medium&amp;id=69c2e66df4197a8e3b68b9b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30653-na-24c18f7a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30653%3A%20n%2Fa&amp;severity=high&amp;id=69c2e66df4197a8e3b68b9b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29840-na-be31308d</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29840%3A%20n%2Fa&amp;severity=medium&amp;id=69c2b56bf4197a8e3b4a080e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29839-na-b148bc9e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29839%3A%20n%2Fa&amp;severity=high&amp;id=69c2b56bf4197a8e3b4a080a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33554-na-db22b7fc</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33554%3A%20n%2Fa&amp;severity=high&amp;id=69c2a3a3f4197a8e3b3ed950</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30662-na-02471498</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30662%3A%20n%2Fa&amp;severity=medium&amp;id=69c2a3a3f4197a8e3b3ed94a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30661-na-8fea80e0</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30661%3A%20n%2Fa&amp;severity=medium&amp;id=69c2a3a3f4197a8e3b3ed947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-24-23e60c42</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-24&amp;severity=medium&amp;id=69c2482ff4197a8e3b034543</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-24-d05ef2d3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-24&amp;severity=low&amp;id=69c2482ff4197a8e3b03453a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33211-cwe-22-improper-limitation-of-a-pat-2bb49643</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33211%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20tektoncd%20pipeline&amp;severity=critical&amp;id=69c1e5e3f4197a8e3bb3f17b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33286-cwe-913-improper-control-of-dynamic-fd76d864</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33286%3A%20CWE-913%3A%20Improper%20Control%20of%20Dynamically-Managed%20Code%20Resources%20in%20graphiti-api%20graphiti&amp;severity=critical&amp;id=69c1e5e3f4197a8e3bb3f18b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33283-cwe-476-null-pointer-dereference-in-5c3025db</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33283%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20ellanetworks%20core&amp;severity=medium&amp;id=69c1e5e3f4197a8e3bb3f188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33282-cwe-476-null-pointer-dereference-in-f5a6c99c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33282%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20ellanetworks%20core&amp;severity=high&amp;id=69c1e5e3f4197a8e3bb3f185</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33281-cwe-129-improper-validation-of-arra-f6f420a2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33281%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20ellanetworks%20core&amp;severity=medium&amp;id=69c1d434f4197a8e3ba042b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33252-cwe-352-cross-site-request-forgery--1c298ddb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33252%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20modelcontextprotocol%20go-sdk&amp;severity=high&amp;id=69c1d434f4197a8e3ba042af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33241-cwe-770-allocation-of-resources-wit-6c94bc33</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33241%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20salvo-rs%20salvo&amp;severity=high&amp;id=69c1d434f4197a8e3ba042a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33242-cwe-22-improper-limitation-of-a-pat-bedfd725</loc>
    <lastmod>2026-04-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33242%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20salvo-rs%20salvo&amp;severity=high&amp;id=69c1d434f4197a8e3ba042a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4615-sql-injection-in-sourcecodester-onli-a3a45347</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4615%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Catering%20Reservation&amp;severity=medium&amp;id=69c1d434f4197a8e3ba042bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4614-sql-injection-in-itsourcecode-saniti-769926fe</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4614%3A%20SQL%20Injection%20in%20itsourcecode%20sanitize%20or%20validate%20this%20input&amp;severity=medium&amp;id=69c1d434f4197a8e3ba042b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33250-cwe-20-improper-input-validation-in-82eeaf69</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33250%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20longturn%20freeciv21&amp;severity=high&amp;id=69c1d434f4197a8e3ba042a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33202-cwe-74-improper-neutralization-of-s-ce0b2cbe</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33202%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20rails%20activestorage&amp;severity=medium&amp;id=69c1d434f4197a8e3ba04297</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33195-cwe-22-improper-limitation-of-a-pat-44000d41</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33195%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20rails%20activestorage&amp;severity=high&amp;id=69c1d434f4197a8e3ba0428e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33176-cwe-400-uncontrolled-resource-consu-8c24e02c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33176%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20rails%20activesupport&amp;severity=medium&amp;id=69c1d4a7f4197a8e3ba0b3e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4021-cwe-287-improper-authentication-in-c-9308bb23</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4021%3A%20CWE-287%20Improper%20Authentication%20in%20contest-gallery%20Contest%20Gallery%20%E2%80%93%20Upload%20%26%20Vote%20Photos%2C%20Media%2C%20Sell%20with%20PayPal%20%26%20Stripe&amp;severity=high&amp;id=69c1d4a7f4197a8e3ba0b3f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4056-cwe-862-missing-authorization-in-wpe-75122f33</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4056%3A%20CWE-862%20Missing%20Authorization%20in%20wpeverest%20User%20Registration%20%26%20Membership%20%E2%80%93%20Free%20%26%20Paid%20Memberships%2C%20Subscriptions%2C%20Content%20Restriction%2C%20User%20Profile%2C%20Custom%20User%20Registration%20%26%20Login%20Builder&amp;severity=medium&amp;id=69c1d4a7f4197a8e3ba0b3fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3533-cwe-434-unrestricted-upload-of-file--68a0c277</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3533%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20artbees%20Jupiter%20X%20Core&amp;severity=high&amp;id=69c1d4a7f4197a8e3ba0b3eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4001-cwe-95-improper-neutralization-of-di-ac901da0</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4001%3A%20CWE-95%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20acowebs%20Woocommerce%20Custom%20Product%20Addons%20Pro&amp;severity=critical&amp;id=69c1d4a7f4197a8e3ba0b3f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33174-cwe-789-memory-allocation-with-exce-2062726e</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33174%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20rails%20activestorage&amp;severity=medium&amp;id=69c1d4a7f4197a8e3ba0b3d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33173-cwe-925-improper-verification-of-in-43111a4f</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33173%3A%20CWE-925%3A%20Improper%20Verification%20of%20Intent%20by%20Broadcast%20Receiver%20in%20rails%20activestorage&amp;severity=medium&amp;id=69c1d4a7f4197a8e3ba0b3d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33170-cwe-79-improper-neutralization-of-i-711e8380</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33170%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rails%20activesupport&amp;severity=medium&amp;id=69c1d4a9f4197a8e3ba0b46f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33169-cwe-400-uncontrolled-resource-consu-0628f812</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33169%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20rails%20activesupport&amp;severity=medium&amp;id=69c1d4a7f4197a8e3ba0b411</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4613-sql-injection-in-sourcecodester-e-co-ecbd9642</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4613%3A%20SQL%20Injection%20in%20SourceCodester%20E-Commerce%20Site&amp;severity=medium&amp;id=69c1cd2bf4197a8e3b9b9472</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33168-cwe-79-improper-neutralization-of-i-bc39b860</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33168%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rails%20actionview&amp;severity=low&amp;id=69c1d4a7f4197a8e3ba0b408</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33167-cwe-79-improper-neutralization-of-i-c52f453b</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33167%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rails%20actionpack&amp;severity=low&amp;id=69c1d4a7f4197a8e3ba0b403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3225-cwe-862-missing-authorization-in-thi-90e5b57c</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3225%3A%20CWE-862%20Missing%20Authorization%20in%20thimpress%20LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin%20for%20Create%20and%20Sell%20Online%20Courses&amp;severity=medium&amp;id=69c1d4a9f4197a8e3ba0b47f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4306-cwe-89-improper-neutralization-of-sp-8504a3a8</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4306%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpjobportal%20WP%20Job%20Portal%20%E2%80%93%20AI-Powered%20Recruitment%20System%20for%20Company%20or%20Job%20Board%20website&amp;severity=high&amp;id=69c1d4a9f4197a8e3ba0b48d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2412-cwe-89-improper-neutralization-of-sp-8fc37751</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2412%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20expresstech%20Quiz%20and%20Survey%20Master%20(QSM)%20%E2%80%93%20Easy%20Quiz%20and%20Survey%20Maker&amp;severity=medium&amp;id=69c1d4a9f4197a8e3ba0b478</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4066-cwe-862-missing-authorization-in-inc-871b678f</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4066%3A%20CWE-862%20Missing%20Authorization%20in%20inc2734%20Smart%20Custom%20Fields&amp;severity=medium&amp;id=69c1d4a9f4197a8e3ba0b486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4612-sql-injection-in-itsourcecode-free-h-7cf79c04</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4612%3A%20SQL%20Injection%20in%20itsourcecode%20Free%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=69c1d4adf4197a8e3ba0b53e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4681-cwe-94-improper-control-of-generatio-dce2340b</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4681%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20PTC%20Windchill%20PDMLink&amp;severity=critical&amp;id=69c1d4adf4197a8e3ba0b545</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33634-cwe-506-embedded-malicious-code-in--163a34d0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33634%3A%20CWE-506%3A%20Embedded%20Malicious%20Code%20in%20aquasecurity%20setup-trivy&amp;severity=critical&amp;id=69c1b815f4197a8e3b932274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32300-cwe-285-improper-authorization-in-o-34aa4212</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32300%3A%20CWE-285%3A%20Improper%20Authorization%20in%20opensource-workshop%20connect-cms&amp;severity=high&amp;id=69c1b815f4197a8e3b93226e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32299-cwe-284-improper-access-control-in--8058e34f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32299%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20opensource-workshop%20connect-cms&amp;severity=high&amp;id=69c1b815f4197a8e3b932269</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32279-cwe-918-server-side-request-forgery-d5a848f1</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32279%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20opensource-workshop%20connect-cms&amp;severity=medium&amp;id=69c1b815f4197a8e3b932262</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32912-6010818f</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32912&amp;severity=null&amp;id=69c1d4adf4197a8e3ba0b53c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32911-8533cf6f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32911&amp;severity=null&amp;id=69c1d4adf4197a8e3ba0b53a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32910-685ea9ca</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32910&amp;severity=null&amp;id=69c1d4abf4197a8e3ba0b510</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32909-70fb35ca</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32909&amp;severity=null&amp;id=69c1d4abf4197a8e3ba0b50e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32908-d294f3c7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32908&amp;severity=null&amp;id=69c1d4abf4197a8e3ba0b50c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32907-d72860c8</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32907&amp;severity=null&amp;id=69c1d4abf4197a8e3ba0b509</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32904-a79971b2</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32904&amp;severity=null&amp;id=69c1d4abf4197a8e3ba0b506</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32903-16e6c7e8</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32903&amp;severity=null&amp;id=69c1d4abf4197a8e3ba0b503</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32902-5d202bfe</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32902&amp;severity=null&amp;id=69c1d4abf4197a8e3ba0b500</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32901-ed154d9e</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32901&amp;severity=null&amp;id=69c1d4abf4197a8e3ba0b4fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32900-a199f6df</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32900&amp;severity=null&amp;id=69c1d4abf4197a8e3ba0b4fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32066-f88860ed</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32066&amp;severity=null&amp;id=69c1d4abf4197a8e3ba0b4f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32047-ddf09970</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32047&amp;severity=null&amp;id=69c1d4a9f4197a8e3ba0b49b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32012-74b36520</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32012&amp;severity=null&amp;id=69c1d4a9f4197a8e3ba0b499</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28483-12f1f14c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28483&amp;severity=null&amp;id=69c32654f4197a8e3b9def81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28455-d8f9feaf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28455&amp;severity=null&amp;id=69c1d4a9f4197a8e3ba0b495</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22173-9c19c107</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22173&amp;severity=null&amp;id=69c1d4a9f4197a8e3ba0b493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32278-cwe-434-unrestricted-upload-of-file-f13f731d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32278%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20opensource-workshop%20connect-cms&amp;severity=high&amp;id=69c1d4adf4197a8e3ba0b555</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1940-vulnerability-in-red-hat-red-hat-ent-05376571</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1940%3A%20Vulnerability%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69c1d4adf4197a8e3ba0b548</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32277-cwe-79-improper-neutralization-of-i-86b1f15c</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32277%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20opensource-workshop%20connect-cms&amp;severity=high&amp;id=69c1d4adf4197a8e3ba0b54f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4611-os-command-injection-in-totolink-x60-3ae7b1a7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4611%3A%20OS%20Command%20Injection%20in%20TOTOLINK%20X6000R&amp;severity=high&amp;id=69c1d4aef4197a8e3ba0b583</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32276-cwe-94-improper-control-of-generati-a03d82ef</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32276%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20opensource-workshop%20connect-cms&amp;severity=high&amp;id=69c1d4adf4197a8e3ba0b55b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60949-cwe-200-exposure-of-sensitive-infor-63fae85a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60949%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Census%20CSWeb&amp;severity=critical&amp;id=69c1d4aef4197a8e3ba0b57d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60948-cwe-79-improper-neutralization-of-i-341329c5</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60948%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Census%20CSWeb&amp;severity=medium&amp;id=69c1d4aef4197a8e3ba0b577</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60947-cwe-434-unrestricted-upload-of-file-12a4f8c5</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60947%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Census%20CSWeb&amp;severity=high&amp;id=69c1d4adf4197a8e3ba0b567</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60946-cwe-22-improper-limitation-of-a-pat-1902b4db</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60946%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Census%20CSWeb&amp;severity=high&amp;id=69c1d4adf4197a8e3ba0b561</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23882-cwe-78-improper-neutralization-of-s-d5b9e9d8</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23882%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20blinkospace%20blinko&amp;severity=high&amp;id=69c1aa03f4197a8e3b8c35ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23485-cwe-22-improper-limitation-of-a-pat-f4e3f9d4</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23485%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20blinkospace%20blinko&amp;severity=medium&amp;id=69c1aa03f4197a8e3b8c35ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23488-cwe-639-authorization-bypass-throug-9ede2719</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23488%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20blinkospace%20blinko&amp;severity=medium&amp;id=69c1aa03f4197a8e3b8c35f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23487-cwe-639-authorization-bypass-throug-99878f35</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23487%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20blinkospace%20blinko&amp;severity=medium&amp;id=69c1aa03f4197a8e3b8c35f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23486-cwe-200-exposure-of-sensitive-infor-22b9b024</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23486%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20blinkospace%20blinko&amp;severity=medium&amp;id=69c1aa03f4197a8e3b8c35ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23480-cwe-288-authentication-bypass-using-857ce055</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23480%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20blinkospace%20blinko&amp;severity=medium&amp;id=69c1a68ff4197a8e3b8b7cd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tool-updates-lots-of-security-and-logic-fixes-mon--38257034</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tool%20updates%3A%20lots%20of%20security%20and%20logic%20fixes%2C%20(Mon%2C%20Mar%2023rd)&amp;severity=low&amp;id=69c1a67ff4197a8e3b8b7498</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23481-cwe-22-improper-limitation-of-a-pat-6ab7581d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23481%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20blinkospace%20blinko&amp;severity=medium&amp;id=69c1a68ff4197a8e3b8b7cde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23484-cwe-22-improper-limitation-of-a-pat-c0f6a5a3</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23484%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20blinkospace%20blinko&amp;severity=medium&amp;id=69c1a68ff4197a8e3b8b7ceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23483-cwe-22-improper-limitation-of-a-pat-f1003822</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23483%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20blinkospace%20blinko&amp;severity=medium&amp;id=69c1a68ff4197a8e3b8b7ce8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23482-cwe-22-improper-limitation-of-a-pat-7f430ae3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23482%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20blinkospace%20blinko&amp;severity=high&amp;id=69c1a68ff4197a8e3b8b7ce3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3055-cwe-125-out-of-bounds-read-in-netsca-4eb4a414</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3055%3A%20CWE-125%20Out-of-bounds%20Read%20in%20NetScaler%20ADC&amp;severity=critical&amp;id=69c1a302f4197a8e3b8aa1e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4597-sql-injection-in-648540858-wvp-gb281-46ef2a06</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4597%3A%20SQL%20Injection%20in%20648540858%20wvp-GB28181-pro&amp;severity=medium&amp;id=69c1a302f4197a8e3b8aa1e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4368-vulnerability-in-netscaler-adc-9513ba21</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4368%3A%20Vulnerability%20in%20NetScaler%20ADC&amp;severity=high&amp;id=69c1a302f4197a8e3b8aa1e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2298-cwe-88-improper-neutralization-of-ar-dcfd6ea3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2298%3A%20CWE-88%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Salesforce%20Marketing%20Cloud%20Engagement&amp;severity=critical&amp;id=69c19bf3f4197a8e3b887547</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32879-cwe-287-improper-authentication-in--ddbd79c1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32879%3A%20CWE-287%3A%20Improper%20Authentication%20in%20QuantumNous%20new-api&amp;severity=medium&amp;id=69c1986ff4197a8e3b86e7bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4596-cross-site-scripting-in-projectworld-56938e19</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4596%3A%20Cross%20Site%20Scripting%20in%20projectworlds%20Lawyer%20Management%20System&amp;severity=medium&amp;id=69c1986ff4197a8e3b86e7c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30886-cwe-639-authorization-bypass-throug-27f24178</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30886%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20QuantumNous%20new-api&amp;severity=medium&amp;id=69c1986ff4197a8e3b86e7bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27131-cwe-200-exposure-of-sensitive-infor-620cdf71</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27131%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20putyourlightson%20craft-sprig&amp;severity=medium&amp;id=69c194ecf4197a8e3b85fa49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26209-cwe-674-uncontrolled-recursion-in-a-d5213351</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26209%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20agronholm%20cbor2&amp;severity=high&amp;id=69c18de6f4197a8e3b82dd7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33723-cwe-89-improper-neutralization-of-s-64220460</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33723%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c18de8f4197a8e3b82ea8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33719-cwe-306-missing-authentication-for--f550060a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33719%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c18de8f4197a8e3b82ea87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33717-cwe-434-unrestricted-upload-of-file-69bcb40c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33717%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c18de8f4197a8e3b82ea83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33716-cwe-287-improper-authentication-in--a45ab5c1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33716%3A%20CWE-287%3A%20Improper%20Authentication%20in%20WWBN%20AVideo&amp;severity=critical&amp;id=69c18de6f4197a8e3b82dd99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33690-cwe-348-use-of-less-trusted-source--d465d980</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33690%3A%20CWE-348%3A%20Use%20of%20Less%20Trusted%20Source%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c18de6f4197a8e3b82dd95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33688-cwe-204-observable-response-discrep-2ae31524</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33688%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c18de6f4197a8e3b82dd91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33685-cwe-862-missing-authorization-in-ww-72c96804</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33685%3A%20CWE-862%3A%20Missing%20Authorization%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c18de6f4197a8e3b82dd8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0898-cwe-284-improper-access-control-in-p-030c9101</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0898%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Pegasystems%20Pega%20Robot%20Studio&amp;severity=critical&amp;id=69c18de6f4197a8e3b82dd78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33683-cwe-79-improper-neutralization-of-i-42f6a9a7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33683%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c18de6f4197a8e3b82dd89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33681-cwe-22-improper-limitation-of-a-pat-f4244785</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33681%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c18de6f4197a8e3b82dd85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33651-cwe-89-improper-neutralization-of-s-783a9dad</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33651%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c18de6f4197a8e3b82dd81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4595-cross-site-scripting-in-code-project-11b45a6f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4595%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=69c18de8f4197a8e3b82ea8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pro-iranian-nasir-security-is-targeting-the-energy-3994b510</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pro-Iranian%20Nasir%20Security%20is%20Targeting%20The%20Energy%20Sector%20in%20the%20Middle%20East&amp;severity=medium&amp;id=69c1ad86f4197a8e3b8da034</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15606-cwe-20-improper-input-validation-in-ebf95e38</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15606%3A%20CWE-20%20Improper%20input%20validation%20in%20TP-Link%20Systems%20Inc.%20TD-W8961N%20v4.0&amp;severity=high&amp;id=69c18de6f4197a8e3b82dd74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33650-cwe-863-incorrect-authorization-in--5fb7dae5</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33650%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c18a60f4197a8e3b8159f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33649-cwe-352-cross-site-request-forgery--1be8ecb0</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33649%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c18a60f4197a8e3b8159f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33648-cwe-78-improper-neutralization-of-s-83c7ae01</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33648%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c18a60f4197a8e3b8159ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33647-cwe-434-unrestricted-upload-of-file-b82e976f</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33647%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c18a60f4197a8e3b8159eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33513-cwe-22-improper-limitation-of-a-pat-063f790f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33513%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c18a60f4197a8e3b8159e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33512-cwe-287-improper-authentication-in--09a67f4f</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33512%3A%20CWE-287%3A%20Improper%20Authentication%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c18a60f4197a8e3b8159e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15605-cwe-321-use-of-hard-coded-cryptogra-411a871b</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15605%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20TP-Link%20Systems%20Inc.%20Archer%20NX600%20v3.0&amp;severity=high&amp;id=69c1835bf4197a8e3b7ecba5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15519-cwe-78-improper-neutralization-of-s-1eec4ee0</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15519%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Archer%20NX600%20v3.0&amp;severity=high&amp;id=69c1835bf4197a8e3b7ecb9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15518-cwe-78-improper-neutralization-of-s-c83afbf0</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15518%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Archer%20NX600%20v3.0&amp;severity=high&amp;id=69c1835bf4197a8e3b7ecb97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15517-cwe-306-missing-authentication-for--d24caf26</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15517%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20TP-Link%20Systems%20Inc.%20Archer%20NX600%20v3.0&amp;severity=high&amp;id=69c1835bf4197a8e3b7ecb90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4594-sql-injection-hibernate-in-erupts-er-82ccc1b1</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4594%3A%20SQL%20Injection%20Hibernate%20in%20erupts%20erupt&amp;severity=medium&amp;id=69c17fd9f4197a8e3b7d5de6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4593-sql-injection-hibernate-in-erupts-er-2d6076e5</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4593%3A%20SQL%20Injection%20Hibernate%20in%20erupts%20erupt&amp;severity=medium&amp;id=69c1754df4197a8e3b789141</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33507-cwe-352-cross-site-request-forgery--676b8efb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33507%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c171cff4197a8e3b777515</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33502-cwe-918-server-side-request-forgery-8b7e8739</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33502%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WWBN%20AVideo&amp;severity=critical&amp;id=69c171cff4197a8e3b777511</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33501-cwe-862-missing-authorization-in-ww-15f1a843</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33501%3A%20CWE-862%3A%20Missing%20Authorization%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c16abef4197a8e3b7505b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33500-cwe-79-improper-neutralization-of-i-9b7b8f21</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33500%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c16abef4197a8e3b7505ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33499-cwe-79-improper-neutralization-of-i-04b61f15</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33499%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c16abef4197a8e3b7505aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4592-improper-authentication-in-kalcaddle-0e340947</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4592%3A%20Improper%20Authentication%20in%20kalcaddle%20kodbox&amp;severity=medium&amp;id=69c17fd9f4197a8e3b7d5dec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33493-cwe-22-improper-limitation-of-a-pat-e1c4f89a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33493%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c171cff4197a8e3b777519</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32845-cwe-190-integer-overflow-or-wraparo-0511ec41</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32845%3A%20CWE-190%20Integer%20overflow%20or%20wraparound%20in%20jkuhlmann%20cgltf&amp;severity=medium&amp;id=69c17c7cf4197a8e3b7b5a7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33492-cwe-384-session-fixation-in-wwbn-av-973399eb</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33492%3A%20CWE-384%3A%20Session%20Fixation%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c16032f4197a8e3b6f2c0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33488-cwe-326-inadequate-encryption-stren-6b555353</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33488%3A%20CWE-326%3A%20Inadequate%20Encryption%20Strength%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c16032f4197a8e3b6f2c08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4591-os-command-injection-in-kalcaddle-ko-e34b5b79</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4591%3A%20OS%20Command%20Injection%20in%20kalcaddle%20kodbox&amp;severity=medium&amp;id=69c16032f4197a8e3b6f2c10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m-trends-2026-initial-access-handoff-shrinks-from--7bb1d2f1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M-Trends%202026%3A%20Initial%20Access%20Handoff%20Shrinks%20From%20Hours%20to%2022%20Seconds&amp;severity=medium&amp;id=69c155a4f4197a8e3b687c6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chip-services-firm-trio-tech-says-subsidiary-hit-b-aa4297ad</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chip%20Services%20Firm%20Trio-Tech%20Says%20Subsidiary%20Hit%20by%20Ransomware&amp;severity=medium&amp;id=69c15220f4197a8e3b66a1c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4590-cross-site-request-forgery-in-kalcad-72a943be</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4590%3A%20Cross-Site%20Request%20Forgery%20in%20kalcaddle%20kodbox&amp;severity=low&amp;id=69c1522ef4197a8e3b66a562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33485-cwe-89-improper-neutralization-of-s-c274543e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33485%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c14e9ef4197a8e3b641c96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33483-cwe-770-allocation-of-resources-wit-75dd964b</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33483%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c14e9ef4197a8e3b641c92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33482-cwe-78-improper-neutralization-of-s-3886e14c</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33482%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c14e9ef4197a8e3b641c8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33480-cwe-918-server-side-request-forgery-e7b70dcf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33480%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c14e9ef4197a8e3b641c8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33479-cwe-94-improper-control-of-generati-39924b37</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33479%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c14e9ef4197a8e3b641c86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33478-cwe-78-improper-neutralization-of-s-b6c81f37</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33478%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=critical&amp;id=69c14e9ef4197a8e3b641c82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33354-cwe-73-external-control-of-file-nam-49e4b6db</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33354%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c14e9ef4197a8e3b641c7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33352-cwe-89-improper-neutralization-of-s-bb241f0f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33352%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=critical&amp;id=69c14797f4197a8e3b602ab3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33351-cwe-918-server-side-request-forgery-ae5efa9b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33351%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WWBN%20AVideo&amp;severity=critical&amp;id=69c14797f4197a8e3b602aaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33297-cwe-639-authorization-bypass-throug-8f970b76</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33297%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c14797f4197a8e3b602aab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aquas-trivy-vulnerability-scanner-hit-by-supply-ch-7c6dcbc1</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Aqua%E2%80%99s%20Trivy%20Vulnerability%20Scanner%20Hit%20by%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=69c14410f4197a8e3b5e2f07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/23rd-march-threat-intelligence-report-ceabc982</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=23rd%20March%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=69c14441f4197a8e3b5e3e16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4647-out-of-bounds-read-in-red-hat-red-ha-36231e4b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4647%3A%20Out-of-bounds%20Read%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69c14797f4197a8e3b602ac4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4645-loop-with-unreachable-exit-condition-6cd7e4c9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4645&amp;severity=null&amp;id=69c14797f4197a8e3b602abd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4589-server-side-request-forgery-in-kalca-2067b409</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4589%3A%20Server-Side%20Request%20Forgery%20in%20kalcaddle%20kodbox&amp;severity=medium&amp;id=69c14797f4197a8e3b602ab7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4588-use-of-hard-coded-cryptographic-key--6d0f896a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4588%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20kalcaddle%20kodbox&amp;severity=medium&amp;id=69c1398bf4197a8e3b580fbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4587-improper-certificate-validation-in-h-097d952b</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4587%3A%20Improper%20Certificate%20Validation%20in%20HybridAuth&amp;severity=medium&amp;id=69c1398bf4197a8e3b580fb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1958-cwe-798-use-of-hard-coded-credential-fc23d20f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1958%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20BRI%20KlinikaXP%20Insertino&amp;severity=high&amp;id=69c1398bf4197a8e3b580fb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31851-cwe-307-improper-restriction-of-exc-a96497fb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31851%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Nexxt%20Solutions%20Nebula%20300%2B&amp;severity=high&amp;id=69c1d4aef4197a8e3ba0b59d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31850-cwe-256-plaintext-storage-of-a-pass-36d1e4ae</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31850%3A%20CWE-256%20Plaintext%20Storage%20of%20a%20Password%20in%20Nexxt%20Solutions%20Nebula%20300%2B&amp;severity=medium&amp;id=69c1d4aef4197a8e3ba0b599</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31849-cwe-352-cross-site-request-forgery--9fe3828a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31849%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Nexxt%20Solutions%20Nebula%20300%2B&amp;severity=high&amp;id=69c1d4aef4197a8e3ba0b595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31848-cwe-312-cleartext-storage-of-sensit-384352d4</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31848%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Nexxt%20Solutions%20Nebula%20300%2B&amp;severity=high&amp;id=69c1d4aef4197a8e3ba0b591</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4586-unrestricted-upload-in-codephiliax-c-82ce6b58</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4586%3A%20Unrestricted%20Upload%20in%20CodePhiliaX%20Chat2DB&amp;severity=medium&amp;id=69c16abef4197a8e3b7505be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31847-cwe-912-hidden-functionality-in-nex-b07dd3af</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31847%3A%20CWE-912%20Hidden%20Functionality%20in%20Nexxt%20Solutions%20Nebula%20300%2B&amp;severity=high&amp;id=69c1d4aef4197a8e3ba0b58d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31846-cwe-306-missing-authentication-for--a9c2d2c0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31846%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Nexxt%20Solutions%20Nebula%20300%2B%20%2F%20Tenda%20F3%20V2.0%20Firmware&amp;severity=high&amp;id=69c12ef9f4197a8e3b4f4049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32969-cwe-89-improper-neutralization-of-s-9351491e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32969%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20MB%20connect%20line%20MB%20connect%20line%20mbCONNECT24&amp;severity=high&amp;id=69c127f2f4197a8e3b4567ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32968-cwe-78-improper-neutralization-of-s-6f1949ba</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32968%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20MB%20connect%20line%20MB%20connect%20line%20mbCONNECT24&amp;severity=critical&amp;id=69c127f2f4197a8e3b4567e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4585-os-command-injection-in-tiandy-easy7-54d78cb3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4585%3A%20OS%20Command%20Injection%20in%20Tiandy%20Easy7%20Integrated%20Management%20Platform&amp;severity=critical&amp;id=69c127f2f4197a8e3b4567f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4584-cleartext-transmission-of-sensitive--afe1d79d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4584%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Shenzhen%20HCC%20Technology%20MPOS%20M6%20PLUS&amp;severity=low&amp;id=69c127f2f4197a8e3b4567f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/qnap-patches-four-vulnerabilities-exploited-at-pwn-c42a1500</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=QNAP%20Patches%20Four%20Vulnerabilities%20Exploited%20at%20Pwn2Own&amp;severity=low&amp;id=69c120e8f4197a8e3b40ecab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4633-generation-of-error-message-containi-d7a7c0fc</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4633%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Red%20Hat%20Red%20Hat%20Build%20of%20Keycloak&amp;severity=low&amp;id=69c11d65f4197a8e3b3f53d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4583-authentication-bypass-by-capture-rep-6441f94b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4583%3A%20Authentication%20Bypass%20by%20Capture-replay%20in%20Shenzhen%20HCC%20Technology%20MPOS%20M6%20PLUS&amp;severity=low&amp;id=69c119e0f4197a8e3b3cb44f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tycoon-2fa-fully-operational-despite-law-enforceme-6358f581</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tycoon%202FA%20Fully%20Operational%20Despite%20Law%20Enforcement%20Takedown&amp;severity=medium&amp;id=69c1165cf4197a8e3b3b0692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28809-cwe-611-improper-restriction-of-xml-6e572eae</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28809%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20dropbox%20esaml&amp;severity=medium&amp;id=69c119e0f4197a8e3b3cb44c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4582-missing-authentication-in-shenzhen-h-bdf6f3ea</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4582%3A%20Missing%20Authentication%20in%20Shenzhen%20HCC%20Technology%20MPOS%20M6%20PLUS&amp;severity=low&amp;id=69c10bd0f4197a8e3b33b915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4581-sql-injection-in-code-projects-simpl-f864cf7c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4581%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69c10bd0f4197a8e3b33b90e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ghostclaw-expands-beyond-npm-github-repositories-a-368823f5</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GhostClaw%20expands%20beyond%20npm%3A%20GitHub%20repositories%20and%20AI%20workflows%20deliver%20macOS%20infostealer&amp;severity=medium&amp;id=69c10bcff4197a8e3b33b87d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4580-sql-injection-in-code-projects-simpl-e7825aa4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4580%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69c10142f4197a8e3b28a6a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4628-improper-access-control-in-red-hat-r-36ac1ffc</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4628%3A%20Improper%20Access%20Control%20in%20Red%20Hat%20Red%20Hat%20Build%20of%20Keycloak&amp;severity=medium&amp;id=69c0fdbff4197a8e3b25d07d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3587-cwe-912-hidden-functionality-in-wago-a4c55a72</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3587%3A%20CWE-912%20Hidden%20Functionality%20in%20WAGO%20Lean%20Managed%20Switch%20852-1812&amp;severity=critical&amp;id=69c0f6b6f4197a8e3b21d85c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4579-sql-injection-in-code-projects-simpl-5f3bc715</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4579%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69c0efaff4197a8e3b1e6aab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4578-cross-site-scripting-in-code-project-c0d98763</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4578%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=69c0efaff4197a8e3b1e6aa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13997-cwe-200-exposure-of-sensitive-infor-d51b2161</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13997%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20kingaddons%20King%20Addons%20for%20Elementor%20%E2%80%93%2080%2B%20Elementor%20Widgets%2C%204%20000%2B%20Elementor%20Templates%2C%20WooCommerce%2C%20Mega%20Menu%2C%20Popup%20Builder&amp;severity=medium&amp;id=69c0e19ff4197a8e3b18a2e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6229-cwe-79-improper-neutralization-of-in-231a13b9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6229%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shaonsina%20Sina%20Extension%20for%20Elementor&amp;severity=medium&amp;id=69c0e19ff4197a8e3b18a2e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4577-cross-site-scripting-in-code-project-23780ee9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4577%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=69c0e19ff4197a8e3b18a2e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1969-cwe-434-unrestricted-upload-of-file--c0354933</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1969%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20trx_addons&amp;severity=medium&amp;id=69c0daaaf4197a8e3b15ada4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4576-cross-site-scripting-in-code-project-134b1b69</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4576%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=69c0d39df4197a8e3b12da36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4575-cross-site-scripting-in-code-project-40472f6d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4575%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=69c0d39df4197a8e3b12da2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/oracle-releases-emergency-patch-for-critical-ident-3d33a815</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Oracle%20Releases%20Emergency%20Patch%20for%20Critical%20Identity%20Manager%20Vulnerability&amp;severity=critical&amp;id=69c0d38ff4197a8e3b12d6cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10734-cwe-922-insecure-storage-of-sensiti-bad439f2</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10734%3A%20CWE-922%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20reviewx%20ReviewX%20%E2%80%93%20Multi-Criteria%20Reviews%20for%20WooCommerce%20with%20Google%20Reviews%20%26%20Schema&amp;severity=medium&amp;id=69c0d39df4197a8e3b12da1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10679-cwe-94-improper-control-of-generati-1b2de9ba</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10679%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20reviewx%20ReviewX%20%E2%80%93%20Multi-Criteria%20Reviews%20for%20WooCommerce%20with%20Google%20Reviews%20%26%20Schema&amp;severity=high&amp;id=69c0d39df4197a8e3b12da10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10731-cwe-285-improper-authorization-in-r-54a86519</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10731%3A%20CWE-285%20Improper%20Authorization%20in%20reviewx%20ReviewX%20%E2%80%93%20Multi-Criteria%20Reviews%20for%20WooCommerce%20with%20Google%20Reviews%20%26%20Schema&amp;severity=medium&amp;id=69c0d39df4197a8e3b12da17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4574-sql-injection-in-sourcecodester-simp-590bdc3b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4574%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20E-learning%20System&amp;severity=medium&amp;id=69c0d39df4197a8e3b12da28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4573-sql-injection-in-sourcecodester-simp-6f478352</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4573%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20E-learning%20System&amp;severity=medium&amp;id=69c0d39df4197a8e3b12da21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4603-division-by-zero-in-jsrsasign-d0b63e96</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4603%3A%20Division%20by%20zero%20in%20jsrsasign&amp;severity=medium&amp;id=69c0d39ff4197a8e3b12db18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4601-missing-cryptographic-step-in-jsrsas-1b19c447</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4601%3A%20Missing%20Cryptographic%20Step%20in%20jsrsasign&amp;severity=critical&amp;id=69c0d39ff4197a8e3b12db0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4599-incomplete-comparison-with-missing-f-9aee8aa7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4599%3A%20Incomplete%20Comparison%20with%20Missing%20Factors%20in%20jsrsasign&amp;severity=critical&amp;id=69c0d39df4197a8e3b12da43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4598-infinite-loop-in-jsrsasign-37374acf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4598%3A%20Infinite%20loop%20in%20jsrsasign&amp;severity=high&amp;id=69c0d39df4197a8e3b12da3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4602-incorrect-conversion-between-numeric-8eab0826</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4602%3A%20Incorrect%20Conversion%20between%20Numeric%20Types%20in%20jsrsasign&amp;severity=high&amp;id=69c0d39ff4197a8e3b12db12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4600-improper-verification-of-cryptograph-546ca5ba</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4600%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20jsrsasign&amp;severity=critical&amp;id=69c0d39df4197a8e3b12da49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10736-cwe-285-improper-authorization-in-r-8dcd9600</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10736%3A%20CWE-285%20Improper%20Authorization%20in%20reviewx%20ReviewX%20%E2%80%93%20Multi-Criteria%20Reviews%20for%20WooCommerce%20with%20Google%20Reviews%20%26%20Schema&amp;severity=medium&amp;id=69c1d4aef4197a8e3ba0b589</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4572-sql-injection-in-sourcecodester-sale-bb457c93</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4572%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69c12b75f4197a8e3b4d2fbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4571-sql-injection-in-sourcecodester-sale-b8e8c39e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4571%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69c16abef4197a8e3b7505b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4570-sql-injection-in-sourcecodester-sale-4006fb57</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4570%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69c171cff4197a8e3b77751d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4569-sql-injection-in-sourcecodester-sale-ef4f7718</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4569%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69c0b3fdf4197a8e3be64bf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4568-sql-injection-in-sourcecodester-sale-d163008f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4568%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69c0a5dbf4197a8e3bdb4a90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4567-stack-based-buffer-overflow-in-tenda-27ff1845</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4567%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A15&amp;severity=critical&amp;id=69c0a5dbf4197a8e3bdb4a88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4566-stack-based-buffer-overflow-in-belki-8cb934b8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4566%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1122&amp;severity=high&amp;id=69c0a5dbf4197a8e3bdb4a81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4606-cwe-250-execution-with-unnecessary-p-39d565c1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4606%3A%20CWE-250%20Execution%20with%20unnecessary%20privileges%20in%20GeoVision%20GV-Edge%20Recording%20Manager&amp;severity=critical&amp;id=69c097cbf4197a8e3bd66623</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4565-buffer-overflow-in-tenda-ac21-5d23ce15</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4565%3A%20Buffer%20Overflow%20in%20Tenda%20AC21&amp;severity=high&amp;id=69c090cbf4197a8e3bd36054</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52204-na-030c791a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52204%3A%20n%2Fa&amp;severity=medium&amp;id=69c19bf3f4197a8e3b887542</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46879-na-e2beb03b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46879%3A%20n%2Fa&amp;severity=medium&amp;id=69c1986ff4197a8e3b86e7b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46878-na-66a3746b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46878%3A%20n%2Fa&amp;severity=medium&amp;id=69c1986ff4197a8e3b86e7b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30007-na-1658d953</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30007%3A%20n%2Fa&amp;severity=medium&amp;id=69c171cff4197a8e3b77750d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30006-na-b7b35e80</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30006%3A%20n%2Fa&amp;severity=medium&amp;id=69c171cff4197a8e3b777509</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26829-na-1d4912f4</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26829%3A%20n%2Fa&amp;severity=high&amp;id=69c16abef4197a8e3b7505a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26828-na-a163fedf</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26828%3A%20n%2Fa&amp;severity=high&amp;id=69c16abef4197a8e3b7505a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24516-na-ecd959ea</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24516%3A%20n%2Fa&amp;severity=high&amp;id=69c16abef4197a8e3b75059a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51226-na-d76be320</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51226%3A%20n%2Fa&amp;severity=medium&amp;id=69c16032f4197a8e3b6f2c04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51225-na-6216ff27</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51225%3A%20n%2Fa&amp;severity=medium&amp;id=69c16032f4197a8e3b6f2c00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51224-na-96495e20</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51224%3A%20n%2Fa&amp;severity=medium&amp;id=69c16032f4197a8e3b6f2bfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51223-na-3bf6f4be</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51223%3A%20n%2Fa&amp;severity=medium&amp;id=69c16032f4197a8e3b6f2bf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51222-na-79d2d66d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51222%3A%20n%2Fa&amp;severity=medium&amp;id=69c16032f4197a8e3b6f2bf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-23-fcf08916</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-23&amp;severity=medium&amp;id=69c127e7f4197a8e3b450253</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-23-8c3342de</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-23&amp;severity=low&amp;id=69c097c3f4197a8e3bd6641a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4564-code-injection-in-yangzongzhuan-ruoy-64a205a4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4564%3A%20Code%20Injection%20in%20yangzongzhuan%20RuoYi&amp;severity=medium&amp;id=69c0833cf4197a8e3bcdaa32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4563-authorization-bypass-in-maccms-eaf25abd</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4563%3A%20Authorization%20Bypass%20in%20MacCMS&amp;severity=medium&amp;id=69c0833cf4197a8e3bcdaa1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2580-cwe-89-improper-neutralization-of-sp-b93f1b1b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2580%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20flippercode%20WP%20Maps%20%E2%80%93%20Store%20Locator%2CGoogle%20Maps%2COpenStreetMap%2CMapbox%2CListing%2CDirectory%20%26%20Filters&amp;severity=high&amp;id=69c07babf4197a8e3bc82349</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4562-missing-authentication-in-maccms-3327321e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4562%3A%20Missing%20Authentication%20in%20MacCMS&amp;severity=medium&amp;id=69c0833cf4197a8e3bcdaa38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4558-os-command-injection-in-linksys-mr96-e5c4353d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4558%3A%20OS%20Command%20Injection%20in%20Linksys%20MR9600&amp;severity=high&amp;id=69c02acff4197a8e3ba6a972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4557-cross-site-scripting-in-code-project-2053ca14</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4557%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=69c02acff4197a8e3ba6a96b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33296-cwe-601-url-redirection-to-untruste-785f37e5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33296%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20WWBN%20AVideo&amp;severity=low&amp;id=69c023c9f4197a8e3ba36535</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33295-cwe-79-improper-neutralization-of-i-4fafbbb4</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33295%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c023c9f4197a8e3ba36531</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33294-cwe-918-server-side-request-forgery-a13589f1</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33294%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c02043f4197a8e3ba1f6d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4555-stack-based-buffer-overflow-in-d-lin-d3320ca7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4555%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-513&amp;severity=high&amp;id=69c02043f4197a8e3ba1f6db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4554-command-injection-in-tenda-f453-fa4e7404</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4554%3A%20Command%20Injection%20in%20Tenda%20F453&amp;severity=medium&amp;id=69c02043f4197a8e3ba1f6d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33293-cwe-22-improper-limitation-of-a-pat-ff5dbc0a</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33293%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c02043f4197a8e3ba1f6e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33319-cwe-78-improper-neutralization-of-s-96a640bb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33319%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c0833cf4197a8e3bcdaa67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33292-cwe-22-improper-limitation-of-a-pat-24031473</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33292%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c0833cf4197a8e3bcdaa55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4553-stack-based-buffer-overflow-in-tenda-df9d32ba</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4553%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69c00eaff4197a8e3b87db39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4552-stack-based-buffer-overflow-in-tenda-2d4d3dfc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4552%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69c0009ff4197a8e3b7d8e6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4551-stack-based-buffer-overflow-in-tenda-a56904d2</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4551%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69c0009ff4197a8e3b7d8e63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4550-sql-injection-in-code-projects-simpl-5472b525</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4550%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Gym%20Management%20System&amp;severity=medium&amp;id=69bff615f4197a8e3b77b0d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4549-authorization-bypass-in-mickasmt-nex-2c60ce48</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4549%3A%20Authorization%20Bypass%20in%20mickasmt%20next-saas-stripe-starter&amp;severity=low&amp;id=69bff615f4197a8e3b77b0cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4548-improper-authorization-in-mickasmt-n-c85f7652</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4548%3A%20Improper%20Authorization%20in%20mickasmt%20next-saas-stripe-starter&amp;severity=medium&amp;id=69bfef0bf4197a8e3b75ae83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4547-business-logic-errors-in-mickasmt-ne-eba15f55</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4547%3A%20Business%20Logic%20Errors%20in%20mickasmt%20next-saas-stripe-starter&amp;severity=medium&amp;id=69bfef0bf4197a8e3b75ae7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4546-uncontrolled-search-path-in-flos-fre-73cfae25</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4546%3A%20Uncontrolled%20Search%20Path%20in%20Flos%20Freeware%20Notepad2&amp;severity=high&amp;id=69bfef0bf4197a8e3b75ae78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4115-improper-verification-of-cryptograph-b4a4f2b1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4115%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20PuTTY&amp;severity=medium&amp;id=69bfe0fbf4197a8e3b712c00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4545-uncontrolled-search-path-in-flos-fre-4b0b234b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4545%3A%20Uncontrolled%20Search%20Path%20in%20Flos%20Freeware%20Notepad2&amp;severity=high&amp;id=69bfd2ebf4197a8e3b6b775b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4544-cross-site-scripting-in-wavlink-wl-w-1122168c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4544%3A%20Cross%20Site%20Scripting%20in%20Wavlink%20WL-WN578W2&amp;severity=medium&amp;id=69c0833cf4197a8e3bcdaa71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4543-command-injection-in-wavlink-wl-wn57-50f96d33</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4543%3A%20Command%20Injection%20in%20Wavlink%20WL-WN578W2&amp;severity=medium&amp;id=69bfba4ff4197a8e3b61fc7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4542-path-traversal-in-sscms-2ffdaf39</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4542%3A%20Path%20Traversal%20in%20SSCMS&amp;severity=medium&amp;id=69bfafc3f4197a8e3b5ee767</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4541-improper-verification-of-cryptograph-bb085ec7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4541%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20janmojzis%20tinyssh&amp;severity=low&amp;id=69bfafc3f4197a8e3b5ee75c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4540-sql-injection-in-projectworlds-onlin-4351ab2e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4540%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Notes%20Sharing%20System&amp;severity=medium&amp;id=69bfa1b3f4197a8e3b5a1521</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4539-inefficient-regular-expression-compl-cb34245c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4539%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20pygments&amp;severity=medium&amp;id=69bf85b4f4197a8e3b50f1d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4538-deserialization-in-pytorch-3d5ae3d6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4538%3A%20Deserialization%20in%20PyTorch&amp;severity=medium&amp;id=69bf707bf4197a8e3b474c5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4537-command-injection-in-cudy-tr1200-eb876869</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4537%3A%20Command%20Injection%20in%20Cudy%20TR1200&amp;severity=medium&amp;id=69bf707bf4197a8e3b474c59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4536-unrestricted-upload-in-acrel-environ-2a8656cd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4536%3A%20Unrestricted%20Upload%20in%20Acrel%20Environmental%20Monitoring%20Cloud%20Platform&amp;severity=medium&amp;id=69bf707bf4197a8e3b474c53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4535-stack-based-buffer-overflow-in-tenda-8f2fc263</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4535%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH451&amp;severity=high&amp;id=69bf707bf4197a8e3b474c4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4534-stack-based-buffer-overflow-in-tenda-65a33e73</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4534%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH451&amp;severity=high&amp;id=69bf707bf4197a8e3b474c44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3427-cwe-79-improper-neutralization-of-in-f396b435</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3427%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yoast%20Yoast%20SEO%20%E2%80%93%20Advanced%20SEO%20with%20real-time%20guidance%20and%20built-in%20AI&amp;severity=medium&amp;id=69c0833cf4197a8e3bcdaa80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4314-cwe-269-improper-privilege-managemen-df6f51b1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4314%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20wpextended%20The%20Ultimate%20WordPress%20Toolkit%20%E2%80%93%20WP%20Extended&amp;severity=high&amp;id=69c0833cf4197a8e3bcdaa8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33550-cwe-308-use-of-single-factor-authen-6be57b9b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33550%3A%20CWE-308%20Use%20of%20Single-factor%20Authentication%20in%20Alinto%20SOGo&amp;severity=low&amp;id=69bf545af4197a8e3b1d674e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71276-cwe-79-improper-neutralization-of-i-4b87c96d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71276%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Alinto%20SOGo&amp;severity=medium&amp;id=69bf545af4197a8e3b1d674b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4533-sql-injection-in-code-projects-simpl-c9dcca98</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4533%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Food%20Ordering%20System&amp;severity=medium&amp;id=69bf545af4197a8e3b1d6752</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4532-files-or-directories-accessible-in-c-73433b3a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4532%3A%20Files%20or%20Directories%20Accessible%20in%20code-projects%20Simple%20Food%20Ordering%20System&amp;severity=medium&amp;id=69bf49cef4197a8e3b18ce5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4531-denial-of-service-in-free5gc-a793a8cd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4531%3A%20Denial%20of%20Service%20in%20Free5GC&amp;severity=medium&amp;id=69bf49cef4197a8e3b18ce53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-22-08f7f078</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-22&amp;severity=medium&amp;id=69c00b23f4197a8e3b82758b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-22-2b31dbc7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-22&amp;severity=low&amp;id=69bf7afff4197a8e3b4d698b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4530-sql-injection-in-apconw-aix-db-2ac345d4</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4530%3A%20SQL%20Injection%20in%20apconw%20Aix-DB&amp;severity=medium&amp;id=69bf2daff4197a8e3b0c09df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4529-stack-based-buffer-overflow-in-d-lin-7f100378</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4529%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DHP-1320&amp;severity=high&amp;id=69bf26a7f4197a8e3b098306</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3629-cwe-269-improper-privilege-managemen-61196a39</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3629%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20carazo%20Import%20and%20export%20users%20and%20customers&amp;severity=high&amp;id=69bf1f9ff4197a8e3b06ff51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4528-server-side-request-forgery-in-truel-6267e37d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4528%3A%20Server-Side%20Request%20Forgery%20in%20trueleaf%20ApiFlow&amp;severity=medium&amp;id=69bf1898f4197a8e3b034520</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2756-missing-authentication-in-omnipemf-n-3c473c97</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2756%3A%20Missing%20Authentication%20in%20OmniPEMF%20NeoRhythm&amp;severity=low&amp;id=69bed94ff4197a8e3be73e58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4516-injection-in-foundation-agents-metag-cb474584</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4516%3A%20Injection%20in%20Foundation%20Agents%20MetaGPT&amp;severity=medium&amp;id=69beb627f4197a8e3bd740a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4515-code-injection-in-foundation-agents--00ba46ff</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4515%3A%20Code%20Injection%20in%20Foundation%20Agents%20MetaGPT&amp;severity=medium&amp;id=69be84f0f4197a8e3bc20cfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-quest-kace-vulnerability-potentially-expl-c5cd699f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Quest%20KACE%20Vulnerability%20Potentially%20Exploited%20in%20Attacks&amp;severity=critical&amp;id=69be7a63f4197a8e3bbd68e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4514-improper-access-controls-in-pbootcms-bb082049</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4514%3A%20Improper%20Access%20Controls%20in%20PbootCMS&amp;severity=medium&amp;id=69be7a70f4197a8e3bbd6d5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4513-sql-injection-in-vanna-ai-vanna-6c0caded</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4513%3A%20SQL%20Injection%20in%20vanna-ai%20vanna&amp;severity=medium&amp;id=69be6fd7f4197a8e3bb95f70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4511-injection-in-vanna-ai-vanna-87d5cbfc</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4511%3A%20Injection%20in%20vanna-ai%20vanna&amp;severity=medium&amp;id=69be5ac1f4197a8e3bb09e95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4510-cross-site-scripting-in-pbootcms-efcb0958</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4510%3A%20Cross%20Site%20Scripting%20in%20PbootCMS&amp;severity=medium&amp;id=69be45a8f4197a8e3ba73aa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4373-cwe-36-absolute-path-traversal-in-je-12b1586f</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4373%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20jetmonsters%20JetFormBuilder%20%E2%80%94%20Dynamic%20Blocks%20Form%20Builder&amp;severity=high&amp;id=69be45a8f4197a8e3ba73aa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4509-incomplete-blacklist-in-pbootcms-c754c3d7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4509%3A%20Incomplete%20Blacklist%20in%20PbootCMS&amp;severity=medium&amp;id=69be3796f4197a8e3ba0643f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4022-cwe-79-improper-neutralization-of-in-7a0fd10b</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4022%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20creativedev4%20Show%20Posts%20list%20%E2%80%93%20Easy%20designs%2C%20filters%20and%20more&amp;severity=medium&amp;id=69be1811f4197a8e3b784400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3478-cwe-918-server-side-request-forgery--aeeaf0a3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3478%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20benmoody%20Content%20Syndication%20Toolkit&amp;severity=high&amp;id=69be180ef4197a8e3b78435f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1914-cwe-79-improper-neutralization-of-in-2b6d007f</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1914%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jeremyshapiro%20FuseDesk&amp;severity=medium&amp;id=69be1809f4197a8e3b783d4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2501-cwe-79-improper-neutralization-of-in-788a7318</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2501%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20waianaeboy702%20Ed&apos;s%20Social%20Share&amp;severity=medium&amp;id=69be180df4197a8e3b7842cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4004-cwe-94-improper-control-of-generatio-7256d48a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4004%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20eoxia%20Task%20Manager&amp;severity=medium&amp;id=69be1811f4197a8e3b7843f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1278-cwe-79-improper-neutralization-of-in-a7319460</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1278%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ketanmujumdar%20Mandatory%20Field&amp;severity=medium&amp;id=69be1806f4197a8e3b783bb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2121-cwe-79-improper-neutralization-of-in-4523a2ff</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2121%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpweaver%20Weaver%20Show%20Posts&amp;severity=medium&amp;id=69be180bf4197a8e3b784269</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2837-cwe-79-improper-neutralization-of-in-aca66766</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2837%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20systemsrtk%20Ricerca%20%E2%80%93%20advanced%20search&amp;severity=medium&amp;id=69be180df4197a8e3b7842e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1397-cwe-79-improper-neutralization-of-in-fe7f07ca</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1397%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20peacefulqode%20PQ%20Addons%20%E2%80%93%20Creative%20Elementor%20Widgets&amp;severity=medium&amp;id=69be1807f4197a8e3b783c2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2723-cwe-352-cross-site-request-forgery-c-29fc5831</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2723%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20phy9pas%20Post%20Snippits&amp;severity=medium&amp;id=69be180df4197a8e3b7842e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3997-cwe-79-improper-neutralization-of-in-6af7d70c</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3997%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hoosierdragon%20Text%20Toggle&amp;severity=medium&amp;id=69be1811f4197a8e3b7843ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3354-cwe-79-improper-neutralization-of-in-c48c2947</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3354%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mooeypoo%20Wikilookup&amp;severity=medium&amp;id=69be180ef4197a8e3b784351</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4143-cwe-352-cross-site-request-forgery-c-a75b1d3d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4143%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20neo2oo5%20Neos%20Connector%20for%20Fakturama&amp;severity=medium&amp;id=69be1813f4197a8e3b784eb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4261-cwe-862-missing-authorization-in-hus-fa4ebb4d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4261%3A%20CWE-862%20Missing%20Authorization%20in%20husobj%20Expire%20Users&amp;severity=high&amp;id=69be1813f4197a8e3b784ec6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4161-cwe-79-improper-neutralization-of-in-d6365643</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4161%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20revukangaroo%20Review%20Map%20by%20RevuKangaroo&amp;severity=medium&amp;id=69be1813f4197a8e3b784eb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2720-cwe-862-missing-authorization-in-cod-9f638a74</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2720%3A%20CWE-862%20Missing%20Authorization%20in%20codeclove%20Hr%20Press%20Lite&amp;severity=medium&amp;id=69be180df4197a8e3b7842d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3554-cwe-79-improper-neutralization-of-in-b5e9e6fa</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3554%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sherkspear%20Sherk%20Custom%20Post%20Type%20Displays&amp;severity=medium&amp;id=69be1810f4197a8e3b784383</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2503-cwe-89-improper-neutralization-of-sp-845cf738</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2503%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpdive%20ElementCamp&amp;severity=medium&amp;id=69be180df4197a8e3b7842d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3353-cwe-79-improper-neutralization-of-in-0976e5f0</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3353%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20intermod%20Comment%20SPAM%20Wiper&amp;severity=medium&amp;id=69be180ef4197a8e3b78434c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2351-cwe-73-external-control-of-file-name-465411d5</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2351%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20eoxia%20Task%20Manager&amp;severity=medium&amp;id=69be180bf4197a8e3b784289</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1911-cwe-79-improper-neutralization-of-in-cc3c042e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1911%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20viaviwebtech%20Twitter%20Feeds&amp;severity=medium&amp;id=69be1809f4197a8e3b783d45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1648-cwe-918-server-side-request-forgery--062101f6</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1648%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20qrolic%20Performance%20Monitor&amp;severity=high&amp;id=69be1807f4197a8e3b783c43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0609-cwe-79-improper-neutralization-of-in-c969af4b</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0609%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20logichunt%20Logo%20Slider%20%E2%80%93%20Logo%20Carousel%2C%20Logo%20Showcase%20%26%20Client%20Logo%20Slider%20Plugin&amp;severity=medium&amp;id=69be1806f4197a8e3b783b96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1575-cwe-79-improper-neutralization-of-in-408cd466</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1575%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jeric_izon%20Schema%20Shortcode&amp;severity=medium&amp;id=69be1807f4197a8e3b783c39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3645-cwe-862-missing-authorization-in-pun-2d45e1ad</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3645%3A%20CWE-862%20Missing%20Authorization%20in%20punnel%20Punnel%20%E2%80%93%20Landing%20Page%20Builder&amp;severity=medium&amp;id=69be1810f4197a8e3b7843aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1275-cwe-79-improper-neutralization-of-in-dba442e0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1275%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gbsdeveloper%20Multi%20Post%20Carousel%20by%20Category&amp;severity=medium&amp;id=69be1806f4197a8e3b783bad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1908-cwe-79-improper-neutralization-of-in-b506e305</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1908%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20minnur%20Integration%20with%20Hubspot%20Forms&amp;severity=medium&amp;id=69be1809f4197a8e3b783d40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3617-cwe-79-improper-neutralization-of-in-1a4b1961</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3617%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20swergroup%20Paypal%20Shortcodes&amp;severity=medium&amp;id=69be1810f4197a8e3b78438f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1647-cwe-79-improper-neutralization-of-in-c9b2ffb5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1647%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20basiliskan%20Comment%20Genius&amp;severity=medium&amp;id=69be1807f4197a8e3b783c3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3347-cwe-79-improper-neutralization-of-in-b23caa6d</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3347%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20arevico%20Multi%20Functional%20Flexi%20Lightbox&amp;severity=medium&amp;id=69be180ef4197a8e3b784345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2427-cwe-79-improper-neutralization-of-in-80f98a8b</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2427%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kazunii%20itsukaita&amp;severity=medium&amp;id=69be180bf4197a8e3b78429b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4072-cwe-79-improper-neutralization-of-in-f39edd0d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4072%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tstachl%20WordPress%20PayPal%20Donation&amp;severity=medium&amp;id=69be1811f4197a8e3b78441d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3546-cwe-202-exposure-of-sensitive-inform-17645cba</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3546%3A%20CWE-202%20Exposure%20of%20Sensitive%20Information%20Through%20Data%20Queries%20in%20forfront%20e-shot&amp;severity=medium&amp;id=69be1810f4197a8e3b78437c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3333-cwe-79-improper-neutralization-of-in-6ad0c532</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3333%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20minhnhut%20MinhNhut%20Link%20Gateway&amp;severity=medium&amp;id=69be180ef4197a8e3b784332</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14037-cwe-352-cross-site-request-forgery--03a05b47</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14037%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20invelity%20Invelity%20Product%20Feeds&amp;severity=high&amp;id=69be1806f4197a8e3b783b92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4087-cwe-89-improper-neutralization-of-sp-e5eec0f7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4087%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20samperrow%20Pre*%20Party%20Resource%20Hints&amp;severity=medium&amp;id=69be1811f4197a8e3b784443</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1503-cwe-352-cross-site-request-forgery-c-9ddba76f</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1503%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20frankkoenen%20Plugin%20Name%3A%20login_register&amp;severity=medium&amp;id=69be1807f4197a8e3b783c33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13785-cwe-94-improper-control-of-generati-ab6a1f39</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13785%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20reputeinfosystems%20Contact%20Form%2C%20Survey%2C%20Quiz%20%26%20Popup%20Form%20Builder%20%E2%80%93%20ARForms&amp;severity=medium&amp;id=69be1806f4197a8e3b783b88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3619-cwe-79-improper-neutralization-of-in-464c4dc3</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3619%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tonyh-1%20Sheets2Table&amp;severity=medium&amp;id=69be1810f4197a8e3b784398</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3331-cwe-352-cross-site-request-forgery-c-9da5a7b9</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3331%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20chuckmo%20Lobot%20Slider%20Administrator&amp;severity=medium&amp;id=69be180ef4197a8e3b784328</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1313-cwe-918-server-side-request-forgery--530406e8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1313%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20eagerterrier%20MimeTypes%20Link%20Icons&amp;severity=high&amp;id=69be1806f4197a8e3b783bb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3003-cwe-79-improper-neutralization-of-in-1c64fa1c</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3003%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vagaro%20Vagaro%20Booking%20Widget&amp;severity=high&amp;id=69be180df4197a8e3b7842f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1392-cwe-352-cross-site-request-forgery-c-4eab07f7</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1392%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20superrishi%20SR%20WP%20Minify%20HTML&amp;severity=medium&amp;id=69be1807f4197a8e3b783c22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3460-cwe-20-improper-input-validation-in--49405daa</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3460%3A%20CWE-20%20Improper%20Input%20Validation%20in%20xjb%20REST%20API%20TO%20MiniProgram&amp;severity=medium&amp;id=69be180ef4197a8e3b784356</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3641-cwe-20-improper-input-validation-in--e26ee0b5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3641%3A%20CWE-20%20Improper%20Input%20Validation%20in%20appmaxplataforma%20Appmax&amp;severity=medium&amp;id=69be1810f4197a8e3b78439f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3996-cwe-79-improper-neutralization-of-in-68478d14</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3996%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sammyb%20WP%20Games%20Embed&amp;severity=medium&amp;id=69be1810f4197a8e3b7843c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3332-cwe-352-cross-site-request-forgery-c-c2f5142d</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3332%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20xhanch_studio%20Xhanch%20%E2%80%93%20My%20Advanced%20Settings&amp;severity=medium&amp;id=69be180ef4197a8e3b78432d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2468-cwe-89-improper-neutralization-of-sp-1117943b</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2468%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20quentn%20Quentn%20WP&amp;severity=high&amp;id=69be180df4197a8e3b7842c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2294-cwe-285-improper-authorization-in-ad-117c9b16</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2294%3A%20CWE-285%20Improper%20Authorization%20in%20admintwentytwenty%20UiPress%20lite%20%7C%20Effortless%20custom%20dashboards%2C%20admin%20themes%20and%20pages&amp;severity=medium&amp;id=69be180bf4197a8e3b784285</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1253-cwe-862-missing-authorization-in-ato-80830b1b</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1253%3A%20CWE-862%20Missing%20Authorization%20in%20atomchat%20Group%20Chat%20%26%20Video%20Chat%20by%20AtomChat&amp;severity=medium&amp;id=69be1806f4197a8e3b783ba7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1899-cwe-79-improper-neutralization-of-in-8084abd1</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1899%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20itpathsolutions%20Any%20Post%20Slider&amp;severity=medium&amp;id=69be1809f4197a8e3b783d3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3651-cwe-862-missing-authorization-in-hak-486b71e7</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3651%3A%20CWE-862%20Missing%20Authorization%20in%20hakeemnala%20Build%20App%20Online&amp;severity=medium&amp;id=69be1810f4197a8e3b7843b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1806-cwe-79-improper-neutralization-of-in-f97469bf</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1806%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tourcms%20Tour%20%26%20Activity%20Operator%20Plugin%20for%20TourCMS&amp;severity=medium&amp;id=69be1809f4197a8e3b783d18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1247-cwe-79-improper-neutralization-of-in-c6f3c974</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1247%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20seosbg%20Survey&amp;severity=medium&amp;id=69be1806f4197a8e3b783ba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1935-cwe-862-missing-authorization-in-bra-987f9535</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1935%3A%20CWE-862%20Missing%20Authorization%20in%20brainstation23%20Company%20Posts%20for%20LinkedIn&amp;severity=medium&amp;id=69be180bf4197a8e3b784264</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1886-cwe-79-improper-neutralization-of-in-ac2ded26</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1886%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hrs2015%20Go%20Night%20Pro%20%7C%20WordPress%20Dark%20Mode%20Plugin&amp;severity=medium&amp;id=69be1809f4197a8e3b783d2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1891-cwe-79-improper-neutralization-of-in-fbd941f7</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1891%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dogrow%20Simple%20Football%20Scoreboard&amp;severity=medium&amp;id=69be1809f4197a8e3b783d35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13910-cwe-79-improper-neutralization-of-i-f70b79dd</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13910%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20axton%20WP-WebAuthn&amp;severity=medium&amp;id=69be1806f4197a8e3b783b8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4069-cwe-79-improper-neutralization-of-in-e056d151</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4069%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pftool%20Alfie%20%E2%80%93%20Feed%20Plugin&amp;severity=medium&amp;id=69be1811f4197a8e3b784412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2496-cwe-79-improper-neutralization-of-in-d1387e77</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2496%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20waianaeboy702%20Ed&apos;s%20Font%20Awesome&amp;severity=medium&amp;id=69be180df4197a8e3b7842c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2424-cwe-79-improper-neutralization-of-in-9fbdb9b6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2424%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20applixir%20Reward%20Video%20Ad%20for%20WordPress&amp;severity=medium&amp;id=69be180bf4197a8e3b784294</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4084-cwe-79-improper-neutralization-of-in-2ab00629</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4084%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cbednarek%20fyyd%20podcast%20shortcodes&amp;severity=medium&amp;id=69be1811f4197a8e3b78442d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4127-cwe-862-missing-authorization-in-cha-4f808c50</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4127%3A%20CWE-862%20Missing%20Authorization%20in%20charlycharm%20Speedup%20Optimization&amp;severity=medium&amp;id=69be1813f4197a8e3b784ea9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1093-cwe-79-improper-neutralization-of-in-2d469579</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1093%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20creativewerkdesigns%20WPFAQBlock%E2%80%93%20FAQ%20%26%20Accordion%20Plugin%20For%20Gutenberg&amp;severity=medium&amp;id=69be1806f4197a8e3b783b9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2290-cwe-918-server-side-request-forgery--493a61c0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2290%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20jurajsim%20Post%20Affiliate%20Pro&amp;severity=low&amp;id=69be180bf4197a8e3b784280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3506-cwe-862-missing-authorization-in-lar-e3524987</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3506%3A%20CWE-862%20Missing%20Authorization%20in%20larrykim%20WP-Chatbot%20for%20Messenger&amp;severity=medium&amp;id=69be1810f4197a8e3b784372</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4067-cwe-79-improper-neutralization-of-in-bc0cb2da</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4067%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nocaredev%20Ad%20Short&amp;severity=medium&amp;id=69be1811f4197a8e3b78440b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2277-cwe-79-improper-neutralization-of-in-34e2f15d</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2277%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20larsdrasmussen%20rexCrawler&amp;severity=medium&amp;id=69be180bf4197a8e3b784272</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1851-cwe-79-improper-neutralization-of-in-f86fc823</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1851%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20deckercz%20iVysilani%20Shortcode&amp;severity=medium&amp;id=69be1809f4197a8e3b783d22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4077-cwe-79-improper-neutralization-of-in-a742ebf9</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4077%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20miguelmartinezlopez%20Ecover%20Builder%20For%20Dummies&amp;severity=medium&amp;id=69be1811f4197a8e3b784424</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1390-cwe-352-cross-site-request-forgery-c-5d433691</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1390%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20haghs%20Redirect%20countdown&amp;severity=medium&amp;id=69be1807f4197a8e3b783c1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1378-cwe-352-cross-site-request-forgery-c-1972715a</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1378%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20suifengtec%20WP%20Posts%20Re-order&amp;severity=medium&amp;id=69be1807f4197a8e3b783c18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1393-cwe-352-cross-site-request-forgery-c-60eef6f3</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1393%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20omarnas%20Add%20Google%20Social%20Profiles%20to%20Knowledge%20Graph%20Box&amp;severity=medium&amp;id=69be1807f4197a8e3b783c27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1854-cwe-79-improper-neutralization-of-in-ba6d190e</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1854%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nosoycesaros%20Post%20Flagger&amp;severity=medium&amp;id=69be1809f4197a8e3b783d28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1822-cwe-79-improper-neutralization-of-in-be7013d5</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1822%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tonysamperi%20WP%20NG%20Weather&amp;severity=medium&amp;id=69be1809f4197a8e3b783d1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2941-cwe-862-missing-authorization-in-plu-785289cf</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2941%3A%20CWE-862%20Missing%20Authorization%20in%20plugli%20Linksy%20Search%20and%20Replace&amp;severity=high&amp;id=69be180df4197a8e3b7842ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4086-cwe-79-improper-neutralization-of-in-d801ad0f</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4086%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20newbiesup%20WP%20Random%20Button&amp;severity=medium&amp;id=69be1811f4197a8e3b78443c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2375-cwe-269-improper-privilege-managemen-b429e3ef</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2375%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20appcheap%20App%20Builder%20%E2%80%93%20Create%20Native%20Android%20%26%20iOS%20Apps%20On%20The%20Flight&amp;severity=medium&amp;id=69be180bf4197a8e3b78428f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1800-cwe-89-improper-neutralization-of-sp-6508487b</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1800%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wisdomlogix%20Fonts%20Manager%20%7C%20Custom%20Fonts&amp;severity=high&amp;id=69be1807f4197a8e3b783c49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2440-cwe-79-improper-neutralization-of-in-5cce452d</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2440%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devsoftbaltic%20SurveyJS%3A%20Drag%20%26%20Drop%20Form%20Builder&amp;severity=high&amp;id=69be180df4197a8e3b7842bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3335-cwe-862-missing-authorization-in-fli-d6558976</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3335%3A%20CWE-862%20Missing%20Authorization%20in%20flightbycanto%20Canto&amp;severity=medium&amp;id=69be180ef4197a8e3b78433c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3570-cwe-862-missing-authorization-in-acu-58dc6d36</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3570%3A%20CWE-862%20Missing%20Authorization%20in%20acumenconsulting%20Smarter%20Analytics&amp;severity=medium&amp;id=69be1810f4197a8e3b78438a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3334-cwe-89-improper-neutralization-of-sp-c25ae167</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3334%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20thoefter%20CMS%20Commander%20%E2%80%93%20Manage%20Multiple%20Sites&amp;severity=high&amp;id=69be180ef4197a8e3b784337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2279-cwe-89-improper-neutralization-of-sp-9177e77e</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2279%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20silvercover%20myLinksDump&amp;severity=high&amp;id=69be180bf4197a8e3b784279</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4302-cwe-918-server-side-request-forgery--5793ece4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4302%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20wpxpo%20WowOptin%3A%20Next-Gen%20Popup%20Maker%20%E2%80%93%20Create%20Stunning%20Popups%20and%20Optins%20for%20Lead%20Generation&amp;severity=high&amp;id=69bdff57f4197a8e3b623666</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-21-7d29c70a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-21&amp;severity=medium&amp;id=69be5ab7f4197a8e3bb06acb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-21-efa95b81</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-21&amp;severity=low&amp;id=69be5ab7f4197a8e3bb06ac0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33238-cwe-22-improper-limitation-of-a-pat-e1bc9bf4</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33238%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69bdda56b462d409683a8be3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33237-cwe-918-server-side-request-forgery-84e662a7</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33237%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69bdda56b462d409683a8bdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2430-cwe-79-improper-neutralization-of-in-b2e5892d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2430%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20optimizingmatters%20Autoptimize&amp;severity=medium&amp;id=69bdda56b462d409683a8bd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3474-cwe-22-improper-limitation-of-a-path-67cc90df</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3474%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20roxnor%20EmailKit%20%E2%80%93%20Email%20Customizer%20for%20WooCommerce%20%26%20WP&amp;severity=medium&amp;id=69bdda56b462d409683a8c08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3350-cwe-79-improper-neutralization-of-in-800f77b3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3350%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpsaad%20Image%20Alt%20Text%20Manager%20%E2%80%93%20Bulk%20%26%20Dynamic%20Alt%20Tags%20For%20image%20SEO%20Optimization%20%2B%20AI&amp;severity=medium&amp;id=69bdda56b462d409683a8bee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3567-cwe-862-missing-authorization-in-swe-2ac2bc12</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3567%3A%20CWE-862%20Missing%20Authorization%20in%20sweetdaisy86%20RepairBuddy%20%E2%80%93%20Repair%20Shop%20CRM%20%26%20Booking%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=69bdda57b462d409683a8c35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3516-cwe-79-improper-neutralization-of-in-7a01a687</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3516%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20anssilaitila%20Contact%20List%20%E2%80%93%20Online%20Staff%20Directory%20%26%20Address%20Book&amp;severity=medium&amp;id=69bdda56b462d409683a8c12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2352-cwe-79-improper-neutralization-of-in-eae8d2fd</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2352%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20optimizingmatters%20Autoptimize&amp;severity=medium&amp;id=69bdda56b462d409683a8bce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4083-cwe-79-improper-neutralization-of-in-fe5ebc60</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4083%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20demonisblack%20Scoreboard%20for%20HTML5%20Games%20Lite&amp;severity=medium&amp;id=69bdda57b462d409683a8c45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3577-cwe-79-improper-neutralization-of-in-5f82dc59</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3577%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fahadmahmood%20Keep%20Backup%20Daily&amp;severity=medium&amp;id=69bdda57b462d409683a8c3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3368-cwe-79-improper-neutralization-of-in-e08e88c6</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3368%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fahadmahmood%20Injection%20Guard&amp;severity=high&amp;id=69bdda56b462d409683a8bf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3339-cwe-22-improper-limitation-of-a-path-290fd5b6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3339%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20fahadmahmood%20Keep%20Backup%20Daily&amp;severity=low&amp;id=69bdda56b462d409683a8be7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24060-cwe-319-in-automated-logic-webctrl--ad487a9d</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24060%3A%20CWE-319%20in%20Automated%20Logic%20WebCTRL%20Premium%20Server&amp;severity=critical&amp;id=69bdda56b462d409683a8bc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32666-cwe-290-in-automated-logic-webctrl--daa6d934</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32666%3A%20CWE-290%20in%20Automated%20Logic%20WebCTRL%20Premium%20Server&amp;severity=high&amp;id=69bdd7ec1188d0bb0cbf88c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25086-cwe-605-in-automated-logic-webctrl--78c13bd9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25086%3A%20CWE-605%20in%20Automated%20Logic%20WebCTRL%20Premium%20Server&amp;severity=high&amp;id=69bdd7ec1188d0bb0cbf88c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33228-cwe-1321-improperly-controlled-modi-dfc6af7c</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33228%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20WebReflection%20flatted&amp;severity=high&amp;id=69bdd4681188d0bb0cbbf673</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31926-cwe-522-in-igl-technologies-eparkin-4991a4ae</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31926%3A%20CWE-522%20in%20IGL-Technologies%20eParking.fi&amp;severity=medium&amp;id=69bdd4681188d0bb0cbbf668</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32663-cwe-613-in-igl-technologies-eparkin-e29ec125</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32663%3A%20CWE-613%20in%20IGL-Technologies%20eParking.fi&amp;severity=high&amp;id=69bdd4681188d0bb0cbbf66c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33210-cwe-134-use-of-externally-controlle-d675dffc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33210%3A%20CWE-134%3A%20Use%20of%20Externally-Controlled%20Format%20String%20in%20ruby%20json&amp;severity=high&amp;id=69bdd4681188d0bb0cbbf670</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31903-cwe-307-in-igl-technologies-eparkin-667c311e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31903%3A%20CWE-307%20in%20IGL-Technologies%20eParking.fi&amp;severity=high&amp;id=69bdd4681188d0bb0cbbf67c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29796-cwe-306-in-igl-technologies-eparkin-fcf429f8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29796%3A%20CWE-306%20in%20IGL-Technologies%20eParking.fi&amp;severity=critical&amp;id=69bdd4681188d0bb0cbbf678</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22163-cwe-820-missing-synchronization-419-71f757dc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22163%3A%20CWE-820%3A%20Missing%20Synchronization%20(4.19)%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=high&amp;id=69bdda57b462d409683a8c52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21732-cwe-823-use-of-out-of-range-pointer-4944e32e</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21732%3A%20CWE-823%3A%20Use%20of%20Out-of-range%20Pointer%20Offset%20(4.16)%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=critical&amp;id=69bdda57b462d409683a8c4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28204-cwe-522-in-ctek-chargeportal-ff0258cc</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28204%3A%20CWE-522%20in%20CTEK%20Chargeportal&amp;severity=medium&amp;id=69bdda57b462d409683a8c5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27649-cwe-613-in-ctek-chargeportal-b04619a7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27649%3A%20CWE-613%20in%20CTEK%20Chargeportal&amp;severity=high&amp;id=69bdda57b462d409683a8c55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31904-cwe-307-in-ctek-chargeportal-4055e4ac</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31904%3A%20CWE-307%20in%20CTEK%20Chargeportal&amp;severity=high&amp;id=69bdda57b462d409683a8c5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25192-cwe-306-in-ctek-chargeportal-a1a8a9ed</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25192%3A%20CWE-306%20in%20CTEK%20Chargeportal&amp;severity=critical&amp;id=69bdda57b462d409683a8c64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32810-cwe-732-incorrect-permission-assign-df095845</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32810%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20squidowl%20halloy&amp;severity=medium&amp;id=69bdda59b462d409683a8cc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33209-cwe-79-improper-neutralization-of-i-3b6d619b</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33209%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20avo-hq%20avo&amp;severity=medium&amp;id=69bdda59b462d409683a8cd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32733-cwe-22-improper-limitation-of-a-pat-279ffebb</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32733%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20squidowl%20halloy&amp;severity=high&amp;id=69bdda57b462d409683a8c69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33204-cwe-400-uncontrolled-resource-consu-bbf89418</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33204%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20kelvinmo%20simplejwt&amp;severity=high&amp;id=69bdda59b462d409683a8ccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33476-cwe-22-improper-limitation-of-a-pat-3381414c</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33476%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=69bdda59b462d409683a8cd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33203-cwe-248-uncaught-exception-in-siyua-8441b75e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33203%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=69bdda59b462d409683a8cca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4508-sql-injection-in-pbootcms-c1d7dbaa</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4508%3A%20SQL%20Injection%20in%20PbootCMS&amp;severity=medium&amp;id=69bdda59b462d409683a8cdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33194-cwe-22-improper-limitation-of-a-pat-8d28cd73</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33194%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=69bdda59b462d409683a8cc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33186-cwe-285-improper-authorization-in-g-3cfe069c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33186%3A%20CWE-285%3A%20Improper%20Authorization%20in%20grpc%20grpc-go&amp;severity=critical&amp;id=69bdcad201d25e334c8cba93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3864-cwe-22-path-traversal-in-kubernetes--25c8737b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3864%3A%20CWE-22%20Path%20Traversal%20in%20Kubernetes%20CSI%20Driver%20for%20NFS&amp;severity=medium&amp;id=69bdcad201d25e334c8cba96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33180-cwe-200-exposure-of-sensitive-infor-6b7e33ae</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33180%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20hapifhir%20org.hl7.fhir.core&amp;severity=high&amp;id=69bdcad201d25e334c8cba8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4507-sql-injection-in-mindinventory-minds-12bc1db4</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4507%3A%20SQL%20Injection%20in%20Mindinventory%20MindSQL&amp;severity=medium&amp;id=69bdc5f74a1db2150bb853e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4506-code-injection-in-mindinventory-mind-8a38174d</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4506%3A%20Code%20Injection%20in%20Mindinventory%20MindSQL&amp;severity=medium&amp;id=69bdc5f74a1db2150bb853dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23536-improper-limitation-of-a-pathname-t-62b17572</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23536%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Red%20Hat%20Red%20Hat%20OpenShift%20AI%20(RHOAI)&amp;severity=high&amp;id=69bdc5f74a1db2150bb853d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33177-cwe-862-missing-authorization-in-st-f4221dee</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33177%3A%20CWE-862%3A%20Missing%20Authorization%20in%20statamic%20cms&amp;severity=medium&amp;id=69bdc1299e4ece4ed25050a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33172-cwe-79-improper-neutralization-of-i-2a2580b8</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33172%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20statamic%20cms&amp;severity=high&amp;id=69bdc1299e4ece4ed25050a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33171-cwe-22-improper-limitation-of-a-pat-305244fc</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33171%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20statamic%20cms&amp;severity=medium&amp;id=69bdc1299e4ece4ed25050a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33166-cwe-22-improper-limitation-of-a-pat-5defed82</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33166%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20allure-framework%20allure2&amp;severity=high&amp;id=69bdc1299e4ece4ed250509f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32887-cwe-362-concurrent-execution-using--4cdd057f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32887%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Effect-TS%20effect&amp;severity=high&amp;id=69bdc1299e4ece4ed250509c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3584-cwe-94-improper-control-of-generatio-1e9c9524</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3584%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20wpchill%20Kali%20Forms%20%E2%80%94%20Contact%20Form%20%26%20Drag-and-Drop%20Builder&amp;severity=critical&amp;id=69bdbd91e2bf98efc48d0977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2378-cwe-1021-improper-restriction-of-ren-2eceb389</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2378%3A%20CWE-1021%20Improper%20restriction%20of%20rendered%20UI%20layers%20or%20frames%20in%20The%20BrowserCompany%20of%20New%20York%20ArcSearch&amp;severity=high&amp;id=69bdbd91e2bf98efc48d0974</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/libyan-oil-refinery-among-targets-in-long-running--c19cb829</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Libyan%20Oil%20Refinery%20Among%20Targets%20in%20Long-running%20Likely%20Espionage%20Campaign&amp;severity=medium&amp;id=69c10bcff4197a8e3b33b84f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33164-cwe-122-heap-based-buffer-overflow--c1a273ee</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33164%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20strukturag%20libde265&amp;severity=high&amp;id=69bdb3ffe32a4fbe5fced8ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33165-cwe-787-out-of-bounds-write-in-stru-44da5709</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33165%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20strukturag%20libde265&amp;severity=medium&amp;id=69bdb3ffe32a4fbe5fced8f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33156-cwe-426-untrusted-search-path-in-ni-e5b4bfb7</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33156%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20NickeManarin%20ScreenToGif&amp;severity=high&amp;id=69bdb079e32a4fbe5fcd3b50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33155-cwe-400-uncontrolled-resource-consu-c4229f4e</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33155%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20seperman%20deepdiff&amp;severity=high&amp;id=69bdb079e32a4fbe5fcd3b4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33151-cwe-20-improper-input-validation-in-b9f920ea</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33151%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20socketio%20socket.io&amp;severity=high&amp;id=69bdacf5e32a4fbe5fcbbe16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33147-cwe-121-stack-based-buffer-overflow-67cddc2a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33147%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20GenericMappingTools%20gmt&amp;severity=high&amp;id=69bdacf5e32a4fbe5fcbbe12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4505-unrestricted-upload-in-eosphoros-ai--e3670476</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4505%3A%20Unrestricted%20Upload%20in%20eosphoros-ai%20DB-GPT&amp;severity=medium&amp;id=69bda974e32a4fbe5fca0bc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4504-sql-injection-in-eosphoros-ai-db-gpt-5d8e60df</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4504%3A%20SQL%20Injection%20in%20eosphoros-ai%20db-gpt&amp;severity=medium&amp;id=69bda974e32a4fbe5fca0bc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33140-cwe-79-improper-neutralization-of-i-dec26bff</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33140%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ParzivalHack%20PySpector&amp;severity=medium&amp;id=69bda974e32a4fbe5fca0bb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33139-cwe-184-incomplete-list-of-disallow-d2e1b823</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33139%3A%20CWE-184%3A%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20ParzivalHack%20PySpector&amp;severity=high&amp;id=69bda974e32a4fbe5fca0bb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4438-cwe-20-improper-input-validation-in--8e885aca</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4438%3A%20CWE-20%20Improper%20input%20validation%20in%20The%20GNU%20C%20Library%20glibc&amp;severity=medium&amp;id=69bda974e32a4fbe5fca0bbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4437-cwe-125-out-of-bounds-read-in-the-gn-cd83f98f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4437%3A%20CWE-125%20Out-of-bounds%20read%20in%20The%20GNU%20C%20Library%20glibc&amp;severity=high&amp;id=69bda974e32a4fbe5fca0bba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33126-cwe-918-server-side-request-forgery-49fe946d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33126%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20blakeblackshear%20frigate&amp;severity=medium&amp;id=69bda974e32a4fbe5fca0bb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4500-injection-in-bagofwords1-bagofwords-0dcba076</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4500%3A%20Injection%20in%20bagofwords1%20bagofwords&amp;severity=medium&amp;id=69bda5ede32a4fbe5fc68a62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4499-os-command-injection-in-d-link-dir-8-5874f0f3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4499%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-820LW&amp;severity=medium&amp;id=69bda5ede32a4fbe5fc68a5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4497-os-command-injection-in-totolink-wa3-7ad2d73a</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4497%3A%20OS%20Command%20Injection%20in%20Totolink%20WA300&amp;severity=medium&amp;id=69bd9b64e32a4fbe5fc09f2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33010-cwe-942-permissive-cross-domain-pol-e7fe03ec</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33010%3A%20CWE-942%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20doobidoo%20mcp-memory-service&amp;severity=high&amp;id=69bd97dde32a4fbe5fbf1b04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4496-os-command-injection-in-sigmade-git--6d5ca08b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4496%3A%20OS%20Command%20Injection%20in%20sigmade%20Git-MCP-Server&amp;severity=medium&amp;id=69bd97dde32a4fbe5fbf1b07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32710-cwe-122-heap-based-buffer-overflow--ac2e8bf6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32710%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20MariaDB%20server&amp;severity=high&amp;id=69bd97dde32a4fbe5fbf1b00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32317-cwe-346-origin-validation-error-in--0e3db814</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32317%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20cryptomator%20android&amp;severity=high&amp;id=69bd97dde32a4fbe5fbf1af6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32318-cwe-346-origin-validation-error-in--2dbac183</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32318%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20cryptomator%20ios&amp;severity=high&amp;id=69bd97dde32a4fbe5fbf1afa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4495-cross-site-scripting-in-atjiu-pybbs-524d3045</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4495%3A%20Cross%20Site%20Scripting%20in%20atjiu%20pybbs&amp;severity=medium&amp;id=69bd8d53e32a4fbe5fb6509f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31836-cwe-285-improper-authorization-in-b-a370377c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31836%3A%20CWE-285%3A%20Improper%20Authorization%20in%20bluewave-labs%20Checkmate&amp;severity=high&amp;id=69bdbd91e2bf98efc48d097c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4494-cross-site-scripting-in-atjiu-pybbs-81e77a33</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4494%3A%20Cross%20Site%20Scripting%20in%20atjiu%20pybbs&amp;severity=medium&amp;id=69bdbd91e2bf98efc48d0993</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4493-stack-based-buffer-overflow-in-tenda-568400c6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4493%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A18%20Pro&amp;severity=high&amp;id=69bda974e32a4fbe5fca0bcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32844-cwe-79-improper-neutralization-of-i-55ddce3c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32844%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20XinLiangCoder%20php_api_doc&amp;severity=medium&amp;id=69bdbd91e2bf98efc48d097f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4492-stack-based-buffer-overflow-in-tenda-86e6b8d7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4492%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A18%20Pro&amp;severity=high&amp;id=69bd82c5e32a4fbe5fb2018f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4491-stack-based-buffer-overflow-in-tenda-48c720e0</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4491%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A18%20Pro&amp;severity=high&amp;id=69bd7bc3e32a4fbe5faf4b50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4490-stack-based-buffer-overflow-in-tenda-d44337bb</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4490%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A18%20Pro&amp;severity=high&amp;id=69bd7bc3e32a4fbe5faf4b49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15608-cwe-121-stack-based-buffer-overflow-5c3b0431</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15608%3A%20CWE-121%20Stack-based%20buffer%20overflow%20in%20TP-Link%20Systems%20Inc.%20AX53%20v1&amp;severity=high&amp;id=69bd7bc3e32a4fbe5faf4b41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15607-cwe-77-improper-neutralization-of-s-5bce1db6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15607%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20AX53%20v1&amp;severity=high&amp;id=69bd7bc3e32a4fbe5faf4b3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59383-cwe-121-in-qnap-systems-inc-media-s-96baa7ec</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59383%3A%20CWE-121%20in%20QNAP%20Systems%20Inc.%20Media%20Streaming%20Add-on&amp;severity=low&amp;id=69bdbd91e2bf98efc48d0999</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62843-cwe-923-in-qnap-systems-inc-quroute-20f6e0c1</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62843%3A%20CWE-923%20in%20QNAP%20Systems%20Inc.%20QuRouter&amp;severity=low&amp;id=69bdbd93e2bf98efc48d0f57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62844-cwe-1390-in-qnap-systems-inc-qurout-24231f48</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62844%3A%20CWE-1390%20in%20QNAP%20Systems%20Inc.%20QuRouter&amp;severity=medium&amp;id=69bdbd93e2bf98efc48d0f5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62845-cwe-150-in-qnap-systems-inc-quroute-cc06e106</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62845%3A%20CWE-150%20in%20QNAP%20Systems%20Inc.%20QuRouter&amp;severity=medium&amp;id=69bdbd93e2bf98efc48d0f5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62846-cwe-89-in-qnap-systems-inc-qurouter-0aebad47</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62846%3A%20CWE-89%20in%20QNAP%20Systems%20Inc.%20QuRouter&amp;severity=high&amp;id=69bdbd93e2bf98efc48d0f60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22895-cwe-79-in-qnap-systems-inc-quftp-se-12f14fbd</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22895%3A%20CWE-79%20in%20QNAP%20Systems%20Inc.%20QuFTP%20Service&amp;severity=low&amp;id=69bdbd93e2bf98efc48d0f63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22897-cwe-78-in-qnap-systems-inc-qunetswi-663db162</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22897%3A%20CWE-78%20in%20QNAP%20Systems%20Inc.%20QuNetSwitch&amp;severity=high&amp;id=69bdbd93e2bf98efc48d0f66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22898-cwe-306-in-qnap-systems-inc-qvr-pro-d9605d37</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22898%3A%20CWE-306%20in%20QNAP%20Systems%20Inc.%20QVR%20Pro&amp;severity=critical&amp;id=69bdbd93e2bf98efc48d0f69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22900-cwe-798-in-qnap-systems-inc-qunetsw-1c94d659</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22900%3A%20CWE-798%20in%20QNAP%20Systems%20Inc.%20QuNetSwitch&amp;severity=medium&amp;id=69bdbd93e2bf98efc48d0f6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22901-cwe-78-in-qnap-systems-inc-qunetswi-b98245bf</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22901%3A%20CWE-78%20in%20QNAP%20Systems%20Inc.%20QuNetSwitch&amp;severity=medium&amp;id=69bdbd93e2bf98efc48d0f6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22902-cwe-78-in-qnap-systems-inc-qunetswi-91e83569</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22902%3A%20CWE-78%20in%20QNAP%20Systems%20Inc.%20QuNetSwitch&amp;severity=medium&amp;id=69bd7bc3e32a4fbe5faf4b57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4489-stack-based-buffer-overflow-in-tenda-7a1a4d9e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4489%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A18%20Pro&amp;severity=high&amp;id=69bd713de32a4fbe5faaf81b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-new-android-safeguards-operation-ali-1e852a2f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20New%20Android%20Safeguards%2C%20Operation%20Alice%2C%20UK%20Toughens%20Cyber%20Reporting&amp;severity=medium&amp;id=69bd70fee32a4fbe5faae813</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32989-cross-site-request-forgery-csrf-in--4fdf15cf</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32989%3A%20CWE-352%20Cross-Site%20request%20forgery%20(CSRF)%20in%20Precurio%20Precurio%20Intranet%20Portal&amp;severity=high&amp;id=69bd713de32a4fbe5faaf817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32986-cwe-79-improper-neutralization-of-i-53f46ee9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32986%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Textpattern%20Textpattern%20CMS&amp;severity=medium&amp;id=69bd6dade32a4fbe5fa8ba88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4488-buffer-overflow-in-utt-hiper-1250gw-bdf7a1ef</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4488%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%201250GW&amp;severity=high&amp;id=69bd6dade32a4fbe5fa8ba8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4519-vulnerability-in-python-software-fou-ec881397</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4519%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=high&amp;id=69bd66a5e32a4fbe5fa5cd32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/3-men-charged-with-conspiring-to-smuggle-us-artifi-a64fb585</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=3%20Men%20Charged%20With%20Conspiring%20to%20Smuggle%20US%20Artificial%20Intelligence%20to%20China&amp;severity=high&amp;id=69bd5f6ae32a4fbe5fa2bedb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33312-cwe-863-incorrect-authorization-in--770ceda6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33312%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69bd5fb1e32a4fbe5fa2ca4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29794-cwe-807-reliance-on-untrusted-input-e5332580</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29794%3A%20CWE-807%3A%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69bd5fb1e32a4fbe5fa2ca49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4487-buffer-overflow-in-utt-hiper-1200gw-2ecb1ddb</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4487%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%201200GW&amp;severity=high&amp;id=69bd5fb1e32a4fbe5fa2ca51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4486-stack-based-buffer-overflow-in-d-lin-7fbf1468</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4486%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-513&amp;severity=high&amp;id=69bd5895e32a4fbe5f9d858c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4485-sql-injection-in-itsourcecode-colleg-6fa0fd0d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4485%3A%20SQL%20Injection%20in%20itsourcecode%20College%20Management%20System&amp;severity=medium&amp;id=69bd5190e32a4fbe5f999477</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31382-cwe-79-improper-neutralization-of-i-63cadc09</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31382%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Gainsight%20Gainsight%20Assist&amp;severity=medium&amp;id=69bd4e0ce32a4fbe5f8d64d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31381-cwe-598-use-of-get-request-method-w-f5d519cd</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31381%3A%20CWE-598%20Use%20of%20GET%20request%20method%20with%20sensitive%20query%20strings%20in%20Gainsight%20Gainsight%20Assist&amp;severity=medium&amp;id=69bd4e0ce32a4fbe5f8d64d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4434-cwe-295-improper-certificate-validat-669c3b4e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4434%3A%20CWE-295%20Improper%20certificate%20validation%20in%20Devolutions%20Server&amp;severity=high&amp;id=69bd4702e32a4fbe5f755168</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-confirms-handala-link-to-iran-government-amid-t-ad25ca57</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Confirms%20Handala%20Link%20to%20Iran%20Government%20Amid%20Takedown%20of%20Hackers%E2%80%99%20Sites&amp;severity=medium&amp;id=69bd3fc6e32a4fbe5f622e72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/predator-spyware-disables-ios-camera-and-microphon-79d2b253</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Predator%20spyware%20disables%20iOS%20camera%20and%20microphone%20indicators%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69bdea2bf4197a8e3b3b6143</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/navia-data-breach-impacts-27-million-45a1c180</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Navia%20Data%20Breach%20Impacts%202.7%20Million&amp;severity=medium&amp;id=69bd2aade32a4fbe5f53bb98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33136-cwe-79-improper-neutralization-of-i-5f385205</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33136%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=69bd275fe32a4fbe5f531f18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33135-cwe-79-improper-neutralization-of-i-cdd783b5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33135%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=69bd275fe32a4fbe5f531f13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/thousands-of-magento-sites-hit-in-ongoing-defaceme-12b3db1c</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Thousands%20of%20Magento%20Sites%20Hit%20in%20Ongoing%20Defacement%20Campaign&amp;severity=medium&amp;id=69bd23a5e32a4fbe5f51f85a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33134-cwe-89-improper-neutralization-of-s-a410423a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33134%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=69bd275fe32a4fbe5f531f0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33133-cwe-89-improper-neutralization-of-s-e49a9cd5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33133%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=69bd275fe32a4fbe5f531f09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33131-cwe-290-authentication-bypass-by-sp-9e875424</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33131%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20h3js%20h3&amp;severity=high&amp;id=69bd23e7e32a4fbe5f52014e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/widespread-github-actions-tag-compromise-exposes-c-7ab138eb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Widespread%20GitHub%20Actions%20Tag%20Compromise%20Exposes%20CI%2FCD%20Secrets&amp;severity=medium&amp;id=69bdb74ce32a4fbe5fd0512f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/voidstealer-debugging-chrome-to-steal-its-secrets-eb82d6ab</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VoidStealer%3A%20Debugging%20Chrome%20to%20Steal%20Its%20Secrets&amp;severity=medium&amp;id=69bdb74ce32a4fbe5fd0512a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33130-cwe-98-improper-control-of-filename-66c6c7a9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33130%3A%20CWE-98%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20louislam%20uptime-kuma&amp;severity=medium&amp;id=69bd1cd0e32a4fbe5f4fde03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33129-cwe-208-observable-timing-discrepan-1f7546b2</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33129%3A%20CWE-208%3A%20Observable%20Timing%20Discrepancy%20in%20h3js%20h3&amp;severity=medium&amp;id=69bd1cd0e32a4fbe5f4fddfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33128-cwe-93-improper-neutralization-of-c-fff9b3de</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33128%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20h3js%20h3&amp;severity=high&amp;id=69bd194ce32a4fbe5f4ea6c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22324-cwe-98-improper-control-of-filename-ec806458</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22324%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Melania&amp;severity=high&amp;id=69bd194ce32a4fbe5f4ea6b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0677-cwe-502-deserialization-of-untrusted-eca92283</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0677%3A%20Deserialization%20of%20Untrusted%20Data%20in%20TotalSuite%20TotalContest%20Lite&amp;severity=null&amp;id=69bd194ce32a4fbe5f4ea6b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33125-cwe-285-improper-authorization-in-b-c66f9dc6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33125%3A%20CWE-285%3A%20Improper%20Authorization%20in%20blakeblackshear%20frigate&amp;severity=high&amp;id=69bd194ce32a4fbe5f4ea6bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33124-cwe-287-improper-authentication-in--31f1f111</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33124%3A%20CWE-287%3A%20Improper%20Authentication%20in%20blakeblackshear%20frigate&amp;severity=high&amp;id=69bd5190e32a4fbe5f999481</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32537-cwe-352-cross-site-request-forgery--fee9ab07</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32537%3A%20CWE-352%20Cross-Site%20request%20forgery%20(CSRF)%20in%20joshuae1974%20Flash%20Video%20Player&amp;severity=high&amp;id=69bd5895e32a4fbe5f9d8595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33123-cwe-400-uncontrolled-resource-consu-be1333fd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33123%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=69bd945ce32a4fbe5fbc7f83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31119-cwe-79-improper-neutralization-of-i-e477788d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31119%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Vasilis%20Triantafyllou%20Special%20Box%20for%20Content&amp;severity=medium&amp;id=69bd38f3e32a4fbe5f57f055</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33080-cwe-79-improper-neutralization-of-i-6232979d</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33080%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20filamentphp%20filament&amp;severity=high&amp;id=69bd0ec2e32a4fbe5f4a70d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32701-cwe-843-access-of-resource-using-in-4cc8eb58</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32701%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20QwikDev%20qwik&amp;severity=high&amp;id=69bd0ec2e32a4fbe5f4a70d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27625-cwe-22-improper-limitation-of-a-pat-64c622ad</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27625%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Stirling-Tools%20Stirling-PDF&amp;severity=high&amp;id=69bd0ec2e32a4fbe5f4a70d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gsocket-backdoor-delivered-through-bash-script-fri-cf8c30b2</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GSocket%20Backdoor%20Delivered%20Through%20Bash%20Script%2C%20(Fri%2C%20Mar%2020th)&amp;severity=medium&amp;id=69bd0b08e32a4fbe5f491c53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-langflow-vulnerability-exploited-hours-af-bdeb0c89</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Langflow%20Vulnerability%20Exploited%20Hours%20After%20Public%20Disclosure&amp;severity=critical&amp;id=69bd0b09e32a4fbe5f491c73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33075-cwe-494-download-of-code-without-in-52a1ff21</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33075%3A%20CWE-494%3A%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20labring%20FastGPT&amp;severity=critical&amp;id=69bd0b4ce32a4fbe5f4933bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33072-cwe-798-use-of-hard-coded-credentia-9bae99e4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33072%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20error311%20FileRise&amp;severity=high&amp;id=69bd0b4ce32a4fbe5f4933b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33071-cwe-434-unrestricted-upload-of-file-61b95bec</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33071%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20error311%20FileRise&amp;severity=medium&amp;id=69bd0b4ce32a4fbe5f4933b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2432-cwe-79-improper-neutralization-of-in-f8cd0cf5</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2432%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20creativemindssolutions%20CM%20Custom%20Reports%20%E2%80%93%20Flexible%20reporting%20to%20track%20what%20matters%20most&amp;severity=medium&amp;id=69bd0b4ce32a4fbe5f4933aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3550-cwe-862-missing-authorization-in-fir-75c59a70</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3550%3A%20CWE-862%20Missing%20Authorization%20in%20firetree%20RockPress&amp;severity=medium&amp;id=69bd0b4ce32a4fbe5f4933bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2421-cwe-22-improper-limitation-of-a-path-f2c4c46a</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2421%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ghera74%20ilGhera%20Carta%20Docente%20for%20WooCommerce&amp;severity=medium&amp;id=69bd0b4ce32a4fbe5f4933a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33070-cwe-306-missing-authentication-for--851eeec5</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33070%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20error311%20FileRise&amp;severity=low&amp;id=69bd0b4ce32a4fbe5f4933b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33069-cwe-125-out-of-bounds-read-in-pjsip-9b1ff4fb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33069%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20pjsip%20pjproject&amp;severity=medium&amp;id=69bd6dade32a4fbe5fa8ba92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33068-cwe-807-reliance-on-untrusted-input-81883495</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33068%3A%20CWE-807%3A%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20anthropics%20claude-code&amp;severity=high&amp;id=69bd5190e32a4fbe5f99947e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33067-cwe-79-improper-neutralization-of-i-1a61bc50</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33067%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=69bd945ce32a4fbe5fbc7f80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/copyright-lures-mask-a-multi-stage-purelog-stealer-54532eb6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Copyright%20Lures%20Mask%20a%20Multi-Stage%20PureLog%20Stealer%20Attack%20on%20Key%20Industries&amp;severity=medium&amp;id=69bd0401e32a4fbe5f43542f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beast-ransomware-toolkit-a-proactive-threat-intell-3c323286</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Beast%20Ransomware%20Toolkit%3A%20A%20Proactive%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=69bd0401e32a4fbe5f435424</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33066-cwe-79-improper-neutralization-of-i-f75d32b5</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33066%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=69bdbd91e2bf98efc48d0983</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33022-cwe-129-improper-validation-of-arra-b543ace7</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33022%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20tektoncd%20pipeline&amp;severity=medium&amp;id=69bcfd2fe32a4fbe5f3cd696</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aisuru-and-kimwolf-ddos-botnets-disrupted-in-inter-329eec84</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Aisuru%20and%20Kimwolf%20DDoS%20Botnets%20Disrupted%20in%20International%20Operation&amp;severity=medium&amp;id=69bcf975e32a4fbe5f3bc392</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33060-cwe-918-server-side-request-forgery-1b50a38a</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33060%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ondata%20ckan-mcp-server&amp;severity=medium&amp;id=69bcf9b8e32a4fbe5f3bdae9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33057-cwe-94-improper-control-of-generati-7b233148</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33057%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20mesop-dev%20mesop&amp;severity=critical&amp;id=69bcf9b8e32a4fbe5f3bdae5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33056-cwe-61-unix-symbolic-link-symlink-f-a61b77da</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33056%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20alexcrichton%20tar-rs&amp;severity=medium&amp;id=69bcf9b8e32a4fbe5f3bdae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33055-cwe-843-access-of-resource-using-in-0fc0ef28</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33055%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20alexcrichton%20tar-rs&amp;severity=medium&amp;id=69bcf624e32a4fbe5f3a710c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4478-improper-verification-of-cryptograph-dd0fa87f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4478%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Yi%20Technology%20YI%20Home%20Camera&amp;severity=critical&amp;id=69bcf624e32a4fbe5f3a7116</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4477-use-of-hard-coded-cryptographic-key--fb0d66fc</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4477%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Yi%20Technology%20YI%20Home%20Camera&amp;severity=low&amp;id=69bcf624e32a4fbe5f3a7111</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33054-cwe-22-improper-limitation-of-a-pat-0da03659</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33054%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20mesop-dev%20mesop&amp;severity=critical&amp;id=69bcf624e32a4fbe5f3a7107</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33053-cwe-639-authorization-bypass-throug-1e144efc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33053%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20langflow-ai%20langflow&amp;severity=medium&amp;id=69bcf624e32a4fbe5f3a7104</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4476-missing-authentication-in-yi-technol-4206d120</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4476%3A%20Missing%20Authentication%20in%20Yi%20Technology%20YI%20Home%20Camera&amp;severity=medium&amp;id=69bcef1ee32a4fbe5f36fb32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4475-hard-coded-credentials-in-yi-technol-fc23c5af</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4475%3A%20Hard-coded%20Credentials%20in%20Yi%20Technology%20YI%20Home%20Camera&amp;severity=high&amp;id=69bceb98e32a4fbe5f35b7b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4474-cross-site-scripting-in-itsourcecode-f76aefd3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4474%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20University%20Management%20System&amp;severity=medium&amp;id=69bceb98e32a4fbe5f35b7af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33051-cwe-79-improper-neutralization-of-i-bc102802</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33051%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20cms&amp;severity=medium&amp;id=69bce490e32a4fbe5f3388a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33043-cwe-942-permissive-cross-domain-pol-745876a2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33043%3A%20CWE-942%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69bce490e32a4fbe5f3388a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33041-cwe-200-exposure-of-sensitive-infor-3ba0bea1</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33041%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69bce490e32a4fbe5f3388a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33040-cwe-190-integer-overflow-or-wraparo-df6446c6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33040%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20libp2p%20rust-libp2p&amp;severity=high&amp;id=69bce490e32a4fbe5f33889e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33039-cwe-918-server-side-request-forgery-15e3e0b3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33039%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69bce490e32a4fbe5f33889a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33038-cwe-306-missing-authentication-for--912771fc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33038%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69bd945ce32a4fbe5fbc7f7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4473-sql-injection-in-itsourcecode-online-f08070d6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4473%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Doctor%20Appointment%20System&amp;severity=medium&amp;id=69bd713ee32a4fbe5faaf827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32768-cwe-284-improper-access-control-in--07d9feb3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32768%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20ctfer-io%20chall-manager&amp;severity=high&amp;id=69bd713de32a4fbe5faaf822</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33037-cwe-1188-insecure-default-initializ-824a27f5</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33037%3A%20CWE-1188%3A%20Insecure%20Default%20Initialization%20of%20Resource%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69bdbd96e2bf98efc48d1059</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33036-cwe-776-improper-restriction-of-rec-ba51d0ac</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33036%3A%20CWE-776%3A%20Improper%20Restriction%20of%20Recursive%20Entity%20References%20in%20DTDs%20(&apos;XML%20Entity%20Expansion&apos;)%20in%20NaturalIntelligence%20fast-xml-parser&amp;severity=high&amp;id=69bdbd93e2bf98efc48d0f72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33035-cwe-79-improper-neutralization-of-i-f45160e4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33035%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69bcda04e32a4fbe5f30468e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4472-sql-injection-in-itsourcecode-online-b296bbe9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4472%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Frozen%20Foods%20Ordering%20System&amp;severity=medium&amp;id=69bcda04e32a4fbe5f304699</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4471-sql-injection-in-itsourcecode-online-86d996d5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4471%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Frozen%20Foods%20Ordering%20System&amp;severity=medium&amp;id=69bcda04e32a4fbe5f304692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33025-cwe-89-improper-neutralization-of-s-1f4cc4d0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33025%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WWBN%20AVideo-Encoder&amp;severity=high&amp;id=69bcda04e32a4fbe5f30468a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33024-cwe-918-server-side-request-forgery-82e88a08</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33024%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WWBN%20AVideo-Encoder&amp;severity=critical&amp;id=69bcda04e32a4fbe5f304686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33017-cwe-94-improper-control-of-generati-d875cfa4</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33017%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20langflow-ai%20langflow&amp;severity=critical&amp;id=69bcda04e32a4fbe5f304681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33013-cwe-835-loop-with-unreachable-exit--ffe4a179</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33013%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20micronaut-projects%20micronaut-core&amp;severity=high&amp;id=69bcda04e32a4fbe5f30467a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33012-cwe-770-allocation-of-resources-wit-0ddd6ec8</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33012%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20micronaut-projects%20micronaut-core&amp;severity=high&amp;id=69bcda04e32a4fbe5f304675</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33011-cwe-670-always-incorrect-control-fl-dbb9303d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33011%3A%20CWE-670%3A%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20nestjs%20nest&amp;severity=high&amp;id=69bcd2fce32a4fbe5f2df42f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4470-sql-injection-in-itsourcecode-online-eb805163</loc>
    <lastmod>2026-04-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4470%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Frozen%20Foods%20Ordering%20System&amp;severity=medium&amp;id=69bcd2fce32a4fbe5f2df43b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32954-cwe-89-improper-neutralization-of-s-2ba0bacc</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32954%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20frappe%20erpnext&amp;severity=high&amp;id=69bcd2fce32a4fbe5f2df42a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32953-cwe-303-incorrect-implementation-of-27501f28</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32953%3A%20CWE-303%3A%20Incorrect%20Implementation%20of%20Authentication%20Algorithm%20in%20tillitis%20tkeyclient&amp;severity=medium&amp;id=69bcd2fce32a4fbe5f2df425</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32950-cwe-89-improper-neutralization-of-s-bc0e21ea</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32950%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20dataease%20SQLBot&amp;severity=high&amp;id=69bcd2fce32a4fbe5f2df420</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32949-cwe-918-server-side-request-forgery-12b78e1c</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32949%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20dataease%20SQLBot&amp;severity=high&amp;id=69bcd2fce32a4fbe5f2df41b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32947-cwe-693-protection-mechanism-failur-f8ad5311</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32947%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20step-security%20harden-runner&amp;severity=medium&amp;id=69bcd2fce32a4fbe5f2df417</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4469-sql-injection-in-itsourcecode-online-bfdb9d05</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4469%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Frozen%20Foods%20Ordering%20System&amp;severity=medium&amp;id=69bcd2fce32a4fbe5f2df434</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32946-cwe-693-protection-mechanism-failur-35e9b997</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32946%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20step-security%20harden-runner&amp;severity=medium&amp;id=69bcc873e32a4fbe5f2a7913</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32945-cwe-122-heap-based-buffer-overflow--9ea99f4b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32945%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20pjsip%20pjproject&amp;severity=high&amp;id=69bcc873e32a4fbe5f2a790f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32942-cwe-416-use-after-free-in-pjsip-pjp-5ca2cca4</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32942%3A%20CWE-416%3A%20Use%20After%20Free%20in%20pjsip%20pjproject&amp;severity=high&amp;id=69bcc873e32a4fbe5f2a790a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32941-cwe-770-allocation-of-resources-wit-1e571571</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32941%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20BishopFox%20sliver&amp;severity=medium&amp;id=69bcc873e32a4fbe5f2a7907</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4136-cwe-640-weak-password-recovery-mecha-33439421</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4136%3A%20CWE-640%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20stellarwp%20Membership%20Plugin%20%E2%80%93%20Restrict%20Content&amp;severity=medium&amp;id=69bcc873e32a4fbe5f2a791b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4038-cwe-862-missing-authorization-in-cod-c5151216</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4038%3A%20CWE-862%20Missing%20Authorization%20in%20CodeRevolution%20Aimogen%20Pro%20-%20All-in-One%20AI%20Content%20Writer%2C%20Editor%2C%20ChatBot%20%26%20Automation%20Toolkit&amp;severity=critical&amp;id=69bcc873e32a4fbe5f2a7917</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32940-cwe-79-improper-neutralization-of-i-a0d7ab4c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32940%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=critical&amp;id=69bcc873e32a4fbe5f2a7901</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4468-command-injection-in-comfast-cf-ac10-b912fa2b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4468%3A%20Command%20Injection%20in%20Comfast%20CF-AC100&amp;severity=medium&amp;id=69bcc873e32a4fbe5f2a7920</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32938-cwe-22-improper-limitation-of-a-pat-6777c83d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32938%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20siyuan-note%20siyuan&amp;severity=critical&amp;id=69bcc873e32a4fbe5f2a78fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33063-cwe-476-null-pointer-dereference-in-e3e3c4cc</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33063%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20free5gc%20ausf&amp;severity=high&amp;id=69bcbde5e32a4fbe5f2545c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33062-cwe-284-improper-access-control-in--3530c734</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33062%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20free5gc%20nrf&amp;severity=high&amp;id=69bcbde5e32a4fbe5f2545c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32937-cwe-129-improper-validation-of-arra-5fe376e5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32937%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20free5gc%20chf&amp;severity=high&amp;id=69bcbde5e32a4fbe5f2545bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32891-cwe-80-improper-neutralization-of-s-b6e950f1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32891%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20openVESSL%20Anchorr&amp;severity=critical&amp;id=69bcbde5e32a4fbe5f2545b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32933-cwe-674-uncontrolled-recursion-in-l-7067c409</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32933%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20LuckyPennySoftware%20AutoMapper&amp;severity=high&amp;id=69bcbde5e32a4fbe5f2545b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32890-cwe-79-improper-neutralization-of-i-5121d7eb</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32890%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20openVESSL%20Anchorr&amp;severity=critical&amp;id=69bcbde5e32a4fbe5f2545aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4467-command-injection-in-comfast-cf-ac10-d886df59</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4467%3A%20Command%20Injection%20in%20Comfast%20CF-AC100&amp;severity=medium&amp;id=69bcbde5e32a4fbe5f2545ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21992-easily-exploitable-vulnerability-al-8b5ed83f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21992%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Identity%20Manager%20and%20Oracle%20Web%20Services%20Manager.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Identity%20Manager%20and%20Oracle%20Web%20Services%20Manager.%20in%20Oracle%20Corporation%20Oracle%20Identity%20Manager&amp;severity=critical&amp;id=69bcbde5e32a4fbe5f2545a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4466-command-injection-in-comfast-cf-ac10-988ceedb</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4466%3A%20Command%20Injection%20in%20Comfast%20CF-AC100&amp;severity=medium&amp;id=69bcafd9e32a4fbe5f174d06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4465-os-command-injection-in-d-link-dir-5-60ae23ef</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4465%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-513&amp;severity=medium&amp;id=69bcafd9e32a4fbe5f174cff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32811-cwe-116-improper-encoding-or-escapi-b3515139</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32811%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20dadrus%20heimdall&amp;severity=high&amp;id=69bcafd6e32a4fbe5f174c28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4464-integer-overflow-in-google-chrome-fa62e2e6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4464%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd9e32a4fbe5f174cfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4463-heap-buffer-overflow-in-google-chrom-dcdbc2fd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4463%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd9e32a4fbe5f174cf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4462-out-of-bounds-read-in-google-chrome-90b629db</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4462%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd9e32a4fbe5f174cf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4461-inappropriate-implementation-in-goog-911b60aa</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4461%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd9e32a4fbe5f174cef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4460-out-of-bounds-read-in-google-chrome-1b58436f</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4460%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd9e32a4fbe5f174ceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4459-out-of-bounds-read-and-write-in-goog-a1209755</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4459%3A%20Out%20of%20bounds%20read%20and%20write%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd9e32a4fbe5f174ce7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4458-use-after-free-in-google-chrome-badd5fd5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4458%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd9e32a4fbe5f174ce3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4457-type-confusion-in-google-chrome-f25568f3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4457%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd7e32a4fbe5f174caf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4456-use-after-free-in-google-chrome-262b8b39</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4456%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd7e32a4fbe5f174cab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4455-heap-buffer-overflow-in-google-chrom-1912bf38</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4455%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd7e32a4fbe5f174ca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4454-use-after-free-in-google-chrome-fca0b857</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4454%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd7e32a4fbe5f174ca3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4453-integer-overflow-in-google-chrome-558bb25a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4453%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=medium&amp;id=69bcafd7e32a4fbe5f174c9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4452-integer-overflow-in-google-chrome-6c804567</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4452%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd7e32a4fbe5f174c9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4451-insufficient-validation-of-untrusted-327de6f6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4451%3A%20Insufficient%20validation%20of%20untrusted%20input%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd7e32a4fbe5f174c97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4450-out-of-bounds-write-in-google-chrome-3ac733c8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4450%3A%20Out%20of%20bounds%20write%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd7e32a4fbe5f174c93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4449-use-after-free-in-google-chrome-ed5f7a7e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4449%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd7e32a4fbe5f174c8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4448-heap-buffer-overflow-in-google-chrom-b57aa6f3</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4448%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd7e32a4fbe5f174c8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4447-inappropriate-implementation-in-goog-a053af5d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4447%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd6e32a4fbe5f174c4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4446-use-after-free-in-google-chrome-e7753fdb</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4446%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd6e32a4fbe5f174c4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4445-use-after-free-in-google-chrome-7854d5d7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4445%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd6e32a4fbe5f174c46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4444-stack-buffer-overflow-in-google-chro-e900039f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4444%3A%20Stack%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd6e32a4fbe5f174c42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4443-heap-buffer-overflow-in-google-chrom-546130a4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4443%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd6e32a4fbe5f174c3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4442-heap-buffer-overflow-in-google-chrom-6134e6a9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4442%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd6e32a4fbe5f174c3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4441-use-after-free-in-google-chrome-1460e210</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4441%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd6e32a4fbe5f174c36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4440-out-of-bounds-read-and-write-in-goog-915aee25</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4440%3A%20Out%20of%20bounds%20read%20and%20write%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd6e32a4fbe5f174c32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4439-out-of-bounds-memory-access-in-googl-367adac0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4439%3A%20Out%20of%20bounds%20memory%20access%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd6e32a4fbe5f174c2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32881-cwe-183-permissive-list-of-allowed--e7cfd7f1</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32881%3A%20CWE-183%3A%20Permissive%20List%20of%20Allowed%20Inputs%20in%20vshakitskiy%20ewe&amp;severity=medium&amp;id=69bca5a4e32a4fbe5f143336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32873-cwe-825-expired-pointer-dereference-5f2b4614</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32873%3A%20CWE-825%3A%20Expired%20Pointer%20Dereference%20in%20vshakitskiy%20ewe&amp;severity=high&amp;id=69bca5a4e32a4fbe5f143324</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32880-cwe-79-improper-neutralization-of-i-0f4748dc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32880%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=medium&amp;id=69bca5a4e32a4fbe5f143330</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32829-cwe-201-insertion-of-sensitive-info-e3d06045</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32829%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20PSeitz%20lz4_flex&amp;severity=high&amp;id=69bc9abfe32a4fbe5f103102</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32828-cwe-918-server-side-request-forgery-fd4580ce</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32828%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20akuity%20kargo&amp;severity=medium&amp;id=69bc9abfe32a4fbe5f1030fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32771-cwe-22-improper-limitation-of-a-pat-ee98cf31</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32771%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ctfer-io%20monitoring&amp;severity=high&amp;id=69bc9abfe32a4fbe5f1030f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32769-cwe-284-improper-access-control-in--1b163257</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32769%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20ctfer-io%20fullchain&amp;severity=high&amp;id=69bc9abfe32a4fbe5f1030f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32767-cwe-89-improper-neutralization-of-s-8a5766fd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32767%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20siyuan-note%20siyuan&amp;severity=critical&amp;id=69bc9abfe32a4fbe5f1030ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32766-cwe-436-interpretation-conflict-in--17af23a0</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32766%3A%20CWE-436%3A%20Interpretation%20Conflict%20in%20astral-sh%20tokio-tar&amp;severity=low&amp;id=69bc9033e32a4fbe5f0c4187</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32985-cwe-306-missing-authentication-for--04629a96</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32985%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Xerte%20Xerte%20Online%20Toolkits&amp;severity=critical&amp;id=69bc9033e32a4fbe5f0c418b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30580-na-acb3a12b</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30580%3A%20n%2Fa&amp;severity=medium&amp;id=69bdbd91e2bf98efc48d098f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63260-na-ee22ee42</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63260%3A%20n%2Fa&amp;severity=medium&amp;id=69bdbd91e2bf98efc48d0987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55988-na-a8eae2c7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55988%3A%20n%2Fa&amp;severity=high&amp;id=69bdb3ffe32a4fbe5fced8e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63261-na-1b8a124a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63261%3A%20n%2Fa&amp;severity=high&amp;id=69bdacf5e32a4fbe5fcbbe0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30579-na-7fa2a6e3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30579%3A%20n%2Fa&amp;severity=medium&amp;id=69bd82c5e32a4fbe5fb2018b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30578-na-78c92819</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30578%3A%20n%2Fa&amp;severity=medium&amp;id=69bd82c5e32a4fbe5fb20187</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29828-na-1e771d97</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29828%3A%20n%2Fa&amp;severity=medium&amp;id=69bd7bc3e32a4fbe5faf4b45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67260-na-ea50c466</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67260%3A%20n%2Fa&amp;severity=high&amp;id=69bd6dade32a4fbe5fa8ba81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46597-na-da22297e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46597%3A%20n%2Fa&amp;severity=high&amp;id=69bd6dade32a4fbe5fa8ba7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46598-na-c6f81fe9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46598%3A%20n%2Fa&amp;severity=medium&amp;id=69bd66a5e32a4fbe5fa5cd2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33372-na-01a2c6aa</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33372%3A%20n%2Fa&amp;severity=medium&amp;id=69bd5895e32a4fbe5f9d8586</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33371-na-d0924778</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33371%3A%20n%2Fa&amp;severity=medium&amp;id=69bd5895e32a4fbe5f9d8580</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33370-na-e6316dfc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33370%3A%20n%2Fa&amp;severity=medium&amp;id=69bd5895e32a4fbe5f9d857a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33369-na-78a1b374</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33369%3A%20n%2Fa&amp;severity=medium&amp;id=69bd5895e32a4fbe5f9d8574</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33368-na-9732165f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33368%3A%20n%2Fa&amp;severity=medium&amp;id=69bd5895e32a4fbe5f9d856e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44722-na-6ff47388</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44722%3A%20n%2Fa&amp;severity=critical&amp;id=69bd5190e32a4fbe5f999473</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-20-e4da03c7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-20&amp;severity=medium&amp;id=69bd3c3fe32a4fbe5f59b660</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-20-85216207</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-20&amp;severity=low&amp;id=69bd3c3ee32a4fbe5f59b636</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-a-tax-search-leads-to-kernel-mode-avedr-kill-d1d929de</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20a%20Tax%20Search%20Leads%20to%20Kernel-Mode%20AV%2FEDR%20Kill&amp;severity=medium&amp;id=69bd007ce32a4fbe5f3ee31a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22737-vulnerability-in-spring-spring-fram-c8bf04a4</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22737%3A%20Vulnerability%20in%20Spring%20Spring%20Framework&amp;severity=medium&amp;id=69bc9033e32a4fbe5f0c418f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22735-vulnerability-in-spring-spring-foun-8a91afe3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22735%3A%20Vulnerability%20in%20Spring%20Spring%20Foundation&amp;severity=low&amp;id=69bc8cafe32a4fbe5f0a920a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22733-cwe-288-authentication-bypass-using-e6f80fbd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22733%3A%20CWE-288%20Authentication%20bypass%20using%20an%20alternate%20path%20or%20channel%20in%20Spring%20Spring%20Security&amp;severity=high&amp;id=69bc8929e32a4fbe5f08fecc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32763-cwe-89-improper-neutralization-of-s-62f7ca75</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32763%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20kysely-org%20kysely&amp;severity=high&amp;id=69bc85a4e32a4fbe5f07b2e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32697-cwe-639-authorization-bypass-throug-143009ec</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32697%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20SuiteCRM%20SuiteCRM-Core&amp;severity=medium&amp;id=69bc85a4e32a4fbe5f07b2e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29109-cwe-502-deserialization-of-untruste-fbc0e466</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29109%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20SuiteCRM%20SuiteCRM-Core&amp;severity=high&amp;id=69bc85a4e32a4fbe5f07b2dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29108-cwe-200-exposure-of-sensitive-infor-95944982</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29108%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20SuiteCRM%20SuiteCRM-Core&amp;severity=medium&amp;id=69bc85a4e32a4fbe5f07b2da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22732-vulnerability-in-spring-spring-secu-2c8fbdd8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22732%3A%20Vulnerability%20in%20VMware%20Spring%20Security&amp;severity=critical&amp;id=69bc8223e32a4fbe5f062176</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32721-cwe-79-improper-neutralization-of-i-8871f1a8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32721%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20openwrt%20luci&amp;severity=high&amp;id=69bc8223e32a4fbe5f062179</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22731-cwe-288-authentication-bypass-using-09055fef</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22731%3A%20CWE-288%20Authentication%20bypass%20using%20an%20alternate%20path%20or%20channel%20in%20Spring%20Spring%20Boot&amp;severity=high&amp;id=69bc7e9ce32a4fbe5f04d5c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4342-cwe-20-improper-input-validation-in--e41533f8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4342%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Kubernetes%20ingress-nginx&amp;severity=high&amp;id=69bc708fe32a4fbe5ffd51a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32815-cwe-287-improper-authentication-in--a6c343f4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32815%3A%20CWE-287%3A%20Improper%20Authentication%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=69bc708fe32a4fbe5ffd51b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32754-cwe-79-improper-neutralization-of-i-21923976</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32754%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20freescout-help-desk%20freescout&amp;severity=critical&amp;id=69bc708fe32a4fbe5ffd51ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32753-cwe-80-improper-neutralization-of-s-a6d22d39</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32753%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=69bc708fe32a4fbe5ffd51a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32194-cwe-77-improper-neutralization-of-s-b13d0979</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32194%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20Bing%20Images&amp;severity=critical&amp;id=69bca5a4e32a4fbe5f143342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32750-cwe-22-improper-limitation-of-a-pat-1494f6ea</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32750%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=69bca5a4e32a4fbe5f143348</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32751-cwe-79-improper-neutralization-of-i-e319aed5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32751%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=69bca5a4e32a4fbe5f143352</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32749-cwe-73-external-control-of-file-nam-faba7104</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32749%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=69bc698ee32a4fbe5ffae0a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3229-cwe-122-heap-based-buffer-overflow-i-110c9450</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3229%3A%20CWE-122%20Heap-based%20buffer%20overflow%20in%20wofSSL%20wolfSSL&amp;severity=low&amp;id=69bc698ee32a4fbe5ffae0a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26137-cwe-918-server-side-request-forgery-45e722c7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26137%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Microsoft%20Exchange%20Online&amp;severity=critical&amp;id=69bc698ce32a4fbe5ffae00d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26136-cwe-77-improper-neutralization-of-s-5da576f7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26136%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20Copilot&amp;severity=medium&amp;id=69bc698ce32a4fbe5ffae00a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24299-cwe-77-improper-neutralization-of-s-66ef9f33</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24299%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20365%20Copilot&amp;severity=medium&amp;id=69bc698ce32a4fbe5ffae004</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23659-cwe-200-exposure-of-sensitive-infor-8cb9cf5a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23659%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Azure%20Data%20Factory&amp;severity=high&amp;id=69bc698ce32a4fbe5ffae001</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26120-cwe-918-server-side-request-forgery-1d36a6ee</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26120%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Microsoft%20Bing&amp;severity=medium&amp;id=69bc698ce32a4fbe5ffae007</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23658-cwe-522-insufficiently-protected-cr-3581b2ff</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23658%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20Microsoft%20Azure%20DevOps%3A%20msazure&amp;severity=high&amp;id=69bc698ce32a4fbe5ffadffe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32191-cwe-78-improper-neutralization-of-s-97a170f1</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32191%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20Bing%20Images&amp;severity=critical&amp;id=69bc698ce32a4fbe5ffae019</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26138-cwe-918-server-side-request-forgery-ebca77b0</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26138%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Microsoft%20Purview&amp;severity=high&amp;id=69bc698ce32a4fbe5ffae010</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26139-cwe-918-server-side-request-forgery-d1f7bdbc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26139%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Microsoft%20Purview&amp;severity=high&amp;id=69bc698ce32a4fbe5ffae013</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32169-cwe-918-server-side-request-forgery-b6b36f7d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32169%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Azure%20Cloud%20Shell&amp;severity=critical&amp;id=69bc698ce32a4fbe5ffae016</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32747-cwe-22-improper-limitation-of-a-pat-54548a0c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32747%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=69bc698ee32a4fbe5ffae09f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32622-cwe-862-missing-authorization-in-da-a6bc8eb1</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32622%3A%20CWE-862%3A%20Missing%20Authorization%20in%20dataease%20SQLBot&amp;severity=high&amp;id=69bc6600e32a4fbe5ff98433</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30924-cwe-942-permissive-cross-domain-pol-3c08973c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30924%3A%20CWE-942%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20autobrr%20qui&amp;severity=critical&amp;id=69bc6600e32a4fbe5ff9842f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4428-cwe-299-improper-check-for-certifica-6e7e17f6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4428%3A%20CWE-299%20Improper%20check%20for%20certificate%20revocation%20in%20AWS%20AWS-LC&amp;severity=high&amp;id=69bc6600e32a4fbe5ff98437</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30836-cwe-287-improper-authentication-in--146fb37a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30836%3A%20CWE-287%3A%20Improper%20Authentication%20in%20smallstep%20certificates&amp;severity=critical&amp;id=69bca5a4e32a4fbe5f14337a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3849-cwe-787-out-of-bounds-write-in-wolfs-5398bc77</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3849%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20wolfSSL%20Inc.%20wolfSSL&amp;severity=medium&amp;id=69bca5a4e32a4fbe5f143384</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27953-cwe-915-improperly-controlled-modif-7873cd73</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27953%3A%20CWE-915%3A%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes%20in%20ormar-orm%20ormar&amp;severity=high&amp;id=69bca5a4e32a4fbe5f143360</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3549-cwe-122-heap-based-buffer-overflow-i-c0d00cf3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3549%3A%20CWE-122%20Heap-based%20buffer%20overflow%20in%20wofSSL%20wolfSSL&amp;severity=high&amp;id=69bc5b75e32a4fbe5ff4fefd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3503-cwe-335-incorrect-usage-of-seeds-in--21219b3e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3503%3A%20CWE-335%20Incorrect%20Usage%20of%20Seeds%20in%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20wolfSSL%20Inc.%20wolfSSL%20(wolfCrypt)&amp;severity=medium&amp;id=69bc42d8e32a4fbe5fe8af3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-screenconnect-vulnerability-exposes-machi-7e07b842</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20ScreenConnect%20Vulnerability%20Exposes%20Machine%20Keys&amp;severity=critical&amp;id=69bc381ae32a4fbe5fe48fd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26940-cwe-1284-improper-validation-of-spe-3f14668f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26940%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=69bc34d3e32a4fbe5fe2fcbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26939-cwe-862-missing-authorization-in-el-103dd2d8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26939%3A%20CWE-862%20Missing%20Authorization%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=69bc34d3e32a4fbe5fe2fcb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26933-cwe-129-improper-validation-of-arra-1b9518eb</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26933%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20Elastic%20Packetbeat&amp;severity=medium&amp;id=69bc34d3e32a4fbe5fe2fcb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26931-cwe-789-memory-allocation-with-exce-91f97db1</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26931%3A%20CWE-789%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20Elastic%20Metricbeat&amp;severity=medium&amp;id=69bc2dc4e32a4fbe5fdefa6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3029-cwe-22-improper-limitation-of-a-path-729e317c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3029%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Artifex%20Software%20Inc.%20*PyMuPDF*%20PyMuPDF&amp;severity=high&amp;id=69bc1fb1e32a4fbe5fd8213b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32869-cwe-79-improper-neutralization-of-i-9b4095a9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32869%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OPEXUS%20eComplaint&amp;severity=medium&amp;id=69bc1fb1e32a4fbe5fd82137</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32868-cwe-79-improper-neutralization-of-i-19f98a35</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32868%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OPEXUS%20eComplaint&amp;severity=medium&amp;id=69bc1fb1e32a4fbe5fd82133</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32867-cwe-639-authorization-bypass-throug-7f856db1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32867%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20OPEXUS%20eComplaint&amp;severity=medium&amp;id=69bc1fb1e32a4fbe5fd8212f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32866-cwe-79-improper-neutralization-of-i-54776fae</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32866%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OPEXUS%20eCASE&amp;severity=medium&amp;id=69bc1fb1e32a4fbe5fd8212b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32865-cwe-200-exposure-of-sensitive-infor-6b65c58b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32865%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20OPEXUS%20eComplaint&amp;severity=critical&amp;id=69bc1fb1e32a4fbe5fd82127</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iran-readied-cyberattack-capabilities-for-response-f9c5f962</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran%20Readied%20Cyberattack%20Capabilities%20for%20Response%20Prior%20to%20Epic%20Fury&amp;severity=medium&amp;id=69bc1876e32a4fbe5fd0e091</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/edr-killers-explained-beyond-the-drivers-086c7370</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=EDR%20killers%20explained%3A%20Beyond%20the%20drivers&amp;severity=medium&amp;id=69bd007ce32a4fbe5f3ee2da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/when-tax-season-becomes-cyberattack-season-phishin-ea935d25</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=When%20tax%20season%20becomes%20cyberattack%20season%3A%20Phishing%20and%20malware%20campaigns%20using%20tax-related%20lures&amp;severity=medium&amp;id=69bd007ce32a4fbe5f3ee2cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/marquis-data-breach-affects-672000-individuals-63033f85</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Marquis%20Data%20Breach%20Affects%20672%2C000%20Individuals&amp;severity=medium&amp;id=69bc116ee32a4fbe5fcdf9bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27043-cwe-434-unrestricted-upload-of-file-cba2eddd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27043%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ThemeGoods%20Photography&amp;severity=high&amp;id=69bc11b6e32a4fbe5fce058b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32843-cwe-79-improper-neutralization-of-i-a49337fc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32843%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20LinkItONEDevGroup%20Location%20Aware%20Sensor%20System%20(LASS)&amp;severity=medium&amp;id=69bc11b6e32a4fbe5fce058e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22557-vulnerability-in-ubiquiti-inc-unifi-b488b1a5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22557%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UniFi%20Network%20Application&amp;severity=critical&amp;id=69bc0a99e32a4fbe5fcbe3ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22558-vulnerability-in-ubiquiti-inc-unifi-ab721e24</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22558%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UniFi%20Network%20Application&amp;severity=high&amp;id=69bc0a99e32a4fbe5fcbe402</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4427-improper-validation-of-array-index-i-ded74843</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4427&amp;severity=null&amp;id=69bc0a99e32a4fbe5fcbe40e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-spotlight-shinyhunters-fast-tracks-saas-acc-d16b4341</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Spotlight%3A%20ShinyHunters%20Fast-Tracks%20SaaS%20Access%20with%20Subdomain%20Impersonation&amp;severity=medium&amp;id=69bd007ce32a4fbe5f3ee2b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2369-integer-underflow-wrap-or-wraparound-1a25d932</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2369%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69bc0a99e32a4fbe5fcbe405</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/security-firm-aura-discloses-data-breach-impacting-e11ac2db</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Security%20Firm%20Aura%20Discloses%20Data%20Breach%20Impacting%20900%2C000%20Records&amp;severity=medium&amp;id=69bc06e1e32a4fbe5fca1251</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4426-incorrect-bitwise-shift-of-integer-i-9edcaece</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4426%3A%20Incorrect%20Bitwise%20Shift%20of%20Integer%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69bc0726e32a4fbe5fca202e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4424-out-of-bounds-read-in-red-hat-red-ha-49c7e3de</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4424%3A%20Out-of-bounds%20Read%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=69bc0726e32a4fbe5fca2029</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71260-cwe-502-deserialization-of-untruste-21e3c5f0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71260%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20BMC%20Software%2C%20Inc.%20FootPrints&amp;severity=high&amp;id=69bc0011e32a4fbe5fc6a5d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71259-cwe-918-server-side-request-forgery-2c78bf47</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71259%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20BMC%20Software%2C%20Inc.%20FootPrints&amp;severity=medium&amp;id=69bc0011e32a4fbe5fc6a5cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71258-cwe-918-server-side-request-forgery-6d09c567</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71258%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20BMC%20Software%2C%20Inc.%20FootPrints&amp;severity=medium&amp;id=69bc0011e32a4fbe5fc6a5ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71257-cwe-306-missing-authentication-for--cfdd0e6a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71257%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20BMC%20Software%2C%20Inc.%20FootPrints&amp;severity=medium&amp;id=69bc0011e32a4fbe5fc6a5c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-apt-exploits-zimbra-vulnerability-against--747fd31c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20APT%20Exploits%20Zimbra%20Vulnerability%20Against%20Ukraine&amp;severity=medium&amp;id=69bbfc57e32a4fbe5fc44ccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3511-cwe-611-improper-restriction-of-xml--d3394379</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3511%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Slovensko.Digital%20Autogram&amp;severity=high&amp;id=69bc0011e32a4fbe5fc6a5d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3658-cwe-89-improper-neutralization-of-sp-4ce634e2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3658%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20croixhaug%20Appointment%20Booking%20Calendar%20%E2%80%94%20Simply%20Schedule%20Appointments%20Booking%20Plugin&amp;severity=high&amp;id=69bbdce4e32a4fbe5fb75e61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-invitation-to-infection-how-silentconnect-del-4ebdc8bf</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Invitation%20to%20Infection%3A%20How%20SILENTCONNECT%20Delivers%20ScreenConnect&amp;severity=medium&amp;id=69bbfc73e32a4fbe5fc45109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-malware-targets-users-of-cobra-docguard-softwa-1c4323bc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Malware%20Targets%20Users%20of%20Cobra%20DocGuard%20Software&amp;severity=medium&amp;id=69bbfc73e32a4fbe5fc45100</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dto-malware-that-takes-notes-d4134ff7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DTO%20malware%20that%20takes%20notes&amp;severity=medium&amp;id=69bbffd8e32a4fbe5fc68b20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14716-cwe-287-improper-authentication-in--a0439e26</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14716%3A%20CWE-287%20Improper%20Authentication%20in%20Secomea%20GateManager&amp;severity=medium&amp;id=69bbd963e32a4fbe5fb5a576</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-warns-of-attacks-exploiting-recent-sharepoint-171abc90</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Warns%20of%20Attacks%20Exploiting%20Recent%20SharePoint%20Vulnerability&amp;severity=critical&amp;id=69bbc79ae32a4fbe5faeae91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-firewall-vulnerability-exploited-as-zero-day-1e82d87b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Firewall%20Vulnerability%20Exploited%20as%20Zero-Day%20in%20Interlock%20Ransomware%20Attacks&amp;severity=medium&amp;id=69bbbd0de32a4fbe5fa90d98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21788-cwe-79-improper-neutralization-of-i-8231cd45</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21788%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20HCLSoftware%20Connections&amp;severity=medium&amp;id=69bbbd50e32a4fbe5fa91b02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27070-cwe-79-improper-neutralization-of-i-037c654a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27070%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPEverest%20Everest%20Forms%20Pro&amp;severity=high&amp;id=69bbbd50e32a4fbe5fa91b08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27068-cwe-79-improper-neutralization-of-i-6464da4e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27068%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ryan%20Howard%20Website%20LLMs.txt&amp;severity=high&amp;id=69bbbd50e32a4fbe5fa91b05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27067-cwe-434-unrestricted-upload-of-file-001b9b9d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27067%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Syarif%20Mobile%20App%20Editor&amp;severity=critical&amp;id=69bbb9bce32a4fbe5fa803c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27065-cwe-98-improper-control-of-filename-c54e685b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27065%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThimPress%20BuilderPress&amp;severity=critical&amp;id=69bbb9bce32a4fbe5fa803c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25445-cwe-502-deserialization-of-untruste-38c3b1fa</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25445%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Membership%20Software%20WishList%20Member%20X&amp;severity=high&amp;id=69bbb9bce32a4fbe5fa803bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25443-cwe-862-missing-authorization-in-do-b2a17dc0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25443%3A%20Missing%20Authorization%20in%20Dotstore%20Fraud%20Prevention%20For%20Woocommerce&amp;severity=high&amp;id=69bbb9bce32a4fbe5fa803ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25442-cwe-79-improper-neutralization-of-i-53e83f86</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25442%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20QantumThemes%20Kentha&amp;severity=high&amp;id=69bbb9bce32a4fbe5fa803b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25438-cwe-79-improper-neutralization-of-i-5ae4c863</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25438%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeHunk%20Gutenberg%20Blocks&amp;severity=high&amp;id=69bbb9bce32a4fbe5fa803b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68836-cwe-79-improper-neutralization-of-i-442407f2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68836%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Markbeljaars%20Table%20of%20Contents%20Creator&amp;severity=high&amp;id=69bbb9bce32a4fbe5fa803b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67618-cwe-79-improper-neutralization-of-i-392796e8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67618%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ArtstudioWorks%20Brookside&amp;severity=high&amp;id=69bbb9bce32a4fbe5fa803ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62043-cwe-79-improper-neutralization-of-i-1f545989</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62043%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20WPSight%20WPCasa&amp;severity=medium&amp;id=69bbb9bce32a4fbe5fa803ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60237-cwe-502-deserialization-of-untruste-02398e83</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60237%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Themeton%20Finag&amp;severity=critical&amp;id=69bbb638e32a4fbe5fa6afee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60233-cwe-502-deserialization-of-untruste-e4dbbeab</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60233%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Themeton%20Zuut&amp;severity=critical&amp;id=69bbb638e32a4fbe5fa6afeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53222-cwe-79-improper-neutralization-of-i-30abad9d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53222%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tagDiv%20tagDiv%20Opt-In%20Builder&amp;severity=high&amp;id=69bbb638e32a4fbe5fa6afe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50001-cwe-79-improper-neutralization-of-i-e0727e1a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50001%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tagDiv%20tagDiv%20Composer&amp;severity=high&amp;id=69bbb638e32a4fbe5fa6afe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32223-cwe-639-authorization-bypass-throug-f19f8659</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32223%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Themeum%20Tutor%20LMS&amp;severity=medium&amp;id=69bbb638e32a4fbe5fa6afe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3475-cwe-862-missing-authorization-in-ins-dcfee312</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3475%3A%20CWE-862%20Missing%20Authorization%20in%20instantpopupbuilder%20Instant%20Popup%20Builder%20%E2%80%93%20Powerful%20Popup%20Maker%20for%20Opt-ins%2C%20Email%20Newsletters%20%26%20Lead%20Generation&amp;severity=medium&amp;id=69bbabafe32a4fbe5fa0f1a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42210-cwe-79-improper-neutralization-of-i-959be701</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42210%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20HCLSoftware%20Unica%20Marketing%20Operations%20(Plan)&amp;severity=high&amp;id=69bbabafe32a4fbe5fa0f1a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25312-missing-authorization-in-metagauss--6088bf26</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25312%3A%20Missing%20Authorization%20in%20Metagauss%20EventPrime&amp;severity=high&amp;id=69cd7410e6bfc5ba1def5044</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25471-cwe-288-authentication-bypass-using-fb51444f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25471%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Themepaste%20Admin%20Safety%20Guard&amp;severity=high&amp;id=69bba828e32a4fbe5f9f514f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27091-cwe-862-missing-authorization-in-ui-51d16ecd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27091%3A%20Missing%20Authorization%20in%20UiPress%20UiPress%20lite&amp;severity=medium&amp;id=69bba122e32a4fbe5f9bab6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2571-cwe-200-exposure-of-sensitive-inform-4433356b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2571%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20codename065%20Download%20Manager&amp;severity=medium&amp;id=69bba122e32a4fbe5f9bab70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4006-cwe-79-improper-neutralization-of-in-57adcf74</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4006%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dartiss%20Draft%20List&amp;severity=medium&amp;id=69bba122e32a4fbe5f9bab77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4120-cwe-79-improper-neutralization-of-in-ace8a1f2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4120%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bplugins%20Info%20Cards%20%E2%80%93%20Add%20Text%20and%20Media%20in%20Card%20Layouts&amp;severity=medium&amp;id=69bba122e32a4fbe5f9bab87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4068-cwe-352-cross-site-request-forgery-c-e2deb8f9</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4068%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20pattihis%20Add%20Custom%20Fields%20to%20Media&amp;severity=medium&amp;id=69bba122e32a4fbe5f9bab7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27093-cwe-98-improper-control-of-filename-113afdb1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27093%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ovatheme%20Tripgo&amp;severity=high&amp;id=69bba122e32a4fbe5f9bab6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/indonesianfoods-spam-campaign-89-000-junk-packages-02add850</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=IndonesianFoods%20Spam%20Campaign%3A%2089%20000%20junk%20packages%20in%20npm&amp;severity=medium&amp;id=69bb8fc7e32a4fbe5f94a83a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27096-cwe-502-deserialization-of-untruste-c54c368b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27096%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20BuddhaThemes%20ColorFolio%20-%20Freelance%20Designer%20WordPress%20Theme&amp;severity=high&amp;id=69bb8f8fe32a4fbe5f949e5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27397-cwe-639-authorization-bypass-throug-fd1f474c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27397%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Really%20Simple%20Plugins%20B.V.%20Really%20Simple%20Security%20Pro&amp;severity=medium&amp;id=69bb8f8fe32a4fbe5f949e61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27413-cwe-89-improper-neutralization-of-s-2b17e884</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27413%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Cozmoslabs%20Profile%20Builder%20Pro&amp;severity=critical&amp;id=69bb8f8fe32a4fbe5f949e64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27540-cwe-434-unrestricted-upload-of-file-64999286</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27540%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Rymera%20Web%20Co%20Pty%20Ltd.%20Woocommerce%20Wholesale%20Lead%20Capture&amp;severity=critical&amp;id=69bb8f8fe32a4fbe5f949e67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27542-cwe-266-incorrect-privilege-assignm-fdf0645e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27542%3A%20Incorrect%20Privilege%20Assignment%20in%20Rymera%20Web%20Co%20Pty%20Ltd.%20Woocommerce%20Wholesale%20Lead%20Capture&amp;severity=critical&amp;id=69bb8f8fe32a4fbe5f949e6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28044-cwe-79-improper-neutralization-of-i-4c6375df</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28044%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Media%20WP%20Rocket&amp;severity=medium&amp;id=69bc0726e32a4fbe5fca2033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28070-cwe-862-missing-authorization-in-ti-af8d6a7a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28070%3A%20CWE-862%20Missing%20Authorization%20in%20Tips%20and%20Tricks%20HQ%20WP%20eMember&amp;severity=medium&amp;id=69bc11b6e32a4fbe5fce0592</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28073-cwe-79-improper-neutralization-of-i-1bc1903b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28073%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Tips%20and%20Tricks%20HQ%20WP%20eMember&amp;severity=high&amp;id=69bc0726e32a4fbe5fca2036</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1238-cwe-79-improper-neutralization-of-in-a993bd3b</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1238%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20veronalabs%20SlimStat%20Analytics&amp;severity=high&amp;id=69bb817ee32a4fbe5f8e86eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36051-cwe-538-insertion-of-sensitive-info-ab618e1d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36051%3A%20CWE-538%20Insertion%20of%20sensitive%20information%20into%20Externally-Accessible%20file%20or%20directory%20in%20IBM%20QRadar%20SIEM&amp;severity=medium&amp;id=69bb5e54e32a4fbe5f57d500</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13995-cwe-1286-improper-validation-of-syn-68a57170</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13995%3A%20CWE-1286%20Improper%20validation%20of%20syntactic%20correctness%20of%20input%20in%20IBM%20QRadar&amp;severity=medium&amp;id=69bb5e54e32a4fbe5f57d4fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15051-cwe-79-improper-neutralization-of-i-ad185818</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15051%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20IBM%20QRadar%20SIEM&amp;severity=medium&amp;id=69bb5e54e32a4fbe5f57d4fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1276-cwe-79-improper-neutralization-of-in-5c8d8570</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1276%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20IBM%20QRadar%20SIEM&amp;severity=medium&amp;id=69bb5e54e32a4fbe5f57d503</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/interesting-message-stored-in-cowrie-logs-wed-mar--eed73e9b</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Interesting%20Message%20Stored%20in%20Cowrie%20Logs%2C%20(Wed%2C%20Mar%2018th)&amp;severity=low&amp;id=69bb4676771bdb1749e386d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-19-f789201b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-19&amp;severity=medium&amp;id=69bc8ffae32a4fbe5f0bc8cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25667-na-4878ddad</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25667%3A%20n%2Fa&amp;severity=high&amp;id=69bc42d8e32a4fbe5fe8af3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30694-na-109950b7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30694%3A%20n%2Fa&amp;severity=critical&amp;id=69bc34d3e32a4fbe5fe2fcbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67115-na-fd8f50f9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67115%3A%20n%2Fa&amp;severity=medium&amp;id=69bc34d3e32a4fbe5fe2fcb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67114-na-cfe87a40</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67114%3A%20n%2Fa&amp;severity=critical&amp;id=69bc34d3e32a4fbe5fe2fcac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67113-na-f177756a</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67113%3A%20n%2Fa&amp;severity=critical&amp;id=69bc34d3e32a4fbe5fe2fca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67112-na-167598ab</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67112%3A%20n%2Fa&amp;severity=critical&amp;id=69bc34d3e32a4fbe5fe2fca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30403-na-47aad45b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30403%3A%20n%2Fa&amp;severity=high&amp;id=69bc2336e32a4fbe5fd9a333</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30404-na-dc0e3c16</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30404%3A%20n%2Fa&amp;severity=high&amp;id=69bc1fb1e32a4fbe5fd82123</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-19-a4f74c0b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-19&amp;severity=medium&amp;id=69bc1bf7e32a4fbe5fd2fcb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30402-na-cbd8e1be</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30402%3A%20n%2Fa&amp;severity=critical&amp;id=69bc1527e32a4fbe5fcfae7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69720-na-186d574f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69720%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20GNU%20ncurses&amp;severity=high&amp;id=69bc11b6e32a4fbe5fce0585</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30711-na-52d1a31a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30711%3A%20n%2Fa&amp;severity=high&amp;id=69bc0a99e32a4fbe5fcbe40a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-19-1560c5bd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-19&amp;severity=low&amp;id=69bb8f56e32a4fbe5f948e9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32743-cwe-121-stack-based-buffer-overflow-abcf5c62</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32743%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20PX4%20PX4-Autopilot&amp;severity=medium&amp;id=69bb389a771bdb1749cfdbf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32255-cwe-918-server-side-request-forgery-b38e16f0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32255%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20kanbn%20kan&amp;severity=high&amp;id=69bb3516771bdb1749cf1e46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32805-cwe-22-improper-limitation-of-a-pat-c9094e96</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32805%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ctfer-io%20romeo&amp;severity=high&amp;id=69bb2a8a771bdb1749cbc625</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32737-cwe-284-improper-access-control-in--390bca84</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32737%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20ctfer-io%20romeo&amp;severity=high&amp;id=69bb2a8a771bdb1749cbc621</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32735-cwe-20-improper-input-validation-in-02f3ed92</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32735%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Chrimle%20openapi-to-java-records-mustache-templates-parent&amp;severity=low&amp;id=69bb2706771bdb1749cae220</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15031-cwe-22-improper-limitation-of-a-pat-b338a25f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15031%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20mlflow%20mlflow%2Fmlflow&amp;severity=high&amp;id=69bb2706771bdb1749cae217</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32736-cwe-862-missing-authorization-in-hy-bd2f85e9</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32736%3A%20CWE-862%3A%20Missing%20Authorization%20in%20HytaleModding%20wiki&amp;severity=medium&amp;id=69bb2706771bdb1749cae226</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32731-cwe-22-improper-limitation-of-a-pat-efa014e1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32731%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20apostrophecms%20import-export&amp;severity=critical&amp;id=69bb2706771bdb1749cae21d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32730-cwe-287-improper-authentication-in--15c69b59</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32730%3A%20CWE-287%3A%20Improper%20Authentication%20in%20apostrophecms%20apostrophe&amp;severity=high&amp;id=69bb2706771bdb1749cae21a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33163-cwe-200-exposure-of-sensitive-infor-bf0b3710</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33163%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69bb2382771bdb1749c98987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33042-cwe-287-improper-authentication-in--316c227c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33042%3A%20CWE-287%3A%20Improper%20Authentication%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69bb2382771bdb1749c98982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32944-cwe-674-uncontrolled-recursion-in-p-89a0ff68</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32944%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69bb2382771bdb1749c9897d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32943-cwe-367-time-of-check-time-of-use-t-09ac7473</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32943%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20parse-community%20parse-server&amp;severity=low&amp;id=69bb2001771bdb1749c89335</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32886-cwe-1321-improperly-controlled-modi-1739e4ba</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32886%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69bb2001771bdb1749c89330</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32878-cwe-1321-improperly-controlled-modi-f8c4ad57</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32878%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69bb2001771bdb1749c8932b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32770-cwe-248-uncaught-exception-in-parse-654e3258</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32770%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69bb2001771bdb1749c89326</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32742-cwe-915-improperly-controlled-modif-464116df</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32742%3A%20CWE-915%3A%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69bb2001771bdb1749c89321</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32728-cwe-79-improper-neutralization-of-i-9f80ada8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32728%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69bb2001771bdb1749c8931a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32723-cwe-362-concurrent-execution-using--576a2875</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32723%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20nyariv%20SandboxJS&amp;severity=medium&amp;id=69bb1c7a771bdb1749c7cd1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32722-cwe-79-improper-neutralization-of-i-088ed356</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32722%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bloomberg%20memray&amp;severity=low&amp;id=69bb1c7a771bdb1749c7cd16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32703-cwe-79-improper-neutralization-of-i-f2afc489</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32703%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20opf%20openproject&amp;severity=critical&amp;id=69bb18f8771bdb1749c6e132</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32698-cwe-89-improper-neutralization-of-s-a9afd70e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32698%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20opf%20openproject&amp;severity=critical&amp;id=69bb18f8771bdb1749c6e12f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32700-cwe-362-concurrent-execution-using--b102bd89</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32700%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20heartcombo%20devise&amp;severity=medium&amp;id=69bb5534e32a4fbe5f378d62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25873-cwe-502-deserialization-of-untruste-9e0b0036</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25873%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Beijing%20Academy%20of%20Artificial%20Intelligence%20(BAAI)%20OmniGen2-RL&amp;severity=critical&amp;id=69bb11f2771bdb1749c4fa31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32638-cwe-639-authorization-bypass-throug-a9775966</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32638%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20withstudiocms%20studiocms&amp;severity=low&amp;id=69bb11f2771bdb1749c4fa3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32321-cwe-89-improper-neutralization-of-s-5fdfa0b3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32321%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20MacWarrior%20clipbucket-v5&amp;severity=high&amp;id=69bb11f2771bdb1749c4fa39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31971-cwe-121-stack-based-buffer-overflow-442a3df6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31971%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20samtools%20htslib&amp;severity=high&amp;id=69bb03e2771bdb1749c142f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31970-cwe-122-heap-based-buffer-overflow--d4a345e8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31970%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20samtools%20htslib&amp;severity=high&amp;id=69bb03e2771bdb1749c142f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31969-cwe-122-heap-based-buffer-overflow--a2fbcdcb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31969%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20samtools%20htslib&amp;severity=high&amp;id=69bb03e2771bdb1749c142f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4396-cwe-295-improper-certificate-validat-50860779</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4396%3A%20CWE-295%20Improper%20certificate%20validation%20in%20Devolutions%20Hub%20Reporting%20Service&amp;severity=high&amp;id=69bb03e2771bdb1749c142fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31968-cwe-121-stack-based-buffer-overflow-dd9916c3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31968%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20samtools%20htslib&amp;severity=high&amp;id=69bb0078771bdb1749c07554</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-collapse-of-predictive-security-in-the-age-of--11cf38f6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Collapse%20of%20Predictive%20Security%20in%20the%20Age%20of%20Machine-Speed%20Attacks&amp;severity=medium&amp;id=69bb0027771bdb1749c06483</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31967-cwe-125-out-of-bounds-read-in-samto-87c20809</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31967%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20samtools%20htslib&amp;severity=medium&amp;id=69bb0079771bdb1749c0755e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31966-cwe-125-out-of-bounds-read-in-samto-83340784</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31966%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20samtools%20htslib&amp;severity=medium&amp;id=69bb0078771bdb1749c07558</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31965-cwe-125-out-of-bounds-read-in-samto-74a2b192</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31965%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20samtools%20htslib&amp;severity=medium&amp;id=69baf5d2771bdb1749bce2b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31964-cwe-476-null-pointer-dereference-in-af5a51cf</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31964%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20samtools%20htslib&amp;severity=medium&amp;id=69baf24a771bdb1749bb3c5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31963-cwe-122-heap-based-buffer-overflow--76b649a8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31963%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20samtools%20htslib&amp;severity=high&amp;id=69baf24a771bdb1749bb3c57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3479-vulnerability-in-python-software-fou-7c646350</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3479%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=low&amp;id=69baf24a771bdb1749bb3c5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31962-cwe-122-heap-based-buffer-overflow--f8425e97</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31962%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20samtools%20htslib&amp;severity=high&amp;id=69baf5d2771bdb1749bce2b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32634-cwe-346-origin-validation-error-in--30d65730</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32634%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20nicolargo%20glances&amp;severity=high&amp;id=69baf5d2771bdb1749bce2c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32633-cwe-200-exposure-of-sensitive-infor-1b1c198b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32633%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20nicolargo%20glances&amp;severity=critical&amp;id=69baf5d2771bdb1749bce2bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32632-cwe-346-origin-validation-error-in--5bc32449</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32632%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20nicolargo%20glances&amp;severity=medium&amp;id=69bae7bf771bdb1749b795a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26948-cwe-1258-exposure-of-sensitive-syst-080f0205</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26948%3A%20CWE-1258%3A%20Exposure%20of%20Sensitive%20System%20Information%20Due%20to%20Uncleared%20Debug%20Information%20in%20Dell%20Integrated%20Dell%20Remote%20Access%20Controller&amp;severity=medium&amp;id=69bae7bf771bdb1749b7959c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26945-cwe-114-process-control-in-dell-int-7305f643</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26945%3A%20CWE-114%3A%20Process%20Control%20in%20Dell%20Integrated%20Dell%20Remote%20Access%20Controller&amp;severity=medium&amp;id=69bae7bf771bdb1749b79599</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32611-cwe-89-improper-neutralization-of-s-86e6c23f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32611%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20nicolargo%20glances&amp;severity=high&amp;id=69bae0bb771bdb1749b563de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32610-cwe-942-permissive-cross-domain-pol-3fbd2cf4</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32610%3A%20CWE-942%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20nicolargo%20glances&amp;severity=high&amp;id=69bad9b2771bdb1749b240a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1463-cwe-98-improper-control-of-filename--497abb3a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1463%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20smub%20Photo%20Gallery%2C%20Sliders%2C%20Proofing%20and%20Themes%20%E2%80%93%20NextGEN%20Gallery&amp;severity=high&amp;id=69bad9b2771bdb1749b2409e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-a-network-of-20000-fake-shops-9f73b038</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20a%20network%20of%2020%2C000%2B%20fake%20shops&amp;severity=medium&amp;id=69bad271771bdb1749aed170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24063-cwe-276-incorrect-default-permissio-bcb180bc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24063%3A%20CWE-276%20Incorrect%20default%20permissions%20in%20Arturia%20Software%20Center&amp;severity=high&amp;id=69bac82e771bdb1749ab0136</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/darksword-ios-exploit-kit-used-by-state-sponsored--9559b6ec</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%98DarkSword%E2%80%99%20iOS%20Exploit%20Kit%20Used%20by%20State-Sponsored%20Hackers%2C%20Spyware%20Vendors&amp;severity=medium&amp;id=69bac7e7771bdb1749aaf3ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/technical-analysis-of-snappyclient-9437d7d7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Technical%20Analysis%20of%20SnappyClient&amp;severity=medium&amp;id=69bad5f5771bdb1749b06b3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2992-cwe-862-missing-authorization-in-iqo-61572437</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2992%3A%20CWE-862%20Missing%20Authorization%20in%20iqonicdesign%20KiviCare%20%E2%80%93%20Clinic%20%26%20Patient%20Management%20System%20(EHR)&amp;severity=high&amp;id=69bac82e771bdb1749ab014c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2991-cwe-287-improper-authentication-in-i-f76202b9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2991%3A%20CWE-287%20Improper%20Authentication%20in%20iqonicdesign%20KiviCare%20%E2%80%93%20Clinic%20%26%20Patient%20Management%20System%20(EHR)&amp;severity=high&amp;id=69bac82e771bdb1749ab0146</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3090-cwe-79-improper-neutralization-of-in-ac88dbf3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3090%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20saadiqbal%20Post%20SMTP%20%E2%80%93%20Complete%20Email%20Deliverability%20and%20SMTP%20Solution%20with%20Email%20Logs%2C%20Alerts%2C%20Backup%20SMTP%20%26%20Mobile%20App&amp;severity=high&amp;id=69bac830771bdb1749ab0209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2512-cwe-79-improper-neutralization-of-in-bd7804ac</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2512%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dartiss%20Code%20Embed&amp;severity=medium&amp;id=69bac82e771bdb1749ab0139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2559-cwe-862-missing-authorization-in-saa-20f1bf38</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2559%3A%20CWE-862%20Missing%20Authorization%20in%20saadiqbal%20Post%20SMTP%20%E2%80%93%20Complete%20Email%20Deliverability%20and%20SMTP%20Solution%20with%20Email%20Logs%2C%20Alerts%2C%20Backup%20SMTP%20%26%20Mobile%20App&amp;severity=medium&amp;id=69bac82e771bdb1749ab0140</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24062-cwe-306-missing-authentication-for--28feee6e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24062%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20Arturia%20Software%20Center&amp;severity=high&amp;id=69bac82e771bdb1749ab0133</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33004-vulnerability-in-jenkins-project-je-d55a21b0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33004%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20LoadNinja%20Plugin&amp;severity=medium&amp;id=69bac82e771bdb1749ab015b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33003-vulnerability-in-jenkins-project-je-bd0a6730</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33003%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20LoadNinja%20Plugin&amp;severity=medium&amp;id=69bac82e771bdb1749ab0158</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33002-vulnerability-in-jenkins-project-je-feb222ea</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33002%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins&amp;severity=high&amp;id=69bac82e771bdb1749ab0155</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33001-vulnerability-in-jenkins-project-je-34f276c4</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33001%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins&amp;severity=high&amp;id=69bac82e771bdb1749ab0152</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/eu-sanctions-chinese-iranian-firms-supporting-hack-8cec962a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=EU%20Sanctions%20Chinese%2C%20Iranian%20Firms%20Supporting%20Hacking%20Operations&amp;severity=medium&amp;id=69babd5c771bdb1749a7527b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32609-cwe-200-exposure-of-sensitive-infor-2b5dd630</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32609%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20nicolargo%20glances&amp;severity=high&amp;id=69baba10771bdb1749a5df7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shadow-ai-risk-how-saas-apps-are-quietly-enabling--358e50ab</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shadow%20AI%20Risk%3A%20How%20SaaS%20Apps%20Are%20Quietly%20Enabling%20Massive%20Breaches&amp;severity=medium&amp;id=69bab2d0771bdb1749a27281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3278-cwe-79-improper-neutralization-of-in-b96fd83c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3278%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20OpenText%E2%84%A2%20ZENworks%20Service%20Desk&amp;severity=high&amp;id=69bab319771bdb1749a293df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scans-for-adminer-wed-mar-18th-1dc2dc26</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scans%20for%20%22adminer%22%2C%20(Wed%2C%20Mar%2018th)&amp;severity=medium&amp;id=69baa842771bdb17499e7319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25449-cwe-502-deserialization-of-untruste-72874dad</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25449%3A%20Deserialization%20of%20Untrusted%20Data%20in%20shinetheme%20Traveler&amp;severity=critical&amp;id=69baabfa771bdb1749a00bdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32694-cwe-343-predictable-value-range-fro-eff99390</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32694%3A%20CWE-343%20Predictable%20value%20range%20from%20previous%20values%20in%20Canonical%20Juju&amp;severity=medium&amp;id=69baabfa771bdb1749a00bde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32693-cwe-863-incorrect-authorization-in--0e03cd1c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32693%3A%20CWE-863%20Incorrect%20Authorization%20in%20Canonical%20Juju&amp;severity=high&amp;id=69baa17f771bdb17499a872d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-hackers-likely-used-malware-stolen-credent-ec3ce55e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20Hackers%20Likely%20Used%20Malware-Stolen%20Credentials%20in%20Stryker%20Breach&amp;severity=medium&amp;id=69baa13b771bdb17499a51a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-debuts-background-security-improvements-with-43f317f5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Debuts%20Background%20Security%20Improvements%20With%20Fresh%20WebKit%20Patches&amp;severity=medium&amp;id=69ba9db7771bdb17499562f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32692-cwe-285-improper-authorization-in-c-8bb2a045</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32692%3A%20CWE-285%20Improper%20Authorization%20in%20Canonical%20Juju&amp;severity=high&amp;id=69baa17f771bdb17499a872a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32691-cwe-708-incorrect-ownership-assignm-4976f2b9</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32691%3A%20CWE-708%20Incorrect%20ownership%20assignment%20in%20Canonical%20Juju&amp;severity=medium&amp;id=69ba9df8771bdb1749975689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-uncover-a-horabot-campaign-and-detect-this--b14c9474</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%20uncover%20a%20Horabot%20campaign%20and%20detect%20this%20malware&amp;severity=medium&amp;id=69bad5f5771bdb1749b06b18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41258-cwe-284-improper-access-control-in--8af3e8ec</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41258%3A%20CWE-284%20Improper%20Access%20Control%20in%20danny-avila%20LibreChat&amp;severity=high&amp;id=69baba10771bdb1749a5df8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12518-cwe-79-improper-neutralization-of-i-9e0f1fb1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12518%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Bee%20Content%20Design%20Befree%20SDK&amp;severity=medium&amp;id=69ba88d6771bdb17497e74c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/casting-a-wider-net-scaling-threat-c5bddf9f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Casting%20a%20Wider%20Net%3A%20Scaling%20Threat&amp;severity=medium&amp;id=69ba88a2771bdb17497e4f69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-roundish-uncovering-an-apt28-roundcube-e-a41e6b6f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Roundish%3A%20Uncovering%20an%20APT28%20Roundcube%20Exploitation%20Toolkit%20Targeting%20Ukraine&amp;severity=medium&amp;id=69ba88a2771bdb17497e4f5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/contagious-trader-campaign-coordinated-weaponisati-15cb4f31</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Contagious%20Trader%20campaign%20-%20Coordinated%20weaponisation%20of%20cryptocurrency%20trading%20bots%20by%20suspected%20DPRK%20malware%20operators&amp;severity=medium&amp;id=69ba88a2771bdb17497e4f49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-of-the-spear-phishing-and-kakaotalk-linke-3131ee7e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysis%20of%20the%20Spear-Phishing%20and%20KakaoTalk-Linked%20Threat%20Campaign&amp;severity=medium&amp;id=69ba88a2771bdb17497e4f38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researcher-discovers-4th-whatsapp-view-once-bypass-c88d9741</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researcher%20Discovers%204th%20WhatsApp%20View%20Once%20Bypass%3B%20Meta%20Won%E2%80%99t%20Patch&amp;severity=medium&amp;id=69ba851a771bdb17497b443d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/minecraft-dark-tale-of-scams-malware-extortion-8865f2fb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Minecraft%3A%20Dark%20Tale%20of%20Scams%2C%20Malware%20%26%20Extortion&amp;severity=medium&amp;id=69ba8c21771bdb174982ab3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-pudgy-world-site-steals-crypto-passwords-2eef4b1a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Pudgy%20World%20site%20steals%20crypto%20passwords&amp;severity=medium&amp;id=69ba8195771bdb174978bc2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32565-cwe-862-missing-authorization-in-we-3beba4f5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32565%3A%20Missing%20Authorization%20in%20Ajay%20Contextual%20Related%20Posts&amp;severity=medium&amp;id=69ba73bc771bdb174968082d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1217-cwe-862-missing-authorization-in-yoa-3986046b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1217%3A%20CWE-862%20Missing%20Authorization%20in%20yoast%20Yoast%20Duplicate%20Post&amp;severity=medium&amp;id=69ba73bc771bdb174968081d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22729-vulnerability-in-vmware-spring-ai-96356f4f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22729%3A%20Vulnerability%20in%20VMware%20Spring%20AI&amp;severity=high&amp;id=69ba5b20771bdb174957e258</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22730-vulnerability-in-vmware-spring-ai-ddcf48d5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22730%3A%20Vulnerability%20in%20VMware%20Spring%20AI&amp;severity=high&amp;id=69ba5b20771bdb174957e25b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22323-cwe-352-cross-site-request-forgery--ebdd149c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22323%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=high&amp;id=69ba579c771bdb17495548ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22322-cwe-79-improper-neutralization-of-i-b70e5235</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22322%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=high&amp;id=69ba579c771bdb17495548fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22321-cwe-121-stack-based-buffer-overflow-a8c2437b</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22321%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=medium&amp;id=69ba579c771bdb17495548f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22320-cwe-121-stack-based-buffer-overflow-da50b6da</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22320%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=medium&amp;id=69ba579c771bdb17495548f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22319-cwe-121-stack-based-buffer-overflow-5a355e4d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22319%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=medium&amp;id=69ba579c771bdb17495548f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22318-cwe-121-stack-based-buffer-overflow-6c12e31f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22318%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=medium&amp;id=69ba579c771bdb17495548f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22317-cwe-77-improper-neutralization-of-s-2550f32c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22317%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=high&amp;id=69ba579c771bdb17495548ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22316-cwe-121-stack-based-buffer-overflow-8a351159</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22316%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=medium&amp;id=69ba579c771bdb17495548ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31703-cwe-305-authentication-bypass-by-pr-50832b2d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31703%3A%20CWE-305%20Authentication%20bypass%20by%20primary%20weakness%20in%20dahua%20NVR2-4KS3&amp;severity=low&amp;id=69ba579c771bdb17495548e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3512-cwe-79-improper-neutralization-of-in-0c263e50</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3512%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20alhadeff%20Writeprint%20Stylometry&amp;severity=medium&amp;id=69ba5091771bdb1749512c4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32608-cwe-78-improper-neutralization-of-s-c704207d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32608%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20nicolargo%20glances&amp;severity=high&amp;id=69ba4605771bdb17494b9a01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15363-cwe-79-cross-site-scripting-xss-in--97d02cde</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15363%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Get%20Use%20APIs&amp;severity=medium&amp;id=69ba4605771bdb17494b99fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32596-cwe-200-exposure-of-sensitive-infor-34b688da</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32596%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20nicolargo%20glances&amp;severity=high&amp;id=69bacf27771bdb1749ad833a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32606-cwe-522-insufficiently-protected-cr-e3768d6b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32606%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20lxc%20incus-os&amp;severity=high&amp;id=69bacf27771bdb1749ad833f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32268-cwe-862-missing-authorization-in-cr-ce09a57b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32268%3A%20CWE-862%3A%20Missing%20Authorization%20in%20craftcms%20azure-blob&amp;severity=high&amp;id=69bae0bb771bdb1749b563e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4366-server-side-request-forgery-ssrf-in--602d24ad</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4366%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Red%20Hat%20Red%20Hat%20Build%20of%20Keycloak&amp;severity=medium&amp;id=69baebb5771bdb1749b8ee09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32266-cwe-200-exposure-of-sensitive-infor-d1e81751</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32266%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20craftcms%20google-cloud&amp;severity=low&amp;id=69baebb5771bdb1749b8edfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1926-cwe-862-missing-authorization-in-wps-f2df5907</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1926%3A%20CWE-862%20Missing%20Authorization%20in%20wpswings%20Subscriptions%20for%20WooCommerce&amp;severity=medium&amp;id=69baba10771bdb1749a5df96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1780-cwe-79-improper-neutralization-of-in-1f16c6d2</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1780%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20silentwind%20%5BCR%5DPaid%20Link%20Manager&amp;severity=medium&amp;id=69baba10771bdb1749a5df91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32265-cwe-200-exposure-of-sensitive-infor-a82c09db</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32265%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20craftcms%20aws-s3&amp;severity=medium&amp;id=69baabfa771bdb1749a00be1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32256-cwe-835-loop-with-unreachable-exit--10f47bf0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32256%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Borewit%20music-metadata&amp;severity=high&amp;id=69bab319771bdb1749a293e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2575-improper-handling-of-highly-compress-5b72b4d9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2575%3A%20Improper%20Handling%20of%20Highly%20Compressed%20Data%20(Data%20Amplification)%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=medium&amp;id=69bab319771bdb1749a293e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32254-cwe-284-improper-access-control-in--d7b8155f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32254%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20cloudnativelabs%20kube-router&amp;severity=high&amp;id=69ba1bd6771bdb17491a1d66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31938-cwe-79-improper-neutralization-of-i-32085433</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31938%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20parallax%20jsPDF&amp;severity=critical&amp;id=69ba1bd6771bdb17491a1d61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31898-cwe-116-improper-encoding-or-escapi-53f2e4d9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31898%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20parallax%20jsPDF&amp;severity=high&amp;id=69ba1bd6771bdb17491a1d5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31891-cwe-89-improper-neutralization-of-s-bc4a2f9a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31891%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Cockpit-HQ%20Cockpit&amp;severity=high&amp;id=69ba1bd6771bdb17491a1d57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31865-cwe-1321-improperly-controlled-modi-a5a2e633</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31865%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20elysiajs%20elysia&amp;severity=medium&amp;id=69ba1bd6771bdb17491a1d53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30884-cwe-639-authorization-bypass-throug-1e3f429f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30884%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20mdjnelson%20moodle-mod_customcert&amp;severity=critical&amp;id=69ba1bd6771bdb17491a1d4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4268-cwe-79-improper-neutralization-of-in-8e1b8afd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4268%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpgmaps%20WP%20Go%20Maps%20(formerly%20WP%20Google%20Maps)&amp;severity=medium&amp;id=69baba10771bdb1749a5dfa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28499-cwe-79-improper-neutralization-of-i-dfb77ddf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28499%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vapor%20leaf-kit&amp;severity=medium&amp;id=69b9ffb5771bdb17490566fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2603-missing-authentication-for-critical--81951507</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2603%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.2&amp;severity=high&amp;id=69b9ffb5771bdb174905670b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2092-improper-validation-of-specified-typ-9fe41714</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2092%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.2&amp;severity=high&amp;id=69b9ffb5771bdb1749056703</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4356-cross-site-scripting-in-itsourcecode-e19faf6c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4356%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20University%20Management%20System&amp;severity=medium&amp;id=69b9ffb5771bdb1749056714</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28674-cwe-434-unrestricted-upload-of-file-bf2dede6</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28674%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20danvei233%20xiaoheiFS&amp;severity=high&amp;id=69b9f8b0771bdb174900ac99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28673-cwe-78-improper-neutralization-of-s-cbfc2cfc</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28673%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20danvei233%20xiaoheiFS&amp;severity=high&amp;id=69b9f8b0771bdb174900ac96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29057-cwe-444-inconsistent-interpretation-3abf3602</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29057%3A%20CWE-444%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20vercel%20next.js&amp;severity=medium&amp;id=69b9f8b0771bdb174900ac9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27980-cwe-400-uncontrolled-resource-consu-0da2877b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27980%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20vercel%20next.js&amp;severity=medium&amp;id=69b9f8b0771bdb174900ac91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27979-cwe-770-allocation-of-resources-wit-c71ea8d4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27979%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20vercel%20next.js&amp;severity=medium&amp;id=69b9f8b0771bdb174900ac8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-18-7a4bc157</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-18&amp;severity=medium&amp;id=69bb3f6b771bdb1749d20ee6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26740-na-479e1e73</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26740%3A%20n%2Fa&amp;severity=high&amp;id=69baf5d2771bdb1749bce2b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58112-na-453304de</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58112%3A%20n%2Fa&amp;severity=high&amp;id=69baf5d2771bdb1749bce2ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29859-na-26756cb3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29859%3A%20n%2Fa&amp;severity=critical&amp;id=69bae7bf771bdb1749b7959f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30704-na-88a06cf6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30704%3A%20n%2Fa&amp;severity=critical&amp;id=69bae0bb771bdb1749b563da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30703-na-b3658dbf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30703%3A%20n%2Fa&amp;severity=critical&amp;id=69bae0bb771bdb1749b563d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30702-na-67ba7464</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30702%3A%20n%2Fa&amp;severity=critical&amp;id=69bae0bb771bdb1749b563d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30701-na-29b2ed2a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30701%3A%20n%2Fa&amp;severity=critical&amp;id=69bae0bb771bdb1749b563ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30048-na-a1cd5795</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30048%3A%20n%2Fa&amp;severity=medium&amp;id=69bae0bb771bdb1749b563c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29858-na-6892327b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29858%3A%20n%2Fa&amp;severity=high&amp;id=69bae0bb771bdb1749b563c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29856-na-335a9813</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29856%3A%20n%2Fa&amp;severity=high&amp;id=69bae0bb771bdb1749b563c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30695-na-bc21bf4d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30695%3A%20n%2Fa&amp;severity=medium&amp;id=69badd33771bdb1749b3b1b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30345-na-468e728e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30345%3A%20n%2Fa&amp;severity=high&amp;id=69badd33771bdb1749b3b1b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67830-na-7a5c8d00</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67830%3A%20n%2Fa&amp;severity=critical&amp;id=69bad9b2771bdb1749b2409b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67829-na-b7fdee79</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67829%3A%20n%2Fa&amp;severity=critical&amp;id=69bacf27771bdb1749ad8337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55046-na-0b9434d0</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55046%3A%20n%2Fa&amp;severity=high&amp;id=69bacf27771bdb1749ad8333</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55045-na-8ce233db</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55045%3A%20n%2Fa&amp;severity=high&amp;id=69bacf27771bdb1749ad832e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55044-na-2ac840c2</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55044%3A%20n%2Fa&amp;severity=high&amp;id=69bacf27771bdb1749ad8329</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55043-na-d4d61f97</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55043%3A%20n%2Fa&amp;severity=medium&amp;id=69bacf27771bdb1749ad8325</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55041-na-16a37252</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55041%3A%20n%2Fa&amp;severity=high&amp;id=69bacf27771bdb1749ad8321</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55040-na-ade2e734</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55040%3A%20n%2Fa&amp;severity=high&amp;id=69bacf27771bdb1749ad831d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-18-7ef0fac3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-18&amp;severity=medium&amp;id=69ba6fff771bdb174964e9e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-18-d1a9599d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-18&amp;severity=low&amp;id=69ba6fff771bdb174964e9bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27978-cwe-352-cross-site-request-forgery--f467b97f</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27978%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20vercel%20next.js&amp;severity=medium&amp;id=69b9ee21771bdb1749ef1e18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27977-cwe-1385-missing-origin-validation--d3f0918a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27977%3A%20CWE-1385%3A%20Missing%20Origin%20Validation%20in%20WebSockets%20in%20vercel%20next.js&amp;severity=low&amp;id=69b9ee21771bdb1749ef1e13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27895-cwe-185-incorrect-regular-expressio-4f0c19f3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27895%3A%20CWE-185%3A%20Incorrect%20Regular%20Expression%20in%20LDAPAccountManager%20lam&amp;severity=medium&amp;id=69b9ee21771bdb1749ef1e0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27894-cwe-98-improper-control-of-filename-350674cd</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27894%3A%20CWE-98%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20LDAPAccountManager%20lam&amp;severity=high&amp;id=69b9ea9e771bdb1749ed199c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27459-cwe-120-buffer-copy-without-checkin-dc2b5449</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27459%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20pyca%20pyopenssl&amp;severity=high&amp;id=69b9e71a771bdb1749eb4c6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4355-cross-site-scripting-in-portabilis-i-bdf7c588</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4355%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=69b9e71a771bdb1749eb4c77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4354-cross-site-scripting-in-trendnet-tew-1222775d</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4354%3A%20Cross%20Site%20Scripting%20in%20TRENDnet%20TEW-824DRU&amp;severity=medium&amp;id=69b9e71a771bdb1749eb4c71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27448-cwe-636-not-failing-securely-failin-92685d63</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27448%3A%20CWE-636%3A%20Not%20Failing%20Securely%20(&apos;Failing%20Open&apos;)%20in%20pyca%20pyopenssl&amp;severity=low&amp;id=69b9e71a771bdb1749eb4c67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26004-cwe-639-authorization-bypass-throug-a14a243d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26004%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20getsentry%20sentry&amp;severity=medium&amp;id=69b9e71a771bdb1749eb4c62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26001-cwe-89-improper-neutralization-of-s-74e88095</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26001%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20glpi-project%20glpi-inventory-plugin&amp;severity=high&amp;id=69b9e397771bdb1749e6bc5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25937-cwe-287-improper-authentication-in--e6802984</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25937%3A%20CWE-287%3A%20Improper%20Authentication%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=69b9e397771bdb1749e6bc5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22727-cwe-306-in-cloudfoundry-cloud-found-0a9b4ea6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22727%3A%20CWE-306%20in%20Cloudfoundry%20Cloud%20Foundry&amp;severity=high&amp;id=69baebb5771bdb1749b8ee31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21994-easily-exploitable-vulnerability-al-d3394a07</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21994%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Edge%20Cloud%20Infrastructure%20Designer%20and%20Visualisation%20Toolkit.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Edge%20Cloud%20Infrastructure%20Designer%20and%20Visualisation%20Toolkit.%20in%20Oracle%20Corporation%20Oracle%20Edge%20Cloud%20Infrastructure%20Designer%20and%20Visualisation%20Toolkit&amp;severity=critical&amp;id=69baba10771bdb1749a5df9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1264-cwe-306-missing-authentication-for-c-f24c86cd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1264%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20IBM%20Sterling%20B2B%20Integrator&amp;severity=high&amp;id=69baebb5771bdb1749b8ee24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14031-cwe-77-improper-neutralization-of-s-5ae99fea</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14031%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20IBM%20Sterling%20B2B%20Integrator&amp;severity=high&amp;id=69baebb5771bdb1749b8ee17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20643-processing-maliciously-crafted-web--a352aaea</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20643%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20bypass%20Same%20Origin%20Policy%20in%20Apple%20Safari&amp;severity=medium&amp;id=69b9d90c771bdb1749de4be8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3856-cwe-353-missing-support-for-integrit-0459f212</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3856%3A%20CWE-353%20Missing%20support%20for%20integrity%20check%20in%20IBM%20Db2%20Recovery%20Expert&amp;severity=medium&amp;id=69baebb5771bdb1749b8ee3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1376-cwe-770-allocation-of-resources-with-360a5243</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1376%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling&amp;severity=high&amp;id=69b9d201771bdb1749dc5690</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1267-cwe-200-exposure-of-sensitive-inform-952ffa1e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1267%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20IBM%20Planning%20Analytics%20Local&amp;severity=medium&amp;id=69b9d201771bdb1749dc568d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14806-cwe-524-use-of-cache-containing-sen-0e309db2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14806%3A%20CWE-524%20Use%20of%20Cache%20Containing%20Sensitive%20Information%20in%20IBM%20Planning%20Analytics%20Local&amp;severity=medium&amp;id=69b9d201771bdb1749dc568a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32838-cwe-319-cleartext-transmission-of-s-bf676878</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32838%3A%20CWE-319%20Cleartext%20transmission%20of%20sensitive%20information%20in%20EDIMAX%20Technology%20Co.%2C%20Ltd.%20Edimax%20GS-5008PL&amp;severity=high&amp;id=69b9ce80771bdb1749db6340</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32839-cwe-352-cross-site-request-forgery--bbbd3906</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32839%3A%20CWE-352%20Cross-Site%20request%20forgery%20(CSRF)%20in%20EDIMAX%20Technology%20Co.%2C%20Ltd.%20Edimax%20GS-5008PL&amp;severity=medium&amp;id=69b9ce80771bdb1749db6345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32840-cwe-79-improper-neutralization-of-i-ec50d642</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32840%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20EDIMAX%20Technology%20Co.%2C%20Ltd.%20Edimax%20GS-5008PL&amp;severity=medium&amp;id=69b9ce80771bdb1749db634a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32842-cwe-312-cleartext-storage-of-sensit-517159b9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32842%3A%20CWE-312%20Cleartext%20storage%20of%20sensitive%20information%20in%20EDIMAX%20Technology%20Co.%2C%20Ltd.%20Edimax%20GS-5008PL&amp;severity=high&amp;id=69b9ce80771bdb1749db6354</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32841-cwe-1108-excessive-reliance-on-glob-a4b3dee3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32841%3A%20CWE-1108%20Excessive%20reliance%20on%20global%20variables%20in%20EDIMAX%20Technology%20Co.%2C%20Ltd.%20Edimax%20GS-5008PL&amp;severity=critical&amp;id=69b9ce80771bdb1749db634f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4349-improper-authentication-in-duende-id-d9d51608</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4349%3A%20Improper%20Authentication%20in%20Duende%20IdentityServer4&amp;severity=medium&amp;id=69b9ce80771bdb1749db6359</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2809-cwe-190-integer-overflow-or-wraparou-22bef509</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2809%3A%20CWE-190%20Integer%20overflow%20or%20wraparound%20in%20Netskope%20Endpoint%20DLP%20Module%20for%20Netskope%20Client&amp;severity=medium&amp;id=69b9bceb771bdb1749d5ffa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4359-cwe-158-improper-neutralization-of-n-2d40f3cd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4359%3A%20CWE-158%20Improper%20neutralization%20of%20null%20byte%20or%20NUL%20character%20in%20MongoDB%20Inc%20MongoDB%20C%20Driver&amp;severity=low&amp;id=69b9b25d771bdb1749d3370d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25936-cwe-89-improper-neutralization-of-s-c21df4bb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25936%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=69b9b25d771bdb1749d33705</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32981-cwe-22-improper-limitation-of-a-pat-0fe01765</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32981%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ray-project%20Ray&amp;severity=high&amp;id=69b9b25d771bdb1749d33708</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3563-cwe-1289-improper-validation-of-unsa-d870739f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3563%3A%20CWE-1289%20Improper%20validation%20of%20unsafe%20equivalence%20in%20input%20in%20Devolutions%20PowerShell%20Universal&amp;severity=medium&amp;id=69b9aedc771bdb1749d151fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4064-cwe-862-in-devolutions-powershell-un-f966a742</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4064%3A%20CWE-862%20in%20Devolutions%20PowerShell%20Universal&amp;severity=high&amp;id=69b9aedc771bdb1749d15200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4295-cwe-829-inclusion-of-functionality-f-7d79dd05</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4295%3A%20CWE-829%20Inclusion%20of%20functionality%20from%20untrusted%20control%20sphere%20in%20AWS%20Kiro%20IDE&amp;severity=high&amp;id=69b9aedc771bdb1749d15203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32836-cwe-789-memory-allocation-with-exce-2ce301df</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32836%3A%20CWE-789%20Memory%20allocation%20with%20excessive%20size%20value%20in%20mackron%20dr_libs%20dr_flac.h&amp;severity=medium&amp;id=69b9aedc771bdb1749d151f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32837-cwe-170-improper-null-termination-i-5eedb995</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32837%3A%20CWE-170%20Improper%20null%20termination%20in%20mackron%20miniaudio&amp;severity=medium&amp;id=69b9aedc771bdb1749d151f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4358-cwe-415-double-free-in-mongodb-inc-m-68de9898</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4358%3A%20CWE-415%20Double%20free%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=medium&amp;id=69b9aedc771bdb1749d15207</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15584-cwe-190-integer-overflow-or-wraparo-8dfc12a8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15584%3A%20CWE-190%20Integer%20overflow%20or%20wraparound%20in%20Netskope%20Endpoint%20DLP%20Module%20for%20Netskope%20Client&amp;severity=medium&amp;id=69b9aedc771bdb1749d151ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66342-cwe-843-access-of-resource-using-in-3d123839</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66342%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Canva%20Affinity&amp;severity=high&amp;id=69b9aee0771bdb1749d152d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62500-cwe-125-out-of-bounds-read-in-canva-15a9bf0b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62500%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aedc771bdb1749d1520e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61979-cwe-125-out-of-bounds-read-in-canva-485677cf</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61979%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aedc771bdb1749d1520a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64733-cwe-125-out-of-bounds-read-in-canva-1672385e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64733%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aede771bdb1749d1527e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66000-cwe-125-out-of-bounds-read-in-canva-8e074563</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66000%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aee0771bdb1749d152cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64301-cwe-787-out-of-bounds-write-in-canv-6642b6f1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64301%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Canva%20Affinity&amp;severity=high&amp;id=69b9aede771bdb1749d1527a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64776-cwe-125-out-of-bounds-read-in-canva-f769b895</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64776%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aede771bdb1749d15286</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64735-cwe-125-out-of-bounds-read-in-canva-856c0bfd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64735%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aede771bdb1749d15282</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66633-cwe-125-out-of-bounds-read-in-canva-a1da5d6c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66633%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aee0771bdb1749d152e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58427-cwe-125-out-of-bounds-read-in-canva-9906ffa1</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58427%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aede771bdb1749d1526e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66617-cwe-125-out-of-bounds-read-in-canva-fd95fd2e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66617%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aee0771bdb1749d152dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47873-cwe-125-out-of-bounds-read-in-canva-f292661c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47873%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aede771bdb1749d1526a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61952-cwe-125-out-of-bounds-read-in-canva-67336838</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61952%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aede771bdb1749d15272</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66503-cwe-125-out-of-bounds-read-in-canva-0c616519</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66503%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aee0771bdb1749d152d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66042-cwe-125-out-of-bounds-read-in-canva-69b1913a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66042%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aee0771bdb1749d152d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65119-cwe-125-out-of-bounds-read-in-canva-509aa906</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65119%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aee0771bdb1749d152c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62403-cwe-125-out-of-bounds-read-in-canva-ce41bab2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62403%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aede771bdb1749d15276</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20726-cwe-125-out-of-bounds-read-in-canva-d616f23f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20726%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aede771bdb1749d15262</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22882-cwe-125-out-of-bounds-read-in-canva-faf26082</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22882%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aede771bdb1749d15266</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3207-cwe-306-missing-authentication-for-c-2e3ff132</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3207%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20TIBCO%20TIBCO%20BPM%20Enterprise&amp;severity=high&amp;id=69b9a0ca771bdb1749cca9bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21570-rce-remote-code-execution-in-atlass-f80a393b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21570%3A%20RCE%20(Remote%20Code%20Execution)%20in%20Atlassian%20Bamboo%20Data%20Center&amp;severity=high&amp;id=69b99a3b771bdb1749cb0c60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25534-cwe-918-server-side-request-forgery-618622b4</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25534%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20io.spinnaker.clouddriver%20clouddriver-artifacts&amp;severity=critical&amp;id=69b992ba771bdb1749c53e0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32298-cwe-78-improper-neutralization-of-s-126d8a3d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32298%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ANGEET%20ES3%20KVM&amp;severity=high&amp;id=69b992ba771bdb1749c53e3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32297-cwe-306-missing-authentication-for--72cb42a6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32297%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20ANGEET%20ES3%20KVM&amp;severity=critical&amp;id=69b992ba771bdb1749c53e35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32296-cwe-306-missing-authentication-for--85524cc6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32296%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Sipeed%20NanoKVM&amp;severity=high&amp;id=69b992ba771bdb1749c53e2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32293-cwe-295-improper-certificate-valida-f28092a1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32293%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20GL-iNet%20Comet%20KVM&amp;severity=low&amp;id=69b992ba771bdb1749c53e28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32292-cwe-307-improper-restriction-of-exc-7d4b6f55</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32292%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20GL-iNet%20Comet%20KVM&amp;severity=critical&amp;id=69b992ba771bdb1749c53e22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32291-cwe-306-missing-authentication-for--185e1423</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32291%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20GL-iNet%20Comet%20KVM&amp;severity=high&amp;id=69b992ba771bdb1749c53e1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32290-cwe-345-insufficient-verification-o-e7ed7343</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32290%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20GL-iNet%20Comet%20KVM&amp;severity=high&amp;id=69b992ba771bdb1749c53e15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4319-sql-injection-in-code-projects-simpl-7d8938bb</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4319%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Food%20Order%20System&amp;severity=medium&amp;id=69b98f36771bdb1749c45e0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4148-cwe-416-use-after-free-in-mongodb-in-c2315488</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4148%3A%20CWE-416%20Use%20after%20free%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=high&amp;id=69b99a3b771bdb1749cb0c92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4147-cwe-457-use-of-uninitialized-variabl-286bf321</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4147%3A%20CWE-457%20Use%20of%20uninitialized%20variable%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=high&amp;id=69b99a3b771bdb1749cb0c8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uk-companies-house-exposed-details-of-millions-of--23f1964d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UK%20Companies%20House%20Exposed%20Details%20of%20Millions%20of%20Firms&amp;severity=medium&amp;id=69b97666771bdb1749bd173a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21886-cwe-285-improper-authorization-in-o-93d93ba5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21886%3A%20CWE-285%3A%20Improper%20Authorization%20in%20OpenCTI-Platform%20opencti&amp;severity=medium&amp;id=69b99a3b771bdb1749cb0c72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23759-cwe-78-improper-neutralization-of-s-623ecb96</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23759%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Perle%20Systems%20IOLAN%20STS&amp;severity=high&amp;id=69b99a3b771bdb1749cb0c80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-botnet-exposed-via-open-directory-15-node--998fdeec</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20Botnet%20Exposed%20via%20Open%20Directory%3A%2015-Node%20Relay%20Network%20and%20Active%20C2&amp;severity=medium&amp;id=69b9ab21771bdb1749cfc092</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4318-buffer-overflow-in-utt-hiper-810g-ec790824</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4318%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20810G&amp;severity=high&amp;id=69b96f91771bdb1749ba8fa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3564-cwe-347-improper-verification-of-cry-bef713bb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3564%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20ConnectWise%20ScreenConnect&amp;severity=critical&amp;id=69b96f91771bdb1749ba8fa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13406-cwe-476-null-pointer-dereference-in-1d82e42d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13406%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Softing%20smartLink%20SW-HT&amp;severity=medium&amp;id=69b9688b771bdb1749b843f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3888-cwe-268-privilege-chaining-eecd8b2c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3888%3A%20CWE-268%20Privilege%20chaining&amp;severity=high&amp;id=69b96182771bdb1749b5a60b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4324-improper-neutralization-of-special-e-98fe071b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4324%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Red%20Hat%20Red%20Hat%20Satellite%206.17%20for%20RHEL%209&amp;severity=medium&amp;id=69b96182771bdb1749b5a60e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/robotic-surgery-giant-intuitive-discloses-cyberatt-4fdbff55</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Robotic%20Surgery%20Giant%20Intuitive%20Discloses%20Cyberattack&amp;severity=medium&amp;id=69b95a46771bdb1749b2c340</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/174-vulnerabilities-targeted-by-rondodox-botnet-bc9d0c8d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=174%20Vulnerabilities%20Targeted%20by%20RondoDox%20Botnet&amp;severity=medium&amp;id=69b94c36771bdb1749acf1d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62320-cwe-79-improper-neutralization-of-i-2b1a260a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62320%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20HCL%20Sametime&amp;severity=medium&amp;id=69b948e6771bdb1749ab9e4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ipv4-mapped-ipv6-addresses-tue-mar-17th-d7adc16f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=IPv4%20Mapped%20IPv6%20Addresses%2C%20(Tue%2C%20Mar%2017th)&amp;severity=medium&amp;id=69b93e26771bdb1749a50eea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31966-cwe-20-improper-input-validation-in-92f29c54</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31966%3A%20CWE-20%20Improper%20input%20validation%20in%20HCL%20Sametime&amp;severity=low&amp;id=69b93e6f771bdb1749a53234</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4271-use-after-free-in-red-hat-red-hat-en-295694a0</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4271%3A%20Use%20After%20Free%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69b93ad5771bdb1749a35140</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hydra-saiga-covert-espionage-and-infiltration-of-c-bebbdde9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hydra%20Saiga%3A%20Covert%20Espionage%20and%20Infiltration%20of%20Critical%20Utilities&amp;severity=medium&amp;id=69b9371d771bdb17499ff040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-backdoor-targeting-ukrainian-entities-with-pos-73165a5a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20backdoor%20targeting%20Ukrainian%20entities%20with%20possible%20links%20to%20Laundry%20Bear&amp;severity=medium&amp;id=69b93aa1771bdb1749a33193</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-slopoly-start-to-ai-enhanced-ransomware-attacks-1c535291</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20Slopoly%20start%20to%20AI-enhanced%20ransomware%20attacks&amp;severity=medium&amp;id=69b93aa1771bdb1749a3316b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-flags-year-old-wing-ftp-vulnerability-as-expl-5d2349a3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Flags%20Year-Old%20Wing%20FTP%20Vulnerability%20as%20Exploited&amp;severity=medium&amp;id=69b9339a771bdb17499dd609</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/endgame-harvesting-inside-acrstealers-modern-infra-956f280d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Endgame%20Harvesting%3A%20Inside%20ACRStealer&apos;s%20Modern%20Infrastructure&amp;severity=medium&amp;id=69b93aa1771bdb1749a33163</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28563-cwe-732-incorrect-permission-assign-799b8643</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28563%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=medium&amp;id=69b93751771bdb1749a0201b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26929-cwe-732-incorrect-permission-assign-fb1d7d04</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26929%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=medium&amp;id=69b93751771bdb1749a02016</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30911-cwe-862-missing-authorization-in-ap-4e7a9ef7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30911%3A%20CWE-862%20Missing%20Authorization%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=high&amp;id=69b93751771bdb1749a0201f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-apis-and-ddos-collide-in-new-era-of-coordinated-b3ee374b</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%2C%20APIs%20and%20DDoS%20Collide%20in%20New%20Era%20of%20Coordinated%20Cyberattacks&amp;severity=medium&amp;id=69b93017771bdb17499c4735</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28779-cwe-668-exposure-of-resource-to-wro-1025f596</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28779%3A%20CWE-668%3A%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=high&amp;id=69b92cc9771bdb17499ac8a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3633-improper-neutralization-of-crlf-sequ-26894e87</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3633%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=low&amp;id=69b95372771bdb1749b00bbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3632-improper-validation-of-syntactic-cor-2a317359</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3632%3A%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=low&amp;id=69b95372771bdb1749b00bb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3634-improper-neutralization-of-crlf-sequ-4222e252</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3634%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=low&amp;id=69b99a3b771bdb1749cb0cab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacked-sites-deliver-vidar-infostealer-to-windows--2b7c4a7b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacked%20sites%20deliver%20Vidar%20infostealer%20to%20Windows%20users&amp;severity=medium&amp;id=69b91afd771bdb17498f40cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4208-cwe-639-in-typo3-extension-e-mail-mf-74236ea3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4208%3A%20CWE-639%20in%20TYPO3%20Extension%20%22E-Mail%20MFA%20Provider%22&amp;severity=high&amp;id=69b917ad771bdb17498cd9dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4202-cwe-862-in-typo3-extension-redirect--04ee806f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4202%3A%20CWE-862%20in%20TYPO3%20Extension%20%22Redirect%20Tabs%22&amp;severity=low&amp;id=69b917ad771bdb17498cd9da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1323-cwe-502-deserialization-of-untrusted-3f51a0d5</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1323%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20TYPO3%20Extension%20%22Mailqueue%22&amp;severity=medium&amp;id=69b917ad771bdb17498cd9d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32586-cwe-862-missing-authorization-in-pl-b291f66c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32586%3A%20Missing%20Authorization%20in%20Pluggabl%20Booster%20for%20WooCommerce&amp;severity=medium&amp;id=69b9142a771bdb17498971f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4312-cwe-306-missing-authentication-for-c-6cd3271e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4312%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20DrangSoft%20GCB%2FFCB%20Audit%20Software&amp;severity=critical&amp;id=69b90619771bdb17497bdc07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3237-low-privilege-user-can-modify-global-3a86964d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3237%3A%20Low-Privilege%20User%20Can%20Modify%20Global%20Signing%20Key%20Settings%20in%20Octopus%20Deploy%20Octopus%20Server&amp;severity=low&amp;id=69b8ff11771bdb174976d616</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4258-improper-verification-of-cryptograph-603f7543</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4258%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20sjcl&amp;severity=high&amp;id=69b8e675771bdb17495b6829</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4308-server-side-request-forgery-in-frdel-ed62dd56</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4308%3A%20Server-Side%20Request%20Forgery%20in%20frdel%20agent-zero&amp;severity=medium&amp;id=69b8d4e1771bdb17492801c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2373-cwe-862-missing-authorization-in-wpr-b6b21bec</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2373%3A%20CWE-862%20Missing%20Authorization%20in%20wproyal%20Royal%20Addons%20for%20Elementor%20%E2%80%93%20Addons%20and%20Templates%20Kit%20for%20Elementor&amp;severity=medium&amp;id=69b8d4e1771bdb17492801b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4307-path-traversal-in-frdel-agent-zero-cefe85ed</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4307%3A%20Path%20Traversal%20in%20frdel%20agent-zero&amp;severity=medium&amp;id=69b8d4e1771bdb17492801bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2579-cwe-89-improper-neutralization-of-sp-b6d47505</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2579%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpxpo%20WowStore%20%E2%80%93%20Store%20Builder%20%26%20Product%20Blocks%20for%20WooCommerce&amp;severity=high&amp;id=69b99a3b771bdb1749cb0ca3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4289-sql-injection-in-tiandy-easy7-integr-ae21908d</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4289%3A%20SQL%20Injection%20in%20Tiandy%20Easy7%20Integrated%20Management%20Platform&amp;severity=medium&amp;id=69b99a3b771bdb1749cb0cbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4288-sql-injection-in-tiandy-easy7-integr-06ab2258</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4288%3A%20SQL%20Injection%20in%20Tiandy%20Easy7%20Integrated%20Management%20Platform&amp;severity=medium&amp;id=69b99a3b771bdb1749cb0cb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-17-e13fec01</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-17&amp;severity=medium&amp;id=69b9edea771bdb1749ee41fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-17-2ec304ef</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-17&amp;severity=medium&amp;id=69b9dfdb771bdb1749e025a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30707-na-821062bf</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30707%3A%20n%2Fa&amp;severity=high&amp;id=69b9aedc771bdb1749d151f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-17-ef279015</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-17&amp;severity=low&amp;id=69b94fb7771bdb1749ae96c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4287-sql-injection-in-tiandy-easy7-integr-93aff348</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4287%3A%20SQL%20Injection%20in%20Tiandy%20Easy7%20Integrated%20Management%20Platform&amp;severity=medium&amp;id=69b8991d771bdb17496c94d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4285-path-traversal-in-taoofagi-easegen-a-f6a4578b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4285%3A%20Path%20Traversal%20in%20taoofagi%20easegen-admin&amp;severity=medium&amp;id=69b895a6771bdb17496b6f2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iocs-indicators-of-compromise-for-the-coruna-ios-i-77074cb0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=IoCs%20(Indicators%20of%20Compromise)%20for%20the%20Coruna%20iOS%20iPhone%20Web%20Malware%20Client%20Side%20Exploits%20Serving%20Web%20Malware%20Exploitation%20Kit&amp;severity=medium&amp;id=69b8a719771bdb1749884ee8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4284-server-side-request-forgery-in-taoof-abfaecba</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4284%3A%20Server-Side%20Request%20Forgery%20in%20taoofagi%20easegen-admin&amp;severity=medium&amp;id=69b88e92771bdb17496901d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4177-cwe-122-heap-based-buffer-overflow-i-afb533fd</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4177%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20TODDR%20YAML%3A%3ASyck&amp;severity=critical&amp;id=69b96182771bdb1749b5a612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21991-a-dtrace-component-dtprobed-allows--d5010724</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21991%3A%20A%20DTrace%20component%2C%20dtprobed%2C%20allows%20arbitrary%20file%20creation%20through%20crafted%20USDT%20provider%20names.%20in%20Oracle%20Corporation%20Oracle%20Linux&amp;severity=medium&amp;id=69b99a3b771bdb1749cb0c9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29522-cwe-22-improper-limitation-of-a-pat-de2651fe</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29522%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ZwickRoell%20GmbH%20%26%20Co.%20KG%20Test%20Data%20Management&amp;severity=high&amp;id=69b86eef771bdb1749567832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30882-cwe-79-improper-neutralization-of-i-1bcc0b7d</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30882%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69b860dd771bdb17494840b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30881-cwe-89-improper-neutralization-of-s-35a3f971</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30881%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69b859da771bdb17492b2d9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30876-cwe-204-observable-response-discrep-5062e6d7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30876%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69b859da771bdb17492b2d9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30875-cwe-94-improper-control-of-generati-e8036721</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30875%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69b859da771bdb17492b2d97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28430-cwe-89-improper-neutralization-of-s-36133b16</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28430%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=critical&amp;id=69b859da771bdb17492b2d8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29516-cwe-732-incorrect-permission-assign-d2fa831b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29516%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Buffalo%20TeraStation%20NAS%20TS5400R&amp;severity=medium&amp;id=69b859da771bdb17492b2d93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32267-cwe-863-incorrect-authorization-in--65bf3522</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32267%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20craftcms%20cms&amp;severity=high&amp;id=69b859da771bdb17492b2db2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32264-cwe-470-use-of-externally-controlle-86230fad</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32264%3A%20CWE-470%3A%20Use%20of%20Externally-Controlled%20Input%20to%20Select%20Classes%20or%20Code%20(&apos;Unsafe%20Reflection&apos;)%20in%20craftcms%20cms&amp;severity=high&amp;id=69b859da771bdb17492b2dac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32263-cwe-470-use-of-externally-controlle-1ff05d12</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32263%3A%20CWE-470%3A%20Use%20of%20Externally-Controlled%20Input%20to%20Select%20Classes%20or%20Code%20(&apos;Unsafe%20Reflection&apos;)%20in%20craftcms%20cms&amp;severity=high&amp;id=69b859da771bdb17492b2da7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32262-cwe-22-improper-limitation-of-a-pat-86adf377</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32262%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20craftcms%20cms&amp;severity=medium&amp;id=69b859da771bdb17492b2da3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32261-cwe-1336-improper-neutralization-of-a2ec3f2c</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32261%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20craftcms%20webhooks&amp;severity=high&amp;id=69b852cf771bdb174922885d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69196-cwe-863-incorrect-authorization-in--28778044</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69196%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20jlowin%20fastmcp&amp;severity=high&amp;id=69b84f4b771bdb17491f5f9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4269-cwe-340-generation-of-predictable-nu-fb138d24</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4269%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20AWS%20Bedrock%20AgentCore%20Starter%20Toolkit&amp;severity=high&amp;id=69b84a02771bdb1749186945</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4224-vulnerability-in-python-software-fou-801a81ac</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4224%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=69b84a02771bdb174918693d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3644-vulnerability-in-python-software-fou-f654c911</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3644%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=69b84a02771bdb174918694f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4254-stack-based-buffer-overflow-in-tenda-501e8b3e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4254%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC8&amp;severity=critical&amp;id=69b84a02771bdb174918695c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23862-cwe-77-improper-neutralization-of-s-596c049d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23862%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Dell%20ThinOS%2010&amp;severity=high&amp;id=69b84a02771bdb1749186949</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23489-cwe-20-improper-input-validation-in-9483a14f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23489%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20pluginsGLPI%20fields&amp;severity=critical&amp;id=69b83bfc9d4df4518377219e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4253-os-command-injection-in-tenda-ac8-dda13ebe</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4253%3A%20OS%20Command%20Injection%20in%20Tenda%20AC8&amp;severity=medium&amp;id=69b83bfc9d4df451837721b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29510-cwe-79-improper-neutralization-of-i-09a1b43e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29510%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Shenzhen%20Hereta%20Technology%20Co.%2C%20Ltd.%20Hereta%20ETH-IMC408M&amp;severity=medium&amp;id=69b83bfc9d4df451837721a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29513-cwe-79-improper-neutralization-of-i-f7867d3d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29513%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Shenzhen%20Hereta%20Technology%20Co.%2C%20Ltd.%20Hereta%20ETH-IMC408M&amp;severity=medium&amp;id=69b83bfc9d4df451837721a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29520-cwe-79-improper-neutralization-of-i-b64081a0</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29520%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Shenzhen%20Hereta%20Technology%20Co.%2C%20Ltd.%20Hereta%20ETH-IMC408M&amp;severity=medium&amp;id=69b83bfc9d4df451837721aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29521-cwe-352-cross-site-request-forgery--51f9174d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29521%3A%20CWE-352%20Cross-Site%20request%20forgery%20(CSRF)%20in%20Shenzhen%20Hereta%20Technology%20Co.%2C%20Ltd.%20Hereta%20ETH-IMC408M&amp;severity=medium&amp;id=69b83bfc9d4df451837721ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4252-reliance-on-ip-address-for-authentic-a9de4650</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4252%3A%20Reliance%20on%20IP%20Address%20for%20Authentication%20in%20Tenda%20AC8&amp;severity=critical&amp;id=69b834f39d4df4518372fd6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4270-cwe-424-improper-protection-of-alter-47f937dc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4270%3A%20CWE-424%3A%20Improper%20Protection%20of%20Alternate%20Path%20in%20AWS%20AWS%20API%20MCP%20Server&amp;severity=medium&amp;id=69b8316f9d4df4518370fea8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4251-unprotected-storage-of-credentials-i-283d0ba5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4251%3A%20Unprotected%20Storage%20of%20Credentials%20in%20CityData%20CityChat&amp;severity=low&amp;id=69b8316f9d4df4518370fea2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/oracle-ebs-hack-only-4-corporate-giants-still-sile-f1281a4e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Oracle%20EBS%20Hack%3A%20Only%204%20Corporate%20Giants%20Still%20Silent%20on%20Potential%20Impact&amp;severity=medium&amp;id=69b826b09d4df451836ba889</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4250-unprotected-storage-of-credentials-i-16e58c2c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4250%3A%20Unprotected%20Storage%20of%20Credentials%20in%20Albert%20Sa%C4%9Fl%C4%B1k%20Hizmetleri%20ve%20Ticaret%20Albert%20Health&amp;severity=low&amp;id=69b84a02771bdb1749186969</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4276-cwe-20-improper-input-validation-in--25cdf739</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4276%3A%20CWE-20%20Improper%20Input%20Validation%20in%20LibreChat%20RAG%20API&amp;severity=high&amp;id=69b8316f9d4df4518370feb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62319-cwe-89-improper-neutralization-of-s-e743fbfb</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62319%3A%20CWE-89%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20injection&apos;)%20in%20HCL%20Unica&amp;severity=critical&amp;id=69b84a02771bdb1749186966</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32587-cwe-862-missing-authorization-in-sa-b875c90e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32587%3A%20Missing%20Authorization%20in%20Saad%20Iqbal%20WP%20EasyPay&amp;severity=medium&amp;id=69b82a679d4df451836d9f72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/covert-rat-phishing-campaign-78be4171</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=COVERT%20RAT%3A%20Phishing%20Campaign&amp;severity=medium&amp;id=69b84937771bdb1749174e11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gopix-banking-trojan-targeting-brazilian-financial-e4520c26</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GoPix%20banking%20Trojan%20targeting%20Brazilian%20financial%20institutions&amp;severity=medium&amp;id=69b84bd2771bdb17491b7596</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/when-ai-hallucinations-turn-fatal-how-to-stay-grou-32659fc4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=When%20AI%20hallucinations%20turn%20fatal%3A%20how%20to%20stay%20grounded%20in%20reality%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69b820159d4df4518368ef91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32583-cwe-862-missing-authorization-in-we-e193183a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32583%3A%20CWE-862%20Missing%20Authorization%20in%20Webnus%20Inc.%20Modern%20Events%20Calendar&amp;severity=medium&amp;id=69b84a02771bdb174918694c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/16th-march-threat-intelligence-report-4bbef5d8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=16th%20March%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=69b8200e9d4df4518368ee85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4243-unprotected-storage-of-credentials-i-1cba1252</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4243%3A%20Unprotected%20Storage%20of%20Credentials%20in%20La%20Nacion%20App&amp;severity=low&amp;id=69b84a03771bdb1749186ae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2274-cwe-79-improper-neutralization-of-in-84affa94</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2274%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Forcepoint%20Web%20Security%20(On-Prem)&amp;severity=medium&amp;id=69b84a03771bdb1749186ad4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52642-vulnerability-in-hcl-aion-2fa9faee</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52642%3A%20Vulnerability%20in%20HCL%20AION&amp;severity=low&amp;id=69b84a03771bdb1749186ad7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52646-vulnerability-in-hcl-aion-de4338ac</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52646%3A%20Vulnerability%20in%20HCL%20AION&amp;severity=low&amp;id=69b84a03771bdb1749186add</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/security-firm-executive-targeted-in-sophisticated--5b7b2a9f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Security%20Firm%20Executive%20Targeted%20in%20Sophisticated%20Phishing%20Attack&amp;severity=medium&amp;id=69b8189f9d4df451836392af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52645-vulnerability-in-hcl-aion-65575b34</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52645%3A%20Vulnerability%20in%20HCL%20AION&amp;severity=low&amp;id=69b84a03771bdb1749186ada</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52649-vulnerability-in-hcl-aion-0c892b9b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52649%3A%20Vulnerability%20in%20HCL%20AION&amp;severity=low&amp;id=69b818e49d4df4518363a2f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4242-unprotected-storage-of-credentials-i-626d3672</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4242%3A%20Unprotected%20Storage%20of%20Credentials%20in%20BabyChakra%20Pregnancy%20%26%20Parenting%20App&amp;severity=low&amp;id=69b818e49d4df4518363a2fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52644-vulnerability-in-hcl-aion-d7b212a1</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52644%3A%20Vulnerability%20in%20HCL%20AION&amp;severity=medium&amp;id=69b818e49d4df4518363a2f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52643-vulnerability-in-hcl-aion-ed82191c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52643%3A%20Vulnerability%20in%20HCL%20AION&amp;severity=medium&amp;id=69b818e49d4df4518363a2ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52636-vulnerability-in-hcl-aion-eb617ebe</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52636%3A%20Vulnerability%20in%20HCL%20AION&amp;severity=low&amp;id=69b818e49d4df4518363a2ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25369-cwe-79-improper-neutralization-of-i-14cd5f30</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25369%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20flexmls%20Flexmls%C2%AE%20IDX&amp;severity=high&amp;id=69b818e49d4df4518363a2f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4241-sql-injection-in-itsourcecode-colleg-d3050c33</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4241%3A%20SQL%20Injection%20in%20itsourcecode%20College%20Management%20System&amp;severity=medium&amp;id=69b818e49d4df4518363a30b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/proxy-url-scans-with-ip-addresses-mon-mar-16th-c643cc2f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%2Fproxy%2F%20URL%20scans%20with%20IP%20addresses%2C%20(Mon%2C%20Mar%2016th)&amp;severity=medium&amp;id=69b80a8f9d4df451835f7661</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4240-denial-of-service-in-open5gs-6a8519b4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4240%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=69b818e49d4df4518363a301</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10461-cwe-20-improper-input-validation-in-97b28249</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10461%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Softing%20smartLink%20SW-HT&amp;severity=medium&amp;id=69b8073f9d4df451835e8b6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10685-cwe-122-heap-based-buffer-overflow--75669fe2</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10685%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Softing%20smartLink%20SW-PN&amp;severity=high&amp;id=69b8073f9d4df451835e8b6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4239-improperly-controlled-modification-o-027708a7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4239%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20in%20Lagom%20WHMCS%20Template&amp;severity=medium&amp;id=69b8073f9d4df451835e8b72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52648-vulnerability-in-hcl-aion-ac473d72</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52648%3A%20Vulnerability%20in%20HCL%20AION&amp;severity=medium&amp;id=69b800489d4df451835c3dee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-hackers-hit-asian-militaries-in-patie-149f8505</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20Hackers%20Hit%20Asian%20Militaries%20in%20Patient%20Espionage%20Operation&amp;severity=medium&amp;id=69b800039d4df451835c3061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52638-vulnerability-in-hcl-aion-8685d6f5</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52638%3A%20Vulnerability%20in%20HCL%20AION&amp;severity=medium&amp;id=69b800489d4df451835c3deb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4238-sql-injection-in-itsourcecode-colleg-f8d11167</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4238%3A%20SQL%20Injection%20in%20itsourcecode%20College%20Management%20System&amp;severity=medium&amp;id=69b7f94a9d4df45183593df8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-actor-targeting-vpn-users-in-new-credential-3b4bb8bc</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Actor%20Targeting%20VPN%20Users%20in%20New%20Credential%20Theft%20Campaign&amp;severity=medium&amp;id=69b7f8fb9d4df45183592dd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52637-vulnerability-in-hcl-aion-8b430d7c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52637%3A%20Vulnerability%20in%20HCL%20AION&amp;severity=medium&amp;id=69b7f94a9d4df45183593df5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4237-sql-injection-in-itsourcecode-free-h-77ceda32</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4237%3A%20SQL%20Injection%20in%20itsourcecode%20Free%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=69b7f5ac9d4df45183583c12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/forcememo-python-repositories-compromised-in-glass-95b214ca</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ForceMemo%3A%20Python%20Repositories%20Compromised%20in%20GlassWorm%20Aftermath&amp;severity=medium&amp;id=69b7f1f59d4df45183566d03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3476-cwe-94-improper-control-of-generatio-12313441</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3476%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Dassault%20Syst%C3%A8mes%20SOLIDWORKS%20Desktop&amp;severity=high&amp;id=69b7f2399d4df4518356864e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4236-sql-injection-in-itsourcecode-online-f9dbc71d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4236%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Enrollment%20System&amp;severity=medium&amp;id=69b84a03771bdb1749186ae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4235-sql-injection-in-itsourcecode-online-b710fa80</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4235%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Enrollment%20System&amp;severity=medium&amp;id=69b7e79a9d4df45183527dcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/web-shells-tunnels-and-ransomware-dissecting-a-war-60be0a41</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Web%20Shells%2C%20Tunnels%2C%20and%20Ransomware%3A%20Dissecting%20a%20Warlock%20Attack&amp;severity=medium&amp;id=69b8529a771bdb1749224218</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maas-vipkeylogger-campaign-62b90e30</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MAAS%20VIP_Keylogger%20Campaign&amp;severity=medium&amp;id=69b7e3e19d4df45183505ac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15554-cwe-525-use-of-web-browser-cache-co-e8f7211f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15554%3A%20CWE-525%20Use%20of%20web%20browser%20cache%20containing%20sensitive%20information%20in%20Truesec%20LAPSWebUI&amp;severity=medium&amp;id=69b7e4169d4df451835079ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15553-cwe-613-insufficient-session-expira-9c9413c3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15553%3A%20CWE-613%20Insufficient%20session%20expiration%20in%20Truesec%20LAPSWebUI&amp;severity=medium&amp;id=69b7e4169d4df451835079c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15552-cwe-613-insufficient-session-expira-6d752576</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15552%3A%20CWE-613%20Insufficient%20session%20expiration%20in%20Truesec%20LAPSWebUI&amp;severity=medium&amp;id=69b7e4169d4df451835079c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4234-sql-injection-in-sscms-de760972</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4234%3A%20SQL%20Injection%20in%20SSCMS&amp;severity=medium&amp;id=69b7e4169d4df451835079cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/investigating-a-new-click-fix-variant-2fbb75b6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Investigating%20a%20new%20Click-fix%20variant&amp;severity=medium&amp;id=69b7e3e19d4df45183505ada</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-camelclone-multi-region-espionage-campai-046fce4b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20CamelClone%3A%20Multi-Region%20Espionage%20Campaign%20Targets%20Government%20and%20Defense%20Entities%20Amidst%20Regional%20Tensions&amp;severity=medium&amp;id=69b7e05e9d4df451834e770f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-nexus-threat-actor-targets-persian-gulf-regi-90bc51f8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-nexus%20Threat%20Actor%20Targets%20Persian%20Gulf%20Region%20With%20PlugX&amp;severity=medium&amp;id=69b7e05e9d4df451834e7746</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/storm-2561-uses-seo-poisoning-to-distribute-fake-v-c8e82c49</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Storm-2561%20uses%20SEO%20poisoning%20to%20distribute%20fake%20VPN%20clients%20for%20credential%20theft&amp;severity=medium&amp;id=69b7e05e9d4df451834e7765</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/handala-hack-unveiling-groups-modus-operandi-18c33a2a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%22Handala%20Hack%22%20-%20Unveiling%20Group&apos;s%20Modus%20Operandi&amp;severity=medium&amp;id=69b7dcda9d4df451834d1c41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishers-hide-scam-links-with-ipv6-trick-in-free-t-c357d956</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishers%20hide%20scam%20links%20with%20IPv6%20trick%20in%20&apos;free%20toothbrush&apos;%20emails&amp;severity=medium&amp;id=69b7dcda9d4df451834d1c52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3024-cwe-79-improper-neutralization-of-in-84fc643b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3024%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Wakyma%20Wakyma%20application%20web&amp;severity=medium&amp;id=69b8073f9d4df451835e8b7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3023-cwe-943-improper-neutralization-of-s-0133fd93</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3023%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20Wakyma%20Wakyma%20application%20web&amp;severity=medium&amp;id=69b8073f9d4df451835e8b79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3022-cwe-943-improper-neutralization-of-s-a0c7d77b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3022%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20Wakyma%20Wakyma%20application%20web&amp;severity=high&amp;id=69b84a03771bdb1749186ad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3021-cwe-943-improper-neutralization-of-s-fb751ce2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3021%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20Wakyma%20Wakyma%20application%20web&amp;severity=high&amp;id=69b84a03771bdb1749186ace</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3020-cwe-639-authorization-bypass-through-ef6ac061</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3020%3A%20CWE-639%20Authorization%20bypass%20through%20User-Controlled%20key%20in%20Wakyma%20Wakyma%20application%20web&amp;severity=high&amp;id=69b84a03771bdb1749186acb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4233-path-traversal-in-thingsgateway-9caba6cd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4233%3A%20Path%20Traversal%20in%20ThingsGateway&amp;severity=medium&amp;id=69b8316f9d4df4518370feac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3111-cwe-284-improper-access-control-in-e-4e65eb21</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3111%3A%20CWE-284%20Improper%20Access%20Control%20in%20Educativa%20Campus&amp;severity=medium&amp;id=69b84a05771bdb1749186bd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3110-cwe-284-improper-access-control-in-e-26eaccd0</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3110%3A%20CWE-284%20Improper%20Access%20Control%20in%20Educativa%20Campus&amp;severity=high&amp;id=69b84a03771bdb1749186af0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4232-sql-injection-in-tiandy-integrated-m-54116443</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4232%3A%20SQL%20Injection%20in%20Tiandy%20Integrated%20Management%20Platform&amp;severity=medium&amp;id=69b7d6069d4df45183495a6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11500-cwe-261-weak-encoding-for-password--70649efc</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11500%3A%20CWE-261%20Weak%20Encoding%20for%20Password%20in%20tinycontrol%20Lan%20Kontroler%20v3.5&amp;severity=high&amp;id=69b7d6069d4df45183495a5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15587-cwe-425-direct-request-forced-brows-8a07be74</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15587%3A%20CWE-425%20Direct%20Request%20(&apos;Forced%20Browsing&apos;)%20in%20tinycontrol%20Lan%20Kontroler%20v3.5&amp;severity=high&amp;id=69b7d6069d4df45183495a65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4231-server-side-request-forgery-in-vanna-0c884c83</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4231%3A%20Server-Side%20Request%20Forgery%20in%20vanna-ai%20vanna&amp;severity=medium&amp;id=69b7d6069d4df45183495a72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacking-attempt-reported-at-polands-nuclear-resear-c106b6db</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacking%20Attempt%20Reported%20at%20Poland%E2%80%99s%20Nuclear%20Research%20Center&amp;severity=medium&amp;id=69b7c7c39d4df451833df70a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4230-sql-injection-in-vanna-ai-vanna-d326f237</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4230%3A%20SQL%20Injection%20in%20vanna-ai%20vanna&amp;severity=medium&amp;id=69b7c4789d4df451833a5b91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4229-sql-injection-in-vanna-ai-vanna-f50509b5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4229%3A%20SQL%20Injection%20in%20vanna-ai%20vanna&amp;severity=medium&amp;id=69b7c4789d4df451833a5b8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4228-command-injection-in-lb-link-bl-wr90-96738fe4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4228%3A%20Command%20Injection%20in%20LB-LINK%20BL-WR9000&amp;severity=medium&amp;id=69b7bd6a9d4df45183343b0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4227-buffer-overflow-in-lb-link-bl-wr9000-4695df8e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4227%3A%20Buffer%20Overflow%20in%20LB-LINK%20BL-WR9000&amp;severity=high&amp;id=69b7bd6a9d4df45183343b07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4226-stack-based-buffer-overflow-in-lb-li-1aa90b19</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4226%3A%20Stack-based%20Buffer%20Overflow%20in%20LB-LINK%20BL-WR9000&amp;severity=high&amp;id=69b7c1479d4df451833752d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4225-cross-site-scripting-in-cms-made-sim-fb8a5324</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4225%3A%20Cross%20Site%20Scripting%20in%20CMS%20Made%20Simple&amp;severity=medium&amp;id=69b7c1479d4df451833752cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4255-cwe-829-inclusion-of-functionality-f-64ab002d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4255%3A%20CWE-829%20Inclusion%20of%20functionality%20from%20untrusted%20control%20sphere%20in%20thermalright%20TR-VISION%20HOME&amp;severity=high&amp;id=69b7af5b9d4df4518329b048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32778-cwe-476-null-pointer-dereference-in-bd1cfa53</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32778%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20libexpat%20project%20libexpat&amp;severity=low&amp;id=69b7af5b9d4df4518329b03d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4223-sql-injection-in-itsourcecode-payrol-f7fd3546</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4223%3A%20SQL%20Injection%20in%20itsourcecode%20Payroll%20Management%20System&amp;severity=medium&amp;id=69b7af5b9d4df4518329b041</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32777-cwe-835-loop-with-unreachable-exit--d8732131</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32777%3A%20CWE-835%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20libexpat%20project%20libexpat&amp;severity=medium&amp;id=69b7af5b9d4df4518329b037</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32776-cwe-476-null-pointer-dereference-in-7a031374</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32776%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20libexpat%20project%20libexpat&amp;severity=medium&amp;id=69b7af5b9d4df4518329b033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25083-missing-authorization-in-growi-inc--8bfd0964</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25083%3A%20Missing%20authorization%20in%20GROWI%2C%20Inc.%20GROWI&amp;severity=high&amp;id=69b7af5b9d4df4518329b02f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4222-path-traversal-in-sscms-6eb6cec9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4222%3A%20Path%20Traversal%20in%20SSCMS&amp;severity=medium&amp;id=69b7a8549d4df4518325f337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4221-unrestricted-upload-in-tiandy-easy7--730344dc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4221%3A%20Unrestricted%20Upload%20in%20Tiandy%20Easy7%20Integrated%20Management%20Platform&amp;severity=medium&amp;id=69b7a8549d4df4518325f331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32775-cwe-191-integer-underflow-wrap-or-w-3ea2e343</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32775%3A%20CWE-191%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20libexif%20project%20libexif&amp;severity=high&amp;id=69dbe51682d89c981fa14167</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4220-unrestricted-upload-in-technologies--184c105f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4220%3A%20Unrestricted%20Upload%20in%20Technologies%20Integrated%20Management%20Platform&amp;severity=medium&amp;id=69b7a8549d4df4518325f32b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4219-hard-coded-credentials-in-index-conf-0c602181</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4219%3A%20Hard-coded%20Credentials%20in%20INDEX%20Conferences%20%26%20Exhibitions%20Organization%20YWF%20BPOF%20APGCS%20App&amp;severity=medium&amp;id=69b7a8549d4df4518325f325</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4218-information-disclosure-in-myaedes-ap-e4a157bc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4218%3A%20Information%20Disclosure%20in%20myAEDES%20App&amp;severity=low&amp;id=69b79ecc9d4df451831f7147</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31386-improper-neutralization-of-special--9aa4ef0e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31386%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20LiteSpeed%20Technologies%20OpenLiteSpeed&amp;severity=high&amp;id=69b796c19d4df451831b8462</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4217-key-management-error-in-xreal-nebula-2089e6f5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4217%3A%20Unprotected%20Storage%20of%20Credentials%20in%20XREAL%20Nebula%20App&amp;severity=low&amp;id=69b796c19d4df451831b846d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4216-hard-coded-credentials-in-i-sens-sma-30d479c8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4216%3A%20Hard-coded%20Credentials%20in%20i-SENS%20SmartLog%20App&amp;severity=medium&amp;id=69b796c19d4df451831b8467</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21005-cwe-22-improper-limitation-of-a-pat-3e867367</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21005%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(%26%2339%3BPath%20Traversal%26%2339%3B)%20in%20Samsung%20Mobile%20Smart%20Switch&amp;severity=high&amp;id=69b78c359d4df4518315ee9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21004-cwe-287-improper-authentication-in--b29f3ccc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21004%3A%20CWE-287%20Improper%20Authentication%20in%20Samsung%20Mobile%20Smart%20Switch&amp;severity=medium&amp;id=69b78c359d4df4518315ee9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4215-server-side-request-forgery-in-flowc-146eba46</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4215%3A%20Server-Side%20Request%20Forgery%20in%20FlowCI%20flow-core-x&amp;severity=medium&amp;id=69b78c359d4df4518315eeb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21002-cwe-347-improper-verification-of-cr-3a79b2e5</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21002%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Samsung%20Mobile%20Galaxy%20Store&amp;severity=medium&amp;id=69b78c359d4df4518315ee98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4214-stack-based-buffer-overflow-in-d-lin-5afe7392</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4214%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DNS-120&amp;severity=high&amp;id=69b78c359d4df4518315eeaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21001-cwe-35-path-traversal-in-samsung-mo-756e512d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21001%3A%20CWE-35%3A%20Path%20Traversal%20in%20Samsung%20Mobile%20Galaxy%20Store&amp;severity=medium&amp;id=69b78c359d4df4518315ee95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21000-cwe-284-improper-access-control-in--8c6fbad1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21000%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Galaxy%20Store&amp;severity=high&amp;id=69b78c359d4df4518315ee92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20999-cwe-294-authentication-bypass-by-re-a52b7f65</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20999%3A%20CWE-294%20-%20Authentication%20Bypass%20by%20Replay%20in%20Samsung%20Mobile%20Smart%20Switch&amp;severity=high&amp;id=69b78c359d4df4518315ee8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20998-cwe-287-improper-authentication-in--725ff812</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20998%3A%20CWE-287%20-%20Improper%20Authentication%20in%20Samsung%20Mobile%20Smart%20Switch&amp;severity=high&amp;id=69b78c359d4df4518315ee8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20997-cwe-347-improper-verification-of-cr-1bb3868e</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20997%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Samsung%20Mobile%20Smart%20Switch&amp;severity=medium&amp;id=69b78c339d4df4518315ee12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20996-cwe-327-use-of-a-broken-or-risky-cr-af2f35f4</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20996%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Samsung%20Mobile%20Smart%20Switch&amp;severity=high&amp;id=69b78c339d4df4518315ee0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20995-cwe-200-exposure-of-sensitive-infor-f4b85c12</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20995%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Samsung%20Mobile%20Smart%20Switch&amp;severity=medium&amp;id=69b78c339d4df4518315ee0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20994-cwe-601-url-redirection-to-untruste-392c7409</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20994%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(%26%2339%3BOpen%20Redirect%26%2339%3B)%20in%20Samsung%20Mobile%20Samsung%20Account&amp;severity=high&amp;id=69b78c339d4df4518315ee09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20993-cwe-926-improper-export-of-android--cdf26a4d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20993%3A%20CWE-926%20%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Samsung%20Mobile%20Samsung%20Assistant&amp;severity=medium&amp;id=69b78c339d4df4518315ee06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20992-cwe-285-improper-authorization-in-s-28f63449</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20992%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69b78c339d4df4518315ee03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20991-cwe-269-improper-privilege-manageme-789aa04d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20991%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69b78c339d4df4518315ee00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20990-cwe-926-improper-export-of-android--139f9df1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20990%3A%20CWE-926%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=high&amp;id=69b78c339d4df4518315edfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20989-cwe-347-improper-verification-of-cr-0138dde6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20989%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69b78c339d4df4518315edfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20988-cwe-925-improper-verification-of-in-ab79f070</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20988%3A%20CWE-925%20%3A%20Improper%20Verification%20of%20Intent%20by%20Broadcast%20Receiver%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69b78c339d4df4518315edf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4213-stack-based-buffer-overflow-in-d-lin-87c01e3a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4213%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DNS-120&amp;severity=high&amp;id=69b78c359d4df4518315eea1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4212-stack-based-buffer-overflow-in-d-lin-423aef88</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4212%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DNS-120&amp;severity=high&amp;id=69b77e229d4df45183f020d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4211-stack-based-buffer-overflow-in-d-lin-0a1f49a3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4211%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DNS-120&amp;severity=high&amp;id=69b77e229d4df45183f020cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4210-command-injection-in-d-link-dns-120-af98b267</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4210%3A%20Command%20Injection%20in%20D-Link%20DNS-120&amp;severity=medium&amp;id=69b77e229d4df45183f020c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4209-command-injection-in-d-link-dns-120-7d0fc20f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4209%3A%20Command%20Injection%20in%20D-Link%20DNS-120&amp;severity=medium&amp;id=69b77e229d4df45183f020b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4207-command-injection-in-d-link-dns-120-f37b1a52</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4207%3A%20Command%20Injection%20in%20D-Link%20DNS-120&amp;severity=medium&amp;id=69b77e229d4df45183f020a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4206-command-injection-in-d-link-dns-120-65477eea</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4206%3A%20Command%20Injection%20in%20D-Link%20DNS-120&amp;severity=medium&amp;id=69b76c8f9d4df45183da5ea7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-monday-march-16th-2026-httpsiscs-72e69648</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Monday%2C%20March%2016th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9850%2C%20(Mon%2C%20Mar%2016th)&amp;severity=medium&amp;id=69b765529d4df45183d1e2cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4205-command-injection-in-d-link-dns-120-1782b85d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4205%3A%20Command%20Injection%20in%20D-Link%20DNS-120&amp;severity=medium&amp;id=69b762029d4df45183c8a8ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4204-command-injection-in-d-link-dns-120-ebd2c6f8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4204%3A%20Command%20Injection%20in%20D-Link%20DNS-120&amp;severity=medium&amp;id=69b762029d4df45183c8a8e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4203-command-injection-in-d-link-dns-120-d99c6b55</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4203%3A%20Command%20Injection%20in%20D-Link%20DNS-120&amp;severity=medium&amp;id=69b762029d4df45183c8a8d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4201-unrestricted-upload-in-glowxq-glowxq-224c8b75</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4201%3A%20Unrestricted%20Upload%20in%20glowxq%20glowxq-oj&amp;severity=medium&amp;id=69b757769d4df45183ae649a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4200-server-side-request-forgery-in-glowx-4505f74b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4200%3A%20Server-Side%20Request%20Forgery%20in%20glowxq%20glowxq-oj&amp;severity=medium&amp;id=69b7c1479d4df451833752e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4199-command-injection-in-bazinga012-mcpc-577e7fdd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4199%3A%20Command%20Injection%20in%20bazinga012%20mcp_code_executor&amp;severity=medium&amp;id=69b7c1479d4df451833752d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-16-2b9e1ab1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-16&amp;severity=medium&amp;id=69b89c6a771bdb17496e1b9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69902-na-285ff70a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69902%3A%20n%2Fa&amp;severity=critical&amp;id=69b86eef771bdb174956782c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50881-na-5ae0b55c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50881%3A%20n%2Fa&amp;severity=high&amp;id=69b867e7771bdb17494e9bfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68971-na-bb07e2a5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68971%3A%20n%2Fa&amp;severity=medium&amp;id=69b8648d771bdb17494b0d4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69693-na-1c752da6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69693%3A%20n%2Fa&amp;severity=medium&amp;id=69b859da771bdb17492b2d8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69809-na-431ba23d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69809%3A%20n%2Fa&amp;severity=critical&amp;id=69b852cf771bdb1749228859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69808-na-ee6b7db8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69808%3A%20n%2Fa&amp;severity=critical&amp;id=69b852cf771bdb1749228855</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69727-na-a25b3bc5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69727%3A%20n%2Fa&amp;severity=medium&amp;id=69b84f4b771bdb17491f5f9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57543-na-c23cf64e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57543%3A%20n%2Fa&amp;severity=medium&amp;id=69b84a02771bdb1749186963</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69768-na-d4afeab5</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69768%3A%20n%2Fa&amp;severity=high&amp;id=69b84a02771bdb1749186957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66687-na-bffe2a7f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66687%3A%20n%2Fa&amp;severity=high&amp;id=69b83bfc9d4df4518377219a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65734-na-11ff5127</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65734%3A%20n%2Fa&amp;severity=medium&amp;id=69b834f39d4df4518372fd66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30405-na-47c1317e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30405%3A%20n%2Fa&amp;severity=high&amp;id=69b8316f9d4df4518370fe9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-16-a2ad58b1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-16&amp;severity=medium&amp;id=69b831389d4df451837030f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69784-na-7ea76be7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69784%3A%20n%2Fa&amp;severity=high&amp;id=69b82a679d4df451836d9f6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69783-na-b19d29eb</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69783%3A%20n%2Fa&amp;severity=high&amp;id=69b82a679d4df451836d9f65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-16-ee2f10f7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-16&amp;severity=low&amp;id=69b7a1159d4df4518320e4be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4198-command-injection-in-hypermodel-labs-54b14dd8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4198%3A%20Command%20Injection%20in%20hypermodel-labs%20mcp-server-auto-commit&amp;severity=medium&amp;id=69b745e29d4df451838ed4ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4197-command-injection-in-d-link-dns-120-3ef2e999</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4197%3A%20Command%20Injection%20in%20D-Link%20DNS-120&amp;severity=medium&amp;id=69b745e29d4df451838ed4be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4196-command-injection-in-d-link-dns-120-f9eb82fe</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4196%3A%20Command%20Injection%20in%20D-Link%20DNS-120&amp;severity=medium&amp;id=69b745e29d4df451838ed4b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4195-command-injection-in-d-link-dns-120-0f05e6b0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4195%3A%20Command%20Injection%20in%20D-Link%20DNS-120&amp;severity=medium&amp;id=69b73b569d4df45183888209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4194-improper-access-controls-in-d-link-d-75e423f5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4194%3A%20Improper%20Access%20Controls%20in%20D-Link%20DNS-120&amp;severity=medium&amp;id=69b73b569d4df45183888202</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4193-improper-access-controls-in-d-link-d-86e0555a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4193%3A%20Improper%20Access%20Controls%20in%20D-Link%20DIR-823G&amp;severity=medium&amp;id=69b73b569d4df451838881f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4192-command-injection-in-avinashbole-qui-2518a2fa</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4192%3A%20Command%20Injection%20in%20AvinashBole%20quip-mcp-server&amp;severity=medium&amp;id=69b71bb39d4df451836c6ead</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4191-unrestricted-upload-in-jawherkl-node-89ece630</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4191%3A%20Unrestricted%20Upload%20in%20JawherKl%20node-api-postgres&amp;severity=medium&amp;id=69b7c1479d4df451833752e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4190-sql-injection-in-jawherkl-node-api-p-a54029ef</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4190%3A%20SQL%20Injection%20in%20JawherKl%20node-api-postgres&amp;severity=medium&amp;id=69b70a219d4df451835b4b68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4189-sql-injection-in-phpipam-ff9d192d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4189%3A%20SQL%20Injection%20in%20phpipam&amp;severity=medium&amp;id=69b70a219d4df451835b4b62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4188-stack-based-buffer-overflow-in-d-lin-4643e6f2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4188%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-619L&amp;severity=high&amp;id=69b70a219d4df451835b4b5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4187-missing-authentication-in-tiandy-eas-d0083b25</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4187%3A%20Missing%20Authentication%20in%20Tiandy%20Easy7%20Integrated%20Management%20Platform&amp;severity=medium&amp;id=69b7069a9d4df451835804bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4186-cross-site-scripting-in-ueditor-9903830f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4186%3A%20Cross%20Site%20Scripting%20in%20UEditor&amp;severity=medium&amp;id=69b7069a9d4df451835804b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4185-stack-based-buffer-overflow-in-gpac-3793df76</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4185%3A%20Stack-based%20Buffer%20Overflow%20in%20GPAC&amp;severity=medium&amp;id=69b7c1479d4df451833752ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4184-stack-based-buffer-overflow-in-d-lin-8b4d54d9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4184%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-816&amp;severity=critical&amp;id=69b6f1829d4df45183499980</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4183-stack-based-buffer-overflow-in-d-lin-2982ced2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4183%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-816&amp;severity=critical&amp;id=69b7c1479d4df451833752f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4182-stack-based-buffer-overflow-in-d-lin-4b5e9537</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4182%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-816&amp;severity=critical&amp;id=69b7c1479d4df45183375304</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4181-stack-based-buffer-overflow-in-d-lin-ddee0ed4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4181%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-816&amp;severity=critical&amp;id=69b7c1479d4df451833752fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28522-null-pointer-dereference-in-tuya-ar-2a93d27c</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28522%3A%20NULL%20Pointer%20Dereference%20in%20Tuya%20arduino-TuyaOpen&amp;severity=high&amp;id=69b7c1499d4df45183375333</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28519-heap-based-buffer-overflow-in-tuya--81bb398e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28519%3A%20Heap-based%20Buffer%20Overflow%20in%20Tuya%20arduino-TuyaOpen&amp;severity=high&amp;id=69b7c1479d4df4518337530b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28521-out-of-bounds-read-in-tuya-arduino--e207a043</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28521%3A%20Out-of-bounds%20Read%20in%20Tuya%20arduino-TuyaOpen&amp;severity=high&amp;id=69b7c1499d4df4518337532e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28520-off-by-one-error-in-tuya-arduino-tu-f1d3cb47</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28520%3A%20Off-by-one%20Error%20in%20Tuya%20arduino-TuyaOpen&amp;severity=high&amp;id=69b7c1499d4df45183375329</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4180-improper-access-controls-in-d-link-d-2aa3ab3a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4180%3A%20Improper%20Access%20Controls%20in%20D-Link%20DIR-816&amp;severity=medium&amp;id=69b7c1499d4df45183375338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4175-cross-site-scripting-in-aureus-erp-ce517057</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4175%3A%20Cross%20Site%20Scripting%20in%20Aureus%20ERP&amp;severity=medium&amp;id=69b68f139d4df451830604a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4174-resource-consumption-in-radare2-2650e8ea</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4174%3A%20Resource%20Consumption%20in%20Radare2&amp;severity=medium&amp;id=69b68f139d4df4518306049a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/loblaw-data-breach-impacts-customer-information-81750628</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Loblaw%20Data%20Breach%20Impacts%20Customer%20Information&amp;severity=medium&amp;id=69b684539d4df45183fde128</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14287-cwe-94-improper-control-of-generati-d9c339c7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14287%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20in%20mlflow%20mlflow%2Fmlflow&amp;severity=high&amp;id=69b7c1499d4df4518337533f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4173-sql-injection-in-codephiliax-chat2db-3df7a560</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4173%3A%20SQL%20Injection%20in%20CodePhiliaX%20Chat2DB&amp;severity=medium&amp;id=69b67d7e9d4df45183f8681b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4172-stack-based-buffer-overflow-in-trend-df028a4c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4172%3A%20Stack-based%20Buffer%20Overflow%20in%20TRENDnet%20TEW-632BRP&amp;severity=high&amp;id=69b676769d4df45183f31fbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4171-authorization-bypass-in-codegenieapp-cf6d9b09</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4171%3A%20Authorization%20Bypass%20in%20CodeGenieApp%20serverless-express&amp;severity=medium&amp;id=69b66e0a9b0f87e881d5b32f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4170-os-command-injection-in-topsec-topac-9e1efe11</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4170%3A%20OS%20Command%20Injection%20in%20Topsec%20TopACM&amp;severity=critical&amp;id=69b670ed9d4df45183e9aed5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4169-cross-site-scripting-in-tecnick-tcex-fd1ffac8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4169%3A%20Cross%20Site%20Scripting%20in%20Tecnick%20TCExam&amp;severity=medium&amp;id=69b64e669b0f87e881babec1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4168-cross-site-scripting-in-tecnick-tcex-9346d093</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4168%3A%20Cross%20Site%20Scripting%20in%20Tecnick%20TCExam&amp;severity=medium&amp;id=69b64e669b0f87e881babeba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4167-stack-based-buffer-overflow-in-belki-ac4818a6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4167%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1122&amp;severity=high&amp;id=69b64ae29b0f87e881b8f1bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4166-cross-site-scripting-in-wavlink-wl-n-93ca904f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4166%3A%20Cross%20Site%20Scripting%20in%20Wavlink%20WL-NU516U1&amp;severity=medium&amp;id=69b64ae29b0f87e881b8f1b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4165-cross-site-scripting-in-worksuite-hr-a0a0992f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4165%3A%20Cross%20Site%20Scripting%20in%20Worksuite%20HR%2C%20CRM%20and%20Project%20Management&amp;severity=medium&amp;id=69b670ed9d4df45183e9aedb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4164-command-injection-in-wavlink-wl-wn57-c028dcbd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4164%3A%20Command%20Injection%20in%20Wavlink%20WL-WN578W2&amp;severity=critical&amp;id=69b62b3e9b0f87e881a99067</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2233-cwe-862-missing-authorization-in-wed-191cba37</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2233%3A%20CWE-862%20Missing%20Authorization%20in%20wedevs%20User%20Frontend%3A%20AI%20Powered%20Frontend%20Posting%2C%20User%20Directory%2C%20Profile%2C%20Membership%20%26%20User%20Registration&amp;severity=medium&amp;id=69b619aa9b0f87e8819c13f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1947-cwe-639-authorization-bypass-through-412339ff</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1947%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20webaways%20NEX-Forms%20%E2%80%93%20Ultimate%20Forms%20Plugin%20for%20WordPress&amp;severity=high&amp;id=69b60f1e9b0f87e88192b131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1883-cwe-639-authorization-bypass-through-0e12c6db</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1883%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wickedplugins%20Wicked%20Folders%20%E2%80%93%20Folder%20Organizer%20for%20Pages%2C%20Posts%2C%20and%20Custom%20Post%20Types&amp;severity=medium&amp;id=69b60f1e9b0f87e88192b12d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3441-out-of-bounds-read-in-red-hat-red-ha-c29ec58c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3441%3A%20Out-of-bounds%20Read%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69b604929b0f87e88177d6e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3442-out-of-bounds-read-in-red-hat-red-ha-01e6e081</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3442%3A%20Out-of-bounds%20Read%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69b604929b0f87e88177d6e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-15-32473807</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-15&amp;severity=medium&amp;id=69b7492f9d4df45183906444</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-15-4b6db233</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-15&amp;severity=medium&amp;id=69b680cc9d4df45183fb5170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-15-fc6b6048</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-15&amp;severity=low&amp;id=69b680cc9d4df45183fb5150</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4163-command-injection-in-wavlink-wl-wn57-5fa0760b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4163%3A%20Command%20Injection%20in%20Wavlink%20WL-WN579A3&amp;severity=critical&amp;id=69b5e4e22f860ef94356585f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4179-loop-with-unreachable-exit-condition-9616b361</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4179%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20zephyrproject-rtos%20Zephyr&amp;severity=medium&amp;id=69b5ff079b0f87e881671219</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0849-buffer-copy-without-checking-size-of-03e4aa02</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0849%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20zephyrproject-rtos%20Zephyr&amp;severity=low&amp;id=69b5cfcb2f860ef94341a096</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1870-cwe-862-missing-authorization-in-thi-2dfc483a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1870%3A%20CWE-862%20Missing%20Authorization%20in%20thimpress%20Thim%20Kit%20for%20Elementor%20%E2%80%93%20Pre-built%20Templates%20%26%20Widgets%20for%20Elementor&amp;severity=medium&amp;id=69b562ce2f860ef943ef5275</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-hpe-aos-cx-vulnerability-allows-admin-pas-c92fd2bb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20HPE%20AOS-CX%20Vulnerability%20Allows%20Admin%20Password%20Resets&amp;severity=critical&amp;id=69b53f722f860ef943baf10d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54920-cwe-502-deserialization-of-untruste-513e22e5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54920%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Spark&amp;severity=high&amp;id=69b527072f860ef943974709</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1948-cwe-862-missing-authorization-in-web-88b87899</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1948%3A%20CWE-862%20Missing%20Authorization%20in%20webaways%20NEX-Forms%20%E2%80%93%20Ultimate%20Forms%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=69b4dd372f860ef94382b90e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/smartapesg-campaign-uses-clickfix-page-to-push-rem-aa9c64ca</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SmartApeSG%20campaign%20uses%20ClickFix%20page%20to%20push%20Remcos%20RAT%2C%20(Sat%2C%20Mar%2014th)&amp;severity=medium&amp;id=69b4b9d92f860ef94307e3a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-14-20b6e0de</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-14&amp;severity=medium&amp;id=69b5f9c02f860ef9436a67d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-14-ad0bb0a5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-14&amp;severity=low&amp;id=69b4d2712f860ef9434a4b9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-14-1eabe221</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-14&amp;severity=medium&amp;id=69b4d2712f860ef9434a1b8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0385-spoofing-in-microsoft-microsoft-edge-1b431653</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0385%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Microsoft%20Microsoft%20Edge%20for%20Android&amp;severity=medium&amp;id=69b48c5d2f860ef943c0bebd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32724-cwe-416-use-after-free-in-px4-px4-a-01ac43e5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32724%3A%20CWE-416%3A%20Use%20After%20Free%20in%20PX4%20PX4-Autopilot&amp;severity=medium&amp;id=69b488d62f860ef943ba416b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3227-cwe-78-improper-neutralization-of-sp-ac440341</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3227%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20TL-WR802N%20v4&amp;severity=high&amp;id=69b488d62f860ef943ba4172</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32720-cwe-284-improper-access-control-in--c14eb5d2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32720%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20ctfer-io%20monitoring&amp;severity=high&amp;id=69b485502f860ef943b83400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32719-cwe-22-improper-limitation-of-a-pat-c20be6ce</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32719%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Mintplex-Labs%20anything-llm&amp;severity=medium&amp;id=69b485502f860ef943b833fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32717-cwe-863-incorrect-authorization-in--a6c8c004</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32717%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Mintplex-Labs%20anything-llm&amp;severity=low&amp;id=69b485502f860ef943b833f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32715-cwe-863-incorrect-authorization-in--02a0b72c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32715%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Mintplex-Labs%20anything-llm&amp;severity=low&amp;id=69b485502f860ef943b833f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32713-cwe-670-always-incorrect-control-fl-e4fe0408</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32713%3A%20CWE-670%3A%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20PX4%20PX4-Autopilot&amp;severity=medium&amp;id=69b485502f860ef943b833ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32709-cwe-22-improper-limitation-of-a-pat-51bc0c50</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32709%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20PX4%20PX4-Autopilot&amp;severity=medium&amp;id=69b485502f860ef943b833ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32708-cwe-121-stack-based-buffer-overflow-a8d143e4</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32708%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20PX4%20PX4-Autopilot&amp;severity=high&amp;id=69b485502f860ef943b833e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32707-cwe-121-stack-based-buffer-overflow-87d08068</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32707%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20PX4%20PX4-Autopilot&amp;severity=medium&amp;id=69b481d42f860ef943b5ebc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32706-cwe-120-buffer-copy-without-checkin-09d5c9f0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32706%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20PX4%20PX4-Autopilot&amp;severity=high&amp;id=69b481d42f860ef943b5ebc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32705-cwe-121-stack-based-buffer-overflow-487fae4d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32705%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20PX4%20PX4-Autopilot&amp;severity=medium&amp;id=69b481d42f860ef943b5ebc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32616-cwe-74-improper-neutralization-of-s-ab6dc709</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32616%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20kasuganosoras%20Pigeon&amp;severity=high&amp;id=69b481d42f860ef943b5ebb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32704-cwe-285-improper-authorization-in-s-8e36d108</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32704%3A%20CWE-285%3A%20Improper%20Authorization%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=69b481d42f860ef943b5ebc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26133-information-disclosure-in-microsoft-fe3e9176</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26133%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20365%20Copilot%20for%20Android&amp;severity=high&amp;id=69b481d42f860ef943b5ebb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32640-cwe-915-improperly-controlled-modif-c6dbc3dd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32640%3A%20CWE-915%3A%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes%20in%20danthedeckie%20simpleeval&amp;severity=high&amp;id=69b481d42f860ef943b5ebbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32772-cwe-669-incorrect-resource-transfer-fd58534d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32772%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20GNU%20inetutils&amp;severity=low&amp;id=69b47e482f860ef943b3ab7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32635-cwe-79-improper-neutralization-of-i-dc8aa9bd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32635%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20%40angular%20compiler&amp;severity=high&amp;id=69b47e482f860ef943b3ab77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32630-cwe-409-improper-handling-of-highly-276ae7f7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32630%3A%20CWE-409%3A%20Improper%20Handling%20of%20Highly%20Compressed%20Data%20(Data%20Amplification)%20in%20sindresorhus%20file-type&amp;severity=medium&amp;id=69b47e482f860ef943b3ab73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32628-cwe-89-improper-neutralization-of-s-a6db85bb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32628%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Mintplex-Labs%20anything-llm&amp;severity=high&amp;id=69b47e482f860ef943b3ab6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32627-cwe-295-improper-certificate-valida-93534cac</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32627%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20yhirose%20cpp-httplib&amp;severity=high&amp;id=69b47ac82f860ef943b21729</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2491-cwe-306-missing-authentication-for-c-5feeb71e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2491%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Socomec%20DIRIS%20A-40&amp;severity=medium&amp;id=69b47ac82f860ef943b21725</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3562-cwe-347-improper-verification-of-cry-0705c7b3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3562%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Philips%20Hue%20Bridge&amp;severity=medium&amp;id=69b47ac82f860ef943b21741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3561-cwe-122-heap-based-buffer-overflow-i-375556a1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3561%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Philips%20Hue%20Bridge&amp;severity=high&amp;id=69b47ac82f860ef943b2173e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3560-cwe-122-heap-based-buffer-overflow-i-45c1d76e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3560%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Philips%20Hue%20Bridge&amp;severity=high&amp;id=69b47ac82f860ef943b2173b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3559-cwe-323-reusing-a-nonce-key-pair-in--315b5e3c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3559%3A%20CWE-323%3A%20Reusing%20a%20Nonce%2C%20Key%20Pair%20in%20Encryption%20in%20Philips%20Hue%20Bridge&amp;severity=high&amp;id=69b47ac82f860ef943b21738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3558-cwe-306-missing-authentication-for-c-e7247790</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3558%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Philips%20Hue%20Bridge&amp;severity=high&amp;id=69b47ac82f860ef943b21735</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3557-cwe-122-heap-based-buffer-overflow-i-348800c6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3557%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Philips%20Hue%20Bridge&amp;severity=high&amp;id=69b47ac82f860ef943b21732</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3556-cwe-122-heap-based-buffer-overflow-i-ceca564d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3556%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Philips%20Hue%20Bridge&amp;severity=high&amp;id=69b47ac82f860ef943b2172f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3555-cwe-122-heap-based-buffer-overflow-i-9ade4958</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3555%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Philips%20Hue%20Bridge&amp;severity=high&amp;id=69b47ac82f860ef943b2172c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32621-cwe-1321-improperly-controlled-modi-1de28d7f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32621%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20%40apollo%20federation-internals&amp;severity=critical&amp;id=69b477402f860ef943af037e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32626-cwe-79-improper-neutralization-of-i-a50f3d86</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32626%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mintplex-Labs%20anything-llm&amp;severity=critical&amp;id=69b473bd2f860ef943aa93f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32614-cwe-347-improper-verification-of-cr-469bafa7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32614%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20emmansun%20gmsm&amp;severity=high&amp;id=69b473bd2f860ef943aa93f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0977-cwe-284-in-ibm-cics-transaction-gate-0f24da33</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0977%3A%20CWE-284%20in%20IBM%20CICS%20Transaction%20Gateway%20for%20Multiplatforms&amp;severity=medium&amp;id=69b473bd2f860ef943aa93ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32617-cwe-942-permissive-cross-domain-pol-afe0fc22</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32617%3A%20CWE-942%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20Mintplex-Labs%20anything-llm&amp;severity=high&amp;id=69b473bd2f860ef943aa93f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32600-cwe-354-improper-validation-of-inte-e8cd52c9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32600%3A%20CWE-354%3A%20Improper%20Validation%20of%20Integrity%20Check%20Value%20in%20simplesamlphp%20xml-security&amp;severity=high&amp;id=69b473bf2f860ef943aa9457</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32594-cwe-306-missing-authentication-for--2bea7820</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32594%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69b473bd2f860ef943aa940d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13212-cwe-799-improper-control-of-interac-fc1bf1b0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13212%3A%20CWE-799%20Improper%20Control%20of%20Interaction%20Frequency%20in%20IBM%20Aspera%20Console&amp;severity=medium&amp;id=69b473bd2f860ef943aa93fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13459-cwe-841-improper-enforcement-of-beh-49253c6b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13459%3A%20CWE-841%20Improper%20Enforcement%20of%20Behavioral%20Workflow%20in%20IBM%20Aspera%20Console&amp;severity=low&amp;id=69b473bd2f860ef943aa93ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13460-cwe-204-observable-response-discrep-b46d5ee6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13460%3A%20CWE-204%20Observable%20Response%20Discrepancy%20in%20IBM%20Aspera%20Console&amp;severity=medium&amp;id=69b473bd2f860ef943aa9402</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32314-cwe-248-uncaught-exception-in-libp2-e25d0c75</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32314%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20libp2p%20rust-yamux&amp;severity=high&amp;id=69b473bd2f860ef943aa940a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32313-cwe-354-improper-validation-of-inte-f09d9228</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32313%3A%20CWE-354%3A%20Improper%20Validation%20of%20Integrity%20Check%20Value%20in%20robrichards%20xmlseclibs&amp;severity=high&amp;id=69b473bd2f860ef943aa9405</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31949-cwe-248-uncaught-exception-in-danny-d7418f23</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31949%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20danny-avila%20LibreChat&amp;severity=medium&amp;id=69b4732e2f860ef943a92620</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31944-cwe-306-missing-authentication-for--349af3c0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31944%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20danny-avila%20LibreChat&amp;severity=high&amp;id=69b4732e2f860ef943a9261d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31899-cwe-674-uncontrolled-recursion-in-k-d8a020a4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31899%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20Kozea%20CairoSVG&amp;severity=high&amp;id=69b4732e2f860ef943a92619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36368-cwe-89-improper-neutralization-of-s-eb4d8f1f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36368%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20IBM%20Sterling%20B2B%20Integrator&amp;severity=medium&amp;id=69b4732e2f860ef943a92616</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31886-cwe-22-improper-limitation-of-a-pat-116cb11a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31886%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20dagu-org%20dagu&amp;severity=critical&amp;id=69b469392f860ef943905692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31882-cwe-306-missing-authentication-for--5fd57a74</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31882%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20dagu-org%20dagu&amp;severity=high&amp;id=69b469392f860ef94390568c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31814-cwe-190-integer-overflow-or-wraparo-40e288f5</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31814%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20libp2p%20rust-yamux&amp;severity=high&amp;id=69b465b22f860ef9438da28d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14483-cwe-201-insertion-of-sensitive-info-0baf0879</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14483%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20IBM%20Sterling%20B2B%20Integrator&amp;severity=medium&amp;id=69b465b22f860ef9438da275</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30961-cwe-770-allocation-of-resources-wit-d12c59e4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30961%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Forceu%20Gokapi&amp;severity=medium&amp;id=69b465b22f860ef9438da289</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14504-cwe-79-improper-neutralization-of-i-1f69d1bd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14504%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Sterling%20B2B%20Integrator&amp;severity=medium&amp;id=69b465b22f860ef9438da278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30955-cwe-400-uncontrolled-resource-consu-c9a9ab34</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30955%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Forceu%20Gokapi&amp;severity=medium&amp;id=69b465b22f860ef9438da285</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30943-cwe-863-incorrect-authorization-in--0656b1a1</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30943%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Forceu%20Gokapi&amp;severity=medium&amp;id=69b465b22f860ef9438da281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30915-cwe-22-improper-limitation-of-a-pat-da7d087b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30915%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20drakkan%20sftpgo&amp;severity=medium&amp;id=69b465b22f860ef9438da27e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30914-cwe-22-improper-limitation-of-a-pat-bd6cd91e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30914%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20drakkan%20sftpgo&amp;severity=medium&amp;id=69b465b22f860ef9438da27b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30853-cwe-22-improper-limitation-of-a-pat-6923c988</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30853%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20kovidgoyal%20calibre&amp;severity=medium&amp;id=69b4622a2f860ef9438be2c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0835-cwe-79-improper-neutralization-of-in-35334f5f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0835%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20IBM%20Sterling%20B2B%20Integrator&amp;severity=medium&amp;id=69b4622a2f860ef9438be2c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71263-cwe-120-buffer-copy-without-checkin-49ff0d18</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71263%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20AT%26T%20Bell%20Labs%20UNIX&amp;severity=high&amp;id=69b45b242f860ef94386c25d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13702-vulnerability-in-ibm-sterling-partn-f430fe6b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13702%3A%20Vulnerability%20in%20IBM%20Sterling%20Partner%20Engagement%20Manager&amp;severity=medium&amp;id=69b45b242f860ef94386c251</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13718-cwe-319-cleartext-transmission-of-s-470e2432</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13718%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20IBM%20Sterling%20Partner%20Engagement%20Manager&amp;severity=low&amp;id=69b45b242f860ef94386c254</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13723-cwe-324-use-of-a-key-past-its-expir-824e411a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13723%3A%20CWE-324%20Use%20of%20a%20Key%20Past%20its%20Expiration%20Date%20in%20IBM%20Sterling%20Partner%20Engagement%20Manager&amp;severity=medium&amp;id=69b45b242f860ef94386c257</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12453-cwe-79-improper-neutralization-of-i-d48ad297</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12453%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20OpenText%E2%84%A2%20Vertica&amp;severity=medium&amp;id=69b45b242f860ef94386c248</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12454-cwe-79-improper-neutralization-of-i-b626b0fb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12454%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20OpenText%E2%84%A2%20Vertica&amp;severity=medium&amp;id=69b45b242f860ef94386c24b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12455-cwe-204-observable-response-discrep-bfc71dd8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12455%3A%20CWE-204%20Observable%20response%20discrepancy%20in%20OpenText%E2%84%A2%20Vertica&amp;severity=medium&amp;id=69b45b242f860ef94386c24e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13726-cwe-209-generation-of-error-message-c3b107e6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13726%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20IBM%20Sterling%20Partner%20Engagement%20Manager&amp;severity=medium&amp;id=69b45b242f860ef94386c25a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wide-scale-opportunistic-sms-pumping-attacks-targe-0c35fd17</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Wide-scale%2C%20opportunistic%20SMS%20pumping%20attacks%20target%20customer%20sign-up%20pages&amp;severity=medium&amp;id=69b7d9569d4df451834af53e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14811-cwe-598-use-of-get-request-method-w-bc6a9c1a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14811%3A%20CWE-598%20Use%20of%20GET%20Request%20Method%20With%20Sensitive%20Query%20Strings%20in%20IBM%20Sterling%20Partner%20Engagement%20Manager&amp;severity=low&amp;id=69b457cc2f860ef943762155</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32746-cwe-120-buffer-copy-without-checkin-0ceead78</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32746%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20GNU%20inetutils&amp;severity=critical&amp;id=69b4498e2f860ef94328433b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1668-cwe-20-improper-input-validation-in--944966a6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1668%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TP-Link%20Systems%20Inc.%20SG2008P%203.2x&amp;severity=high&amp;id=69b4440c2f860ef9430eaa02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26954-cwe-94-improper-control-of-generati-35790079</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26954%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20nyariv%20SandboxJS&amp;severity=critical&amp;id=69b45b752f860ef943872ec1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32745-cwe-614-in-jetbrains-datalore-e0b6f632</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32745%3A%20CWE-614%20in%20JetBrains%20Datalore&amp;severity=medium&amp;id=69b45b752f860ef943872ec4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4092-cwe-22-improper-limitation-of-a-path-4edecfa5</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4092%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Google%20Clasp&amp;severity=high&amp;id=69b45b752f860ef943872ec7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60012-cwe-20-improper-input-validation-in-45b604ff</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60012%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20Livy&amp;severity=medium&amp;id=69b42da82f860ef943f7d5fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66249-cwe-22-improper-limitation-of-a-pat-cb731667</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66249%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Livy&amp;severity=medium&amp;id=69b42da82f860ef943f7d5fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/starbucks-data-breach-impacts-employees-cd090120</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Starbucks%20Data%20Breach%20Impacts%20Employees&amp;severity=medium&amp;id=69b42d392f860ef943f7a2c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0956-cwe-125-out-of-bounds-read-in-digile-9c731add</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0956%3A%20CWE-125%20Out-of-bounds%20read%20in%20Digilent%20DASYLab&amp;severity=high&amp;id=69b42da82f860ef943f7d604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0955-cwe-125-out-of-bounds-read-in-digile-1617a903</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0955%3A%20CWE-125%20Out-of-bounds%20read%20in%20Digilent%20DASYLab&amp;severity=high&amp;id=69b42da82f860ef943f7d601</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0957-cwe-787-out-of-bounds-write-in-digil-a0dbc562</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0957%3A%20CWE-787%20Out-of-bounds%20write%20in%20Digilent%20DASYLab&amp;severity=high&amp;id=69b422e32f860ef943ee8229</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0954-cwe-787-out-of-bounds-write-in-digil-5904e41d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0954%3A%20CWE-787%20Out-of-bounds%20write%20in%20Digilent%20DASYLab&amp;severity=high&amp;id=69b422e32f860ef943ee8226</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-n8n-flaw-exploited-slopoly-malware-i-1257d1a4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20N8n%20Flaw%20Exploited%2C%20Slopoly%20Malware%2C%20Interpol%20Cybercrime%20Crackdown&amp;severity=low&amp;id=69b41f282f860ef943ebe1a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13779-cwe-306-missing-authentication-for--4936bb9e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13779%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20ABB%20AWIN%20GW100%20rev.2&amp;severity=high&amp;id=69b414d22f860ef943e394b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13778-cwe-306-missing-authentication-for--89a37f0e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13778%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20ABB%20AWIN%20GW100%20rev.2&amp;severity=medium&amp;id=69b40df72f860ef943ddd9ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13777-cwe-294-authentication-bypass-by-ca-4adcb152</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13777%3A%20CWE-294%20Authentication%20bypass%20by%20capture-replay%20in%20ABB%20AWIN%20GW100%20rev.2&amp;severity=high&amp;id=69b40df72f860ef943ddd9e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iran-linked-hackers-take-aim-at-us-and-other-targe-9bcfe572</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran-Linked%20Hackers%20Take%20Aim%20at%20US%20and%20Other%20Targets%2C%20Raising%20Risk%20of%20Cyberattacks%20During%20War&amp;severity=medium&amp;id=69b4068c2f860ef943d8f890</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4111-loop-with-unreachable-exit-condition-fe816334</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4111%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=69b3fc832f860ef943d17f88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32543-missing-authorization-in-cyberchimp-8017ca52</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32543%3A%20Missing%20Authorization%20in%20CyberChimps%20Responsive%20Blocks&amp;severity=medium&amp;id=69b3fc832f860ef943d17f85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32487-missing-authorization-in-raratheme--191fac15</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32487%3A%20Missing%20Authorization%20in%20raratheme%20Lawyer%20Landing%20Page&amp;severity=medium&amp;id=69b3fc832f860ef943d17f82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32486-missing-authorization-in-wptravelen-38838032</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32486%3A%20Missing%20Authorization%20in%20wptravelengine%20Travel%20Booking&amp;severity=medium&amp;id=69b3fc832f860ef943d17f7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32462-improper-neutralization-of-input-du-9c426d46</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32462%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Liton%20Arefin%20Master%20Addons%20for%20Elementor&amp;severity=medium&amp;id=69b3fc832f860ef943d17f7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32461-missing-authorization-in-really-sim-fffa3e1d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32461%3A%20Missing%20Authorization%20in%20Really%20Simple%20Plugins%20Really%20Simple%20SSL&amp;severity=medium&amp;id=69b3fc832f860ef943d17f79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32460-improper-neutralization-of-input-du-d89a53a4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32460%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themefic%20Ultimate%20Addons%20for%20Contact%20Form%207&amp;severity=medium&amp;id=69b3fc832f860ef943d17f76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32459-improper-neutralization-of-special--db7bd114</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32459%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20flycart%20UpsellWP&amp;severity=high&amp;id=69b3fc832f860ef943d17f73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32458-improper-neutralization-of-special--eb6e8174</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32458%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20RealMag777%20WOLF&amp;severity=high&amp;id=69b3fc832f860ef943d17f70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32457-missing-authorization-in-wombat-plu-4784041d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32457%3A%20Missing%20Authorization%20in%20Wombat%20Plugins%20Advanced%20Product%20Fields%20(Product%20Addons)%20for%20WooCommerce&amp;severity=medium&amp;id=69b3fc832f860ef943d17f6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32456-cross-site-request-forgery-csrf-in--9291cbc0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32456%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Janis%20Elsts%20Admin%20Menu%20Editor&amp;severity=medium&amp;id=69b3fc812f860ef943d17f2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32455-improper-neutralization-of-input-du-7de85790</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32455%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RealMag777%20MDTF&amp;severity=medium&amp;id=69b3fc812f860ef943d17f2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32454-improper-neutralization-of-input-du-53b4d6ce</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32454%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeFusion%20Avada%20Core&amp;severity=medium&amp;id=69b3fc812f860ef943d17f27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32453-missing-authorization-in-themefusio-6f99cd0b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32453%3A%20Missing%20Authorization%20in%20ThemeFusion%20Avada%20Core&amp;severity=medium&amp;id=69b3fc812f860ef943d17f24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32452-missing-authorization-in-themefusio-896f48b2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32452%3A%20Missing%20Authorization%20in%20ThemeFusion%20Fusion%20Builder&amp;severity=medium&amp;id=69b3fc812f860ef943d17f21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32451-missing-authorization-in-themefusio-dde6c7ca</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32451%3A%20Missing%20Authorization%20in%20ThemeFusion%20Fusion%20Builder&amp;severity=medium&amp;id=69b3fc812f860ef943d17f1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32450-improper-neutralization-of-input-du-a3960304</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32450%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RealMag777%20Active%20Products%20Tables%20for%20WooCommerce&amp;severity=medium&amp;id=69b3fc812f860ef943d17f1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32449-improper-neutralization-of-input-du-d3119f43</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32449%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themifyme%20Themify%20Event%20Post&amp;severity=medium&amp;id=69b3fc812f860ef943d17f18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32448-improper-neutralization-of-input-du-a2e879f8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32448%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Eric%20Teubert%20Podlove%20Podcast%20Publisher&amp;severity=medium&amp;id=69b3fc812f860ef943d17f15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32447-missing-authorization-in-vito-peleg-dc3d9cb0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32447%3A%20Missing%20Authorization%20in%20Vito%20Peleg%20Atarim&amp;severity=medium&amp;id=69b3fc812f860ef943d17f12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32446-missing-authorization-in-syed-balkh-9e5eebf2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32446%3A%20Missing%20Authorization%20in%20Syed%20Balkhi%20Contact%20Form%20by%20WPForms&amp;severity=medium&amp;id=69b3fc7f2f860ef943d17e5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32445-missing-authorization-in-elementor--89cd866e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32445%3A%20Missing%20Authorization%20in%20Elementor%20Elementor%20Website%20Builder&amp;severity=low&amp;id=69b3fc7f2f860ef943d17e5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32443-cross-site-request-forgery-csrf-in--31384905</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32443%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Josh%20Kohlbach%20Product%20Feed%20PRO%20for%20WooCommerce&amp;severity=medium&amp;id=69b3fc7f2f860ef943d17e57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32440-missing-authorization-in-ex-themes--35f616df</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32440%3A%20Missing%20Authorization%20in%20Ex-Themes%20WP%20Food&amp;severity=medium&amp;id=69b3fc7f2f860ef943d17e54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32439-missing-authorization-in-webgeniusl-d0e96da4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32439%3A%20Missing%20Authorization%20in%20WebGeniusLab%20BigHearts&amp;severity=medium&amp;id=69b3fc7f2f860ef943d17e50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32438-missing-authorization-in-vowelweb-v-d91f803d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32438%3A%20Missing%20Authorization%20in%20vowelweb%20VW%20School%20Education&amp;severity=medium&amp;id=69b3fc7f2f860ef943d17e4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32437-missing-authorization-in-vowelweb-v-ff2fb1ea</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32437%3A%20Missing%20Authorization%20in%20vowelweb%20VW%20Portfolio&amp;severity=medium&amp;id=69b3fc7f2f860ef943d17e48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32436-missing-authorization-in-vowelweb-v-330cef25</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32436%3A%20Missing%20Authorization%20in%20vowelweb%20VW%20Photography&amp;severity=medium&amp;id=69b3fc7f2f860ef943d17e3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32435-missing-authorization-in-vowelweb-v-16582c1d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32435%3A%20Missing%20Authorization%20in%20vowelweb%20VW%20Pet%20Shop&amp;severity=medium&amp;id=69b3fc7f2f860ef943d17e37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32434-missing-authorization-in-vowelweb-v-a3a8714f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32434%3A%20Missing%20Authorization%20in%20vowelweb%20VW%20Fitness&amp;severity=medium&amp;id=69b3fc7f2f860ef943d17e34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32433-improper-neutralization-of-special--6e960526</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32433%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20codepeople%20CP%20Contact%20Form%20with%20Paypal&amp;severity=high&amp;id=69b3fc7d2f860ef943d17e1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32432-missing-authorization-in-codepeople-bf935de5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32432%3A%20Missing%20Authorization%20in%20codepeople%20WP%20Time%20Slots%20Booking%20Form&amp;severity=medium&amp;id=69b3fc7d2f860ef943d17e18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32431-improper-neutralization-of-input-du-fd10a23c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32431%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Brainstorm%20Force%20Astra%20Bulk%20Edit&amp;severity=medium&amp;id=69b3fc7d2f860ef943d17e15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32430-improper-neutralization-of-input-du-ca001993</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32430%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IdeaBox%20Creations%20PowerPack%20Addons%20for%20Elementor&amp;severity=medium&amp;id=69b3fc7d2f860ef943d17e12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32429-improper-neutralization-of-input-du-360d0c55</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32429%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Noor%20Alam%20Magical%20Addons%20For%20Elementor&amp;severity=medium&amp;id=69b3fc7d2f860ef943d17e0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32428-missing-authorization-in-ays-pro-po-c5de410e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32428%3A%20Missing%20Authorization%20in%20Ays%20Pro%20Popup%20Like%20box&amp;severity=medium&amp;id=69b3fc7d2f860ef943d17e0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32427-missing-authorization-in-vowelweb-v-9d4a6be6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32427%3A%20Missing%20Authorization%20in%20vowelweb%20VW%20Education%20Lite&amp;severity=medium&amp;id=69b3fc7d2f860ef943d17e09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32426-improper-control-of-filename-for-in-05e0db0a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32426%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20themelexus%20Medilazar%20Core&amp;severity=high&amp;id=69b3fc7d2f860ef943d17e05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32425-missing-authorization-in-linknacion-39cfb0ed</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32425%3A%20Missing%20Authorization%20in%20linknacional%20Payment%20Gateway%20Pix%20For%20GiveWP&amp;severity=medium&amp;id=69b3fc7d2f860ef943d17e00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32424-improper-neutralization-of-input-du-cd3cbd9f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32424%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20BoldGrid%20Sprout%20Clients&amp;severity=medium&amp;id=69b3fc7d2f860ef943d17dfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32423-missing-authorization-in-bowo-admin-6ca8630e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32423%3A%20Missing%20Authorization%20in%20Bowo%20Admin%20and%20Site%20Enhancements%20(ASE)&amp;severity=medium&amp;id=69b3fc7b2f860ef943d17d90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32422-improper-neutralization-of-special--ceec3e00</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32422%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20levelfourdevelopment%20WP%20EasyCart&amp;severity=high&amp;id=69b3fc7b2f860ef943d17d8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32421-missing-authorization-in-agile-logi-ac7a0873</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32421%3A%20Missing%20Authorization%20in%20Agile%20Logix%20Post%20Timeline&amp;severity=medium&amp;id=69b3fc7b2f860ef943d17d8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32420-cross-site-request-forgery-csrf-in--f8e9d754</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32420%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ruben%20Garcia%20GamiPress&amp;severity=medium&amp;id=69b3fc7b2f860ef943d17d87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32419-improper-neutralization-of-input-du-d6192675</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32419%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Fernando%20Briano%20List%20category%20posts&amp;severity=medium&amp;id=69b3fc7b2f860ef943d17d84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32418-improper-neutralization-of-special--406aedf9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32418%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Jordy%20Meow%20Meow%20Gallery&amp;severity=high&amp;id=69b3fc7b2f860ef943d17d81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32417-missing-authorization-in-wppochipp--0e63fb08</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32417%3A%20Missing%20Authorization%20in%20wppochipp%20Pochipp&amp;severity=medium&amp;id=69b3fc7b2f860ef943d17d7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32416-missing-authorization-in-bplugins-p-b8ccda05</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32416%3A%20Missing%20Authorization%20in%20bPlugins%20PDF%20Poster&amp;severity=medium&amp;id=69b3fc7b2f860ef943d17d7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32415-path-traversal-in-bogdan-bendziukov-7cff31d6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32415%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Bogdan%20Bendziukov%20Squeeze&amp;severity=medium&amp;id=69b3fc7b2f860ef943d17d78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32414-improper-control-of-generation-of-c-c501db48</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32414%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ILLID%20Advanced%20Woo%20Labels&amp;severity=high&amp;id=69b3fc7b2f860ef943d17d75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32413-missing-authorization-in-maciej-bis-326cf9ab</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32413%3A%20Missing%20Authorization%20in%20Maciej%20Bis%20Permalink%20Manager%20Lite&amp;severity=medium&amp;id=69b3fc792f860ef943d17d03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32412-server-side-request-forgery-ssrf-in-be99818f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32412%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Gift%20Up!%20Gift%20Up%20Gift%20Cards%20for%20WordPress%20and%20WooCommerce&amp;severity=medium&amp;id=69b3fc792f860ef943d17d00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32411-improper-neutralization-of-input-du-20534a8e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32411%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Simpma%20Embed%20Calendly&amp;severity=medium&amp;id=69b3fc792f860ef943d17cfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32410-missing-authorization-in-wbw-plugin-7a2cec48</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32410%3A%20Missing%20Authorization%20in%20WBW%20Plugins%20WBW%20Currency%20Switcher%20for%20WooCommerce&amp;severity=medium&amp;id=69b3fc792f860ef943d17cfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32409-missing-authorization-in-wpmu-dev-y-fb9f790f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32409%3A%20Missing%20Authorization%20in%20WPMU%20DEV%20-%20Your%20All-in-One%20WordPress%20Platform%20Forminator&amp;severity=medium&amp;id=69b3fc792f860ef943d17cf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32408-missing-authorization-in-themefusec-54b63062</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32408%3A%20Missing%20Authorization%20in%20themefusecom%20Brizy&amp;severity=medium&amp;id=69b3fc792f860ef943d17cf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32407-missing-authorization-in-wpclever-w-5b109433</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32407%3A%20Missing%20Authorization%20in%20WPClever%20WPC%20Smart%20Wishlist%20for%20WooCommerce&amp;severity=medium&amp;id=69b3fc792f860ef943d17cf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32406-missing-authorization-in-wpclever-w-4a6bc9a5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32406%3A%20Missing%20Authorization%20in%20WPClever%20WPC%20Product%20Bundles%20for%20WooCommerce&amp;severity=medium&amp;id=69b3fc792f860ef943d17cee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32405-exposure-of-sensitive-system-inform-c9b093e1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32405%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20xtemos%20WoodMart&amp;severity=medium&amp;id=69b3fc792f860ef943d17ceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32404-missing-authorization-in-studio99-s-0ba83ffa</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32404%3A%20Missing%20Authorization%20in%20Studio99%20Studio99%20WP%20Monitor&amp;severity=medium&amp;id=69b3fc792f860ef943d17ce8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32403-improper-neutralization-of-input-du-fbc598bb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32403%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20toocheke%20Toocheke%20Companion&amp;severity=medium&amp;id=69b3fc762f860ef943d17bd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32402-missing-authorization-in-ays-pro-im-e86a5a00</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32402%3A%20Missing%20Authorization%20in%20Ays%20Pro%20Image%20Slider%20by%20Ays&amp;severity=medium&amp;id=69b3fc762f860ef943d17bd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32401-improper-control-of-filename-for-in-714f1e8e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32401%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20BoldGrid%20Client%20Invoicing%20by%20Sprout%20Invoices&amp;severity=high&amp;id=69b3fc762f860ef943d17bd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32400-improper-control-of-filename-for-in-672cf594</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32400%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemetechMount%20Boldman&amp;severity=high&amp;id=69b3fc762f860ef943d17bd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32399-improper-neutralization-of-special--f3f5d513</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32399%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20David%20Lingren%20Media%20LIbrary%20Assistant&amp;severity=high&amp;id=69b3fc762f860ef943d17bcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32398-concurrent-execution-using-shared-r-1c37c90c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32398%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Subrata%20Mal%20TeraWallet%20%E2%80%93%20For%20WooCommerce&amp;severity=medium&amp;id=69b3fc762f860ef943d17bca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32397-missing-authorization-in-ymc-filter-9676781d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32397%3A%20Missing%20Authorization%20in%20YMC%20Filter%20%26%20Grids&amp;severity=medium&amp;id=69b3fc762f860ef943d17bc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32396-missing-authorization-in-radiusthem-60534463</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32396%3A%20Missing%20Authorization%20in%20RadiusTheme%20Team&amp;severity=medium&amp;id=69b3fc762f860ef943d17bc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32395-missing-authorization-in-xpro-xpro--39384c2f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32395%3A%20Missing%20Authorization%20in%20Xpro%20Xpro%20Addons%20For%20Beaver%20Builder%20%E2%80%93%20Lite&amp;severity=medium&amp;id=69b3fc762f860ef943d17bc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32394-missing-authorization-in-publishpre-dfc7113c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32394%3A%20Missing%20Authorization%20in%20PublishPress%20PublishPress%20Capabilities&amp;severity=medium&amp;id=69b3fc762f860ef943d17bbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32393-improper-control-of-filename-for-in-45e6ac39</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32393%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Creatives_Planet%20Greenly%20Theme%20Addons&amp;severity=high&amp;id=69b3fc742f860ef943d17af8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32392-improper-control-of-filename-for-in-9f269b2b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32392%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Creatives_Planet%20Greenly&amp;severity=high&amp;id=69b3fc742f860ef943d17af5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32391-missing-authorization-in-linethemes-325eafba</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32391%3A%20Missing%20Authorization%20in%20linethemes%20SmartFix&amp;severity=medium&amp;id=69b3fc742f860ef943d17af2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32390-missing-authorization-in-linethemes-05abb297</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32390%3A%20Missing%20Authorization%20in%20linethemes%20Nanosoft&amp;severity=medium&amp;id=69b3fc742f860ef943d17aef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32388-missing-authorization-in-linethemes-09a893de</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32388%3A%20Missing%20Authorization%20in%20linethemes%20GLB&amp;severity=medium&amp;id=69b3fc742f860ef943d17aec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32387-missing-authorization-in-noor-alam--347bfb66</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32387%3A%20Missing%20Authorization%20in%20Noor%20Alam%20Checkout%20for%20PayPal&amp;severity=medium&amp;id=69b3fc742f860ef943d17ae9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32386-missing-authorization-in-envothemes-724fa76f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32386%3A%20Missing%20Authorization%20in%20EnvoThemes%20Envo%20Extra&amp;severity=medium&amp;id=69b3fc742f860ef943d17ae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32385-missing-authorization-in-metagauss--5a9cbabb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32385%3A%20Missing%20Authorization%20in%20Metagauss%20RegistrationMagic&amp;severity=medium&amp;id=69b3fc742f860ef943d17ae3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32384-improper-control-of-filename-for-in-18a09511</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32384%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20magepeopleteam%20WpBookingly&amp;severity=high&amp;id=69b3fc742f860ef943d17ae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32383-missing-authorization-in-raratheme--7af966ca</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32383%3A%20Missing%20Authorization%20in%20raratheme%20Ridhi&amp;severity=medium&amp;id=69b3fc742f860ef943d17add</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32382-missing-authorization-in-raratheme--593105cf</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32382%3A%20Missing%20Authorization%20in%20raratheme%20Digital%20Download&amp;severity=medium&amp;id=69b3fc712f860ef943d17a70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32381-missing-authorization-in-raratheme--287ddad3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32381%3A%20Missing%20Authorization%20in%20raratheme%20App%20Landing%20Page&amp;severity=medium&amp;id=69b3fc712f860ef943d17a6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32380-missing-authorization-in-raratheme--18a1b659</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32380%3A%20Missing%20Authorization%20in%20raratheme%20Numinous&amp;severity=medium&amp;id=69b3fc712f860ef943d17a6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32379-missing-authorization-in-raratheme--2fab580c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32379%3A%20Missing%20Authorization%20in%20raratheme%20Rara%20Academic&amp;severity=medium&amp;id=69b3fc712f860ef943d17a67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32378-missing-authorization-in-raratheme--03ba613b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32378%3A%20Missing%20Authorization%20in%20raratheme%20Book%20Landing%20Page&amp;severity=medium&amp;id=69b3fc712f860ef943d17a64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32377-missing-authorization-in-raratheme--14318444</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32377%3A%20Missing%20Authorization%20in%20raratheme%20Pranayama%20Yoga&amp;severity=medium&amp;id=69b3fc712f860ef943d17a61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32376-missing-authorization-in-raratheme--817ef71a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32376%3A%20Missing%20Authorization%20in%20raratheme%20Kalon&amp;severity=medium&amp;id=69b3fc712f860ef943d17a5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32375-missing-authorization-in-raratheme--153d1a60</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32375%3A%20Missing%20Authorization%20in%20raratheme%20Travel%20Diaries&amp;severity=medium&amp;id=69b3fc712f860ef943d17a5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32374-missing-authorization-in-raratheme--311e6467</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32374%3A%20Missing%20Authorization%20in%20raratheme%20The%20Minimal&amp;severity=medium&amp;id=69b3fc712f860ef943d17a58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32373-missing-authorization-in-cozy-visio-850a1769</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32373%3A%20Missing%20Authorization%20in%20Cozy%20Vision%20SMS%20Alert%20Order%20Notifications&amp;severity=medium&amp;id=69b3fc712f860ef943d17a55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32372-exposure-of-sensitive-system-inform-cda0de09</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32372%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20RadiusTheme%20ShopBuilder%20%E2%80%93%20Elementor%20WooCommerce%20Builder%20Addons&amp;severity=medium&amp;id=69b3fc6f2f860ef943d179d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32371-missing-authorization-in-raratheme--52c9dac8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32371%3A%20Missing%20Authorization%20in%20raratheme%20Elegant%20Pink&amp;severity=medium&amp;id=69b3fc6f2f860ef943d179d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32370-missing-authorization-in-raratheme--6b90ae32</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32370%3A%20Missing%20Authorization%20in%20raratheme%20Influencer&amp;severity=medium&amp;id=69b3fc6f2f860ef943d179cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32369-improper-control-of-filename-for-in-0988553a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32369%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20RadiusTheme%20Medilink-Core&amp;severity=high&amp;id=69b3fc6f2f860ef943d179cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32368-improper-neutralization-of-special--5cc971cf</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32368%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20delphiknight%20Geo%20to%20Lat&amp;severity=high&amp;id=69b3fc6f2f860ef943d179c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32367-improper-control-of-generation-of-c-4c66769d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32367%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Yannick%20Lefebvre%20Modal%20Dialog&amp;severity=critical&amp;id=69b3fc6f2f860ef943d179c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32366-improper-neutralization-of-special--0d1f7e9a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32366%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20robfelty%20Collapsing%20Categories&amp;severity=high&amp;id=69b3fc6f2f860ef943d179c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32365-improper-neutralization-of-special--243cc45a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32365%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20robfelty%20Collapsing%20Archives&amp;severity=high&amp;id=69b3fc6f2f860ef943d179c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32364-improper-control-of-filename-for-in-be7da41c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32364%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20redqteam%20Turbo%20Manager&amp;severity=high&amp;id=69b3fc6f2f860ef943d179bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32363-missing-authorization-in-funlus-oy--5c71d6b6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32363%3A%20Missing%20Authorization%20in%20Funlus%20Oy%20WPLifeCycle&amp;severity=medium&amp;id=69b3fc6f2f860ef943d179ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32362-missing-authorization-in-activity-l-d17a4d68</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32362%3A%20Missing%20Authorization%20in%20activity-log.com%20WP%20Sessions%20Time%20Monitoring%20Full%20Automatic&amp;severity=medium&amp;id=69b3fc6e2f860ef943d17989</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32361-improper-neutralization-of-input-du-dc91a949</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32361%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Marketing%20Fire%20Editorial%20Calendar&amp;severity=medium&amp;id=69b3fc6e2f860ef943d17986</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32360-improper-neutralization-of-input-du-0129744c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32360%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20richplugins%20Rich%20Showcase%20for%20Google%20Reviews&amp;severity=medium&amp;id=69b3fc6e2f860ef943d17983</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32359-improper-neutralization-of-input-du-055fab5b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32359%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bPlugins%20Icon%20List%20Block&amp;severity=medium&amp;id=69b3fc6e2f860ef943d17980</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32358-improper-neutralization-of-special--b6dd4fca</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32358%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpdevelop%20Booking%20Calendar&amp;severity=high&amp;id=69b3fc6e2f860ef943d1797d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32357-server-side-request-forgery-ssrf-in-f4e13b72</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32357%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Katsushi%20Kawamori%20Simple%20Blog%20Card&amp;severity=medium&amp;id=69b3fc6e2f860ef943d1797a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32356-improper-neutralization-of-input-du-d61982ba</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32356%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20robosoft%20Robo%20Gallery&amp;severity=medium&amp;id=69b3fc6e2f860ef943d17977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32355-deserialization-of-untrusted-data-i-9218efa4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32355%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Crocoblock%20JetEngine&amp;severity=high&amp;id=69b3fc6e2f860ef943d17974</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32354-insertion-of-sensitive-information--9e564a09</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32354%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20magepeopleteam%20WpEvently&amp;severity=medium&amp;id=69b3fc6e2f860ef943d17971</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32353-server-side-request-forgery-ssrf-in-fe177f7b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32353%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20MailerPress%20Team%20MailerPress&amp;severity=medium&amp;id=69b3fc6e2f860ef943d1796e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32352-improper-neutralization-of-input-du-df53e92f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32352%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Elementor%20Elementor%20Website%20Builder&amp;severity=medium&amp;id=69b3fc6c2f860ef943d17947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32351-improper-neutralization-of-input-du-5bf039b6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32351%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20blubrry%20PowerPress%20Podcasting&amp;severity=medium&amp;id=69b3fc6c2f860ef943d17944</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32350-missing-authorization-in-wpradiant--fae14b80</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32350%3A%20Missing%20Authorization%20in%20wpradiant%20Chocolate%20House&amp;severity=medium&amp;id=69b3fc6c2f860ef943d17941</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32349-server-side-request-forgery-ssrf-in-d09f4573</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32349%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Andy%20Fragen%20Embed%20PDF%20Viewer&amp;severity=medium&amp;id=69b3fc6c2f860ef943d1793e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32348-missing-authorization-in-madrasthem-79cb9bfd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32348%3A%20Missing%20Authorization%20in%20MadrasThemes%20MAS%20Videos&amp;severity=medium&amp;id=69b3fc6c2f860ef943d1793b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32347-missing-authorization-in-raratheme--ddfc26ca</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32347%3A%20Missing%20Authorization%20in%20raratheme%20Restaurant%20and%20Cafe&amp;severity=medium&amp;id=69b3fc6c2f860ef943d17938</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32346-missing-authorization-in-raratheme--be3c9748</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32346%3A%20Missing%20Authorization%20in%20raratheme%20Travel%20Agency&amp;severity=medium&amp;id=69b3fc6c2f860ef943d17935</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32345-missing-authorization-in-raratheme--e7f0c170</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32345%3A%20Missing%20Authorization%20in%20raratheme%20Perfect%20Portfolio&amp;severity=medium&amp;id=69b3fc6c2f860ef943d17932</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32344-cross-site-request-forgery-csrf-in--f00dd3fe</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32344%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20desertthemes%20Corpiva&amp;severity=medium&amp;id=69b3fc6c2f860ef943d1792f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32343-cross-site-request-forgery-csrf-in--ad2a2626</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32343%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Magazine3%20Easy%20Table%20of%20Contents&amp;severity=medium&amp;id=69b3fc6c2f860ef943d1792c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32342-cross-site-request-forgery-csrf-in--4b314ef2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32342%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ays%20Pro%20Quiz%20Maker&amp;severity=medium&amp;id=69b3fc6a2f860ef943d178d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32341-missing-authorization-in-raratheme--98f6a5d3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32341%3A%20Missing%20Authorization%20in%20raratheme%20Benevolent&amp;severity=medium&amp;id=69b3fc6a2f860ef943d178cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32340-missing-authorization-in-raratheme--fcdc0dc1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32340%3A%20Missing%20Authorization%20in%20raratheme%20Business%20One%20Page&amp;severity=medium&amp;id=69b3fc6a2f860ef943d178ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32339-missing-authorization-in-raratheme--0b1eb6aa</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32339%3A%20Missing%20Authorization%20in%20raratheme%20Bakes%20And%20Cakes&amp;severity=medium&amp;id=69b3fc6a2f860ef943d178c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32338-missing-authorization-in-raratheme--78ae7b59</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32338%3A%20Missing%20Authorization%20in%20raratheme%20Construction%20Landing%20Page&amp;severity=medium&amp;id=69b3fc6a2f860ef943d178c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32337-missing-authorization-in-raratheme--ac285de1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32337%3A%20Missing%20Authorization%20in%20raratheme%20Preschool%20and%20Kindergarten&amp;severity=medium&amp;id=69b3fc6a2f860ef943d178c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32336-missing-authorization-in-raratheme--c98d665b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32336%3A%20Missing%20Authorization%20in%20raratheme%20Rara%20Business&amp;severity=medium&amp;id=69b3fc6a2f860ef943d178be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32335-missing-authorization-in-raratheme--287fa8de</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32335%3A%20Missing%20Authorization%20in%20raratheme%20The%20Conference&amp;severity=medium&amp;id=69b3fc6a2f860ef943d178bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32334-missing-authorization-in-raratheme--70528cc2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32334%3A%20Missing%20Authorization%20in%20raratheme%20JobScout&amp;severity=medium&amp;id=69b3fc6a2f860ef943d178b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32332-missing-authorization-in-ays-pro-ea-decd35d6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32332%3A%20Missing%20Authorization%20in%20Ays%20Pro%20Easy%20Form&amp;severity=medium&amp;id=69b3fc6a2f860ef943d178b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32331-missing-authorization-in-israpil-te-d9b6551a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32331%3A%20Missing%20Authorization%20in%20Israpil%20Textmetrics&amp;severity=medium&amp;id=69b3fc682f860ef943d17888</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32330-cross-site-request-forgery-csrf-in--46f95374</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32330%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%2010Web%20Photo%20Gallery%20by%2010Web&amp;severity=medium&amp;id=69b3fc682f860ef943d17885</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32329-missing-authorization-in-ays-pro-ad-8db73316</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32329%3A%20Missing%20Authorization%20in%20Ays%20Pro%20Advanced%20Related%20Posts&amp;severity=medium&amp;id=69b3fc682f860ef943d17882</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32328-cross-site-request-forgery-csrf-in--8416fb00</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32328%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20shufflehound%20Lemmony&amp;severity=medium&amp;id=69b3fc682f860ef943d1787f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31922-improper-neutralization-of-special--603cf965</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31922%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ays%20Pro%20Fox%20LMS&amp;severity=high&amp;id=69b3fc682f860ef943d1787c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31919-missing-authorization-in-josh-kohlb-f077f2be</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31919%3A%20Missing%20Authorization%20in%20Josh%20Kohlbach%20Advanced%20Coupons%20for%20WooCommerce%20Coupons&amp;severity=medium&amp;id=69b3fc682f860ef943d17879</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31918-improper-neutralization-of-input-du-978416ff</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31918%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20immonex%20immonex%20Kickstart&amp;severity=medium&amp;id=69b3fc682f860ef943d17876</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31917-improper-neutralization-of-special--06e00a70</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31917%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20weDevs%20WP%20ERP&amp;severity=high&amp;id=69b3fc682f860ef943d17873</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31916-missing-authorization-in-iulia-caza-a7c0b15c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31916%3A%20Missing%20Authorization%20in%20Iulia%20Cazan%20Latest%20Post%20Shortcode&amp;severity=medium&amp;id=69b3fc682f860ef943d17870</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31915-missing-authorization-in-ux-themes--986caac9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31915%3A%20Missing%20Authorization%20in%20UX-themes%20Flatsome&amp;severity=medium&amp;id=69b3fc682f860ef943d1786d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/data-exfiltration-and-threat-actor-infrastructure--59260c61</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Data%20Exfiltration%20and%20Threat%20Actor%20Infrastructure%20Exposed&amp;severity=medium&amp;id=69b7d5d29d4df4518349438b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-paid-out-17-million-in-bug-bounty-rewards-i-2fdb9a10</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Paid%20Out%20%2417%20Million%20in%20Bug%20Bounty%20Rewards%20in%202025&amp;severity=medium&amp;id=69b3f1742f860ef943caf537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iran-linked-hacker-attack-on-stryker-disrupted-man-a7e24b42</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran-Linked%20Hacker%20Attack%20on%20Stryker%20Disrupted%20Manufacturing%20and%20Shipping&amp;severity=medium&amp;id=69b3ea6c2f860ef943c741ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2859-cwe-204-observable-response-discrepa-8005d70e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2859%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=medium&amp;id=69b3e0242f860ef943bfc08f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24097-cwe-204-observable-response-discrep-09daffb8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24097%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=medium&amp;id=69b3e0242f860ef943bfc08b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4063-cwe-862-missing-authorization-in-wpz-a1746f82</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4063%3A%20CWE-862%20Missing%20Authorization%20in%20wpzoom%20Social%20Icons%20Widget%20%26%20Block%20%E2%80%93%20Social%20Media%20Icons%20%26%20Share%20Buttons&amp;severity=medium&amp;id=69b3dc922f860ef943bc93c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23941-cwe-444-inconsistent-interpretation-11894fdc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23941%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%20Smuggling&apos;)%20in%20Erlang%20OTP&amp;severity=high&amp;id=69b3d90e2f860ef943bac721</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23943-cwe-409-improper-handling-of-highly-e97946a6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23943%3A%20CWE-409%20Improper%20Handling%20of%20Highly%20Compressed%20Data%20(Data%20Amplification)%20in%20Erlang%20OTP&amp;severity=medium&amp;id=69b3d90e2f860ef943bac72f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23942-cwe-22-improper-limitation-of-a-pat-08d85e22</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23942%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Erlang%20OTP&amp;severity=medium&amp;id=69b3d90e2f860ef943bac728</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4105-improper-access-control-in-red-hat-r-78746624</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4105%3A%20Improper%20Access%20Control%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69b41bd82f860ef943e9123e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3999-cwe-639-authorization-bypass-through-ed4f0cd8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3999%3A%20CWE-639%20Authorization%20bypass%20through%20User-Controlled%20key%20in%20Pointsharp%20ID%20Server&amp;severity=high&amp;id=69b3ceae2f860ef943b31146</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/authorities-disrupt-socksescort-proxy-service-powe-66d041d6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Authorities%20Disrupt%20SocksEscort%20Proxy%20Service%20Powered%20by%20AVrecon%20Botnet&amp;severity=medium&amp;id=69b3cacb2f860ef943b0650c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3986-cwe-79-improper-neutralization-of-in-06be8be9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3986%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codepeople%20Calculated%20Fields%20Form&amp;severity=medium&amp;id=69b3ceae2f860ef943b3113f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2888-cwe-639-authorization-bypass-through-be10e6a4</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2888%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20strategy11team%20Formidable%20Forms%20%E2%80%93%20Contact%20Form%20Plugin%2C%20Survey%2C%20Quiz%2C%20Payment%2C%20Calculator%20Form%20%26%20Custom%20Form%20Builder&amp;severity=medium&amp;id=69b3ceae2f860ef943b31138</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2879-cwe-639-authorization-bypass-through-33cd0f40</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2879%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20roxnor%20GetGenie%20%E2%80%93%20AI%20Content%20Writer%20with%20Keyword%20Research%20%26%20SEO%20Tracking%20Tools&amp;severity=medium&amp;id=69b3ceae2f860ef943b31132</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2257-cwe-639-authorization-bypass-through-450feceb</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2257%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20roxnor%20GetGenie%20%E2%80%93%20AI%20Content%20Writer%20with%20Keyword%20Research%20%26%20SEO%20Tracking%20Tools&amp;severity=medium&amp;id=69b3ceae2f860ef943b3112c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3873-cwe-798-use-of-hard-coded-credential-c885523b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3873%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20syslink%20software%20AG%20Avantra&amp;severity=high&amp;id=69b3cb0f2f860ef943b07f8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-146-update-patches-two-exploited-zero-days-c3299c74</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%20146%20Update%20Patches%20Two%20Exploited%20Zero-Days&amp;severity=medium&amp;id=69b3c3c22f860ef943ab4d24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2890-cwe-862-missing-authorization-in-str-3cbd25f0</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2890%3A%20CWE-862%20Missing%20Authorization%20in%20strategy11team%20Formidable%20Forms%20%E2%80%93%20Contact%20Form%20Plugin%2C%20Survey%2C%20Quiz%2C%20Payment%2C%20Calculator%20Form%20%26%20Custom%20Form%20Builder&amp;severity=high&amp;id=69b3c0802f860ef943a8ad97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1704-cwe-639-authorization-bypass-through-bf6c8b22</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1704%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20croixhaug%20Appointment%20Booking%20Calendar%20%E2%80%94%20Simply%20Schedule%20Appointments%20Booking%20Plugin&amp;severity=medium&amp;id=69b3c0802f860ef943a8ad8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3045-cwe-862-missing-authorization-in-cro-a77c0fc0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3045%3A%20CWE-862%20Missing%20Authorization%20in%20croixhaug%20Appointment%20Booking%20Calendar%20%E2%80%94%20Simply%20Schedule%20Appointments%20Booking%20Plugin&amp;severity=high&amp;id=69b3c0802f860ef943a8ad9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3891-cwe-434-unrestricted-upload-of-file--f5fb3cc6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3891%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20linknacional%20Pix%20for%20WooCommerce&amp;severity=critical&amp;id=69b3c0802f860ef943a8ada4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-react-based-phishing-page-with-credential-exfilt-61aaf490</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20React-based%20phishing%20page%20with%20credential%20exfiltration%20via%20EmailJS%2C%20(Fri%2C%20Mar%2013th)&amp;severity=low&amp;id=69b3bcba2f860ef943a6b841</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15515-cwe-306-missing-authentication-for--11564705</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15515%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20vivo%20Easyshare&amp;severity=medium&amp;id=69b3b5e82f860ef943a0e01b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57849-incorrect-default-permissions-in-re-f1df4890</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57849%3A%20Incorrect%20Default%20Permissions%20in%20Red%20Hat%20Red%20Hat%20Fuse%207&amp;severity=medium&amp;id=69b41f832f860ef943ec0b50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8766-incorrect-default-permissions-in-red-f543bdcb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8766%3A%20Incorrect%20Default%20Permissions%20in%20Red%20Hat%20Red%20Hat%20Openshift%20Data%20Foundation%204&amp;severity=medium&amp;id=69b37da62f860ef94357f3fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22216-improper-control-of-interaction-fre-b8164faf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22216%3A%20Improper%20Control%20of%20Interaction%20Frequency%20in%20gVectors%20wpDiscuz&amp;severity=medium&amp;id=69b36fc22f860ef9434ef315</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22215-cross-site-request-forgery-csrf-in--343e3edd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22215%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20gVectors%20wpDiscuz&amp;severity=medium&amp;id=69b36fc22f860ef9434ef304</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22210-improper-neutralization-of-input-du-1e5ecaf0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22210%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gVectors%20wpDiscuz&amp;severity=low&amp;id=69b36fc22f860ef9434ef2fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22209-improper-neutralization-of-input-du-b3cac329</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22209%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gVectors%20wpDiscuz&amp;severity=medium&amp;id=69b36fc22f860ef9434ef2f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22204-improper-input-validation-in-gvecto-cc7b6f3b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22204%3A%20Improper%20Input%20Validation%20in%20gVectors%20wpDiscuz&amp;severity=medium&amp;id=69b36fc02f860ef9434ef2b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22203-exposure-of-sensitive-information-t-7dc2dafb</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22203%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20gVectors%20wpDiscuz&amp;severity=medium&amp;id=69b36fc02f860ef9434ef2ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22202-cross-site-request-forgery-csrf-in--0ad91517</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22202%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20gVectors%20wpDiscuz&amp;severity=medium&amp;id=69b36fc02f860ef9434ef2a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22201-use-of-less-trusted-source-in-gvect-1dd97214</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22201%3A%20Use%20of%20Less%20Trusted%20Source%20in%20gVectors%20wpDiscuz&amp;severity=medium&amp;id=69b36fc02f860ef9434ef2a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22199-authentication-bypass-by-spoofing-i-6e3b7ac2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22199%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Voltronic%20Power%20SNMP%20Web%20Pro&amp;severity=high&amp;id=69b36fc02f860ef9434ef29f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22193-improper-neutralization-of-special--3f166beb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22193%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20gVectors%20wpDiscuz&amp;severity=critical&amp;id=69b36fc02f860ef9434ef29a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22192-improper-neutralization-of-input-du-14954f30</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22192%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Voltronic%20Power%20SNMP%20Web%20Pro&amp;severity=high&amp;id=69b36fc02f860ef9434ef295</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22191-improper-control-of-generation-of-c-4cebc079</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22191%3A%20CWE-1336%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20Beghelli%20SicuroWeb%20(Sicuro24)&amp;severity=medium&amp;id=69b36fc02f860ef9434ef290</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22183-improper-neutralization-of-input-du-c2f286a7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22183%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gVectors%20wpDiscuz&amp;severity=medium&amp;id=69b36fc02f860ef9434ef28b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22182-missing-authorization-in-gvectors-w-7c03bc66</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22182%3A%20Missing%20Authorization%20in%20gVectors%20wpDiscuz&amp;severity=high&amp;id=69b36fc02f860ef9434ef286</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-13-7098392e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-13&amp;severity=medium&amp;id=69b4a8402f860ef943cf25a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-13-00a4f50f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-13&amp;severity=medium&amp;id=69b4424d2f860ef94305fd27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kadnap-botnet-ioc-mainly-asus-router-eedbb221</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KadNap%20botnet%20IOC%20(mainly%20Asus%20router)&amp;severity=low&amp;id=69b4424d2f860ef94305fced</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-13-28ac8131</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-13&amp;severity=low&amp;id=69b3b22a2f860ef9439d7e17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32612-cwe-79-improper-neutralization-of-i-f3855dcc</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32612%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20statamic%20cms&amp;severity=medium&amp;id=69b3375b2f860ef943024599</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32597-cwe-345-insufficient-verification-o-0a93b017</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32597%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20jpadilla%20pyjwt&amp;severity=high&amp;id=69b3375b2f860ef943024596</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32322-cwe-697-incorrect-comparison-in-ste-733aea35</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32322%3A%20CWE-697%3A%20Incorrect%20Comparison%20in%20stellar%20rs-soroban-sdk&amp;severity=medium&amp;id=69b3375b2f860ef943024593</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32320-cwe-125-out-of-bounds-read-in-ellan-b44add55</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32320%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20ellanetworks%20core&amp;severity=medium&amp;id=69b3375b2f860ef94302458b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32319-cwe-125-out-of-bounds-read-in-ellan-85cb4aa1</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32319%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20ellanetworks%20core&amp;severity=high&amp;id=69b3375b2f860ef943024587</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3910-inappropriate-implementation-in-goog-ead606c5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3910%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=69b333cf2f860ef943fdd755</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3909-out-of-bounds-write-in-google-chrome-b07a2ef8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3909%3A%20Out%20of%20bounds%20write%20in%20Google%20Chrome&amp;severity=high&amp;id=69b333cf2f860ef943fdd751</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32304-cwe-94-improper-control-of-generati-7207fd62</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32304%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20locutusjs%20locutus&amp;severity=critical&amp;id=69b333cf2f860ef943fdd74d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32301-cwe-918-server-side-request-forgery-6022b45c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32301%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20centrifugal%20centrifugo&amp;severity=critical&amp;id=69b333cf2f860ef943fdd74a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25076-sql-injection-in-anchore-anchore-en-d94b4892</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25076%3A%20SQL%20Injection%20in%20Anchore%20Anchore%20Enterprise&amp;severity=high&amp;id=69b3304b2f860ef943fa4693</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3611-cwe-306-missing-authentication-for-c-2be1059b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3611%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20Honeywell%20IQ4E&amp;severity=critical&amp;id=69b3223b2f860ef943f219ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32274-cwe-22-improper-limitation-of-a-pat-ca949827</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32274%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20psf%20black&amp;severity=high&amp;id=69b31b3a2f860ef943e8fcb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32269-cwe-683-function-call-with-incorrec-d0471610</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32269%3A%20CWE-683%3A%20Function%20Call%20With%20Incorrect%20Order%20of%20Arguments%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69b31b3a2f860ef943e8fcab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32260-cwe-78-improper-neutralization-of-s-9c1d5a82</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32260%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20denoland%20deno&amp;severity=high&amp;id=69b31b3a2f860ef943e8fca8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32251-cwe-611-improper-restriction-of-xml-6ee364da</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32251%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20tolgee%20tolgee-platform&amp;severity=critical&amp;id=69b317b02f860ef943e64732</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32248-cwe-943-improper-neutralization-of--cc26229b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32248%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20parse-community%20parse-server&amp;severity=critical&amp;id=69b317b02f860ef943e6472d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32247-cwe-943-improper-neutralization-of--936b3588</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32247%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20getzep%20graphiti&amp;severity=high&amp;id=69b3294c2f860ef943f62e03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2376-url-redirection-to-untrusted-site-op-8ae8f8b9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2376%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Red%20Hat%20mirror%20registry%20for%20Red%20Hat%20OpenShift&amp;severity=medium&amp;id=69b3223b2f860ef943f219b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32246-cwe-287-improper-authentication-in--788ee6c9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32246%3A%20CWE-287%3A%20Improper%20Authentication%20in%20steveiliop56%20tinyauth&amp;severity=high&amp;id=69b3294c2f860ef943f62df7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32245-cwe-863-incorrect-authorization-in--778356e5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32245%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20steveiliop56%20tinyauth&amp;severity=medium&amp;id=69b3294c2f860ef943f62df0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32242-cwe-362-concurrent-execution-using--7a67bf5f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32242%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20parse-community%20parse-server&amp;severity=critical&amp;id=69b30d502f860ef943de4428</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32237-cwe-200-exposure-of-sensitive-infor-f529e41f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32237%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20%40backstage%20plugin-scaffolder-backend&amp;severity=medium&amp;id=69b30d502f860ef943de4424</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32236-cwe-918-server-side-request-forgery-ca31ec08</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32236%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20%40backstage%20plugin-auth-backend&amp;severity=low&amp;id=69dffcc482d89c981f9a5a14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32235-cwe-601-url-redirection-to-untruste-8786b7b2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32235%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20%40backstage%20plugin-auth-backend&amp;severity=medium&amp;id=69b30d502f860ef943de441e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32138-cwe-284-improper-access-control-in--1d029b4f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32138%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Stalin-143%20website&amp;severity=high&amp;id=69b30d502f860ef943de441a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3497-cwe-908-use-of-uninitialized-resourc-cddab41e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3497%3A%20CWE-908%20Use%20of%20Uninitialized%20Resource%20in%20Ubuntu%20openssh&amp;severity=low&amp;id=69b30a4d2f860ef943dbc47e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32232-cwe-22-improper-limitation-of-a-pat-5c2df155</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32232%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20qhkm%20zeptoclaw&amp;severity=high&amp;id=69b30a4d2f860ef943dbc47a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32231-cwe-306-missing-authentication-for--ae638150</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32231%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20qhkm%20zeptoclaw&amp;severity=high&amp;id=69b30a4d2f860ef943dbc474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32142-cwe-200-exposure-of-sensitive-infor-6fbc29e7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32142%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20shopware%20commercial&amp;severity=medium&amp;id=69b30a4d2f860ef943dbc46a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13913-cwe-502-in-inductive-automation-ign-01f96f6b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13913%3A%20CWE-502%20in%20Inductive%20Automation%20Ignition%20Software&amp;severity=medium&amp;id=69b30a4d2f860ef943dbc460</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32230-cwe-862-missing-authorization-in-lo-356bd849</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32230%3A%20CWE-862%3A%20Missing%20Authorization%20in%20louislam%20uptime-kuma&amp;severity=medium&amp;id=69b30a4d2f860ef943dbc46d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32100-cwe-200-exposure-of-sensitive-infor-978514b3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32100%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20swag%20platform-security&amp;severity=medium&amp;id=69b302c82f860ef943d65df3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32141-cwe-674-uncontrolled-recursion-in-w-e8a42dbc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32141%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20WebReflection%20flatted&amp;severity=high&amp;id=69b302c82f860ef943d65df6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13462-vulnerability-in-python-software-fo-9c4c971e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13462%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=low&amp;id=69b302c82f860ef943d65de2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32129-cwe-328-use-of-weak-hash-in-stellar-9ed57848</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32129%3A%20CWE-328%3A%20Use%20of%20Weak%20Hash%20in%20stellar%20rs-soroban-poseidon&amp;severity=high&amp;id=69b2ff142f860ef943d3c349</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28256-cwe-547-use-of-hard-coded-security--5f1a8c05</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28256%3A%20CWE-547%20Use%20of%20hard-coded%2C%20security-relevant%20constants%20in%20Trane%20Tracer%20SC&amp;severity=medium&amp;id=69b2ff142f860ef943d3c346</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28255-cwe-798-use-of-hard-coded-credentia-0910cf57</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28255%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Trane%20Tracer%20SC&amp;severity=high&amp;id=69b2ff142f860ef943d3c343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28254-cwe-862-missing-authorization-in-tr-73884a61</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28254%3A%20CWE-862%20Missing%20Authorization%20in%20Trane%20Tracer%20SC&amp;severity=medium&amp;id=69b2fb902f860ef943d10b67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28253-cwe-789-memory-allocation-with-exce-81851637</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28253%3A%20CWE-789%20Memory%20allocation%20with%20excessive%20size%20value%20in%20Trane%20Tracer%20SC&amp;severity=high&amp;id=69b2fb902f860ef943d10b64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3841-cwe-78-improper-neutralization-of-sp-c6a0b1e5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3841%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20TL-MR6400%20v5.3&amp;severity=high&amp;id=69b2fb902f860ef943d10b6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28252-cwe-327-use-of-a-broken-or-risky-cr-93113256</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28252%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Trane%20Tracer%20SC&amp;severity=critical&amp;id=69b2fb902f860ef943d10b61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/handala-hack-unveiling-groups-modus-operandi-5e58407e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%9CHandala%20Hack%E2%80%9D%20%E2%80%93%20Unveiling%20Group%E2%80%99s%20Modus%20Operandi&amp;severity=medium&amp;id=69b2f83f2f860ef943cde4ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31860-cwe-79-improper-neutralization-of-i-7fa3718b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31860%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20unjs%20unhead&amp;severity=medium&amp;id=69b2fb902f860ef943d10b6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21887-cwe-918-server-side-request-forgery-bfed939e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21887%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20OpenCTI-Platform%20opencti&amp;severity=high&amp;id=69b2ff142f860ef943d3c351</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29066-cwe-552-files-or-directories-access-7742946f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29066%3A%20CWE-552%3A%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20%40tinacms%20cli&amp;severity=medium&amp;id=69b30a4f2f860ef943dbd356</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28793-cwe-22-improper-limitation-of-a-pat-139c4d03</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28793%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20%40tinacms%20cli&amp;severity=high&amp;id=69b30a4f2f860ef943dbd353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28792-cwe-22-improper-limitation-of-a-pat-b7476262</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28792%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20%40tinacms%20cli&amp;severity=critical&amp;id=69b30a4d2f860ef943dbc486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28356-cwe-1333-inefficient-regular-expres-ea759df3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28356%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20defnull%20multipart&amp;severity=high&amp;id=69b30a4d2f860ef943dbc483</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27940-cwe-122-heap-based-buffer-overflow--417912cf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27940%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20ggml-org%20llama.cpp&amp;severity=high&amp;id=69b30a4f2f860ef943dbd359</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25529-cwe-79-improper-neutralization-of-i-c5291a63</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25529%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20postalserver%20postal&amp;severity=high&amp;id=69b302c82f860ef943d65e01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24125-cwe-22-improper-limitation-of-a-pat-167a257b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24125%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20%40tinacms%20graphql&amp;severity=medium&amp;id=69b302c82f860ef943d65dfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21708-vulnerability-in-veeam-backup-and-r-a01c130d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21708%3A%20CWE-89%20SQL%20Injection%20in%20Veeam%20Backup%20and%20Replication&amp;severity=null&amp;id=69b2fb902f860ef943d10b77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21672-vulnerability-in-veeam-backup-and-r-a938f0b4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21672%3A%20CWE-538%20File%20and%20Directory%20Information%20Exposure%20in%20Veeam%20Backup%20and%20Replication&amp;severity=null&amp;id=69b2fb902f860ef943d10b73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4045-observable-response-discrepancy-in-p-923f1212</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4045%3A%20Observable%20Response%20Discrepancy%20in%20projectsend&amp;severity=medium&amp;id=69b2e9fd2f860ef943be3537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/amos-and-amatera-disguised-as-ai-agents-kaspersky--0fed8e97</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AMOS%20and%20Amatera%20disguised%20as%20AI%20agents%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69b329192f860ef943f5f8c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4044-path-traversal-in-projectsend-d26863f9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4044%3A%20Path%20Traversal%20in%20projectsend&amp;severity=medium&amp;id=69b2df702f860ef943b15ccf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4043-stack-based-buffer-overflow-in-tenda-40bf116e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4043%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20i12&amp;severity=high&amp;id=69b2df702f860ef943b15cc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21668-vulnerability-in-veeam-backup-and-r-5ceecedd</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21668%3A%20Vulnerability%20in%20Veeam%20Backup%20and%20Replication&amp;severity=high&amp;id=69b2df702f860ef943b15cdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21669-vulnerability-in-veeam-backup-and-r-0923d707</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21669%3A%20Vulnerability%20in%20Veeam%20Backup%20and%20Replication&amp;severity=critical&amp;id=69b2df702f860ef943b15cde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21671-vulnerability-in-veeam-software-app-8e791f48</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21671%3A%20Vulnerability%20in%20Veeam%20Software%20Appliance&amp;severity=critical&amp;id=69b2df702f860ef943b15ce4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21670-vulnerability-in-veeam-backup-and-r-75713f74</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21670%3A%20Vulnerability%20in%20Veeam%20Backup%20and%20Replication&amp;severity=high&amp;id=69b2df702f860ef943b15ce1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21666-vulnerability-in-veeam-backup-and-r-d782aaf9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21666%3A%20Vulnerability%20in%20Veeam%20Backup%20and%20Replication&amp;severity=critical&amp;id=69b2df702f860ef943b15cd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21667-vulnerability-in-veeam-backup-and-r-7dd414e0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21667%3A%20Vulnerability%20in%20Veeam%20Backup%20and%20Replication&amp;severity=critical&amp;id=69b2df702f860ef943b15cd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4042-stack-based-buffer-overflow-in-tenda-a49a83d0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4042%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20i12&amp;severity=high&amp;id=69b2df722f860ef943b15d0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4041-stack-based-buffer-overflow-in-tenda-433ad76d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4041%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20i12&amp;severity=high&amp;id=69b2df722f860ef943b15d05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28384-cwe-78-improper-neutralization-of-s-d5f2b981</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28384%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20Canonical%20lxd&amp;severity=critical&amp;id=69b30a4f2f860ef943dbd36c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-updates-legacy-ios-versions-to-patch-coruna--74b61107</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Updates%20Legacy%20iOS%20Versions%20to%20Patch%20Coruna%20Exploits&amp;severity=medium&amp;id=69b2d12d2f860ef943a1d41b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3099-reusing-a-nonce-key-pair-in-encrypti-33353641</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3099%3A%20Reusing%20a%20Nonce%2C%20Key%20Pair%20in%20Encryption%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69b2ca582f860ef943997cd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/meta-launches-new-protection-tools-as-it-helps-dis-4884c999</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Meta%20Launches%20New%20Protection%20Tools%20as%20It%20Helps%20Disrupt%20Scam%20Centers&amp;severity=medium&amp;id=69b2bf982f860ef9438df518</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0809-cwe-261-weak-encoding-for-password-i-5ddf5427</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0809%3A%20CWE-261%20Weak%20Encoding%20for%20Password%20in%20Streamsoft%20Streamsoft%20Presti%C5%BC&amp;severity=medium&amp;id=69b2ca582f860ef943997cdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2514-cwe-79-improper-neutralization-of-in-5051e4f2</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2514%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Progress%20Software%20Flowmon%20ADS&amp;severity=high&amp;id=69b2cde02f860ef9439e364c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2513-cwe-79-improper-neutralization-of-in-6c15055f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2513%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Progress%20Software%20Flowmon%20ADS&amp;severity=high&amp;id=69b2cde02f860ef9439e3649</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ally-wordpress-plugin-flaw-exposes-over-200000-web-d4e539a4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ally%20WordPress%20Plugin%20Flaw%20Exposes%20Over%20200%2C000%20Websites%20to%20Attacks&amp;severity=low&amp;id=69b2b50f2f860ef94380e7e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-human-ioc-why-security-professionals-struggle--46b836af</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Human%20IOC%3A%20Why%20Security%20Professionals%20Struggle%20with%20Social%20Vetting&amp;severity=medium&amp;id=69b2b50f2f860ef94380e7ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2987-cwe-79-improper-neutralization-of-in-5a2918fc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2987%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20specialk%20Simple%20Ajax%20Chat%20%E2%80%93%20Add%20a%20Fast%2C%20Secure%20Chat%20Box&amp;severity=medium&amp;id=69b30a4f2f860ef943dbd377</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/splunk-zoom-patch-severe-vulnerabilities-8e95386b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Splunk%2C%20Zoom%20Patch%20Severe%20Vulnerabilities&amp;severity=critical&amp;id=69b2ae042f860ef943779eee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4040-information-exposure-through-discrep-0aaa5cb6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4040%3A%20Information%20Exposure%20Through%20Discrepancy%20in%20OpenClaw&amp;severity=medium&amp;id=69b2ae4a2f860ef94378366e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4039-code-injection-in-openclaw-5c8684db</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4039%3A%20Code%20Injection%20in%20OpenClaw&amp;severity=medium&amp;id=69b2ae4a2f860ef943783665</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2366-authorization-bypass-through-user-co-8b18f55c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2366%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=low&amp;id=69b2c3542f860ef94391643f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3234-improper-neutralization-of-crlf-sequ-0b41120c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3234%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69b2c3542f860ef943916446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-patches-high-severity-ios-xr-vulnerabilities-0b099562</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Patches%20High-Severity%20IOS%20XR%20Vulnerabilities&amp;severity=high&amp;id=69b295692f860ef943608336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-n8n-vulnerabilities-allowed-server-takeov-0dad78f8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20N8n%20Vulnerabilities%20Allowed%20Server%20Takeover&amp;severity=critical&amp;id=69b28e602f860ef9435aedf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/polyfill-supply-chain-attack-impacting-100k-sites--0b7e80a5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Polyfill%20Supply%20Chain%20Attack%20Impacting%20100k%20Sites%20Linked%20to%20North%20Korea&amp;severity=medium&amp;id=69b28adc2f860ef9435891b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4016-out-of-bounds-write-in-gpac-eec5a290</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4016%3A%20Out-of-bounds%20Write%20in%20GPAC&amp;severity=medium&amp;id=69b27d022f860ef9434f496c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4015-stack-based-buffer-overflow-in-gpac-e8ec27fe</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4015%3A%20Stack-based%20Buffer%20Overflow%20in%20GPAC&amp;severity=medium&amp;id=69b27d022f860ef9434f4962</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4014-sql-injection-in-itsourcecode-cafe-r-fce405d4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4014%3A%20SQL%20Injection%20in%20itsourcecode%20Cafe%20Reservation%20System&amp;severity=medium&amp;id=69b275fa2f860ef94349bd09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4013-improper-authorization-in-sourcecode-f6c9bfe1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4013%3A%20Improper%20Authorization%20in%20SourceCodester%20Web-based%20Pharmacy%20Product%20Management%20System&amp;severity=medium&amp;id=69b275fa2f860ef94349bd03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4012-out-of-bounds-read-in-rxi-fe-16bd524c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4012%3A%20Out-of-Bounds%20Read%20in%20rxi%20fe&amp;severity=medium&amp;id=69b26ef22f860ef94343bee9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4010-memory-corruption-in-thakeenathees-p-393ae7ee</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4010%3A%20Memory%20Corruption%20in%20ThakeeNathees%20pocketlang&amp;severity=medium&amp;id=69b26ef22f860ef94343bee1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4009-out-of-bounds-read-in-jarikomppa-sol-d4f76128</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4009%3A%20Out-of-Bounds%20Read%20in%20jarikomppa%20soloud&amp;severity=medium&amp;id=69b26b6b2f860ef943412a61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4008-stack-based-buffer-overflow-in-tenda-40f87be9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4008%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20W3&amp;severity=high&amp;id=69b264662f860ef9433c6315</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4007-stack-based-buffer-overflow-in-tenda-fcb0a190</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4007%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20W3&amp;severity=high&amp;id=69b264662f860ef9433c630e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3994-heap-based-buffer-overflow-in-rui314-8b4917fd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3994%3A%20Heap-based%20Buffer%20Overflow%20in%20rui314%20mold&amp;severity=medium&amp;id=69b2cde02f860ef9439e364f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3993-cross-site-scripting-in-itsourcecode-24b9c531</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3993%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20Payroll%20Management%20System&amp;severity=medium&amp;id=69b2d4ee2f860ef943a58d81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2687-cwe-79-cross-site-scripting-xss-in-r-e7e711dd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2687%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Reading%20progressbar&amp;severity=medium&amp;id=69b2c3542f860ef943916443</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15473-cwe-862-missing-authorization-in-ti-8824c4ba</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15473%3A%20CWE-862%20Missing%20Authorization%20in%20Timetics&amp;severity=medium&amp;id=69b2ca582f860ef943997cdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3992-injection-in-codegenieapp-serverless-4bc669e0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3992%3A%20Injection%20in%20CodeGenieApp%20serverless-express&amp;severity=medium&amp;id=69b256532f860ef94332313d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3990-cross-site-scripting-in-cesiumgs-ces-3cc6e9c4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3990%3A%20Cross%20Site%20Scripting%20in%20CesiumGS%20CesiumJS&amp;severity=medium&amp;id=69b256532f860ef943323137</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3984-cross-site-scripting-in-campcodes-di-3bd8c22a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3984%3A%20Cross%20Site%20Scripting%20in%20Campcodes%20Division%20Regional%20Athletic%20Meet%20Game%20Result%20Matrix%20System&amp;severity=medium&amp;id=69b252cf2f860ef9432f8fe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3983-cross-site-scripting-in-campcodes-di-d143b87a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3983%3A%20Cross%20Site%20Scripting%20in%20Campcodes%20Division%20Regional%20Athletic%20Meet%20Game%20Result%20Matrix%20System&amp;severity=medium&amp;id=69b252cf2f860ef9432f8fda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3982-cross-site-scripting-in-itsourcecode-6ecf9062</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3982%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20University%20Management%20System&amp;severity=medium&amp;id=69b24bc72f860ef94329d5a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3981-sql-injection-in-itsourcecode-online-3fe06655</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3981%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Doctor%20Appointment%20System&amp;severity=medium&amp;id=69b24bc72f860ef94329d59d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3980-sql-injection-in-itsourcecode-online-6b588852</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3980%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Doctor%20Appointment%20System&amp;severity=medium&amp;id=69b241412f860ef94318ef80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3979-use-after-free-in-quickjs-ng-quickjs-4da86ea7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3979%3A%20Use%20After%20Free%20in%20quickjs-ng%20quickjs&amp;severity=medium&amp;id=69b236b22f860ef943fc88b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3978-stack-based-buffer-overflow-in-d-lin-18e3807e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3978%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-513&amp;severity=high&amp;id=69b236b22f860ef943fc88aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3977-missing-authorization-in-projectsend-aca59aed</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3977%3A%20Missing%20Authorization%20in%20projectsend&amp;severity=medium&amp;id=69b236b22f860ef943fc88a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3976-stack-based-buffer-overflow-in-tenda-d46c36c3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3976%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20W3&amp;severity=high&amp;id=69b22c262f860ef943edb6fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3975-stack-based-buffer-overflow-in-tenda-d05d15a9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3975%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20W3&amp;severity=high&amp;id=69b22c262f860ef943edb6f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3226-cwe-862-missing-authorization-in-thi-acd09a45</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3226%3A%20CWE-862%20Missing%20Authorization%20in%20thimpress%20LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin%20for%20Create%20and%20Sell%20Online%20Courses&amp;severity=medium&amp;id=69b22c262f860ef943edb6e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3657-cwe-89-improper-neutralization-of-sp-9aa62a75</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3657%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20premio%20My%20Sticky%20Bar%20%E2%80%93%20Floating%20Notification%20Bar%20%26%20Sticky%20Header%20(formerly%20myStickymenu)&amp;severity=high&amp;id=69b22c262f860ef943edb6e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15038-cwe-125-out-of-bounds-read-in-asus--cbe1b081</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15038%3A%20CWE-125%20Out-of-bounds%20Read%20in%20ASUS%20ASUS%20Business%20System%20Control%20Interface&amp;severity=medium&amp;id=69b22c262f860ef943edb6db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1878-cwe-494-download-of-code-without-int-6c0c8aa1</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1878%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20ASUS%20Driver(%20Keyboard%20%26%20Mouse%20)&amp;severity=medium&amp;id=69b22c262f860ef943edb6de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3974-stack-based-buffer-overflow-in-tenda-3ff86e73</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3974%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20W3&amp;severity=high&amp;id=69b22c262f860ef943edb6f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15037-cwe-732-incorrect-permission-assign-ede452fb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15037%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20ASUS%20ASUS%20Business%20System%20Control%20Interface&amp;severity=medium&amp;id=69b22c262f860ef943edb6d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59388-cwe-259-in-qnap-systems-inc-hyper-d-f9d41b22</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59388%3A%20CWE-259%20in%20QNAP%20Systems%20Inc.%20Hyper%20Data%20Protector&amp;severity=medium&amp;id=69b21e172f860ef943e393ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3973-stack-based-buffer-overflow-in-tenda-36404d80</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3973%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20W3&amp;severity=high&amp;id=69b21e172f860ef943e393b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3972-stack-based-buffer-overflow-in-tenda-c4bbbc78</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3972%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20W3&amp;severity=high&amp;id=69b21e172f860ef943e393b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/when-your-iot-device-logs-in-as-admin-itx3fs-too-l-1ee7e685</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=When%20your%20IoT%20Device%20Logs%20in%20as%20Admin%2C%20It%26%23x3f%3Bs%20too%20Late%26%23x21%3B%20%26%23x5b%3BGuest%20Diary%26%23x5d%3B%2C%20(Wed%2C%20Mar%2011th)&amp;severity=medium&amp;id=69b216d82f860ef943ce83a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3971-stack-based-buffer-overflow-in-tenda-6d3a9072</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3971%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20i3&amp;severity=high&amp;id=69b30a4f2f860ef943dbd363</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3970-stack-based-buffer-overflow-in-tenda-efc7e7df</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3970%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20i3&amp;severity=high&amp;id=69b30a4f2f860ef943dbd35c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3969-sql-injection-in-feminer-wms-e9e28958</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3969%3A%20SQL%20Injection%20in%20FeMiner%20wms&amp;severity=medium&amp;id=69b2e9fd2f860ef943be353d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3968-code-injection-in-autohomecorp-frost-dc906d39</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3968%3A%20Code%20Injection%20in%20AutohomeCorp%20frostmourne&amp;severity=medium&amp;id=69b2c3542f860ef943916465</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3967-deserialization-in-alfresco-activiti-ec4438da</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3967%3A%20Deserialization%20in%20Alfresco%20Activiti&amp;severity=medium&amp;id=69b205772f860ef9439c94a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3966-server-side-request-forgery-in-64854-7a9f914b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3966%3A%20Server-Side%20Request%20Forgery%20in%20648540858%20wvp-GB28181-pro&amp;severity=medium&amp;id=69b205772f860ef9439c949e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-12-12a19288</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-12&amp;severity=medium&amp;id=69b46b7a2f860ef94391c798</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-12-d2659d35</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-12&amp;severity=medium&amp;id=69b356c02f860ef9431a7669</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25823-na-7fa89b66</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25823%3A%20n%2Fa&amp;severity=critical&amp;id=69b333cf2f860ef943fdd746</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25819-na-a8d102e1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25819%3A%20n%2Fa&amp;severity=high&amp;id=69b333cf2f860ef943fdd742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25818-na-3a1c622a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25818%3A%20n%2Fa&amp;severity=critical&amp;id=69b333cf2f860ef943fdd73e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25817-na-cdf8c0ec</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25817%3A%20n%2Fa&amp;severity=high&amp;id=69b333cf2f860ef943fdd73a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70245-na-3e3c2378</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70245%3A%20n%2Fa&amp;severity=high&amp;id=69b3294c2f860ef943f62dfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61154-na-7755ec0f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61154%3A%20n%2Fa&amp;severity=medium&amp;id=69b3294c2f860ef943f62dfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26793-na-885a662b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26793%3A%20n%2Fa&amp;severity=critical&amp;id=69b30d502f860ef943de4417</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70873-na-d464299c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70873%3A%20n%2Fa&amp;severity=high&amp;id=69b30d502f860ef943de4412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66955-na-224e8433</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66955%3A%20n%2Fa&amp;severity=medium&amp;id=69b30a4d2f860ef943dbc465</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26795-na-e936710e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26795%3A%20n%2Fa&amp;severity=critical&amp;id=69b302c82f860ef943d65df0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26794-na-db8d7433</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26794%3A%20n%2Fa&amp;severity=high&amp;id=69b302c82f860ef943d65ded</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26792-na-4b0f503b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26792%3A%20n%2Fa&amp;severity=critical&amp;id=69b302c82f860ef943d65dea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26791-na-72598ba6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26791%3A%20n%2Fa&amp;severity=critical&amp;id=69b302c82f860ef943d65de7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-12-2a7a0014</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-12&amp;severity=low&amp;id=69b295652f860ef943607383</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3965-protection-mechanism-failure-in-whyo-903268fb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3965%3A%20Protection%20Mechanism%20Failure%20in%20whyour%20qinglong&amp;severity=medium&amp;id=69b2c3542f860ef94391645a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2808-cwe-59-improper-link-resolution-befo-54e69108</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2808%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(Link%20Following)%20in%20HashiCorp%20Consul&amp;severity=medium&amp;id=69b1faec2f860ef94395a3ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3964-os-command-injection-in-openakita-4eebd5f8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3964%3A%20OS%20Command%20Injection%20in%20OpenAkita&amp;severity=medium&amp;id=69b1f7682f860ef94392e99d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3963-use-of-hard-coded-cryptographic-key--825e5a85</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3963%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20perfree%20go-fastdfs-web&amp;severity=medium&amp;id=69b1f7682f860ef94392e996</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31988-off-by-one-error-in-thejoshwolfe-ya-91b12b49</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31988%3A%20Off-by-one%20Error%20in%20thejoshwolfe%20yauzl&amp;severity=medium&amp;id=69b1f7682f860ef94392e990</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3962-cross-site-scripting-in-jcharis-mach-bab8dcf6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3962%3A%20Cross%20Site%20Scripting%20in%20Jcharis%20Machine-Learning-Web-Apps&amp;severity=medium&amp;id=69b1f0632f860ef9438d4fc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3942-incorrect-security-ui-in-google-chro-809449ba</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3942%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=69b2d4ee2f860ef943a58d7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3941-insufficient-policy-enforcement-in-g-31991683</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3941%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=medium&amp;id=69b2d4ee2f860ef943a58d79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3940-insufficient-policy-enforcement-in-g-7e111baa</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3940%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=medium&amp;id=69b30a522f860ef943dbd4a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3939-insufficient-policy-enforcement-in-g-db3a4229</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3939%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=medium&amp;id=69b30a522f860ef943dbd4a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3938-insufficient-policy-enforcement-in-g-a4258331</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3938%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=medium&amp;id=69b30a522f860ef943dbd49f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3937-incorrect-security-ui-in-google-chro-63199e35</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3937%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=69b30a522f860ef943dbd49b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3936-use-after-free-in-google-chrome-687e409a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3936%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69b2df702f860ef943b15ceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3935-incorrect-security-ui-in-google-chro-752742df</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3935%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=69b30a522f860ef943dbd497</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3934-insufficient-policy-enforcement-in-g-2c861307</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3934%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=medium&amp;id=69b30a522f860ef943dbd493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3932-insufficient-policy-enforcement-in-g-0a35e8cc</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3932%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=medium&amp;id=69b30a522f860ef943dbd48f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3931-heap-buffer-overflow-in-google-chrom-ef223c08</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3931%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69b2df702f860ef943b15ce7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3930-unsafe-navigation-in-google-chrome-e5c1e63d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3930%3A%20Unsafe%20navigation%20in%20Google%20Chrome&amp;severity=medium&amp;id=69b30a512f860ef943dbd440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62328-cwe-1021-improper-restriction-of-re-45a03379</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62328%3A%20CWE-1021%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20HCLSoftware%20Nomad%20server%20on%20Domino&amp;severity=low&amp;id=69b2ff142f860ef943d3c34e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3929-side-channel-information-leakage-in--267deba1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3929%3A%20Side-channel%20information%20leakage%20in%20Google%20Chrome&amp;severity=low&amp;id=69b30a4f2f860ef943dbd373</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3928-insufficient-policy-enforcement-in-g-8ec6a14c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3928%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=medium&amp;id=69b30a512f860ef943dbd43c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3927-incorrect-security-ui-in-google-chro-791f6273</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3927%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=69b30a512f860ef943dbd438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3926-out-of-bounds-read-in-google-chrome-e2d2ad3f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3926%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=high&amp;id=69b30a512f860ef943dbd434</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3925-incorrect-security-ui-in-google-chro-6b9c2f67</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3925%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=69b2d4ee2f860ef943a58d74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3924-use-after-free-in-google-chrome-aed7be91</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3924%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69b2c3542f860ef943916456</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3923-use-after-free-in-google-chrome-50402a92</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3923%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69b2c3542f860ef943916452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3922-use-after-free-in-google-chrome-b0d39043</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3922%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69b2c3542f860ef94391644e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3921-use-after-free-in-google-chrome-62791b9d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3921%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69b2c3542f860ef94391644a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3920-out-of-bounds-memory-access-in-googl-31d6b34c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3920%3A%20Out%20of%20bounds%20memory%20access%20in%20Google%20Chrome&amp;severity=high&amp;id=69b30a512f860ef943dbd424</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3919-use-after-free-in-google-chrome-9af16b10</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3919%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69b30a512f860ef943dbd420</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3918-use-after-free-in-google-chrome-9ef1326e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3918%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69b30a512f860ef943dbd430</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3917-use-after-free-in-google-chrome-71a58bd0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3917%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69b30a512f860ef943dbd41c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3916-out-of-bounds-read-in-google-chrome-0673a67d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3916%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=critical&amp;id=69b30a512f860ef943dbd42c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3915-heap-buffer-overflow-in-google-chrom-e216428c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3915%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69b30a512f860ef943dbd428</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3914-integer-overflow-in-google-chrome-950479b6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3914%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69b30a4f2f860ef943dbd37f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3913-heap-buffer-overflow-in-google-chrom-8cf7ead7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3913%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69b30a4f2f860ef943dbd37b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3961-server-side-request-forgery-in-zyddn-d3b2c62a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3961%3A%20Server-Side%20Request%20Forgery%20in%20zyddnys%20manga-image-translator&amp;severity=medium&amp;id=69b30a522f860ef943dbd4ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32133-cwe-918-server-side-request-forgery-6d76d5cb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32133%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Bubka%202FAuth&amp;severity=high&amp;id=69b1e5dd2f860ef94384a33b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32136-cwe-287-improper-authentication-in--91bc9287</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32136%3A%20CWE-287%3A%20Improper%20Authentication%20in%20AdguardTeam%20AdGuardHome&amp;severity=critical&amp;id=69b1e5dd2f860ef94384a33e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3959-os-command-injection-in-0xkoda-wirem-1d3e6508</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3959%3A%20OS%20Command%20Injection%20in%200xKoda%20WireMCP&amp;severity=medium&amp;id=69b1e5dd2f860ef94384a348</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3958-server-side-request-forgery-in-woaha-1c324814</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3958%3A%20Server-Side%20Request%20Forgery%20in%20Woahai321%20ListSync&amp;severity=medium&amp;id=69b1e5dd2f860ef94384a341</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32128-cwe-184-incomplete-list-of-disallow-46446d35</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32128%3A%20CWE-184%3A%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20labring%20FastGPT&amp;severity=medium&amp;id=69b1e24f2f860ef943814c6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32117-cwe-79-improper-neutralization-of-i-425bdca8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32117%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ekacnet%20grafanacubism-panel&amp;severity=high&amp;id=69b1e24f2f860ef943814c67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27591-cwe-284-improper-access-control-in--eac8002f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27591%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20wintercms%20winter&amp;severity=critical&amp;id=69b1e24f2f860ef943814c61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3957-sql-injection-in-xierongwkhd-weimai--648696b2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3957%3A%20SQL%20Injection%20in%20xierongwkhd%20weimai-wetapp&amp;severity=medium&amp;id=69b1db482f860ef9437ae350</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32112-cwe-79-improper-neutralization-of-i-e6caf05a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32112%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20homeassistant-ai%20ha-mcp&amp;severity=medium&amp;id=69b1d7c72f860ef94378fdd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32111-cwe-918-server-side-request-forgery-65cc1f87</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32111%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20homeassistant-ai%20ha-mcp&amp;severity=medium&amp;id=69b1d7c72f860ef94378fdcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32110-cwe-918-server-side-request-forgery-60e05017</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32110%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=69b1d7c72f860ef94378fdcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3956-sql-injection-in-xierongwkhd-weimai--fcc59d65</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3956%3A%20SQL%20Injection%20in%20xierongwkhd%20weimai-wetapp&amp;severity=medium&amp;id=69b1d4422f860ef9437718ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3955-code-injection-in-elecv2p-8cd8ad16</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3955%3A%20Code%20Injection%20in%20elecV2P&amp;severity=medium&amp;id=69b1d4422f860ef9437718a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2640-cwe-269-improper-privilege-managemen-e95ab468</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2640%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Lenovo%20PC%20Manager&amp;severity=medium&amp;id=69b1d4422f860ef9437718a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1717-cwe-88-improper-neutralization-of-ar-cb1d4268</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1717%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Lenovo%20Vantage&amp;severity=medium&amp;id=69b1d4402f860ef94377184b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1716-cwe-88-improper-neutralization-of-ar-14e492a1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1716%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Lenovo%20Vantage&amp;severity=medium&amp;id=69b1d4402f860ef943771847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1715-cwe-88-improper-neutralization-of-ar-b8774eec</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1715%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Lenovo%20Vantage&amp;severity=medium&amp;id=69b1d4402f860ef943771843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1653-cwe-369-divide-by-zero-in-lenovo-sma-2246780a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1653%3A%20CWE-369%3A%20Divide%20By%20Zero%20in%20Lenovo%20Smart%20Connect&amp;severity=medium&amp;id=69b1d4402f860ef943771840</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1652-cwe-122-heap-based-buffer-overflow-i-f6353da2</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1652%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Lenovo%20Smart%20Connect&amp;severity=medium&amp;id=69b1d4402f860ef94377183d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0940-cwe-665-improper-initialization-in-l-1e8a6587</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0940%3A%20CWE-665%3A%20Improper%20Initialization%20in%20Lenovo%20ThinkPad%20T14%20Gen%205%20BIOS&amp;severity=high&amp;id=69b1d4402f860ef943771837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2368-cwe-295-improper-certificate-validat-34870dff</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2368%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Lenovo%20FileZ&amp;severity=high&amp;id=69b1d4402f860ef94377184f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1068-cwe-295-improper-certificate-validat-9db0aa86</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1068%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Lenovo%20FileZ&amp;severity=medium&amp;id=69b1d4402f860ef94377183a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0520-cwe-532-insertion-of-sensitive-infor-ef53dc0e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0520%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Lenovo%20FileZ&amp;severity=low&amp;id=69b1d4402f860ef943771834</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32109-cwe-79-improper-neutralization-of-i-b3c947c0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32109%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%209001%20copyparty&amp;severity=low&amp;id=69b1d0c22f860ef94375752b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32108-cwe-863-incorrect-authorization-in--b3b79436</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32108%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%209001%20copyparty&amp;severity=low&amp;id=69b1d0c22f860ef943757528</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32104-cwe-639-authorization-bypass-throug-275920a2</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32104%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20withstudiocms%20studiocms&amp;severity=medium&amp;id=69b1d0c22f860ef943757522</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32106-cwe-269-improper-privilege-manageme-b98c7a31</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32106%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20withstudiocms%20studiocms&amp;severity=medium&amp;id=69b1d0c22f860ef943757525</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32103-cwe-639-authorization-bypass-throug-677e6d72</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32103%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20withstudiocms%20studiocms&amp;severity=medium&amp;id=69b1d0c22f860ef94375751f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32101-cwe-863-incorrect-authorization-in--952207f9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32101%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20%40studiocms%20s3-storage&amp;severity=high&amp;id=69b1d0c22f860ef94375751c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3954-path-traversal-in-openbmb-xagent-fb861de9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3954%3A%20Path%20Traversal%20in%20OpenBMB%20XAgent&amp;severity=medium&amp;id=69b1cd382f860ef943720755</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32234-cwe-89-improper-neutralization-of-s-dd3557bc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32234%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69b1cd382f860ef943720750</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32098-cwe-200-exposure-of-sensitive-infor-ba6a965b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32098%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69b1cd382f860ef94372074b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32097-cwe-639-authorization-bypass-throug-8831b524</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32097%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20comppolicylab%20pingpong&amp;severity=high&amp;id=69b1cd382f860ef943720748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32096-cwe-918-server-side-request-forgery-4e688d7e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32096%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20useplunk%20plunk&amp;severity=critical&amp;id=69b1cd382f860ef943720744</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32095-cwe-79-improper-neutralization-of-i-683938fe</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32095%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20useplunk%20plunk&amp;severity=medium&amp;id=69b1cd382f860ef943720741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32094-cwe-200-exposure-of-sensitive-infor-d09e40d8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32094%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20ericcornelissen%20shescape&amp;severity=medium&amp;id=69b1cd382f860ef94372073d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31979-cwe-59-improper-link-resolution-bef-4ecb1ff2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31979%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20himmelblau-idm%20himmelblau&amp;severity=high&amp;id=69b1c9b82f860ef9436f46ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31976-cwe-506-embedded-malicious-code-in--7bdbb65f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31976%3A%20CWE-506%3A%20Embedded%20Malicious%20Code%20in%20xygeni%20xygeni-action&amp;severity=critical&amp;id=69b1c9b82f860ef9436f46e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31974-cwe-918-server-side-request-forgery-e24e73ea</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31974%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20opf%20openproject&amp;severity=low&amp;id=69b1c9b82f860ef9436f46e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27703-cwe-787-out-of-bounds-write-in-riot-9f9f0e2f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27703%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20RIOT-OS%20RIOT&amp;severity=high&amp;id=69b1c9b82f860ef9436f46e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31961-cwe-770-allocation-of-resources-wit-7b2d6a47</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31961%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20anchore%20quill&amp;severity=medium&amp;id=69b1c6312f860ef9436c35f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3951-cross-site-scripting-in-lockerprojec-e61e3138</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3951%3A%20Cross%20Site%20Scripting%20in%20LockerProject%20Locker&amp;severity=medium&amp;id=69b1c6312f860ef9436c35fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31960-cwe-770-allocation-of-resources-wit-3b284858</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31960%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20anchore%20quill&amp;severity=medium&amp;id=69b1c6312f860ef9436c35f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31959-cwe-918-server-side-request-forgery-ed587800</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31959%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20anchore%20quill&amp;severity=medium&amp;id=69b1c6312f860ef9436c35f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31958-cwe-400-uncontrolled-resource-consu-93042686</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31958%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20tornadoweb%20tornado&amp;severity=high&amp;id=69b1c6312f860ef9436c35eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31957-cwe-1188-insecure-default-initializ-e7809765</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31957%3A%20CWE-1188%3A%20Insecure%20Default%20Initialization%20of%20Resource%20in%20himmelblau-idm%20himmelblau&amp;severity=critical&amp;id=69b1c6312f860ef9436c35e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31901-cwe-204-observable-response-discrep-218df620</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31901%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69b1c6312f860ef9436c35e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31900-cwe-20-improper-input-validation-in-edbd8e2f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31900%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20psf%20black&amp;severity=high&amp;id=69b1c6312f860ef9436c35dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31896-cwe-89-improper-neutralization-of-s-90bf525e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31896%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=69b1c2ac2f860ef943697e5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31895-cwe-89-improper-neutralization-of-s-8ec6b871</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31895%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=69b1c2ac2f860ef943697e5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31894-cwe-59-improper-link-resolution-bef-273e74f1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31894%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=69b1c2ac2f860ef943697e58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3950-out-of-bounds-read-in-strukturag-lib-c710b92d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3950%3A%20Out-of-Bounds%20Read%20in%20strukturag%20libheif&amp;severity=medium&amp;id=69b1c2ac2f860ef943697e62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24510-cwe-269-improper-privilege-manageme-c60c1a34</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24510%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Dell%20Alienware%20Command%20Center%20(AWCC)&amp;severity=medium&amp;id=69b1c2ac2f860ef943697e52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31889-cwe-290-authentication-bypass-by-sp-9a902af4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31889%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20shopware%20core&amp;severity=high&amp;id=69b1c2ac2f860ef943697e55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24508-cwe-295-improper-certificate-valida-35144bc2</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24508%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Dell%20Alienware%20Command%20Center%20(AWCC)&amp;severity=low&amp;id=69b1c2ac2f860ef943697e4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31888-cwe-204-observable-response-discrep-3a60d5fb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31888%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20shopware%20core&amp;severity=medium&amp;id=69b1bba82f860ef94362bfb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24509-cwe-284-improper-access-control-in--f38b1b80</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24509%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Dell%20Alienware%20Command%20Center%20(AWCC)&amp;severity=low&amp;id=69b1bba82f860ef94362bfaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31887-cwe-863-incorrect-authorization-in--092202e0</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31887%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20shopware%20core&amp;severity=high&amp;id=69b1bba82f860ef94362bfad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3949-out-of-bounds-read-in-strukturag-lib-5bf25418</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3949%3A%20Out-of-Bounds%20Read%20in%20strukturag%20libheif&amp;severity=medium&amp;id=69b1b88a2f860ef943602144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31876-cwe-79-improper-neutralization-of-i-82d78847</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31876%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20streetwriters%20notesnook&amp;severity=medium&amp;id=69b1b88a2f860ef943602140</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31875-cwe-672-operation-on-a-resource-aft-92224a64</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31875%3A%20CWE-672%3A%20Operation%20on%20a%20Resource%20after%20Expiration%20or%20Release%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69b1b88a2f860ef943602166</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0231-cwe-497-exposure-of-sensitive-system-2d07855f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0231%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Palo%20Alto%20Networks%20Cortex%20XDR%20Broker%20VM&amp;severity=medium&amp;id=69b1b88a2f860ef943602151</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31872-cwe-284-improper-access-control-in--6ddaf3fb</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31872%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69b1b88a2f860ef943602161</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0230-cwe-754-improper-check-for-unusual-o-1c766041</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0230%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Palo%20Alto%20Networks%20Cortex%20XDR%20Agent&amp;severity=medium&amp;id=69b1b88a2f860ef94360214e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31871-cwe-89-improper-neutralization-of-s-b26a259b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31871%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20parse-community%20parse-server&amp;severity=critical&amp;id=69b1b88a2f860ef94360215c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31870-cwe-248-uncaught-exception-in-yhiro-528175cd</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31870%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20yhirose%20cpp-httplib&amp;severity=high&amp;id=69b1b88a2f860ef943602159</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31868-cwe-79-improper-neutralization-of-i-07f6fa3b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31868%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69b1b88a2f860ef943602154</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31867-cwe-639-authorization-bypass-throug-c2789827</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31867%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20craftcms%20commerce&amp;severity=medium&amp;id=69b1b88b2f860ef9436021cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31866-cwe-770-allocation-of-resources-wit-c8bbc737</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31866%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20open-feature%20flagd&amp;severity=high&amp;id=69b1b88b2f860ef9436021cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30226-cwe-1321-improperly-controlled-modi-8604fba8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30226%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20sveltejs%20devalue&amp;severity=medium&amp;id=69b1b88a2f860ef94360216b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31863-cwe-307-improper-restriction-of-exc-8cc9caca</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31863%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20anyproto%20anytype-heart&amp;severity=low&amp;id=69b1b88b2f860ef9436021c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31859-cwe-79-improper-neutralization-of-i-e1757a3a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31859%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20cms&amp;severity=medium&amp;id=69b1b88b2f860ef9436021c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31858-cwe-89-improper-neutralization-of-s-88a77bb1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31858%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20craftcms%20cms&amp;severity=high&amp;id=69b1b88b2f860ef9436021c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31857-cwe-94-improper-control-of-generati-b827dfaa</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31857%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20craftcms%20cms&amp;severity=high&amp;id=69b1aa112f860ef943525d7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31975-cwe-78-improper-neutralization-of-s-a38c6f04</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31975%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20siteboon%20claudecodeui&amp;severity=high&amp;id=69b1aa112f860ef943525d8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31861-cwe-94-improper-control-of-generati-57615f72</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31861%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20siteboon%20claudecodeui&amp;severity=high&amp;id=69b1aa112f860ef943525d82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31862-cwe-78-improper-neutralization-of-s-27a2b874</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31862%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20siteboon%20claudecodeui&amp;severity=critical&amp;id=69b1aa112f860ef943525d87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31856-cwe-89-improper-neutralization-of-s-9159e344</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31856%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20parse-community%20parse-server&amp;severity=critical&amp;id=69b1aa112f860ef943525d79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31852-cwe-269-improper-privilege-manageme-1e9d6b5a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31852%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20jellyfin%20code-quality.yml&amp;severity=critical&amp;id=69b1b88b2f860ef9436021d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31840-cwe-89-improper-neutralization-of-s-ae48a02e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31840%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20parse-community%20parse-server&amp;severity=critical&amp;id=69b1b88b2f860ef9436021d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31839-cwe-354-improper-validation-of-inte-928c10e1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31839%3A%20CWE-354%3A%20Improper%20Validation%20of%20Integrity%20Check%20Value%20in%20striae-org%20striae&amp;severity=high&amp;id=69b19f882f860ef9434a76cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31813-cwe-290-authentication-bypass-by-sp-c3c5f69f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31813%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20supabase%20auth&amp;severity=medium&amp;id=69b19f882f860ef9434a76cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30868-cwe-352-cross-site-request-forgery--7f200187</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30868%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20opnsense%20core&amp;severity=medium&amp;id=69b19f882f860ef9434a76c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20118-improper-cleanup-on-thrown-exceptio-decbeee1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20118%3A%20Improper%20Cleanup%20on%20Thrown%20Exception%20in%20Cisco%20Cisco%20IOS%20XR%20Software&amp;severity=medium&amp;id=69b19f882f860ef9434a76c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20117-improper-neutralization-of-input-du-1b81cde1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20117%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Unified%20Contact%20Center%20Express&amp;severity=medium&amp;id=69b19f882f860ef9434a76c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20116-improper-neutralization-of-input-du-5d1d53fd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20116%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Unified%20Contact%20Center%20Express&amp;severity=medium&amp;id=69b19f882f860ef9434a76c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20046-permissions-privileges-and-access-c-8ac8ec84</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20046%3A%20Permissions%2C%20Privileges%2C%20and%20Access%20Control%20in%20Cisco%20Cisco%20IOS%20XR%20Software&amp;severity=high&amp;id=69b19f882f860ef9434a76ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20074-improper-validation-of-specified-ty-cb4cdc42</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20074%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Cisco%20Cisco%20IOS%20XR%20Software&amp;severity=high&amp;id=69b19f882f860ef9434a76bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20040-improper-neutralization-of-special--28cef64a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20040%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Cisco%20Cisco%20IOS%20XR%20Software&amp;severity=high&amp;id=69b19f882f860ef9434a76b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1471-cwe-863-incorrect-authorization-in-n-5b0adb08</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1471%3A%20CWE-863%20Incorrect%20Authorization%20in%20Neo4j%20Enterprise%20edition&amp;severity=low&amp;id=69b19f882f860ef9434a76b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30239-cwe-863-incorrect-authorization-in--ed065581</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30239%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20opf%20openproject&amp;severity=medium&amp;id=69b198902f860ef9433d35f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30236-cwe-863-incorrect-authorization-in--4fd2e91c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30236%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20opf%20openproject&amp;severity=medium&amp;id=69b198902f860ef9433d35f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/medtech-giant-stryker-crippled-by-iran-linked-hack-953234d5</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MedTech%20Giant%20Stryker%20Crippled%20by%20Iran-Linked%20Hacker%20Attack&amp;severity=medium&amp;id=69b198492f860ef9433c9548</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20163-the-software-constructs-all-or-part-9c53cba7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20163%3A%20The%20software%20constructs%20all%20or%20part%20of%20a%20command%20using%20externally-influenced%20input%20from%20an%20upstream%20component%2C%20but%20it%20does%20not%20neutralize%20or%20incorrectly%20neutralizes%20special%20elements%20that%20could%20modify%20the%20intended%20command%20when%20it%20is%20sent%20to%20a%20downstream%20component.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=high&amp;id=69b198902f860ef9433d35e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20162-the-software-does-not-neutralize-or-5dd46d0f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20162%3A%20The%20software%20does%20not%20neutralize%20or%20incorrectly%20neutralizes%20user-controllable%20input%20before%20it%20is%20placed%20in%20output%20that%20is%20used%20as%20a%20web%20page%20that%20is%20served%20to%20other%20users.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=69b198902f860ef9433d35e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20166-the-product-exposes-sensitive-infor-a841b7c6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20166%3A%20The%20product%20exposes%20sensitive%20information%20to%20an%20actor%20that%20is%20not%20explicitly%20authorized%20to%20have%20access%20to%20that%20information.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=69b198902f860ef9433d35ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20164-the-product-exposes-sensitive-infor-98853a72</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20164%3A%20The%20product%20exposes%20sensitive%20information%20to%20an%20actor%20that%20is%20not%20explicitly%20authorized%20to%20have%20access%20to%20that%20information.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=69b198902f860ef9433d35e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20165-information-written-to-log-files-ca-f88941b5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20165%3A%20Information%20written%20to%20log%20files%20can%20be%20of%20a%20sensitive%20nature%20and%20give%20valuable%20guidance%20to%20an%20attacker%20or%20expose%20sensitive%20user%20information.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=69b198902f860ef9433d35ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3429-improper-access-control-in-red-hat-r-689d9289</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3429%3A%20Improper%20Access%20Control%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=medium&amp;id=69b198902f860ef9433d35fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1524-cwe-863-incorrect-authorization-in-n-a1518306</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1524%3A%20CWE-863%20Incorrect%20Authorization%20in%20neo4j%20Enterprise%20Edition&amp;severity=low&amp;id=69b1988f2f860ef9433d150f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30235-cwe-79-improper-neutralization-of-i-dd14d40c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30235%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20opf%20openproject&amp;severity=medium&amp;id=69b198902f860ef9433d35f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30234-cwe-22-improper-limitation-of-a-pat-90813fd6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30234%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20opf%20openproject&amp;severity=medium&amp;id=69b194fa2f860ef943342469</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28803-cwe-284-improper-access-control-in--4f7bbe07</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28803%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20open-formulieren%20open-forms&amp;severity=medium&amp;id=69b194fa2f860ef943342466</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1497-cwe-863-incorrect-authorization-in-n-7ddf9448</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1497%3A%20CWE-863%20Incorrect%20Authorization%20in%20neo4j%20Enterprise%20Edition&amp;severity=low&amp;id=69b194fa2f860ef943342463</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31892-cwe-863-incorrect-authorization-in--a88b5d70</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31892%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20argoproj%20argo-workflows&amp;severity=high&amp;id=69b1917d2f860ef9432c8e48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28229-cwe-863-incorrect-authorization-in--f1c60bd3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28229%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20argoproj%20argo-workflows&amp;severity=critical&amp;id=69b1917d2f860ef9432c8e45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12690-cwe-250-execution-with-unnecessary--e81ca7a2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12690%3A%20CWE-250%20Execution%20with%20unnecessary%20privileges%20in%20Forcepoint%20NGFW%20Engine&amp;severity=high&amp;id=69b1917d2f860ef9432c8e3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27897-cwe-22-improper-limitation-of-a-pat-e3daa46c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27897%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WanderingAstronomer%20Vociferous&amp;severity=critical&amp;id=69b1917d2f860ef9432c8e42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22248-cwe-502-deserialization-of-untruste-1db54bf0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22248%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20glpi-project%20glpi&amp;severity=high&amp;id=69b1917d2f860ef9432c8e3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iran-conflict-drives-heightened-espionage-activity-8e0cdf7e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran%20conflict%20drives%20heightened%20espionage%20activity%20against%20Middle%20East%20targets&amp;severity=medium&amp;id=69b7d24e9d4df45183475a4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32229-cwe-290-in-jetbrains-hub-d8b40e32</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32229%3A%20CWE-290%20in%20JetBrains%20Hub&amp;severity=medium&amp;id=69b186eb2f860ef9431291d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3946-cross-site-scripting-in-phpems-703668cb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3946%3A%20Cross%20Site%20Scripting%20in%20PHPEMS&amp;severity=medium&amp;id=69b186eb2f860ef9431291d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30903-cwe-73-external-control-of-file-nam-9bcbc0fc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30903%3A%20CWE-73%20External%20control%20of%20file%20name%20or%20path%20in%20Zoom%20Communications%20Zoom%20Workplace&amp;severity=critical&amp;id=69b186eb2f860ef9431291cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30902-cwe-269-improper-privilege-manageme-b4150bc0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30902%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Zoom%20Communications%20Inc.%20Zoom%20Workplace&amp;severity=high&amp;id=69b186eb2f860ef9431291ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30901-cwe-20-improper-input-validation-in-d71d0f92</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30901%3A%20CWE-20%20Improper%20input%20validation%20in%20Zoom%20Communications%20Inc.%20Zoom%20Rooms&amp;severity=high&amp;id=69b186eb2f860ef9431291c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30900-cwe-754-improper-check-for-unusual--7c59c0ee</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30900%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Zoom%20Communications%20Inc.%20Zoom%20Workplace&amp;severity=high&amp;id=69b183692f860ef9430a87e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/238000-impacted-by-bell-ambulance-data-breach-8a14bb51</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=238%2C000%20Impacted%20by%20Bell%20Ambulance%20Data%20Breach&amp;severity=medium&amp;id=69b1719c2f860ef943cd4ddc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3496-cwe-89-improper-neutralization-of-sp-f54d6727</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3496%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Crocoblock%20JetBooking&amp;severity=high&amp;id=69b171e72f860ef943cd659c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3904-cwe-366-race-condition-within-a-thre-3c00b05d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3904%3A%20CWE-366%20Race%20condition%20within%20a%20thread%20in%20The%20GNU%20C%20Library%20glibc&amp;severity=medium&amp;id=69b171e72f860ef943cd65a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3944-sql-injection-in-itsourcecode-univer-51d5eea3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3944%3A%20SQL%20Injection%20in%20itsourcecode%20University%20Management%20System&amp;severity=medium&amp;id=69b163bf2f860ef943c23223</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3943-command-injection-in-h3c-acg1000-ak2-385a93b7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3943%3A%20Command%20Injection%20in%20H3C%20ACG1000-AK230&amp;severity=medium&amp;id=69b163bf2f860ef943c2321d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-ivanti-intel-patch-high-severity-vulnerab-6eed7f7c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%2C%20Ivanti%2C%20Intel%20Patch%20High-Severity%20Vulnerabilities&amp;severity=high&amp;id=69b15c862f860ef943bdbb8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-10x-your-vulnerability-management-program-i-9e653e42</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%2010x%20Your%20Vulnerability%20Management%20Program%20in%20the%20Agentic%20Era&amp;severity=medium&amp;id=69b15c862f860ef943bdbb91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/michelin-confirms-data-breach-linked-to-oracle-ebs-6db6f397</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Michelin%20Confirms%20Data%20Breach%20Linked%20to%20Oracle%20EBS%20Attack&amp;severity=medium&amp;id=69b151f92f860ef943b5520d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beatbanker-and-btmob-trojans-infection-techniques--c2f45e9e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BeatBanker%20and%20BTMOB%20trojans%3A%20infection%20techniques%20and%20how%20to%20stay%20safe%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69b1d0172f860ef94375071d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/middle-east-crisis-exploited-by-fraudsters-governm-f86a46d9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Middle%20East%20Crisis%20Exploited%20by%20Fraudsters%3A%20Government%20Impersonation%20and%20Evacuation%20Scam%20Infrastructure%20Identified&amp;severity=medium&amp;id=69b933a8771bdb17499de646</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/castlerat-attack-first-to-abuse-deno-javascript-ru-260b4856</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CastleRAT%20attack%20first%20to%20abuse%20Deno%20JavaScript%20runtime%20to%20evade%20enterprise%20security&amp;severity=medium&amp;id=69b7c7d69d4df451833e08e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3178-cwe-79-improper-neutralization-of-in-e5f2762b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3178%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jeroenpeters1986%20Name%20Directory&amp;severity=high&amp;id=69b1523c2f860ef943b572b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kadnap-malware-turning-asus-routers-into-botnets-71871166</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KadNap%20Malware%20Turning%20Asus%20Routers%20Into%20Botnets&amp;severity=medium&amp;id=69b140632f860ef9439004e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analyzing-zombie-zip-files-cve-2026-0866-wed-mar-1-4a802635</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analyzing%20%22Zombie%20Zip%22%20Files%20(CVE-2026-0866)%2C%20(Wed%2C%20Mar%2011th)&amp;severity=medium&amp;id=69b1d0472f860ef943751945</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/blacksanta-malware-activates-edr-and-av-killer-bef-26cabb98</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%98BlackSanta%E2%80%99%20Malware%20Activates%20EDR%20and%20AV%20Killer%20Before%20Detonating%20Payload&amp;severity=medium&amp;id=69b1395c2f860ef94389f066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3231-cwe-79-improper-neutralization-of-in-46fc345a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3231%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themehigh%20Checkout%20Field%20Editor%20(Checkout%20Manager)%20for%20WooCommerce&amp;severity=high&amp;id=69b139a22f860ef9438a0d7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3906-cwe-862-missing-authorization-in-wor-9947b784</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3906%3A%20CWE-862%20Missing%20Authorization%20in%20WordPress%20Foundation%20WordPress&amp;severity=medium&amp;id=69b139a22f860ef9438a0d83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1992-cwe-639-authorization-bypass-through-abde304f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1992%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20smub%20ExactMetrics%20%E2%80%93%20Google%20Analytics%20Dashboard%20for%20WordPress%20(Website%20Stats%20Plugin)&amp;severity=high&amp;id=69b139a22f860ef9438a0d70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1993-cwe-269-improper-privilege-managemen-24b1c442</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1993%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20smub%20ExactMetrics%20%E2%80%93%20Google%20Analytics%20Dashboard%20for%20WordPress%20(Website%20Stats%20Plugin)&amp;severity=high&amp;id=69b139a22f860ef9438a0d75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1454-cwe-79-improper-neutralization-of-in-c99aaf23</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1454%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themehunk%20Lead%20Form%20Builder%20%26%20Contact%20Form&amp;severity=high&amp;id=69b12b822f860ef94376110d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14026-cwe-78-in-qnap-systems-inc-qts-04698809</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14026%3A%20CWE-78%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=69b124772f860ef943643f9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14025-cwe-89-in-qnap-systems-inc-video-st-dfdabf28</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14025%3A%20CWE-89%20in%20QNAP%20Systems%20Inc.%20Video%20Station&amp;severity=low&amp;id=69b124772f860ef943643f97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14024-cwe-295-in-qnap-systems-inc-video-s-51816644</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14024%3A%20CWE-295%20in%20QNAP%20Systems%20Inc.%20Video%20Station&amp;severity=low&amp;id=69b124772f860ef943643f94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ics-patch-tuesday-vulnerabilities-fixed-by-siemens-b89a8949</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ICS%20Patch%20Tuesday%3A%20Vulnerabilities%20Fixed%20by%20Siemens%2C%20Schneider%2C%20Moxa%2C%20Mitsubishi%20Electric&amp;severity=medium&amp;id=69b120c12f860ef9435b03c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2917-cwe-639-authorization-bypass-through-c3ec0b8c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2917%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20thehappymonster%20Happy%20Addons%20for%20Elementor&amp;severity=medium&amp;id=69b121032f860ef9435ba546</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3903-cwe-352-cross-site-request-forgery-c-73f3bf67</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3903%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20modulards%20Modular%20DS%3A%20Monitor%2C%20update%2C%20and%20backup%20multiple%20websites&amp;severity=medium&amp;id=69b121032f860ef9435ba556</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1708-cwe-89-improper-neutralization-of-sp-91722cf8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1708%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20croixhaug%20Appointment%20Booking%20Calendar%20%E2%80%94%20Simply%20Schedule%20Appointments%20Booking%20Plugin&amp;severity=high&amp;id=69b121032f860ef9435ba53a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2918-cwe-639-authorization-bypass-through-17a3f525</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2918%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20thehappymonster%20Happy%20Addons%20for%20Elementor&amp;severity=medium&amp;id=69b121032f860ef9435ba54e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3534-cwe-79-improper-neutralization-of-in-83a4f3a9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3534%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brainstormforce%20Astra&amp;severity=medium&amp;id=69b112e52f860ef943422837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3826-cwe-98-improper-control-of-filename--e68c5a28</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3826%3A%20CWE-98%20Improper%20control%20of%20filename%20for%20Include%2FRequire%20statement%20in%20PHP%20program%20(&apos;PHP%20remote%20file%20inclusion&apos;)%20in%20WellChoose%20IFTOP&amp;severity=critical&amp;id=69b112e62f860ef943422847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3825-cwe-79-improper-neutralization-of-in-641f3f35</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3825%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20WellChoose%20IFTOP&amp;severity=medium&amp;id=69b112e62f860ef943422843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31844-cwe-89-improper-neutralization-of-s-fae24db9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31844%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Koha%20Community%20Koha&amp;severity=high&amp;id=69b112e52f860ef943422834</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3824-cwe-601-url-redirection-to-untrusted-e8697e70</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3824%3A%20CWE-601%20URL%20redirection%20to%20untrusted%20site%20(&apos;open%20redirect&apos;)%20in%20WellChoose%20IFTOP&amp;severity=medium&amp;id=69b112e62f860ef94342283f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-oauth-device-code-phishing-5c00f553</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20OAuth%20Device%20Code%20Phishing&amp;severity=medium&amp;id=69b143e72f860ef94397fe66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2631-cwe-269-improper-privilege-managemen-beccaec0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2631%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Datalogics%20Ecommerce%20Delivery&amp;severity=critical&amp;id=69b108572f860ef94335d440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2626-cwe-502-deserialization-of-untrusted-6caf0aad</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2626%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20divi-booster&amp;severity=high&amp;id=69b108572f860ef94335d43d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2466-cwe-79-cross-site-scripting-xss-in-d-1e292536</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2466%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20DukaPress&amp;severity=high&amp;id=69b108572f860ef94335d43a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1867-cwe-200-information-exposure-in-gues-73b4347e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1867%3A%20CWE-200%20Information%20Exposure%20in%20Guest%20posting%20%2F%20Frontend%20Posting%20%2F%20Front%20Editor&amp;severity=medium&amp;id=69b108572f860ef94335d437</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1753-cwe-639-authorization-bypass-through-f27a895c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1753%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Gutena%20Forms&amp;severity=medium&amp;id=69b108572f860ef94335d434</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3911-exposure-of-private-personal-informa-7285863b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3911%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=low&amp;id=69b104d42f860ef943326c64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2707-cwe-79-improper-neutralization-of-in-1a1d8fa1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2707%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boldgrid%20weForms%20%E2%80%93%20Easy%20Drag%20%26%20Drop%20Contact%20Form%20Builder%20For%20WordPress&amp;severity=medium&amp;id=69b0fdcf2f860ef9432e28e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3222-cwe-89-improper-neutralization-of-sp-3eef23b5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3222%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20flippercode%20WP%20Maps%20%E2%80%93%20Store%20Locator%2CGoogle%20Maps%2COpenStreetMap%2CMapbox%2CListing%2CDirectory%20%26%20Filters&amp;severity=high&amp;id=69b0fdcf2f860ef9432e28ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2358-cwe-79-improper-neutralization-of-in-aadc0e97</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2358%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20alimir%20WP%20ULike%20%E2%80%93%20Like%20%26%20Dislike%20Buttons%20for%20Engagement%20and%20Feedback&amp;severity=medium&amp;id=69b0fdcf2f860ef9432e28dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27842-authentication-bypass-using-an-alte-4a1f7ba8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27842%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Micro%20Research%20Ltd.%20MR-GM5L-S1&amp;severity=critical&amp;id=69b0fdcf2f860ef9432e28d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24448-use-of-hard-coded-credentials-in-mi-455b658d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24448%3A%20Use%20of%20hard-coded%20credentials%20in%20Micro%20Research%20Ltd.%20MR-GM5L-S1&amp;severity=critical&amp;id=69b0fdcf2f860ef9432e28d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20892-code-injection-in-micro-research-lt-9d6b477d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20892%3A%20Code%20injection%20in%20Micro%20Research%20Ltd.%20MR-GM5L-S1&amp;severity=high&amp;id=69b0fdcf2f860ef9432e28d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3884-cross-site-scripting-xss-in-spinjs-fd57032d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3884%3A%20Cross-site%20Scripting%20(XSS)%20in%20spin.js&amp;severity=medium&amp;id=69b0fdcf2f860ef9432e28fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13067-cwe-434-unrestricted-upload-of-file-9f3e7849</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13067%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20wproyal%20Royal%20Addons%20for%20Elementor%20%E2%80%93%20Addons%20and%20Templates%20Kit%20for%20Elementor&amp;severity=high&amp;id=69b0efc52f860ef943185a78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2413-cwe-89-improper-neutralization-of-sp-3cc7e9f8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2413%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20elemntor%20Ally%20%E2%80%93%20Web%20Accessibility%20%26%20Usability&amp;severity=high&amp;id=69b0efc52f860ef943185a7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29515-cwe-303-incorrect-implementation-of-ff84fc0e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29515%3A%20CWE-303%20Incorrect%20implementation%20of%20authentication%20algorithm%20in%20MiCode%20FileExplorer&amp;severity=critical&amp;id=69b0e8b62f860ef943102174</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23817-vulnerability-in-hewlett-packard-en-5631bf85</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23817%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20AOS-CX&amp;severity=medium&amp;id=69b0e8b62f860ef943102171</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23816-vulnerability-in-hewlett-packard-en-f75f54e7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23816%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20AOS-CX&amp;severity=high&amp;id=69b0e8b62f860ef94310216e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23815-vulnerability-in-hewlett-packard-en-630530fe</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23815%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20AOS-CX&amp;severity=high&amp;id=69b0e8b62f860ef94310216b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23814-vulnerability-in-hewlett-packard-en-e0f88dd5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23814%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20AOS-CX&amp;severity=high&amp;id=69b0e8b62f860ef943102168</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23813-vulnerability-in-hewlett-packard-en-bce16d68</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23813%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20AOS-CX&amp;severity=critical&amp;id=69b0e8b62f860ef943102165</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3453-cwe-639-authorization-bypass-through-41f4f93e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3453%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20properfraction%20Paid%20Membership%20Plugin%2C%20Ecommerce%2C%20User%20Registration%20Form%2C%20Login%20Form%2C%20User%20Profile%20%26%20Restrict%20Content%20%E2%80%93%20ProfilePress&amp;severity=high&amp;id=69b0de292f860ef9430a0afe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21291-cross-site-scripting-stored-xss-cwe-3d41cde9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21291%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=69b0de272f860ef9430a0ac9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21293-server-side-request-forgery-ssrf-cw-90c28adc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21293%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20(CWE-918)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=69b0de272f860ef9430a0acf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21282-improper-input-validation-cwe-20-in-a8641567</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21282%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=69b0de272f860ef9430a0ab7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21286-incorrect-authorization-cwe-863-in--83d31496</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21286%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=69b0de272f860ef9430a0ac0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21294-server-side-request-forgery-ssrf-cw-2145ce76</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21294%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20(CWE-918)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=69b0de272f860ef9430a0ad2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21284-cross-site-scripting-stored-xss-cwe-91191b9f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21284%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=69b0de272f860ef9430a0aba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21297-incorrect-authorization-cwe-863-in--5c202651</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21297%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=69b0de292f860ef9430a0ae9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21359-incorrect-authorization-cwe-863-in--f32386b9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21359%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=69b0de292f860ef9430a0af5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21309-incorrect-authorization-cwe-863-in--80c62d9c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21309%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=69b0de292f860ef9430a0aec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21292-cross-site-scripting-stored-xss-cwe-734da7f2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21292%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=69b0de272f860ef9430a0acc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21310-improper-input-validation-cwe-20-in-7fe81d1f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21310%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=69b0de292f860ef9430a0aef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21285-incorrect-authorization-cwe-863-in--6bb8f61d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21285%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=69b0de272f860ef9430a0abd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21290-cross-site-scripting-stored-xss-cwe-2715abb1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21290%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=69b0de272f860ef9430a0ac6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21289-incorrect-authorization-cwe-863-in--83fd635f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21289%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=69b0de272f860ef9430a0ac3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21361-cross-site-scripting-stored-xss-cwe-be6d2519</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21361%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=69b0de292f860ef9430a0afb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21360-improper-limitation-of-a-pathname-t-0f35b82f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21360%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20(CWE-22)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=69b0de292f860ef9430a0af8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21296-incorrect-authorization-cwe-863-in--71f95566</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21296%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=69b0de292f860ef9430a0ae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21311-cross-site-scripting-stored-xss-cwe-8238eb6d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21311%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=69b0de292f860ef9430a0af2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21295-url-redirection-to-untrusted-site-o-16a56e2f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21295%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20(CWE-601)%20in%20Adobe%20Adobe%20Commerce&amp;severity=low&amp;id=69b0de292f860ef9430a0ae3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12473-cwe-79-improper-neutralization-of-i-2a6f769c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12473%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rometheme%20RTMKit&amp;severity=medium&amp;id=69b0cc972f860ef943fb1c09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2324-cwe-352-cross-site-request-forgery-c-13e6dde4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2324%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20latepoint%20LatePoint%20%E2%80%93%20Calendar%20Booking%20Plugin%20for%20Appointments%20and%20Events&amp;severity=medium&amp;id=69b0cc972f860ef943fb1c18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1781-cwe-862-missing-authorization-in-dva-c640e5a4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1781%3A%20CWE-862%20Missing%20Authorization%20in%20dvankooten%20MC4WP%3A%20Mailchimp%20for%20WordPress&amp;severity=medium&amp;id=69b0cc972f860ef943fb1c0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27241-cross-site-scripting-stored-xss-cwe-e3d79025</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27241%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be892f860ef943f0dd02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27255-cross-site-scripting-stored-xss-cwe-c7b3c2ff</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27255%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be8b2f860ef943f0dd5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27244-cross-site-scripting-stored-xss-cwe-e47a6dc5</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27244%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be892f860ef943f0dd08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27251-cross-site-scripting-stored-xss-cwe-73b1726e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27251%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be8b2f860ef943f0dd4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27223-cross-site-scripting-stored-xss-cwe-bec05048</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27223%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be882f860ef943f0dcbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27263-cross-site-scripting-stored-xss-cwe-10cfe83f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27263&amp;severity=null&amp;id=69b0be8c2f860ef943f0dd94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27262-cross-site-scripting-stored-xss-cwe-020c85ad</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27262%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be8c2f860ef943f0dd91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27261-cross-site-scripting-stored-xss-cwe-57935d09</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27261&amp;severity=null&amp;id=69b0be8c2f860ef943f0dd8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27232-cross-site-scripting-stored-xss-cwe-dbe9271e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27232%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be882f860ef943f0dcd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27249-cross-site-scripting-stored-xss-cwe-3a157720</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27249%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be8b2f860ef943f0dd44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27247-cross-site-scripting-dom-based-xss--dfb069c2</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27247%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be892f860ef943f0dd0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27242-cross-site-scripting-stored-xss-cwe-eb28f710</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27242%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be892f860ef943f0dd05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27252-cross-site-scripting-stored-xss-cwe-27028954</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27252%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be8b2f860ef943f0dd4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27235-cross-site-scripting-stored-xss-cwe-78c18807</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27235%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be892f860ef943f0dcf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27225-cross-site-scripting-stored-xss-cwe-4fb82607</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27225%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be882f860ef943f0dcc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27256-cross-site-scripting-stored-xss-cwe-c97af280</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27256%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be8b2f860ef943f0dd61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27260-cross-site-scripting-stored-xss-cwe-ca7563dd</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27260&amp;severity=null&amp;id=69b0be8c2f860ef943f0dd8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27237-cross-site-scripting-stored-xss-cwe-26b46177</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27237%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be892f860ef943f0dcf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27265-cross-site-scripting-stored-xss-cwe-17d23e90</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27265%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be8c2f860ef943f0dd9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27233-cross-site-scripting-stored-xss-cwe-de63556d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27233%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be882f860ef943f0dcda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27236-cross-site-scripting-stored-xss-cwe-48c489ac</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27236%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be892f860ef943f0dcf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27240-cross-site-scripting-stored-xss-cwe-51fff64f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27240%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be892f860ef943f0dcff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27239-cross-site-scripting-stored-xss-cwe-eaeb950d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27239%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be892f860ef943f0dcfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27234-cross-site-scripting-stored-xss-cwe-d54737c8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27234%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be892f860ef943f0dcf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27259-cross-site-scripting-stored-xss-cwe-272afcac</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27259&amp;severity=null&amp;id=69b0be8c2f860ef943f0dd88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27231-cross-site-scripting-stored-xss-cwe-840d33f5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27231%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be882f860ef943f0dcd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27264-cross-site-scripting-stored-xss-cwe-4cf95917</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27264&amp;severity=null&amp;id=69b0be8c2f860ef943f0dd97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27230-cross-site-scripting-stored-xss-cwe-2da5dfa8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27230%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be882f860ef943f0dcd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27229-cross-site-scripting-stored-xss-cwe-6e8f5926</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27229%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be882f860ef943f0dcce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27266-cross-site-scripting-stored-xss-cwe-1b2aa55d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27266%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be8c2f860ef943f0dd9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27254-cross-site-scripting-stored-xss-cwe-ddda00f4</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27254%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be8b2f860ef943f0dd5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27228-cross-site-scripting-stored-xss-cwe-a86793cf</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27228%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be882f860ef943f0dccb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27248-cross-site-scripting-stored-xss-cwe-1aa0d2cc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27248%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be8b2f860ef943f0dd41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27257-cross-site-scripting-stored-xss-cwe-1a20c357</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27257%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be8b2f860ef943f0dd64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27226-cross-site-scripting-stored-xss-cwe-20b5adcd</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27226%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be882f860ef943f0dcc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27253-cross-site-scripting-stored-xss-cwe-bf27f658</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27253%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be8b2f860ef943f0dd57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27224-cross-site-scripting-stored-xss-cwe-369e2d82</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27224%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be882f860ef943f0dcc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27250-cross-site-scripting-stored-xss-cwe-47871a60</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27250%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be8b2f860ef943f0dd47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-11-38f0e8ce</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-11&amp;severity=medium&amp;id=69b205402f860ef9439bca45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70041-na-ac29e404</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70041%3A%20n%2Fa&amp;severity=critical&amp;id=69b1d7c72f860ef94378fdc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70024-na-0548f027</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70024%3A%20n%2Fa&amp;severity=critical&amp;id=69b1d4402f860ef94377182f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66956-na-361ffc2b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66956%3A%20n%2Fa&amp;severity=critical&amp;id=69b1d0c22f860ef943757517</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70082-na-40a1d15e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70082%3A%20n%2Fa&amp;severity=critical&amp;id=69b1988f2f860ef9433d150a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68623-na-988346cf</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68623%3A%20n%2Fa&amp;severity=high&amp;id=69b1988f2f860ef9433d1505</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67041-na-6e95bb25</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67041%3A%20n%2Fa&amp;severity=critical&amp;id=69b1988f2f860ef9433d1500</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67039-na-7e165db4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67039%3A%20n%2Fa&amp;severity=critical&amp;id=69b1988f2f860ef9433d14fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67038-na-642f82a2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67038%3A%20n%2Fa&amp;severity=critical&amp;id=69b1988f2f860ef9433d14f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67037-na-ccafdfee</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67037%3A%20n%2Fa&amp;severity=high&amp;id=69b1988f2f860ef9433d14f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67036-na-a8c80856</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67036%3A%20n%2Fa&amp;severity=high&amp;id=69b1988f2f860ef9433d14ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67035-na-376cd6ab</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67035%3A%20n%2Fa&amp;severity=critical&amp;id=69b1988f2f860ef9433d14e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67034-na-e3e1ba63</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67034%3A%20n%2Fa&amp;severity=high&amp;id=69b1988f2f860ef9433d14e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30741-na-35d95b25</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30741%3A%20n%2Fa&amp;severity=critical&amp;id=69b194fa2f860ef94334246c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67298-na-23778477</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67298%3A%20n%2Fa&amp;severity=high&amp;id=69b186eb2f860ef9431291c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70330-na-4afa6ce5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70330%3A%20n%2Fa&amp;severity=low&amp;id=69b183692f860ef9430a87de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70027-na-b6816533</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70027%3A%20n%2Fa&amp;severity=high&amp;id=69b17c642f860ef943f8b119</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-11-3af3869f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-11&amp;severity=medium&amp;id=69b1751d2f860ef943cfc2f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-11-66c38b04</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-11&amp;severity=low&amp;id=69b0e4f92f860ef9430e38ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2569-cwe-79-improper-neutralization-of-in-d80ea1e4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2569%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dearhive%20Dear%20Flipbook%20%E2%80%93%20PDF%20Flipbook%2C%203D%20Flipbook%2C%20PDF%20embed%2C%20PDF%20viewer&amp;severity=medium&amp;id=69b0acf02f860ef943e36226</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27270-out-of-bounds-read-cwe-125-in-adobe-f1de6725</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27270%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=69b0a5e82f860ef943dd6b9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27271-heap-based-buffer-overflow-cwe-122--6508905d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27271%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=69b0a5e82f860ef943dd6ba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21333-untrusted-search-path-cwe-426-in-ad-6ec6c0d8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21333%3A%20Untrusted%20Search%20Path%20(CWE-426)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=69b0a5e82f860ef943dd6b91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27268-out-of-bounds-read-cwe-125-in-adobe-2889ba56</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27268%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=69b0a5e82f860ef943dd6b9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21362-out-of-bounds-write-cwe-787-in-adob-d9ffb819</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21362%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=69b0a5e82f860ef943dd6b94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27272-out-of-bounds-write-cwe-787-in-adob-b2062b24</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27272%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=69b0a5e82f860ef943dd6ba3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27267-stack-based-buffer-overflow-cwe-121-b7b786ca</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27267%3A%20Stack-based%20Buffer%20Overflow%20(CWE-121)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=69b0a5e82f860ef943dd6b97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22850-information-disclosure-in-intelr-re-bf19ed93</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22850%3A%20Information%20Disclosure%20in%20Intel(R)%20reference%20platforms%20may%20allow%20an%20information%20disclosure.%20System%20software%20adversary%20with%20a%20privileged%20user%20combined%20with%20a%20high%20complexity%20attack%20may%20enable%20data%20exposure.%20This%20result%20may%20potentially%20occur%20via%20local%20access%20when%20attack%20requirements%20are%20not%20present%20without%20special%20internal%20knowledge%20and%20requires%20no%20user%20interaction.%20The%20potential%20vulnerability%20may%20impact%20the%20confidentiality%20(high)%2C%20integrity%20(none)%20and%20availability%20(none)%20of%20the%20vulnerable%20system%2C%20resulting%20in%20subsequent%20system%20confidentiality%20(none)%2C%20integrity%20(none)%20and%20availability%20(none)%20impacts.&amp;severity=medium&amp;id=69b0a2672f860ef943daaa01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22444-information-disclosure-in-intelr-re-1a61e87f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22444%3A%20Information%20Disclosure%20in%20Intel(R)%20reference%20platforms%20may%20allow%20an%20information%20disclosure.%20System%20software%20adversary%20with%20a%20privileged%20user%20combined%20with%20a%20high%20complexity%20attack%20may%20enable%20data%20exposure.%20This%20result%20may%20potentially%20occur%20via%20local%20access%20when%20attack%20requirements%20are%20not%20present%20without%20special%20internal%20knowledge%20and%20requires%20no%20user%20interaction.%20The%20potential%20vulnerability%20may%20impact%20the%20confidentiality%20(high)%2C%20integrity%20(none)%20and%20availability%20(none)%20of%20the%20vulnerable%20system%2C%20resulting%20in%20subsequent%20system%20confidentiality%20(none)%2C%20integrity%20(none)%20and%20availability%20(none)%20impacts.&amp;severity=medium&amp;id=69b0a2672f860ef943daa9fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20105-escalation-of-privilege-in-intelr-r-d3541982</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20105%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20reference%20platforms%20may%20allow%20an%20escalation%20of%20privilege.%20System%20software%20adversary%20with%20a%20privileged%20user%20combined%20with%20a%20low%20complexity%20attack%20may%20enable%20local%20code%20execution.%20This%20result%20may%20potentially%20occur%20via%20local%20access%20when%20attack%20requirements%20are%20present%20without%20special%20internal%20knowledge%20and%20requires%20no%20user%20interaction.%20The%20potential%20vulnerability%20may%20impact%20the%20confidentiality%20(high)%2C%20integrity%20(high)%20and%20availability%20(high)%20of%20the%20vulnerable%20system%2C%20resulting%20in%20subsequent%20system%20confidentiality%20(high)%2C%20integrity%20(high)%20and%20availability%20(high)%20impacts.&amp;severity=high&amp;id=69b0a2672f860ef943daa9fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20073-information-disclosure-in-intelr-re-8e917e6e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20073%3A%20Information%20Disclosure%20in%20Intel(R)%20Reference%20Platforms&amp;severity=low&amp;id=69b0a2672f860ef943daa9f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20068-escalation-of-privilege-in-intelr-r-a31dde9e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20068%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20reference%20platforms%20may%20allow%20an%20escalation%20of%20privilege.%20System%20software%20adversary%20with%20a%20privileged%20user%20combined%20with%20a%20high%20complexity%20attack%20may%20enable%20escalation%20of%20privilege.%20This%20result%20may%20potentially%20occur%20via%20local%20access%20when%20attack%20requirements%20are%20present%20without%20special%20internal%20knowledge%20and%20requires%20no%20user%20interaction.%20The%20potential%20vulnerability%20may%20impact%20the%20confidentiality%20(high)%2C%20integrity%20(high)%20and%20availability%20(high)%20of%20the%20vulnerable%20system%2C%20resulting%20in%20subsequent%20system%20confidentiality%20(none)%2C%20integrity%20(none)%20and%20availability%20(none)%20impacts.&amp;severity=high&amp;id=69b0a2672f860ef943daa9f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20064-escalation-of-privilege-in-intelr-r-b72354ff</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20064%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20reference%20platforms%20may%20allow%20an%20escalation%20of%20privilege.%20System%20software%20adversary%20with%20a%20privileged%20user%20combined%20with%20a%20high%20complexity%20attack%20may%20enable%20local%20code%20execution.%20This%20result%20may%20potentially%20occur%20via%20local%20access%20when%20attack%20requirements%20are%20not%20present%20without%20special%20internal%20knowledge%20and%20requires%20no%20user%20interaction.%20The%20potential%20vulnerability%20may%20impact%20the%20confidentiality%20(high)%2C%20integrity%20(high)%20and%20availability%20(high)%20of%20the%20vulnerable%20system%2C%20resulting%20in%20subsequent%20system%20confidentiality%20(high)%2C%20integrity%20(high)%20and%20availability%20(high)%20impacts.&amp;severity=high&amp;id=69b0a2672f860ef943daa9f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20028-escalation-of-privilege-in-intelr-r-8b5df3e0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20028%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20reference%20platforms%20may%20allow%20an%20escalation%20of%20privilege.%20System%20software%20adversary%20with%20a%20privileged%20user%20combined%20with%20a%20high%20complexity%20attack%20may%20enable%20escalation%20of%20privilege.%20This%20result%20may%20potentially%20occur%20via%20local%20access%20when%20attack%20requirements%20are%20present%20without%20special%20internal%20knowledge%20and%20requires%20no%20user%20interaction.%20The%20potential%20vulnerability%20may%20impact%20the%20confidentiality%20(high)%2C%20integrity%20(high)%20and%20availability%20(high)%20of%20the%20vulnerable%20system%2C%20resulting%20in%20subsequent%20system%20confidentiality%20(none)%2C%20integrity%20(none)%20and%20availability%20(none)%20impacts.&amp;severity=high&amp;id=69b0a2672f860ef943daa9ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20027-escalation-of-privilege-in-intelr-r-ac01f83a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20027%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20reference%20platforms%20may%20allow%20an%20escalation%20of%20privilege.%20System%20software%20adversary%20with%20a%20privileged%20user%20combined%20with%20a%20high%20complexity%20attack%20may%20enable%20escalation%20of%20privilege.%20This%20result%20may%20potentially%20occur%20via%20local%20access%20when%20attack%20requirements%20are%20present%20without%20special%20internal%20knowledge%20and%20requires%20no%20user%20interaction.%20The%20potential%20vulnerability%20may%20impact%20the%20confidentiality%20(high)%2C%20integrity%20(high)%20and%20availability%20(high)%20of%20the%20vulnerable%20system%2C%20resulting%20in%20subsequent%20system%20confidentiality%20(none)%2C%20integrity%20(none)%20and%20availability%20(none)%20impacts.&amp;severity=high&amp;id=69b0a2672f860ef943daa9ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20005-escalation-of-privilege-in-intelr-r-17136448</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20005%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20reference%20platforms%20may%20allow%20an%20escalation%20of%20privilege.%20System%20software%20adversary%20with%20a%20privileged%20user%20combined%20with%20a%20high%20complexity%20attack%20may%20enable%20data%20manipulation.%20This%20result%20may%20potentially%20occur%20via%20local%20access%20when%20attack%20requirements%20are%20not%20present%20without%20special%20internal%20knowledge%20and%20requires%20no%20user%20interaction.%20The%20potential%20vulnerability%20may%20impact%20the%20confidentiality%20(none)%2C%20integrity%20(high)%20and%20availability%20(low)%20of%20the%20vulnerable%20system%2C%20resulting%20in%20subsequent%20system%20confidentiality%20(none)%2C%20integrity%20(none)%20and%20availability%20(none)%20impacts.&amp;severity=medium&amp;id=69b0a2672f860ef943daa9e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20096-escalation-of-privilege-in-intel-re-4e321b78</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20096%3A%20Escalation%20of%20Privilege%20in%20Intel%20Reference%20Platforms%20may%20allow%20an%20escalation%20of%20privilege.%20System%20software%20adversary%20with%20a%20privileged%20user%20combined%20with%20a%20high%20complexity%20attack%20may%20enable%20data%20manipulation.%20This%20result%20may%20potentially%20occur%20via%20local%20access%20when%20attack%20requirements%20are%20present%20without%20special%20internal%20knowledge%20and%20requires%20active%20user%20interaction.%20The%20potential%20vulnerability%20may%20impact%20the%20confidentiality%20(none)%2C%20integrity%20(high)%20and%20availability%20(high)%20of%20the%20vulnerable%20system%2C%20resulting%20in%20subsequent%20system%20confidentiality%20(none)%2C%20integrity%20(high)%20and%20availability%20(high)%20impacts.&amp;severity=medium&amp;id=69b09ee22f860ef943d62fa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31834-cwe-269-improper-privilege-manageme-405c91d9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31834%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20umbraco%20Umbraco-CMS&amp;severity=high&amp;id=69b094562f860ef943cc190d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31833-cwe-79-improper-neutralization-of-i-bd0cf56c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31833%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20umbraco%20Umbraco-CMS&amp;severity=medium&amp;id=69b094562f860ef943cc190a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31832-cwe-639-authorization-bypass-throug-58061dc2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31832%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20umbraco%20Umbraco-CMS&amp;severity=medium&amp;id=69b094562f860ef943cc1907</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31830-cwe-252-unchecked-return-value-in-s-e783b2ed</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31830%3A%20CWE-252%3A%20Unchecked%20Return%20Value%20in%20sigstore%20sigstore-ruby&amp;severity=high&amp;id=69b094562f860ef943cc1904</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31829-cwe-918-server-side-request-forgery-c90afb2e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31829%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69b18a712f860ef9431b626c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31828-cwe-90-improper-neutralization-of-s-a8a27177</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31828%3A%20CWE-90%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20LDAP%20Query%20(&apos;LDAP%20Injection&apos;)%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69b194fa2f860ef943342479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27221-improper-certificate-validation-cwe-74d41f50</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27221%3A%20Improper%20Certificate%20Validation%20(CWE-295)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=69b0efc52f860ef943185a85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27278-use-after-free-cwe-416-in-adobe-acr-65cc0110</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27278%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=69b178e02f860ef943e659be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27220-use-after-free-cwe-416-in-adobe-acr-1606279c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27220%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=69b0efc52f860ef943185a82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31827-cwe-362-concurrent-execution-using--6da2171b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31827%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Blue-B%20Alienbin&amp;severity=high&amp;id=69b194fa2f860ef943342476</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31826-cwe-770-allocation-of-resources-wit-6bab0c22</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31826%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=69b194fa2f860ef943342471</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28807-cwe-22-improper-limitation-of-a-pat-467caf6c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28807%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20gleam-wisp%20wisp&amp;severity=high&amp;id=69b17c642f860ef943f8b121</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28806-cwe-285-improper-authorization-in-n-d2ddfb8c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28806%3A%20CWE-285%20Improper%20Authorization%20in%20nerves-hub%20nerves_hub_web&amp;severity=critical&amp;id=69b090d12f860ef943c885b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-mois-actors-the-cyber-crime-connection-45c626a7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20MOIS%20Actors%20%26%20the%20Cyber%20Crime%20Connection&amp;severity=medium&amp;id=69b140632f860ef9439004ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31815-cwe-284-improper-access-control-in--f8afe07c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31815%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20django-commons%20django-unicorn&amp;severity=medium&amp;id=69b08d502f860ef943c51495</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31812-cwe-248-uncaught-exception-in-quinn-8aa79227</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31812%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20quinn-rs%20quinn&amp;severity=high&amp;id=69b08d502f860ef943c51492</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31808-cwe-835-loop-with-unreachable-exit--1b765dff</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31808%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20sindresorhus%20file-type&amp;severity=medium&amp;id=69b089ca2f860ef943c11e8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31809-cwe-79-improper-neutralization-of-i-e8f87427</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31809%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=69b089ca2f860ef943c11e93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31807-cwe-79-improper-neutralization-of-i-70d89aab</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31807%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=69b089ca2f860ef943c11e8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31801-cwe-863-incorrect-authorization-in--2ed9c2cc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31801%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20project-zot%20zot&amp;severity=high&amp;id=69b089ca2f860ef943c11e89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31800-cwe-862-missing-authorization-in-pa-7b9d0f4c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31800%3A%20CWE-862%3A%20Missing%20Authorization%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69b0864c2f860ef943bbb075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30972-cwe-799-improper-control-of-interac-e73c2d7d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30972%3A%20CWE-799%3A%20Improper%20Control%20of%20Interaction%20Frequency%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69b0864c2f860ef943bbb070</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0124-elevation-of-privilege-in-google-and-bf0f89c1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0124%3A%20Vulnerability%20in%20Google%20Android&amp;severity=critical&amp;id=69b0864a2f860ef943bb990c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0123-elevation-of-privilege-in-google-and-3241f5ef</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0123%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69b0864a2f860ef943bb9909</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0122-remote-code-execution-in-google-andr-6ef00366</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0122%3A%20Remote%20code%20execution%20in%20Google%20Android&amp;severity=high&amp;id=69b0864a2f860ef943bb9906</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0121-information-disclosure-in-google-and-2990bd54</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0121%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=low&amp;id=69b0864a2f860ef943bb9903</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0120-remote-code-execution-in-google-andr-8a23e39a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0120%3A%20Remote%20code%20execution%20in%20Google%20Android&amp;severity=critical&amp;id=69b0864a2f860ef943bb9900</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0119-elevation-of-privilege-in-google-and-8be81354</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0119%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=69b0864a2f860ef943bb98fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0118-elevation-of-privilege-in-google-and-7abd765c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0118%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69b0864a2f860ef943bb98fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0117-elevation-of-privilege-in-google-and-157fc49a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0117%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69b0864a2f860ef943bb98f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0116-remote-code-execution-in-google-andr-57041293</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0116%3A%20Remote%20code%20execution%20in%20Google%20Android&amp;severity=critical&amp;id=69b0864a2f860ef943bb98f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0115-information-disclosure-in-google-and-f8bd7d43</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0115%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=low&amp;id=69b086492f860ef943bb98da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0114-remote-code-execution-in-google-andr-19803325</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0114%3A%20Remote%20code%20execution%20in%20Google%20Android&amp;severity=critical&amp;id=69b086492f860ef943bb98d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0113-elevation-of-privilege-in-google-and-81569a06</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0113%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=critical&amp;id=69b086492f860ef943bb98d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0112-elevation-of-privilege-in-google-and-c9519c28</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0112%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69b086492f860ef943bb98d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0111-elevation-of-privilege-in-google-and-aad93a86</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0111%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=critical&amp;id=69b086492f860ef943bb98ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30967-cwe-287-improper-authentication-in--fd3a9bf6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30967%3A%20CWE-287%3A%20Improper%20Authentication%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69b0864c2f860ef943bbb06b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0110-elevation-of-privilege-in-google-and-40cc8cba</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0110%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=critical&amp;id=69b086492f860ef943bb98cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0109-denial-of-service-in-google-android-797e2891</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0109%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=high&amp;id=69b086492f860ef943bb98c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0108-information-disclosure-in-google-and-3a45f672</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0108%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=69b086492f860ef943bb98c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0107-elevation-of-privilege-in-google-and-3e492b37</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0107%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69b086492f860ef943bb98c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36920-elevation-of-privilege-in-google-an-ca1cd87c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36920%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69b086492f860ef943bb98bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30966-cwe-284-improper-access-control-in--321de92a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30966%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20parse-community%20parse-server&amp;severity=critical&amp;id=69b0864c2f860ef943bbb066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30965-cwe-863-incorrect-authorization-in--02172b99</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30965%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20parse-community%20parse-server&amp;severity=critical&amp;id=69b0864c2f860ef943bbb061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30962-cwe-284-improper-access-control-in--f0f6f512</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30962%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69b0864c2f860ef943bbb05c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30954-cwe-639-authorization-bypass-throug-dbe3b488</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30954%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Kovah%20LinkAce&amp;severity=medium&amp;id=69b0864a2f860ef943bb990f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30953-cwe-918-server-side-request-forgery-8de6dba7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30953%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Kovah%20LinkAce&amp;severity=high&amp;id=69b082c52f860ef943b7fd49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66413-cwe-200-exposure-of-sensitive-infor-7dcd20ea</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66413%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20git-for-windows%20git&amp;severity=high&amp;id=69b082c52f860ef943b7fd37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30952-cwe-22-improper-limitation-of-a-pat-4b891716</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30952%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20harttle%20liquidjs&amp;severity=high&amp;id=69b082c52f860ef943b7fd43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30949-cwe-287-improper-authentication-in--b219bd57</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30949%3A%20CWE-287%3A%20Improper%20Authentication%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69b07f3e2f860ef943b515bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30948-cwe-79-improper-neutralization-of-i-9cf54941</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30948%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69b07f3e2f860ef943b515b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30947-cwe-863-incorrect-authorization-in--2701ab0e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30947%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69b07f3e2f860ef943b515b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13213-cwe-644-improper-neutralization-of--ac5f008e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13213%3A%20CWE-644%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20IBM%20Aspera%20Orchestrator&amp;severity=medium&amp;id=69b07f3e2f860ef943b515a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30946-cwe-770-allocation-of-resources-wit-e2f098e9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30946%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69b07f3e2f860ef943b515ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30837-cwe-1333-inefficient-regular-expres-f4457447</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30837%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20elysiajs%20elysia&amp;severity=high&amp;id=69b07f3e2f860ef943b515a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29793-cwe-943-improper-neutralization-of--35303311</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29793%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20%40feathersjs%20mongodb&amp;severity=critical&amp;id=69b17c642f860ef943f8b128</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13219-cwe-598-use-of-get-request-method-w-dda311a4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13219%3A%20CWE-598%20Use%20of%20GET%20Request%20Method%20With%20Sensitive%20Query%20Strings%20in%20IBM%20Aspera%20Orchestrator&amp;severity=medium&amp;id=69b17c642f860ef943f8b11e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29792-cwe-287-improper-authentication-in--5aa27c8c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29792%3A%20CWE-287%3A%20Improper%20Authentication%20in%20feathersjs%20feathers&amp;severity=critical&amp;id=69b17c642f860ef943f8b125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29177-cwe-79-improper-neutralization-of-i-6718bb6e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29177%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20commerce&amp;severity=low&amp;id=69b07bba2f860ef943b24cd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29176-cwe-79-improper-neutralization-of-i-11bbfb8c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29176%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20commerce&amp;severity=medium&amp;id=69b07bba2f860ef943b24cd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36226-cwe-79-improper-neutralization-of-i-05c56705</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36226%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Aspera%20Faspex%205&amp;severity=medium&amp;id=69b07bba2f860ef943b24cb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29175-cwe-79-improper-neutralization-of-i-64f01270</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29175%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20commerce&amp;severity=high&amp;id=69b07bba2f860ef943b24ccf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36227-cwe-644-improper-neutralization-of--a6241ec7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36227%3A%20CWE-644%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20IBM%20Aspera%20Faspex%205&amp;severity=medium&amp;id=69b07bba2f860ef943b24cb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29174-cwe-89-improper-neutralization-of-s-a2c8e194</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29174%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20craftcms%20commerce&amp;severity=high&amp;id=69b07bba2f860ef943b24cca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29173-cwe-79-improper-neutralization-of-i-4996e4fe</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29173%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20commerce&amp;severity=low&amp;id=69b07bba2f860ef943b24cc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2713-cwe-427-uncontrolled-search-path-ele-2f1ac992</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2713%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20IBM%20Trusteer%20Rapport%20installer&amp;severity=high&amp;id=69b07bba2f860ef943b24cdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29172-cwe-89-improper-neutralization-of-s-7609f4db</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29172%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20craftcms%20commerce&amp;severity=high&amp;id=69b07bba2f860ef943b24cc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29113-cwe-352-cross-site-request-forgery--e48c5eb2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29113%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20craftcms%20cms&amp;severity=low&amp;id=69b078412f860ef943afd33f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48611-vulnerability-in-google-pixel-609c67e3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48611%3A%20Vulnerability%20in%20Google%20Android&amp;severity=critical&amp;id=69b078412f860ef943afd332</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26330-cwe-416-use-after-free-in-envoyprox-ddebfef5</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26330%3A%20CWE-416%3A%20Use%20After%20Free%20in%20envoyproxy%20envoy&amp;severity=medium&amp;id=69b071392f860ef943a5fd3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26311-cwe-416-use-after-free-in-envoyprox-c65b8305</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26311%3A%20CWE-416%3A%20Use%20After%20Free%20in%20envoyproxy%20envoy&amp;severity=medium&amp;id=69b071392f860ef943a5fd5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-patches-83-vulnerabilities-3d1aa61f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Patches%2083%20Vulnerabilities&amp;severity=critical&amp;id=69b06d742f860ef9439f662e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26310-cwe-20-improper-input-validation-in-c47a1f4e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26310%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20envoyproxy%20envoy&amp;severity=medium&amp;id=69b071392f860ef943a5fd5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26309-cwe-193-off-by-one-error-in-envoypr-008d28a0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26309%3A%20CWE-193%3A%20Off-by-one%20Error%20in%20envoyproxy%20envoy&amp;severity=medium&amp;id=69b071392f860ef943a5fd57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26123-cwe-939-improper-authorization-in-h-19c71b84</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26123%3A%20CWE-939%3A%20Improper%20Authorization%20in%20Handler%20for%20Custom%20URL%20Scheme%20in%20Microsoft%20Microsoft%20Authenticator%20for%20Android&amp;severity=medium&amp;id=69b071392f860ef943a5fd50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26308-cwe-863-incorrect-authorization-in--f13a384a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26308%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20envoyproxy%20envoy&amp;severity=high&amp;id=69b071392f860ef943a5fd53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3582-cwe-862-missing-authorization-in-git-07d9b944</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3582%3A%20CWE-862%20Missing%20Authorization%20in%20GitHub%20Enterprise%20Server&amp;severity=medium&amp;id=69b0713c2f860ef943a5fdec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2266-cwe-79-improper-neutralization-of-in-30e812ca</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2266%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20GitHub%20Enterprise%20Server&amp;severity=high&amp;id=69b0713c2f860ef943a5fde8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27825-cwe-22-improper-limitation-of-a-pat-2e969811</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27825%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20sooperset%20mcp-atlassian&amp;severity=critical&amp;id=69b0713c2f860ef943a5fde4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27218-null-pointer-dereference-cwe-476-in-19a98ba3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27218%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=medium&amp;id=69b06a2a2f860ef943991ebc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27219-out-of-bounds-read-cwe-125-in-adobe-f5642f0d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27219%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=medium&amp;id=69b06a2b2f860ef943991ee1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27214-null-pointer-dereference-cwe-476-in-86773ec4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27214%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=medium&amp;id=69b06a2a2f860ef943991eb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21364-null-pointer-dereference-cwe-476-in-bf0c7224</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21364%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=medium&amp;id=69b06a2a2f860ef943991ea4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21365-out-of-bounds-read-cwe-125-in-adobe-ece1c6c4</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21365%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=medium&amp;id=69b06a2a2f860ef943991ea7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27217-null-pointer-dereference-cwe-476-in-425fdf98</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27217%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=medium&amp;id=69b06a2a2f860ef943991eb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27216-out-of-bounds-read-cwe-125-in-adobe-bab54d2b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27216%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=medium&amp;id=69b06a2a2f860ef943991eb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21363-null-pointer-dereference-cwe-476-in-925a5a83</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21363%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=medium&amp;id=69b06a2a2f860ef943991ea1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27215-null-pointer-dereference-cwe-476-in-a150e4da</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27215%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=medium&amp;id=69b06a2a2f860ef943991eb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27826-cwe-918-server-side-request-forgery-590e7915</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27826%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20sooperset%20mcp-atlassian&amp;severity=high&amp;id=69b06a2b2f860ef943991eff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27274-out-of-bounds-write-cwe-787-in-adob-71522e22</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27274%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=69b06a2b2f860ef943991ef0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27277-use-after-free-cwe-416-in-adobe-sub-c30c0c73</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27277%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=69b06a2b2f860ef943991ef9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27273-out-of-bounds-write-cwe-787-in-adob-702a87fe</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27273%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=69b06a2b2f860ef943991eec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27275-out-of-bounds-write-cwe-787-in-adob-a30a4fc1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27275%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=69b06a2b2f860ef943991ef3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27276-use-after-free-cwe-416-in-adobe-sub-a6f54503</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27276%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=69b06a2b2f860ef943991ef6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27279-out-of-bounds-write-cwe-787-in-adob-7f3c880f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27279%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=69b06a2b2f860ef943991efc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28292-cwe-78-improper-neutralization-of-s-9307703c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28292%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20steveukx%20simple-git&amp;severity=critical&amp;id=69b06a2b2f860ef943991f03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27269-out-of-bounds-read-cwe-125-in-adobe-ca3c9c57</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27269%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Premiere%20Pro&amp;severity=high&amp;id=69b06a2b2f860ef943991ee9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27281-integer-overflow-or-wraparound-cwe--5911f44a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27281%3A%20Integer%20Overflow%20or%20Wraparound%20(CWE-190)%20in%20Adobe%20DNG%20SDK&amp;severity=medium&amp;id=69b063a09972381a98a3a053</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27280-out-of-bounds-write-cwe-787-in-adob-f9f72bc0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27280%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20DNG%20SDK&amp;severity=high&amp;id=69b063a09972381a98a3a050</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/adobe-patches-80-vulnerabilities-across-eight-prod-e4e45626</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Adobe%20Patches%2080%20Vulnerabilities%20Across%20Eight%20Products&amp;severity=medium&amp;id=69b063599972381a98a2f608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30980-cwe-121-stack-based-buffer-overflow-016aa9e5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30980%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69b060169972381a9898e690</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31797-cwe-125-out-of-bounds-read-in-inter-11ca7acb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31797%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69b060189972381a9898f2b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31796-cwe-122-heap-based-buffer-overflow--7bfcec69</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31796%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=69b060189972381a9898f2aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31795-cwe-120-buffer-copy-without-checkin-cd8b5822</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31795%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=69b060189972381a9898f2a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31794-cwe-125-out-of-bounds-read-in-inter-b68a5903</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31794%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69b060189972381a9898f29e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31793-cwe-125-out-of-bounds-read-in-inter-aee63f1d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31793%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69b060189972381a9898f298</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31792-cwe-476-null-pointer-dereference-in-ebb64067</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31792%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=69b060189972381a9898f292</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30987-cwe-120-buffer-copy-without-checkin-e205f696</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30987%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=69b060189972381a9898f28c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30986-cwe-125-out-of-bounds-read-in-inter-f7bff699</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30986%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69b060189972381a9898f286</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30985-cwe-120-buffer-copy-without-checkin-8671bbf3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30985%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=69b060169972381a9898e6ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30984-cwe-125-out-of-bounds-read-in-inter-a3bc80de</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30984%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69b060169972381a9898e6a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30983-cwe-120-buffer-copy-without-checkin-f33c4cb9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30983%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=69b060169972381a9898e6a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30982-cwe-122-heap-based-buffer-overflow--69aca4d6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30982%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69b060169972381a9898e69c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30981-cwe-120-buffer-copy-without-checkin-2e72aca3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30981%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69b060169972381a9898e696</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30979-cwe-120-buffer-copy-without-checkin-ecd82a3e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30979%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=69b060169972381a9898e68a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3306-cwe-639-authorization-bypass-through-20e33556</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3306%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20GitHub%20Enterprise%20Server&amp;severity=medium&amp;id=69b060189972381a9898f2b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30978-cwe-416-use-after-free-in-internati-63697589</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30978%3A%20CWE-416%3A%20Use%20After%20Free%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=69b060169972381a9898e684</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30977-cwe-79-improper-neutralization-of-i-ba88b63e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30977%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lihaohong6%20RenderBlocking&amp;severity=low&amp;id=69b059afea502d3aa8817508</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3854-cwe-77-improper-neutralization-of-sp-75942f9f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3854%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20GitHub%20Enterprise%20Server&amp;severity=high&amp;id=69b059afea502d3aa881750d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30974-cwe-79-improper-neutralization-of-i-793c1d5c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30974%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%209001%20copyparty&amp;severity=medium&amp;id=69b059afea502d3aa8817503</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-patch-tuesday-march-2026-tue-mar-10th-b60d64cb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Patch%20Tuesday%20March%202026%2C%20(Tue%2C%20Mar%2010th)&amp;severity=critical&amp;id=69b05966ea502d3aa880ea76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30973-cwe-22-improper-limitation-of-a-pat-71bf7da0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30973%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20%40appium%20support&amp;severity=medium&amp;id=69b059afea502d3aa88174ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30970-cwe-862-missing-authorization-in-co-8a757049</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30970%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Coral-Protocol%20coral-server&amp;severity=high&amp;id=69b059afea502d3aa88174fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30969-cwe-639-authorization-bypass-throug-371410d3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30969%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Coral-Protocol%20coral-server&amp;severity=high&amp;id=69b059afea502d3aa88174f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30968-cwe-862-missing-authorization-in-co-37b3de3a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30968%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Coral-Protocol%20coral-server&amp;severity=high&amp;id=69b05633ea502d3aa87d6b8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2273-cwe-94-improper-control-of-generatio-f2295eba</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2273%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Schneider%20Electric%20EcoStruxure%E2%84%A2%20Automation%20Expert&amp;severity=high&amp;id=69b05632ea502d3aa87d6b6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30964-cwe-346-origin-validation-error-in--c1f14445</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30964%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20web-auth%20webauthn-framework&amp;severity=medium&amp;id=69b05633ea502d3aa87d6b87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30960-cwe-94-improper-control-of-generati-c9d430fc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30960%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Apich-Organization%20rssn&amp;severity=critical&amp;id=69b05633ea502d3aa87d6b82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1286-cwe-502-deserialization-of-untrusted-87e64bf8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1286%3A%20CWE-502%20Deserialization%20of%20untrusted%20data%20in%20Schneider%20Electric%20EcoStruxure%E2%84%A2%20Foxboro%20DCS&amp;severity=high&amp;id=69b05626ea502d3aa87d6873</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13902-cwe-79-improper-neutralization-of-i-03f84a2b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13902%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Schneider%20Electric%20Modicon%20Controllers%20M241%2FM251&amp;severity=medium&amp;id=69b05626ea502d3aa87d6870</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26144-cwe-79-improper-neutralization-of-i-0ee52b3e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26144%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69b05632ea502d3aa87d6b65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26141-cwe-287-improper-authentication-in--f569f664</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26141%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Azure%20Automation%20Hybrid%20Worker%20Windows%20Extension&amp;severity=high&amp;id=69b05632ea502d3aa87d6b62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26130-cwe-770-allocation-of-resources-wit-049f3df0</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26130%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Microsoft%20ASP.NET%20Core%2010.0&amp;severity=high&amp;id=69b05632ea502d3aa87d6b56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26118-cwe-918-server-side-request-forgery-18ee2132</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26118%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Azure%20MCP%20Server%20Tools%201.0.0%20(npm)&amp;severity=high&amp;id=69b05631ea502d3aa87d6b2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26117-cwe-288-authentication-bypass-using-54d513ec</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26117%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Microsoft%20Arc%20Enabled%20Servers%20-%20Azure%20Connected%20Machine%20Agent&amp;severity=high&amp;id=69b05631ea502d3aa87d6b2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26110-cwe-843-access-of-resource-using-in-9fa096e6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26110%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69b05631ea502d3aa87d6b17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26109-cwe-125-out-of-bounds-read-in-micro-6ab80f9c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26109%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69b0562fea502d3aa87d6afb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26108-cwe-122-heap-based-buffer-overflow--4da7b8eb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26108%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69b0562fea502d3aa87d6af7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26107-cwe-416-use-after-free-in-microsoft-914827d2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26107%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69b0562fea502d3aa87d6af3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26106-cwe-20-improper-input-validation-in-a3d910ed</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26106%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=69b0562fea502d3aa87d6aef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23665-cwe-122-heap-based-buffer-overflow--3678cfb4</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23665%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Azure%20Linux%20Virtual%20Machines%20with%20Azure%20Diagnostics%20extension&amp;severity=high&amp;id=69b05628ea502d3aa87d68b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23662-cwe-306-missing-authentication-for--5df599e6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23662%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Microsoft%20Azure%20IoT%20Explorer&amp;severity=high&amp;id=69b05626ea502d3aa87d6888</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23661-cwe-319-cleartext-transmission-of-s-c4879b4f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23661%3A%20CWE-319%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Microsoft%20Azure%20IoT%20Explorer&amp;severity=high&amp;id=69b05626ea502d3aa87d6885</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23654-cwe-1395-dependency-on-vulnerable-t-07048b44</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23654%3A%20CWE-1395%3A%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20Microsoft%20GitHub%20Repo%3A%20Zero%20Shot%20scFoundation&amp;severity=high&amp;id=69b05626ea502d3aa87d687c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26148-cwe-454-external-initialization-of--fe77d030</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26148%3A%20CWE-454%3A%20External%20Initialization%20of%20Trusted%20Variables%20or%20Data%20Stores%20in%20Microsoft%20Microsoft%20Azure%20AD%20SSH%20Login%20extension%20for%20Linux&amp;severity=high&amp;id=69b05632ea502d3aa87d6b68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23674-cwe-41-improper-resolution-of-path--d3a08b4a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23674%3A%20CWE-41%3A%20Improper%20Resolution%20of%20Path%20Equivalence%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b05628ea502d3aa87d68c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26127-cwe-125-out-of-bounds-read-in-micro-f1ea3b1f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26127%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20.NET%2010.0&amp;severity=high&amp;id=69b05632ea502d3aa87d6b50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26134-cwe-190-integer-overflow-or-wraparo-c5e3cb95</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26134%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Microsoft%20Office%20for%20Android&amp;severity=high&amp;id=69b05632ea502d3aa87d6b5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26132-cwe-416-use-after-free-in-microsoft-27e62c6f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26132%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=69b05632ea502d3aa87d6b5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26131-cwe-276-incorrect-default-permissio-0d188990</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26131%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20Microsoft%20.NET%2010.0&amp;severity=high&amp;id=69b05632ea502d3aa87d6b59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26128-cwe-287-improper-authentication-in--762dc85c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26128%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b05632ea502d3aa87d6b53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26116-cwe-89-improper-neutralization-of-s-9cbccc2b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26116%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Microsoft%20Microsoft%20SQL%20Server%202025%20(CU%202)&amp;severity=high&amp;id=69b05631ea502d3aa87d6b29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26115-cwe-1287-improper-validation-of-spe-925c4ffb</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26115%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Microsoft%20Microsoft%20SQL%20Server%202016%20Service%20Pack%203%20(GDR)&amp;severity=high&amp;id=69b05631ea502d3aa87d6b26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26121-cwe-918-server-side-request-forgery-e1a50dda</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26121%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Azure%20IoT%20Explorer&amp;severity=high&amp;id=69b05631ea502d3aa87d6b32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20967-cwe-20-improper-input-validation-in-1667a03a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20967%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20System%20Center%20Operations%20Manager%202019&amp;severity=high&amp;id=69b05626ea502d3aa87d6876</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23656-cwe-345-insufficient-verification-o-ccd8afa7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23656%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20Microsoft%20Windows%20App%20Client%20for%20Windows%20Desktop&amp;severity=medium&amp;id=69b05626ea502d3aa87d687f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26114-cwe-502-deserialization-of-untruste-89a579ac</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26114%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=69b05631ea502d3aa87d6b23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26113-cwe-822-untrusted-pointer-dereferen-7108a4bd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26113%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69b05631ea502d3aa87d6b20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26112-cwe-822-untrusted-pointer-dereferen-dbf4ec68</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26112%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69b05631ea502d3aa87d6b1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26111-cwe-190-integer-overflow-or-wraparo-fdf81b93</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26111%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b05631ea502d3aa87d6b1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26105-cwe-79-improper-neutralization-of-i-067b842a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26105%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=69b0562fea502d3aa87d6ae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25190-cwe-426-untrusted-search-path-in-mi-0a2f7d7c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25190%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562fea502d3aa87d6ae2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25189-cwe-416-use-after-free-in-microsoft-ee491495</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25189%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69b0562fea502d3aa87d6adf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25188-cwe-122-heap-based-buffer-overflow--1a76e429</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25188%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562fea502d3aa87d6adc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25187-cwe-59-improper-link-resolution-bef-a2a668e2</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25187%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562fea502d3aa87d6ad9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25186-cwe-200-exposure-of-sensitive-infor-b990dd8e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25186%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69b0562fea502d3aa87d6ad6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25185-cwe-200-exposure-of-sensitive-infor-5e59b27f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25185%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69b0562dea502d3aa87d6a44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25181-cwe-125-out-of-bounds-read-in-micro-2f71462d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25181%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562dea502d3aa87d6a41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25180-cwe-125-out-of-bounds-read-in-micro-aef172d0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25180%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20Office%20for%20Android&amp;severity=medium&amp;id=69b0562dea502d3aa87d6a3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25179-cwe-1287-improper-validation-of-spe-dcee60e5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25179%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562dea502d3aa87d6a3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25178-cwe-416-use-after-free-in-microsoft-06ec56b3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25178%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562dea502d3aa87d6a38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25177-cwe-641-improper-restriction-of-nam-3db83fdb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25177%3A%20CWE-641%3A%20Improper%20Restriction%20of%20Names%20for%20Files%20and%20Other%20Resources%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562dea502d3aa87d6a35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25176-cwe-284-improper-access-control-in--b0ef8b07</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25176%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562dea502d3aa87d6a32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25175-cwe-125-out-of-bounds-read-in-micro-754cc756</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25175%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562dea502d3aa87d6a2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25174-cwe-125-out-of-bounds-read-in-micro-381de664</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25174%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562dea502d3aa87d6a2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25173-cwe-190-integer-overflow-or-wraparo-6750b40e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25173%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562dea502d3aa87d6a29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25172-cwe-190-integer-overflow-or-wraparo-564389dc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25172%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562cea502d3aa87d69f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25171-cwe-416-use-after-free-in-microsoft-1aa3dedd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25171%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562cea502d3aa87d69f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25170-cwe-416-use-after-free-in-microsoft-0b7d7ce2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25170%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=69b0562cea502d3aa87d69ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25169-cwe-369-divide-by-zero-in-microsoft-97602fdc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25169%3A%20CWE-369%3A%20Divide%20By%20Zero%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69b0562cea502d3aa87d69e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25168-cwe-476-null-pointer-dereference-in-b2e00811</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25168%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69b0562cea502d3aa87d69e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25167-cwe-416-use-after-free-in-microsoft-032a21da</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25167%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69b0562cea502d3aa87d69e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25166-cwe-502-deserialization-of-untruste-fce8ed91</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25166%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Windows%20ADK%20for%20Windows%2010%2C%20version%202004&amp;severity=high&amp;id=69b0562cea502d3aa87d69dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25165-cwe-476-null-pointer-dereference-in-94d9aeef</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25165%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562cea502d3aa87d69d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24297-cwe-362-concurrent-execution-using--1709c15b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24297%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69b0562cea502d3aa87d69d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24296-cwe-362-concurrent-execution-using--501626ac</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24296%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562cea502d3aa87d69d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24295-cwe-362-concurrent-execution-using--d90aca44</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24295%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562aea502d3aa87d698d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24294-cwe-287-improper-authentication-in--8b581eb6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24294%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562aea502d3aa87d698a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24293-cwe-476-null-pointer-dereference-in-cfb69648</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24293%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=69b0562aea502d3aa87d6987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24292-cwe-416-use-after-free-in-microsoft-f8ee5a46</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24292%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69b0562aea502d3aa87d6984</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24291-cwe-732-incorrect-permission-assign-e1d71316</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24291%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562aea502d3aa87d6981</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24290-cwe-284-improper-access-control-in--3d676351</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24290%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69b0562aea502d3aa87d697e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24289-cwe-416-use-after-free-in-microsoft-e4cd306d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24289%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562aea502d3aa87d697b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24288-cwe-122-heap-based-buffer-overflow--dad21d67</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24288%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=medium&amp;id=69b0562aea502d3aa87d6978</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24287-cwe-73-external-control-of-file-nam-ade8f025</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24287%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69b0562aea502d3aa87d6975</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24285-cwe-416-use-after-free-in-microsoft-1dca559e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24285%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20Office%20for%20Android&amp;severity=high&amp;id=69b0562aea502d3aa87d6972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24283-cwe-122-heap-based-buffer-overflow--da8e4901</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24283%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69b05628ea502d3aa87d68cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24282-cwe-125-out-of-bounds-read-in-micro-4c1a43ec</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24282%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69b05628ea502d3aa87d68ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23673-cwe-125-out-of-bounds-read-in-micro-a63954b0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23673%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b05628ea502d3aa87d68c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23672-cwe-125-out-of-bounds-read-in-micro-9d4bbc2c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23672%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b05628ea502d3aa87d68c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23671-cwe-362-concurrent-execution-using--6af84697</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23671%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b05628ea502d3aa87d68be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23669-cwe-416-use-after-free-in-microsoft-cee8b9e1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23669%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b05628ea502d3aa87d68bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23668-cwe-362-concurrent-execution-using--564d19e1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23668%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b05628ea502d3aa87d68b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23667-cwe-416-use-after-free-in-microsoft-2b98106e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23667%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69b05628ea502d3aa87d68b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23664-cwe-923-improper-restriction-of-com-8cd21252</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23664%3A%20CWE-923%3A%20Improper%20Restriction%20of%20Communication%20Channel%20to%20Intended%20Endpoints%20in%20Microsoft%20Azure%20IoT%20Explorer&amp;severity=high&amp;id=69b05626ea502d3aa87d688b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23660-cwe-284-improper-access-control-in--b81a763b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23660%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%20Admin%20Center%20in%20Azure%20Portal&amp;severity=high&amp;id=69b05626ea502d3aa87d6882</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21262-cwe-284-improper-access-control-in--4d900db9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21262%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20SQL%20Server%202016%20Service%20Pack%203%20(GDR)&amp;severity=high&amp;id=69b05626ea502d3aa87d6879</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13901-cwe-404-improper-resource-shutdown--412f4c56</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13901%3A%20CWE-404%20Improper%20Resource%20Shutdown%20or%20Release%20in%20Schneider%20Electric%20Modicon%20M241%2FM251&amp;severity=medium&amp;id=69b05633ea502d3aa87d6b90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-mois-actors-the-cyber-crime-connection-6b277061</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20MOIS%20Actors%20%26%20the%20Cyber%20Crime%20Connection&amp;severity=medium&amp;id=69b04f42ea502d3aa876704c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30945-cwe-639-authorization-bypass-throug-d61b6bdb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30945%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20withstudiocms%20studiocms&amp;severity=high&amp;id=69b05635ea502d3aa87d7c00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30944-cwe-639-authorization-bypass-throug-139adf1f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30944%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20withstudiocms%20studiocms&amp;severity=high&amp;id=69b05635ea502d3aa87d7bfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66178-execute-unauthorized-code-or-comman-3339db4e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66178%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiWeb&amp;severity=medium&amp;id=69b05634ea502d3aa87d6bbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24641-denial-of-service-in-fortinet-forti-2e845127</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24641%3A%20Denial%20of%20service%20in%20Fortinet%20FortiWeb&amp;severity=low&amp;id=69b05635ea502d3aa87d7be7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24640-execute-unauthorized-code-or-comman-efcffcfb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24640%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiWeb&amp;severity=medium&amp;id=69b05635ea502d3aa87d7be4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54659-information-disclosure-in-fortinet--39aea68d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54659%3A%20Information%20disclosure%20in%20Fortinet%20FortiSOAR%20Agent%20Communication%20Bridge&amp;severity=medium&amp;id=69b05633ea502d3aa87d6b9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24017-improper-access-control-in-fortinet-216acf1c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24017%3A%20Improper%20access%20control%20in%20Fortinet%20FortiWeb&amp;severity=high&amp;id=69b05634ea502d3aa87d6bd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25972-execute-unauthorized-code-or-comman-719551c1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25972%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSIEM&amp;severity=medium&amp;id=69b05635ea502d3aa87d7bf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22629-improper-access-control-in-fortinet-65b40607</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22629%3A%20Improper%20access%20control%20in%20Fortinet%20FortiAnalyzer&amp;severity=low&amp;id=69b05634ea502d3aa87d6bcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68482-information-disclosure-in-fortinet--37d779b1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68482%3A%20Information%20disclosure%20in%20Fortinet%20FortiAnalyzer&amp;severity=medium&amp;id=69b05634ea502d3aa87d6bbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48418-escalation-of-privilege-in-fortinet-a483513e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48418%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiAnalyzer&amp;severity=medium&amp;id=69b05633ea502d3aa87d6b93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49784-execute-unauthorized-code-or-comman-5f6c4f4f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49784%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiAnalyzer-BigData&amp;severity=medium&amp;id=69b05633ea502d3aa87d6b99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22572-improper-access-control-in-fortinet-73115578</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22572%3A%20Improper%20access%20control%20in%20Fortinet%20FortiManager&amp;severity=medium&amp;id=69b05634ea502d3aa87d6bc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68648-escalation-of-privilege-in-fortinet-d0f91097</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68648%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiManager%20Cloud&amp;severity=medium&amp;id=69b05634ea502d3aa87d6bc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25689-execute-unauthorized-code-or-comman-1fe24b86</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25689%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiDeceptor&amp;severity=medium&amp;id=69b05635ea502d3aa87d7bea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53608-execute-unauthorized-code-or-comman-8ca13482</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53608%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSandbox&amp;severity=medium&amp;id=69b05633ea502d3aa87d6b9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24018-escalation-of-privilege-in-fortinet-b9a9329c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24018%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiClientLinux&amp;severity=high&amp;id=69b05634ea502d3aa87d6bd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48840-improper-access-control-in-fortinet-0c23b9b8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48840%3A%20Improper%20access%20control%20in%20Fortinet%20FortiWeb&amp;severity=medium&amp;id=69b05633ea502d3aa87d6b96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22627-execute-unauthorized-code-or-comman-691b1205</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22627%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSwitchAXFixed&amp;severity=high&amp;id=69b05634ea502d3aa87d6bc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54820-execute-unauthorized-code-or-comman-3da6e695</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54820%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiManager&amp;severity=high&amp;id=69b05633ea502d3aa87d6ba2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30942-cwe-22-improper-limitation-of-a-pat-efb3b11a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30942%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20FlintSH%20Flare&amp;severity=high&amp;id=69b05635ea502d3aa87d7bf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55717-information-disclosure-in-fortinet--a4b92c31</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55717%3A%20Information%20disclosure%20in%20Fortinet%20FortiVoice&amp;severity=low&amp;id=69b05634ea502d3aa87d6bb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25836-execute-unauthorized-code-or-comman-0549df17</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25836%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSandbox%20Cloud&amp;severity=medium&amp;id=69b05635ea502d3aa87d7bed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30897-execute-unauthorized-code-or-comman-50b13368</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30897%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiWeb&amp;severity=medium&amp;id=69b05635ea502d3aa87d7bf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22628-execute-unauthorized-code-or-comman-3b1e4185</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22628%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSwitchAXFixed&amp;severity=medium&amp;id=69b05634ea502d3aa87d6bca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30941-cwe-943-improper-neutralization-of--450ddd4e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30941%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69b04b8cea502d3aa873ba98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30939-cwe-1321-improperly-controlled-modi-cc76a7f7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30939%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69b04b8cea502d3aa873ba93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30938-cwe-693-protection-mechanism-failur-9d8e25cb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30938%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69b04b8cea502d3aa873ba8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30930-cwe-89-improper-neutralization-of-s-7240df0a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30930%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20nicolargo%20glances&amp;severity=high&amp;id=69b04b8dea502d3aa873bac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30928-cwe-200-exposure-of-sensitive-infor-341c875e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30928%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20nicolargo%20glances&amp;severity=high&amp;id=69b04b8dea502d3aa873bac2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30934-cwe-79-improper-neutralization-of-i-24a65d33</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30934%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gtsteffaniak%20filebrowser&amp;severity=high&amp;id=69b04b8dea502d3aa873bad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30933-cwe-200-exposure-of-sensitive-infor-d9a74993</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30933%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20gtsteffaniak%20filebrowser&amp;severity=high&amp;id=69b04b8dea502d3aa873bacc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27661-cwe-1230-exposure-of-sensitive-info-ff4cf300</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27661%3A%20CWE-1230%3A%20Exposure%20of%20Sensitive%20Information%20Through%20Metadata%20in%20Siemens%20SINEC%20Security%20Monitor&amp;severity=medium&amp;id=69b04b8dea502d3aa873babf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25605-cwe-73-external-control-of-file-nam-5ee32c1c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25605%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Siemens%20SICAM%20SIAPP%20SDK&amp;severity=medium&amp;id=69b04b8dea502d3aa873babc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25573-cwe-73-external-control-of-file-nam-dafe948f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25573%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Siemens%20SICAM%20SIAPP%20SDK&amp;severity=high&amp;id=69b04b8cea502d3aa873baaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25572-cwe-130-improper-handling-of-length-0eb7b1d5</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25572%3A%20CWE-130%3A%20Improper%20Handling%20of%20Length%20Parameter%20Inconsistency%20in%20Siemens%20SICAM%20SIAPP%20SDK&amp;severity=medium&amp;id=69b04b8cea502d3aa873baac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25571-cwe-130-improper-handling-of-length-dc53ba63</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25571%3A%20CWE-130%3A%20Improper%20Handling%20of%20Length%20Parameter%20Inconsistency%20in%20Siemens%20SICAM%20SIAPP%20SDK&amp;severity=medium&amp;id=69b04b8cea502d3aa873baa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25570-cwe-121-stack-based-buffer-overflow-98c21ede</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25570%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Siemens%20SICAM%20SIAPP%20SDK&amp;severity=high&amp;id=69b04b8cea502d3aa873baa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25569-cwe-787-out-of-bounds-write-in-siem-c2c91e7f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25569%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Siemens%20SICAM%20SIAPP%20SDK&amp;severity=high&amp;id=69b04b8cea502d3aa873baa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40943-cwe-79-improper-neutralization-of-i-9fc302a8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40943%3A%20CWE-95%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20Siemens%20SIMATIC%20Drive%20Controller%20CPU%201504D%20TF&amp;severity=critical&amp;id=69b04b8cea502d3aa873baa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27769-cwe-923-improper-restriction-of-com-a4450901</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27769%3A%20CWE-923%3A%20Improper%20Restriction%20of%20Communication%20Channel%20to%20Intended%20Endpoints%20in%20Siemens%20Heliox%20Flex%20180%20kW%20EV%20Charging%20Station&amp;severity=low&amp;id=69b04b8cea502d3aa873ba9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mental-health-apps-are-leaking-your-private-though-f3284dc0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mental%20health%20apps%20are%20leaking%20your%20private%20thoughts.%20How%20do%20you%20protect%20yourself%3F%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69b05631ea502d3aa87d6b45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/webinar-today-securing-fragile-ot-in-an-exposed-wo-3be6e649</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Webinar%20Today%3A%20Securing%20Fragile%20OT%20in%20an%20Exposed%20World&amp;severity=medium&amp;id=69b03641ea502d3aa8673936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3847-vulnerability-in-mozilla-firefox-93e6bf98</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3847%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69b03689ea502d3aa867a112</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3846-vulnerability-in-mozilla-firefox-104c9947</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3846%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69b03689ea502d3aa867a10e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3845-vulnerability-in-mozilla-firefox-81266191</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3845%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69b03689ea502d3aa867a10a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3862-vulnerability-in-broadcom-siteminder-6245c414</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3862%3A%20Vulnerability%20in%20Broadcom%20SiteMinder&amp;severity=medium&amp;id=69b03689ea502d3aa867a116</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sap-patches-critical-fs-quo-netweaver-vulnerabilit-a4a029a4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SAP%20Patches%20Critical%20FS-QUO%2C%20NetWeaver%20Vulnerabilities&amp;severity=critical&amp;id=69b02bb5ea502d3aa85f6592</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/thousands-affected-by-ericsson-data-breach-183bdf0a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Thousands%20Affected%20by%20Ericsson%20Data%20Breach&amp;severity=medium&amp;id=69b02bb5ea502d3aa85f6595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3483-cwe-749-exposed-dangerous-method-or--62639a97</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3483%3A%20CWE-749%20Exposed%20dangerous%20method%20or%20function%20in%20Ivanti%20Desktop%20and%20Server%20Management&amp;severity=high&amp;id=69b02c18ea502d3aa85f8868</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openai-rolls-out-codex-security-vulnerability-scan-222e753a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenAI%20Rolls%20Out%20Codex%20Security%20Vulnerability%20Scanner&amp;severity=critical&amp;id=69b01da5ea502d3aa8574d03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kevin-mandias-armadin-launches-with-190-million-in-5f25333b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kevin%20Mandia%E2%80%99s%20Armadin%20Launches%20With%20%24190%20Million%20in%20Funding&amp;severity=medium&amp;id=69b01da5ea502d3aa8574d09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/quiz-sites-trick-users-into-enabling-unwanted-brow-23554c48</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Quiz%20sites%20trick%20users%20into%20enabling%20unwanted%20browser%20notifications&amp;severity=medium&amp;id=69b01a1eea502d3aa8553b3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2339-cwe-306-missing-authentication-for-c-bfc86a8c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2339%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20TUBITAK%20BILGEM%20Software%20Technologies%20Research%20Institute%20Liderahenk&amp;severity=high&amp;id=69b0215bea502d3aa859162a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hundreds-of-salesforce-customers-allegedly-targete-d347d683</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hundreds%20of%20Salesforce%20Customers%20Allegedly%20Targeted%20in%20New%20Data%20Theft%20Campaign&amp;severity=medium&amp;id=69b01318ea502d3aa850c00a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beatbanker-both-banker-and-miner-for-android-65d627b5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BeatBanker%3A%20both%20banker%20and%20miner%20for%20Android&amp;severity=medium&amp;id=69b0169cea502d3aa852b221</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11739-cwe-502-deserialization-of-untruste-7716261a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11739%3A%20CWE-502%20Deserialization%20of%20untrusted%20data%20in%20Schneider%20Electric%20EcoStruxure%E2%84%A2%20Power%20Monitoring%20Expert%20(PME)&amp;severity=high&amp;id=69b01357ea502d3aa8512703</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13957-cwe-798-use-of-hard-coded-credentia-50d57493</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13957%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Schneider%20Electric%20EcoStruxure%E2%84%A2%20IT%20Data%20Center%20Expert%20(Formerly%20known%20as%20StruxureWare%20Data%20Center%20Expert)&amp;severity=high&amp;id=69b00fcaea502d3aa84f717e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2741-cwe-22-improper-limitation-of-a-path-48a18612</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2741%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20vaadin%20flow&amp;severity=low&amp;id=69b00fcaea502d3aa84f7181</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/recent-ivanti-endpoint-manager-flaw-exploited-in-a-da7247af</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Recent%20Ivanti%20Endpoint%20Manager%20Flaw%20Exploited%20in%20Attacks&amp;severity=high&amp;id=69b0088eea502d3aa84bf7fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3843-cwe-89-improper-neutralization-of-sp-db749180</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3843%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Nefteprodukttekhnika%20LLC%20BUK%20TS-G%20Gas%20Station%20Automation%20System&amp;severity=critical&amp;id=69b0215bea502d3aa859162d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sim-swaps-expose-a-critical-flaw-in-identity-secur-b61e9db7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SIM%20Swaps%20Expose%20a%20Critical%20Flaw%20in%20Identity%20Security&amp;severity=critical&amp;id=69affa7bea502d3aa840daea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22614-cwe-257-storing-passwords-in-a-reco-75e6ae65</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22614%3A%20CWE-257%20Storing%20passwords%20in%20a%20recoverable%20format%20in%20Eaton%20EasySoft&amp;severity=medium&amp;id=69aff72aea502d3aa83f35d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21791-cwe-532-insertion-of-sensitive-info-c766ae5b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21791%3A%20CWE-532%20Insertion%20of%20sensitive%20information%20into%20log%20file%20in%20HCL%20Sametime&amp;severity=low&amp;id=69aff3a6ea502d3aa83c665c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3228-cwe-79-improper-neutralization-of-in-07e7a8d3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3228%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nextscripts%20NextScripts%3A%20Social%20Networks%20Auto-Poster&amp;severity=medium&amp;id=69b044ddea502d3aa870234e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2724-cwe-79-improper-neutralization-of-in-6aed2920</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2724%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20unitecms%20Unlimited%20Elements%20For%20Elementor&amp;severity=high&amp;id=69b044ddea502d3aa8702346</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23907-cwe-22-improper-limitation-of-a-pat-f06ac661</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23907%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20PDFBox%20Examples&amp;severity=medium&amp;id=69b0215bea502d3aa8591625</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3315-cwe-276-incorrect-default-permission-cadef1a4</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3315%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20ASSA%20ABLOY%20Visionline&amp;severity=medium&amp;id=69afe91aea502d3aa834a958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1261-cwe-79-improper-neutralization-of-in-3b7ad624</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1261%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Wpmet%20MetForm%20Pro&amp;severity=high&amp;id=69afe91aea502d3aa834a951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41712-cwe-732-incorrect-permission-assign-d864906a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41712%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Janitza%20UMG%2096RM-E%2024V(5222063)&amp;severity=medium&amp;id=69afd786ea502d3aa827b17d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41711-cwe-327-use-of-a-broken-or-risky-cr-3f06a07f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41711%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Janitza%20UMG%2096RM-E%2024V(5222063)&amp;severity=medium&amp;id=69afd786ea502d3aa827b177</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41710-cwe-798-use-of-hard-coded-credentia-86ec016a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41710%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Janitza%20UMG%2096RM-E%2024V(5222063)&amp;severity=medium&amp;id=69afd786ea502d3aa827b171</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41709-cwe-78-improper-neutralization-of-s-7863621d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41709%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Janitza%20UMG%2096RM-E%2024V(5222063)&amp;severity=critical&amp;id=69afd786ea502d3aa827b16b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2364-cwe-367-time-of-check-time-of-use-to-5eb858d5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2364%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20CODESYS%20CODESYS%20Installer&amp;severity=high&amp;id=69afc976ea502d3aa81f019e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1508-cwe-352-cross-site-request-forgery-c-cd03c8c6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1508%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Court%20Reservation&amp;severity=medium&amp;id=69afbb66ea502d3aa81236ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0953-cwe-287-improper-authentication-in-t-965fa126</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0953%3A%20CWE-287%20Improper%20Authentication%20in%20themeum%20Tutor%20LMS%20Pro&amp;severity=critical&amp;id=69afb0daea502d3aa80ce240</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2399-cwe-1285-improper-validation-of-spec-1fc878cf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2399%3A%20CWE-1285%20Improper%20Validation%20of%20Specified%20Index%2C%20Position%2C%20or%20Offset%20in%20Input%20in%20Mitsubishi%20Electric%20Corporation%20Mitsubishi%20Electric%20CNC%20M800V%20Series%20M800VW&amp;severity=medium&amp;id=69afa64eea502d3aa8064f3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3585-cwe-22-improper-limitation-of-a-path-57fec669</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3585%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20stellarwp%20The%20Events%20Calendar&amp;severity=high&amp;id=69af94baea502d3aa8fe3e7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1919-cwe-306-missing-authentication-for-c-b7d963b1</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1919%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20arraytics%20Booktics%20%E2%80%93%20Booking%20Calendar%20for%20Appointments%20and%20Service%20Businesses&amp;severity=medium&amp;id=69af86aaea502d3aa8f4fe7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1920-cwe-306-missing-authentication-for-c-3db6a0a1</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1920%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20arraytics%20Booktics%20%E2%80%93%20Booking%20Calendar%20for%20Appointments%20and%20Service%20Businesses&amp;severity=medium&amp;id=69af86aaea502d3aa8f4fe84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36173-cwe-79-improper-neutralization-of-i-f97282af</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36173%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20InfoSphere%20Data%20Architect&amp;severity=medium&amp;id=69af789aea502d3aa8ed4d8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36105-cwe-526-cleartext-storage-of-sensit-e80db9d6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36105%3A%20CWE-526%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20an%20Environment%20Variable%20in%20IBM%20Planning%20Analytics%20Advanced%20Certified%20Containers&amp;severity=medium&amp;id=69af7192ea502d3aa8ea5c71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27689-cwe-606-unchecked-input-for-loop-co-d8b8d892</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27689%3A%20CWE-606%3A%20Unchecked%20Input%20for%20Loop%20Condition%20in%20SAP_SE%20SAP%20Supply%20Chain%20Management&amp;severity=high&amp;id=69af6a8cea502d3aa8e719dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27688-cwe-862-missing-authorization-in-sa-62bd5477</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27688%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20for%20ABAP&amp;severity=medium&amp;id=69af6a8cea502d3aa8e719d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27687-cwe-862-missing-authorization-in-sa-bb7713f0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27687%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20S%2F4HANA%20HCM%20Portugal%20and%20SAP%20ERP%20HCM%20Portugal&amp;severity=medium&amp;id=69af6a8cea502d3aa8e719d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27686-cwe-862-missing-authorization-in-sa-83adb224</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27686%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20Business%20Warehouse%20(Service%20API)&amp;severity=medium&amp;id=69af6a8bea502d3aa8e719bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27685-cwe-502-deserialization-of-untruste-36704129</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27685%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20SAP_SE%20SAP%20NetWeaver%20Enterprise%20Portal%20Administration&amp;severity=critical&amp;id=69af6a8bea502d3aa8e719b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27684-cwe-89-improper-neutralization-of-s-c68052d0</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27684%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20in%20SAP_SE%20SAP%20NetWeaver%20(Feedback%20Notification)&amp;severity=medium&amp;id=69af6a8bea502d3aa8e719b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24317-cwe-427-uncontrolled-search-path-el-9d366f48</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24317%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20SAP_SE%20SAP%20GUI%20for%20Windows%20with%20active%20GuiXT&amp;severity=medium&amp;id=69af6a8bea502d3aa8e719b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24316-cwe-918-server-side-request-forgery-f88090d8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24316%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20for%20ABAP&amp;severity=medium&amp;id=69af6a8bea502d3aa8e719ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24313-cwe-862-missing-authorization-in-sa-66d5a26c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24313%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20Solution%20Tools%20Plug-In%20(ST-PI)&amp;severity=medium&amp;id=69af6a8bea502d3aa8e719a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24311-cwe-312-cleartext-storage-of-sensit-e84d825d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24311%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20SAP_SE%20SAP%20Customer%20Checkout%202.0&amp;severity=medium&amp;id=69af6a8bea502d3aa8e719a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24310-cwe-862-missing-authorization-in-sa-7999f018</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24310%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20for%20ABAP&amp;severity=low&amp;id=69af6a8bea502d3aa8e719a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24309-cwe-862-missing-authorization-in-sa-f005d646</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24309%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20for%20ABAP&amp;severity=medium&amp;id=69af6a8bea502d3aa8e7199c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0489-cwe-79-improper-neutralization-of-in-cbf68665</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0489%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20SAP_SE%20SAP%20Business%20One%20(Job%20Service)&amp;severity=medium&amp;id=69af6a8bea502d3aa8e71998</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70242-na-c6411a74</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70242%3A%20n%2Fa&amp;severity=high&amp;id=69b0864c2f860ef943bbb07a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70802-na-3e020311</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70802%3A%20n%2Fa&amp;severity=high&amp;id=69b082c52f860ef943b7fd3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70798-na-508a12b2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70798%3A%20n%2Fa&amp;severity=high&amp;id=69b082c52f860ef943b7fd3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70244-na-e28317c6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70244%3A%20n%2Fa&amp;severity=high&amp;id=69b07f3e2f860ef943b515a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70227-na-cbb81ab6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70227%3A%20n%2Fa&amp;severity=high&amp;id=69b07bba2f860ef943b24cbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70251-na-669447d6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70251%3A%20n%2Fa&amp;severity=high&amp;id=69b078412f860ef943afd33a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70247-na-d44926cd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70247%3A%20n%2Fa&amp;severity=high&amp;id=69b078412f860ef943afd335</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70249-na-f5902c4c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70249%3A%20n%2Fa&amp;severity=high&amp;id=69b071392f860ef943a5fd4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70246-na-89dc65ca</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70246%3A%20n%2Fa&amp;severity=high&amp;id=69b071392f860ef943a5fd46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70129-na-ab3fe0cb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70129%3A%20n%2Fa&amp;severity=medium&amp;id=69b071392f860ef943a5fd42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70128-na-5b2105a8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70128%3A%20n%2Fa&amp;severity=medium&amp;id=69b071392f860ef943a5fd3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26742-na-e679e983</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26742%3A%20n%2Fa&amp;severity=high&amp;id=69b06a2a2f860ef943991ead</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26741-na-af97790d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26741%3A%20n%2Fa&amp;severity=high&amp;id=69b06a2a2f860ef943991eaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26801-na-507b5071</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26801%3A%20n%2Fa&amp;severity=high&amp;id=69b063a09972381a98a3a04a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56422-na-e0fce763</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56422%3A%20n%2Fa&amp;severity=critical&amp;id=69b060169972381a9898e680</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56421-na-d4e6f7b0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56421%3A%20n%2Fa&amp;severity=high&amp;id=69b060159972381a9898e67c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69615-na-b9f6729e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69615%3A%20n%2Fa&amp;severity=critical&amp;id=69b059afea502d3aa88174f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69614-na-f8e99074</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69614%3A%20n%2Fa&amp;severity=critical&amp;id=69b059afea502d3aa88174ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-10-d294a46c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-10&amp;severity=medium&amp;id=69b05598ea502d3aa87bd071</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26738-na-e655b58c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26738%3A%20n%2Fa&amp;severity=high&amp;id=69b040ffea502d3aa86ddc39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70025-na-0b47dd0a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70025%3A%20n%2Fa&amp;severity=medium&amp;id=69b040ffea502d3aa86ddc34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-10-26d06c7c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-10&amp;severity=low&amp;id=69afc5bcea502d3aa81b3a7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30925-cwe-1333-inefficient-regular-expres-7c8115f9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30925%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69af5576ea502d3aa8d50d90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30917-cwe-79-improper-neutralization-of-i-374fc6af</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30917%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20weirdgloop%20mediawiki-extensions-Bucket&amp;severity=high&amp;id=69af51f2ea502d3aa8d1f2ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30916-cwe-200-exposure-of-sensitive-infor-ceee8999</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30916&amp;severity=null&amp;id=69af51f2ea502d3aa8d1f2d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30913-cwe-79-improper-neutralization-of-i-61bde380</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30913%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20flarum%20nicknames&amp;severity=medium&amp;id=69af51f2ea502d3aa8d1f2cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30885-cwe-306-missing-authentication-for--c52692c2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30885%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69af4e6aea502d3aa8cf7ccf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30870-cwe-285-improper-authorization-in-p-1df0986b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30870%3A%20CWE-285%3A%20Improper%20Authorization%20in%20powersync-ja%20powersync-service&amp;severity=medium&amp;id=69af4e6aea502d3aa8cf7ccc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28267-incorrect-default-permissions-in-di-18abd493</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28267%3A%20Incorrect%20default%20permissions%20in%20Digital%20Arts%20Inc.%20i-%E3%83%95%E3%82%A3%E3%83%AB%E3%82%BF%E3%83%BC%2010%20(Windows%20version%20only)&amp;severity=medium&amp;id=69af4e6aea502d3aa8cf7cb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30869-cwe-22-improper-limitation-of-a-pat-98459c9d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30869%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20siyuan-note%20siyuan&amp;severity=critical&amp;id=69af4e6aea502d3aa8cf7cc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30862-cwe-79-improper-neutralization-of-i-d918c60a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30862%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20appsmithorg%20appsmith&amp;severity=critical&amp;id=69af4e6aea502d3aa8cf7cc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29773-cwe-863-incorrect-authorization-in--70ff5380</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29773%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20kubewarden%20kubewarden-controller&amp;severity=medium&amp;id=69af4e6aea502d3aa8cf7cc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28281-cwe-352-cross-site-request-forgery--582e209f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28281%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20instantsoft%20icms2&amp;severity=high&amp;id=69af4ae9ea502d3aa8cd9889</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11158-cwe-862-missing-authorization-in-hi-7c52de59</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11158%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Hitachi%20Vantara%20Pentaho%20Data%20Integration%20and%20Analytics&amp;severity=critical&amp;id=69af4ae9ea502d3aa8cd9886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28433-cwe-639-authorization-bypass-throug-5743eba7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28433%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20misskey-dev%20misskey&amp;severity=low&amp;id=69af3cdaea502d3aa8c6d38f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28432-cwe-347-improper-verification-of-cr-d72cfb17</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28432%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20misskey-dev%20misskey&amp;severity=high&amp;id=69af3cdaea502d3aa8c6d38c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28431-cwe-285-improper-authorization-in-m-e4688f7e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28431%3A%20CWE-285%3A%20Improper%20Authorization%20in%20misskey-dev%20misskey&amp;severity=critical&amp;id=69af3cdaea502d3aa8c6d389</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26982-cwe-78-improper-neutralization-of-s-dd6a54d3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26982%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ghostty-org%20ghostty&amp;severity=medium&amp;id=69af3955ea502d3aa8c59c7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31802-cwe-22-improper-limitation-of-a-pat-247231a7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31802%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20isaacs%20node-tar&amp;severity=high&amp;id=69af3955ea502d3aa8c59c83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1776-cwe-22-improper-limitation-of-a-path-96ab7479</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1776%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20owen2345%20Camaleon%20CMS&amp;severity=medium&amp;id=69af3955ea502d3aa8c59c75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30926-cwe-284-improper-access-control-in--1175aec5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30926%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=69af3955ea502d3aa8c59c80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25960-cwe-918-server-side-request-forgery-c3fc1a91</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25960%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20vllm-project%20vllm&amp;severity=high&amp;id=69b03689ea502d3aa867a119</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3288-cwe-20-improper-input-validation-in--b7359678</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3288%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Kubernetes%20ingress-nginx&amp;severity=high&amp;id=69af3955ea502d3aa8c59c87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15603-insufficiently-random-values-in-ope-2f25b3d9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15603%3A%20Insufficiently%20Random%20Values%20in%20open-webui&amp;severity=medium&amp;id=69b044ddea502d3aa8702354</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0846-cwe-36-absolute-path-traversal-in-nl-799595df</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0846%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20nltk%20nltk%2Fnltk&amp;severity=high&amp;id=69af20b9ea502d3aa8b98ce9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3638-cwe-862-missing-authorization-in-dev-87162fbb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3638%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Devolutions%20Server&amp;severity=medium&amp;id=69af19aeea502d3aa8b3c468</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29023-cwe-798-use-of-hard-coded-credentia-e510eadc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29023%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20KeygraphHQ%20Shannon&amp;severity=medium&amp;id=69af0b9eea502d3aa8af25bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/9th-march-threat-intelligence-report-3ef7c2ab</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=9th%20March%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=69aefa3eea502d3aa88a9e9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15568-cwe-78-improper-neutralization-of-s-b5d6b74a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15568%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Archer%20AXE75%20v1.6%2Fv1.0&amp;severity=high&amp;id=69aef68aea502d3aa8861a2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3588-cwe-918-server-side-request-forgery--d3eb8845</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3588%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ikea%20dirigera&amp;severity=high&amp;id=69aef0552904315ca31e4b3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25866-cwe-428-unquoted-search-path-or-ele-0dfb2877</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25866%3A%20CWE-428%20Unquoted%20search%20path%20or%20element%20in%20Mobatek%20MobaXterm&amp;severity=high&amp;id=69aeeccc2904315ca31bf399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/encrypted-client-hello-ready-for-prime-timex3f-mon-75a90978</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Encrypted%20Client%20Hello%3A%20Ready%20for%20Prime%20Time%26%23x3f%3B%2C%20(Mon%2C%20Mar%209th)&amp;severity=medium&amp;id=69aede872904315ca3143bbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3089-cwe-22-improper-limitation-of-a-path-c51e0410</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3089%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Actual%20Actual%20Sync%20Server&amp;severity=medium&amp;id=69aed7b62904315ca3115bd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2919-vulnerability-in-mozilla-focus-for-i-08c2d971</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2919%3A%20Vulnerability%20in%20Mozilla%20Focus%20for%20iOS&amp;severity=medium&amp;id=69aed0ab2904315ca30d0a91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clickfix-attack-uses-windows-terminal-to-evade-det-2d22d0e7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ClickFix%20Attack%20Uses%20Windows%20Terminal%20to%20Evade%20Detection&amp;severity=medium&amp;id=69aec2682904315ca3069adf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3819-cross-site-scripting-in-sourcecodest-aaa44b39</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3819%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Resort%20Reservation%20System&amp;severity=medium&amp;id=69aec2a82904315ca306c3ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21736-cwe-280-improper-handling-of-insuff-b649a84a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21736%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=medium&amp;id=69aebf172904315ca3052918</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/internet-infrastructure-tld-arpa-abused-in-phishin-e2d522ee</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Internet%20Infrastructure%20TLD%20.arpa%20Abused%20in%20Phishing%20Attacks&amp;severity=medium&amp;id=69aeb7db2904315ca3023076</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3818-sql-injection-in-tiandy-easy7-cms-wi-a4db1eb0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3818%3A%20SQL%20Injection%20in%20Tiandy%20Easy7%20CMS%20Windows&amp;severity=medium&amp;id=69aeb8222904315ca3023bc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cloned-ai-tool-sites-distribute-malware-in-install-a9978540</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cloned%20AI%20Tool%20Sites%20Distribute%20Malware%20in%20%E2%80%98InstallFix%E2%80%99%20Campaign&amp;severity=medium&amp;id=69aeb4572904315ca30031af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3817-improper-authorization-in-sourcecode-267ac504</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3817%3A%20Improper%20Authorization%20in%20SourceCodester%20Patients%20Waiting%20Area%20Queue%20Management%20System&amp;severity=medium&amp;id=69aeb4982904315ca3004502</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3816-denial-of-service-in-owasp-defectdoj-a15580d6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3816%3A%20Denial%20of%20Service%20in%20OWASP%20DefectDojo&amp;severity=medium&amp;id=69aef497ea502d3aa883cff9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25604-cwe-346-origin-validation-error-in--5a7b7808</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25604%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20Apache%20Software%20Foundation%20Apache%20Airflow%20Providers%20Amazon&amp;severity=medium&amp;id=69aea67e2904315ca3fb12d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3815-buffer-overflow-in-utt-hiper-810g-4cb171a4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3815%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20810G&amp;severity=high&amp;id=69aea67e2904315ca3fb12dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69219-cwe-913-improper-control-of-dynamic-c55c74a4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69219%3A%20CWE-913%3A%20Improper%20Control%20of%20Dynamically-Managed%20Code%20Resources%20in%20Apache%20Software%20Foundation%20Apache%20Airflow%20Providers%20Http&amp;severity=high&amp;id=69aea2f72904315ca3f9c786</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-cleanmymac-site-installs-shub-stealer-and-bac-cb0be810</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20CleanMyMac%20site%20installs%20SHub%20Stealer%20and%20backdoors%20crypto%20wallets&amp;severity=medium&amp;id=69aea2c22904315ca3f9aacb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3814-buffer-overflow-in-utt-hiper-810g-7866271a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3814%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20810G&amp;severity=high&amp;id=69ae9f732904315ca3f8057d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/installfix-how-attackers-are-weaponizing-malvertiz-3ceb237b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=InstallFix%3A%20How%20attackers%20are%20weaponizing%20malvertized%20install%20guides&amp;severity=medium&amp;id=69ae9bba2904315ca3f470fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3813-injection-in-opencc-jflow-c61de85b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3813%3A%20Injection%20in%20opencc%20JFlow&amp;severity=medium&amp;id=69ae986d2904315ca3f1764a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69279-cwe-20-improper-input-validation-in-fe83ee3f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69279%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=69ae8de22904315ca3e9d00f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69278-cwe-20-improper-input-validation-in-b08709bc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69278%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T7300%2FT8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=69ae8de22904315ca3e9d00c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61616-cwe-20-improper-input-validation-in-6d0031ac</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61616%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=69ae8de22904315ca3e9d009</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61615-cwe-20-improper-input-validation-in-e5a517e5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61615%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=69ae8de22904315ca3e9d006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61614-cwe-20-improper-input-validation-in-0a7e31c7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61614%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T7300%2FT8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=69ae8de22904315ca3e9d003</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61613-cwe-20-improper-input-validation-in-a7f83b60</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61613%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=69ae8de22904315ca3e9d000</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61612-cwe-20-improper-input-validation-in-4f34411f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61612%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T7300%2FT8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=69ae8de22904315ca3e9cffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61611-cwe-20-improper-input-validation-in-32e99f23</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61611%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20UDX710&amp;severity=high&amp;id=69ae8de22904315ca3e9cffa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3812-cross-site-scripting-in-itsourcecode-7ee28ec9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3812%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20Payroll%20Management%20System&amp;severity=medium&amp;id=69ae8de42904315ca3e9d026</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24713-cwe-20-improper-input-validation-in-78e1759b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24713%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20IoTDB&amp;severity=critical&amp;id=69ae8de22904315ca3e9d015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24015-cwe-1327-binding-to-an-unrestricted-99fd9b26</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24015%3A%20CWE-1327%20Binding%20to%20an%20Unrestricted%20IP%20Address%20in%20Apache%20Software%20Foundation%20Apache%20IoTDB&amp;severity=critical&amp;id=69ae8de22904315ca3e9d012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3811-stack-based-buffer-overflow-in-tenda-076e8a7e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3811%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1202&amp;severity=high&amp;id=69ae8a5a2904315ca3e7e074</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41772-cwe-598-use-of-get-request-method-w-ba0a22f3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41772%3A%20CWE-598%20Use%20of%20GET%20Request%20Method%20With%20Sensitive%20Query%20Strings%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=high&amp;id=69ae86d82904315ca3e5dc45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41767-cwe-347-improper-verification-of-cr-d117e184</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41767%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=high&amp;id=69ae86d82904315ca3e5dc42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41766-cwe-787-out-of-bounds-write-in-mbs--5533adda</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41766%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=high&amp;id=69ae86d82904315ca3e5dc3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41765-cwe-862-missing-authorization-in-mb-57e75f2c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41765%3A%20CWE-862%20Missing%20Authorization%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=critical&amp;id=69ae86d82904315ca3e5dc3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41764-cwe-862-missing-authorization-in-mb-a3e3d2de</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41764%3A%20CWE-862%20Missing%20Authorization%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=critical&amp;id=69ae86d82904315ca3e5dc39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41763-cwe-497-exposure-of-sensitive-syste-5ae93f0c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41763%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=medium&amp;id=69ae86d72904315ca3e5dbf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41762-cwe-328-use-of-weak-hash-in-mbs-ubr-f7ff21d7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41762%3A%20CWE-328%20Use%20of%20Weak%20Hash%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=medium&amp;id=69ae86d72904315ca3e5dbf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41761-cwe-88-improper-neutralization-of-a-c2ea65ba</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41761%3A%20CWE-88%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=high&amp;id=69ae86d72904315ca3e5dbee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41760-cwe-636-not-failing-securely-failin-96960f60</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41760%3A%20CWE-636%20Not%20Failing%20Securely%20(&apos;Failing%20Open&apos;)%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=medium&amp;id=69ae86d72904315ca3e5dbeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41759-cwe-636-not-failing-securely-failin-b5660774</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41759%3A%20CWE-636%20Not%20Failing%20Securely%20(&apos;Failing%20Open&apos;)%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=medium&amp;id=69ae86d72904315ca3e5dbe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41758-cwe-22-improper-limitation-of-a-pat-2e4cf25e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41758%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=high&amp;id=69ae86d72904315ca3e5dbe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41757-cwe-22-improper-limitation-of-a-pat-d23dc345</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41757%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=high&amp;id=69ae86d72904315ca3e5dbe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41756-cwe-1242-inclusion-of-undocumented--2432140c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41756%3A%20CWE-1242%20Inclusion%20of%20Undocumented%20Features%20or%20Chicken%20Bits%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=high&amp;id=69ae86d72904315ca3e5dbdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41755-cwe-22-improper-limitation-of-a-pat-cd09f553</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41755%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=medium&amp;id=69ae86d72904315ca3e5dbdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41754-cwe-1242-inclusion-of-undocumented--5310c8c8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41754%3A%20CWE-1242%20Inclusion%20of%20Undocumented%20Features%20or%20Chicken%20Bits%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=medium&amp;id=69ae86d72904315ca3e5dbd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3810-stack-based-buffer-overflow-in-tenda-96d51f9d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3810%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1202&amp;severity=high&amp;id=69ae7fd12904315ca3e0a268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3809-stack-based-buffer-overflow-in-tenda-cd7509e0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3809%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1202&amp;severity=high&amp;id=69ae7c4e2904315ca3de0ffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3808-stack-based-buffer-overflow-in-tenda-47c2dc78</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3808%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1202&amp;severity=high&amp;id=69ae78c72904315ca3dac14f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3807-stack-based-buffer-overflow-in-tenda-57a28f57</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3807%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1202&amp;severity=high&amp;id=69ae6ab82904315ca3cb955f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3823-cwe-121-stack-based-buffer-overflow--68d582bc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3823%3A%20CWE-121%20Stack-based%20buffer%20overflow%20in%20Atop%20Technologies%20EHG2408&amp;severity=critical&amp;id=69ae6ab82904315ca3cb9567</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3806-sql-injection-in-sourcecodester-reso-2611b6c4</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3806%3A%20SQL%20Injection%20in%20SourceCodester%20Resort%20Reservation%20System&amp;severity=medium&amp;id=69aef497ea502d3aa883d003</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3804-stack-based-buffer-overflow-in-tenda-c824133f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3804%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20i3&amp;severity=high&amp;id=69ae602a2904315ca3bfed68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3803-stack-based-buffer-overflow-in-tenda-d8d8363c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3803%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20i3&amp;severity=high&amp;id=69ae59252904315ca3ba53b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30896-uncontrolled-search-path-element-in-2c04514c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30896%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Qsee%20Qsee%20Client&amp;severity=high&amp;id=69ae59252904315ca3ba53ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3802-stack-based-buffer-overflow-in-tenda-e2e310a9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3802%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20i3&amp;severity=high&amp;id=69ae521a2904315ca3b4fb03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3801-stack-based-buffer-overflow-in-tenda-c8df084e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3801%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20i3&amp;severity=high&amp;id=69ae47912904315ca3972de8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3822-cwe-295-improper-certificate-validat-93f8590c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3822%3A%20CWE-295%20Improper%20certificate%20validation%20in%20Taipower%20Taipower%20APP&amp;severity=high&amp;id=69ae47912904315ca3972df1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3800-unrestricted-upload-in-sourcecodeste-535e7ac6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3800%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Resort%20Reservation%20System&amp;severity=medium&amp;id=69ae47912904315ca3972de1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3799-stack-based-buffer-overflow-in-tenda-8e3e46d3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3799%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20i3&amp;severity=high&amp;id=69ae47912904315ca3972dda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3798-command-injection-in-comfast-cf-ac10-eb1c1917</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3798%3A%20Command%20Injection%20in%20Comfast%20CF-AC100&amp;severity=medium&amp;id=69ae3d052904315ca386c4a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3631-cwe-125-out-of-bounds-read-in-deltaw-56dcbeb6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3631%3A%20CWE-125%20Out-of-bounds%20Read%20in%20DeltaWW%20COMMGR2&amp;severity=high&amp;id=69ae3d052904315ca386c491</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3630-cwe-121-stack-based-buffer-overflow--c00e7f15</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3630%3A%20cwe-121%20Stack-based%20Buffer%20Overflow%20in%20DeltaWW%20COMMGR2&amp;severity=critical&amp;id=69ae3d052904315ca386c48e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3797-unrestricted-upload-in-tiandy-video--748bd466</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3797%3A%20Unrestricted%20Upload%20in%20Tiandy%20Video%20Surveillance%20System%20%E8%A7%86%E9%A2%91%E7%9B%91%E6%8E%A7%E5%B9%B3%E5%8F%B0&amp;severity=medium&amp;id=69ae3d052904315ca386c49b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3796-improper-access-controls-in-qi-anxin-5a415393</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3796%3A%20Improper%20Access%20Controls%20in%20Qi-ANXIN%20QAX%20Virus%20Removal&amp;severity=medium&amp;id=69ae3d052904315ca386c494</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3795-path-traversal-in-doramart-doracms-2b1ce532</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3795%3A%20Path%20Traversal%20in%20doramart%20DoraCMS&amp;severity=medium&amp;id=69ae2ef52904315ca3454d35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3794-improper-authentication-in-doramart--485a5a33</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3794%3A%20Improper%20Authentication%20in%20doramart%20DoraCMS&amp;severity=medium&amp;id=69ae2ef52904315ca3454d30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3793-sql-injection-in-sourcecodester-sale-e809dfe3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3793%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69ae2ef52904315ca3454d29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3792-sql-injection-in-sourcecodester-sale-24b11dc7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3792%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69ae24662904315ca31e22a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3791-sql-injection-in-sourcecodester-sale-ce9829f3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3791%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69ae1d5f2904315ca314c85a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3790-sql-injection-in-sourcecodester-sale-5f985483</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3790%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69ae12d72904315ca30ac9b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70030-na-d0975b30</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70030%3A%20n%2Fa&amp;severity=high&amp;id=69b044ddea502d3aa8702362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70973-na-54f51c5f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70973%3A%20n%2Fa&amp;severity=medium&amp;id=69b044ddea502d3aa870235f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70028-na-3a07e508</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70028%3A%20n%2Fa&amp;severity=high&amp;id=69b044ddea502d3aa870235a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-09-57701da0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-09&amp;severity=medium&amp;id=69af634bea502d3aa8dad08d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-09-79bfea9f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-09&amp;severity=medium&amp;id=69af3598ea502d3aa8c0dbf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70031-na-8a203d21</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70031%3A%20n%2Fa&amp;severity=high&amp;id=69af20b9ea502d3aa8b98ce4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70032-na-37d1a9c0</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70032%3A%20n%2Fa&amp;severity=medium&amp;id=69af1d36ea502d3aa8b51a55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30140-na-bdcbb2e3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30140%3A%20n%2Fa&amp;severity=high&amp;id=69af12acea502d3aa8b1aeb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70033-na-99291bb2</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70033%3A%20n%2Fa&amp;severity=medium&amp;id=69af081bea502d3aa8ad8b80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70039-na-d5e0ae2c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70039%3A%20n%2Fa&amp;severity=critical&amp;id=69af0116ea502d3aa8929a4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70038-na-403c97f4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70038%3A%20n%2Fa&amp;severity=high&amp;id=69af0116ea502d3aa8929a46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70034-na-f2a4579f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70034%3A%20n%2Fa&amp;severity=high&amp;id=69af0116ea502d3aa8929a41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70037-na-d58dc3af</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70037%3A%20n%2Fa&amp;severity=medium&amp;id=69aefd8fea502d3aa88d43ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70060-na-ff9fb2d0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70060%3A%20n%2Fa&amp;severity=medium&amp;id=69aef0552904315ca31e4b39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70040-na-5b2fc2fc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70040%3A%20n%2Fa&amp;severity=medium&amp;id=69aef0552904315ca31e4b34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70050-na-e5092a6d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70050%3A%20n%2Fa&amp;severity=medium&amp;id=69aeeccc2904315ca31bf394</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70046-na-320037a1</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70046%3A%20n%2Fa&amp;severity=critical&amp;id=69aeeccc2904315ca31bf38f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70042-na-712777a3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70042%3A%20n%2Fa&amp;severity=critical&amp;id=69aeeccc2904315ca31bf38a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70048-na-ea9aa573</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70048%3A%20n%2Fa&amp;severity=high&amp;id=69aee5c82904315ca318c679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70047-na-78041731</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70047%3A%20n%2Fa&amp;severity=high&amp;id=69aee5c82904315ca318c666</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70238-na-86922b37</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70238%3A%20n%2Fa&amp;severity=high&amp;id=69aee2432904315ca316f538</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70059-na-d54d5feb</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70059%3A%20n%2Fa&amp;severity=high&amp;id=69aee2432904315ca316f533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70250-na-e9579a40</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70250%3A%20n%2Fa&amp;severity=high&amp;id=69aedb362904315ca312a949</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70243-na-87101f93</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70243%3A%20n%2Fa&amp;severity=high&amp;id=69aedb362904315ca312a944</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69648-na-ca1b875d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69648%3A%20n%2Fa&amp;severity=medium&amp;id=69aedb362904315ca312a940</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69647-na-99770e2b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69647%3A%20n%2Fa&amp;severity=medium&amp;id=69aedb362904315ca312a93c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-09-dff51750</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-09&amp;severity=low&amp;id=69aea6442904315ca3faf7d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3789-server-side-request-forgery-in-byted-4bd85a81</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3789%3A%20Server-Side%20Request%20Forgery%20in%20Bytedesk&amp;severity=medium&amp;id=69ae0bcb2904315ca302ed63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3788-server-side-request-forgery-in-byted-a581b462</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3788%3A%20Server-Side%20Request%20Forgery%20in%20Bytedesk&amp;severity=medium&amp;id=69ae0bcb2904315ca302ed58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3787-uncontrolled-search-path-in-ultravnc-8f16fda8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3787%3A%20Uncontrolled%20Search%20Path%20in%20UltraVNC&amp;severity=high&amp;id=69ae01432904315ca3febb14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3786-sql-injection-in-easycms-316a8934</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3786%3A%20SQL%20Injection%20in%20EasyCMS&amp;severity=medium&amp;id=69ae16ab2904315ca310d422</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3785-sql-injection-in-easycms-2d45fde4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3785%3A%20SQL%20Injection%20in%20EasyCMS&amp;severity=medium&amp;id=69ae16ab2904315ca310d41c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3771-sql-injection-in-sourcecodester-reso-7816bc70</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3771%3A%20SQL%20Injection%20in%20SourceCodester%20Resort%20Reservation%20System&amp;severity=medium&amp;id=69ae16ab2904315ca310d428</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3770-cross-site-request-forgery-in-source-6bf6f3bb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3770%3A%20Cross-Site%20Request%20Forgery%20in%20SourceCodester%20Computer%20Laboratory%20Management%20System&amp;severity=medium&amp;id=69ade5242904315ca3f04df0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3769-stack-based-buffer-overflow-in-tenda-7dc11ff5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3769%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69ade5242904315ca3f04de9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3768-stack-based-buffer-overflow-in-tenda-9b634f69</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3768%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69ae16ab2904315ca310d435</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3767-sql-injection-in-itsourcecode-saniti-52abf55a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3767%3A%20SQL%20Injection%20in%20itsourcecode%20sanitize%20or%20validate%20this%20input&amp;severity=medium&amp;id=69ae16ab2904315ca310d42e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3766-cross-site-scripting-in-sourcecodest-10437615</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3766%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Web-based%20Pharmacy%20Product%20Management%20System&amp;severity=medium&amp;id=69adda962904315ca3ea0ea7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3765-sql-injection-in-itsourcecode-univer-6d84a21e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3765%3A%20SQL%20Injection%20in%20itsourcecode%20University%20Management%20System&amp;severity=medium&amp;id=69adda962904315ca3ea0ea0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3764-improper-authorization-in-sourcecode-be8ab318</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3764%3A%20Improper%20Authorization%20in%20SourceCodester%20Client%20Database%20Management%20System&amp;severity=medium&amp;id=69ae16ab2904315ca310d43c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3763-cross-site-scripting-in-code-project-57718c26</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3763%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Flight%20Ticket%20Booking%20System&amp;severity=medium&amp;id=69adcc862904315ca3df3a73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3762-improper-authorization-in-sourcecode-8f58b49a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3762%3A%20Improper%20Authorization%20in%20SourceCodester%20Client%20Database%20Management%20System&amp;severity=medium&amp;id=69adc57d2904315ca3dae050</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3761-improper-authorization-in-sourcecode-685647db</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3761%3A%20Improper%20Authorization%20in%20SourceCodester%20Client%20Database%20Management%20System&amp;severity=medium&amp;id=69adc57d2904315ca3dae049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3760-sql-injection-in-itsourcecode-univer-96d4785b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3760%3A%20SQL%20Injection%20in%20itsourcecode%20University%20Management%20System&amp;severity=medium&amp;id=69adc57d2904315ca3dae042</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3759-sql-injection-in-projectworlds-onlin-d5105e31</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3759%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Art%20Gallery%20Shop&amp;severity=medium&amp;id=69adbe762904315ca3d63bfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3758-sql-injection-in-projectworlds-onlin-0a0c709d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3758%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Art%20Gallery%20Shop&amp;severity=medium&amp;id=69adbe762904315ca3d63bf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3757-sql-injection-in-projectworlds-onlin-02ba6ae8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3757%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Art%20Gallery%20Shop&amp;severity=medium&amp;id=69adbe762904315ca3d63be9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3756-sql-injection-in-sourcecodester-sale-64acb6bc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3756%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69adb3e72904315ca3cfbc24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3755-sql-injection-in-sourcecodester-sale-f37a46a1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3755%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69adb3e72904315ca3cfbc1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3754-sql-injection-in-sourcecodester-sale-ac14f663</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3754%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69adb3e72904315ca3cfbc16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3753-sql-injection-in-sourcecodester-sale-71e9fdb7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3753%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69adb0662904315ca3cdf014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3752-sql-injection-in-sourcecodester-empl-d7f036bd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3752%3A%20SQL%20Injection%20in%20SourceCodester%20Employee%20Task%20Management%20System&amp;severity=medium&amp;id=69adb0662904315ca3cdf00d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3751-sql-injection-in-sourcecodester-empl-1af4f1f5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3751%3A%20SQL%20Injection%20in%20SourceCodester%20Employee%20Task%20Management%20System&amp;severity=medium&amp;id=69ada5d72904315ca3c7b46b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3750-server-side-request-forgery-in-conti-21a73a4e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3750%3A%20Server-Side%20Request%20Forgery%20in%20ContiNew%20Admin&amp;severity=medium&amp;id=69ada5d72904315ca3c7b465</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3749-unrestricted-upload-in-bytedesk-bcf82151</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3749%3A%20Unrestricted%20Upload%20in%20Bytedesk&amp;severity=medium&amp;id=69ada2562904315ca3c51412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3748-unrestricted-upload-in-bytedesk-51fa3d63</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3748%3A%20Unrestricted%20Upload%20in%20Bytedesk&amp;severity=medium&amp;id=69ada2562904315ca3c51407</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3747-sql-injection-in-itsourcecode-univer-fc6e6a87</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3747%3A%20SQL%20Injection%20in%20itsourcecode%20University%20Management%20System&amp;severity=medium&amp;id=69ada2562904315ca3c51400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3746-sql-injection-in-sourcecodester-simp-eee390ea</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3746%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20Responsive%20Tourism%20Website&amp;severity=medium&amp;id=69ad9b4b2904315ca3c0f6ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3745-sql-injection-in-code-projects-stude-dcc91ae0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3745%3A%20SQL%20Injection%20in%20code-projects%20Student%20Web%20Portal&amp;severity=medium&amp;id=69ad9b4b2904315ca3c0f6c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3744-sql-injection-in-code-projects-stude-a7dcbf08</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3744%3A%20SQL%20Injection%20in%20code-projects%20Student%20Web%20Portal&amp;severity=medium&amp;id=69ad90c22904315ca3ba6b1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3743-cross-site-scripting-in-yifang-cms-e1484fe7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3743%3A%20Cross%20Site%20Scripting%20in%20YiFang%20CMS&amp;severity=medium&amp;id=69ad90c22904315ca3ba6b17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3742-cross-site-scripting-in-yifang-cms-a944e116</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3742%3A%20Cross%20Site%20Scripting%20in%20YiFang%20CMS&amp;severity=medium&amp;id=69ad90c22904315ca3ba6b11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3741-cross-site-scripting-in-yifang-cms-b83d28be</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3741%3A%20Cross%20Site%20Scripting%20in%20YiFang%20CMS&amp;severity=medium&amp;id=69ad8d3b2904315ca3b727ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3740-sql-injection-in-itsourcecode-univer-6e5ebad9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3740%3A%20SQL%20Injection%20in%20itsourcecode%20University%20Management%20System&amp;severity=medium&amp;id=69ad8d3b2904315ca3b727a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3739-improper-authentication-in-suitenume-86af1c13</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3739%3A%20Improper%20Authentication%20in%20suitenumerique%20messages&amp;severity=medium&amp;id=69ad86362904315ca3b03eca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3738-improper-authorization-in-sourcecode-56a01e02</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3738%3A%20Improper%20Authorization%20in%20SourceCodester%20Pet%20Grooming%20Management%20Software&amp;severity=medium&amp;id=69ad7f2d2904315ca3ab3a16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3737-improper-authorization-in-sourcecode-73c2f948</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3737%3A%20Improper%20Authorization%20in%20SourceCodester%20Pet%20Grooming%20Management%20Software&amp;severity=medium&amp;id=69ad7f2d2904315ca3ab3a0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3736-sql-injection-in-code-projects-simpl-6228c35e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3736%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Flight%20Ticket%20Booking%20System&amp;severity=medium&amp;id=69ad78262904315ca3a7ddf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3735-sql-injection-in-code-projects-simpl-8c229f7b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3735%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Flight%20Ticket%20Booking%20System&amp;severity=medium&amp;id=69ad78262904315ca3a7ddea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3734-improper-authorization-in-sourcecode-cc058dff</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3734%3A%20Improper%20Authorization%20in%20SourceCodester%20Client%20Database%20Management%20System&amp;severity=medium&amp;id=69ad78262904315ca3a7dde3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/recent-cisco-catalyst-sd-wan-vulnerability-now-wid-d8c5b10c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Recent%20Cisco%20Catalyst%20SD-WAN%20Vulnerability%20Now%20Widely%20Exploited&amp;severity=medium&amp;id=69ad69e02904315ca39f0717</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3733-server-side-request-forgery-in-xuxue-10d35591</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3733%3A%20Server-Side%20Request%20Forgery%20in%20xuxueli%20xxl-job&amp;severity=medium&amp;id=69ad58832904315ca3977d20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3732-stack-based-buffer-overflow-in-tenda-41443da2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3732%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69ad58832904315ca3977d19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3731-out-of-bounds-read-in-libssh-21070aa6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3731%3A%20Out-of-Bounds%20Read%20in%20libssh&amp;severity=medium&amp;id=69ae16ab2904315ca310d453</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3730-sql-injection-in-itsourcecode-free-h-8dceb15e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3730%3A%20SQL%20Injection%20in%20itsourcecode%20Free%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=69ae16ab2904315ca310d44a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3729-stack-based-buffer-overflow-in-tenda-c32f2d10</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3729%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69ae16ab2904315ca310d443</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3728-stack-based-buffer-overflow-in-tenda-9cd01aff</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3728%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69ad4df52904315ca3903934</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3727-stack-based-buffer-overflow-in-tenda-b75939cc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3727%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69ad4df52904315ca390392d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3726-stack-based-buffer-overflow-in-tenda-6f0be4bc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3726%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69ad3fe72904315ca3895d7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3725-improper-neutralization-of-special-e-4c8ec9b1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3725%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%201024-lab%20SmartAdmin&amp;severity=medium&amp;id=69ad3fe72904315ca3895d76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3724-improper-authorization-in-sourcecode-be7325e5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3724%3A%20Improper%20Authorization%20in%20SourceCodester%20Patients%20Waiting%20Area%20Queue%20Management%20System&amp;severity=medium&amp;id=69ad38dd2904315ca3862bff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3723-sql-injection-in-code-projects-simpl-ef519ae6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3723%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Flight%20Ticket%20Booking%20System&amp;severity=medium&amp;id=69ad38dd2904315ca3862bf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3721-cross-site-scripting-in-1024-lab-sma-8d474ce7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3721%3A%20Cross%20Site%20Scripting%20in%201024-lab%20SmartAdmin&amp;severity=medium&amp;id=69ad27472904315ca37a8baa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3720-cross-site-scripting-in-1024-lab-sma-42f1e756</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3720%3A%20Cross%20Site%20Scripting%20in%201024-lab%20SmartAdmin&amp;severity=medium&amp;id=69ad23c92904315ca3793831</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3719-path-traversal-in-tsinghua-unigroup--0b08a3de</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3719%3A%20Path%20Traversal%20in%20Tsinghua%20Unigroup%20Electronic%20Archives%20System&amp;severity=medium&amp;id=69ad23c92904315ca379382b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3716-cross-site-scripting-in-wavlink-wl-w-15d23a27</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3716%3A%20Cross%20Site%20Scripting%20in%20Wavlink%20WL-WN579X3-C&amp;severity=medium&amp;id=69ad23c92904315ca3793824</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3715-stack-based-buffer-overflow-in-wavli-504a0f36</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3715%3A%20Stack-based%20Buffer%20Overflow%20in%20Wavlink%20WL-WN579X3-C&amp;severity=high&amp;id=69ad1cbb2904315ca37532d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3714-improper-neutralization-of-special-e-239b3f2e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3714%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20OpenCart&amp;severity=medium&amp;id=69ad1cbb2904315ca37532ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3713-heap-based-buffer-overflow-in-pnggro-c90393c3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3713%3A%20Heap-based%20Buffer%20Overflow%20in%20pnggroup%20libpng&amp;severity=medium&amp;id=69ad12452904315ca36fe687</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3711-sql-injection-in-code-projects-simpl-69490cf7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3711%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Flight%20Ticket%20Booking%20System&amp;severity=medium&amp;id=69ad12452904315ca36fe67f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3710-sql-injection-in-code-projects-simpl-0646e9b8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3710%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Flight%20Ticket%20Booking%20System&amp;severity=medium&amp;id=69ad0ead2904315ca36e8d90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3709-sql-injection-in-code-projects-simpl-f8a1e203</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3709%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Flight%20Ticket%20Booking%20System&amp;severity=medium&amp;id=69ad0ead2904315ca36e8d88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3708-sql-injection-in-code-projects-simpl-120c2473</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3708%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Flight%20Ticket%20Booking%20System&amp;severity=medium&amp;id=69ad04212904315ca3691e29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3707-integer-overflow-in-mrnanko-webp4j-0a183bd2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3707%3A%20Integer%20Overflow%20in%20MrNanko%20webp4j&amp;severity=medium&amp;id=69ad04212904315ca3691e1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3706-improper-verification-of-cryptograph-71eb7d25</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3706%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20mkj%20Dropbear&amp;severity=medium&amp;id=69ad04212904315ca3691e15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3705-sql-injection-in-code-projects-simpl-e3e4254b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3705%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Flight%20Ticket%20Booking%20System&amp;severity=medium&amp;id=69ad009b2904315ca367a3ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3703-out-of-bounds-write-in-wavlink-nu516-a93ca55c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3703%3A%20Out-of-bounds%20Write%20in%20Wavlink%20NU516U1&amp;severity=critical&amp;id=69ad009b2904315ca367a3f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3702-cross-site-scripting-in-sourcecodest-360d788f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3702%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Loan%20Management%20System&amp;severity=medium&amp;id=69ad009b2904315ca367a3ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3701-buffer-overflow-in-h3c-magic-b1-5792aaae</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3701%3A%20Buffer%20Overflow%20in%20H3C%20Magic%20B1&amp;severity=high&amp;id=69ad009b2904315ca367a3e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3704-command-injection-in-wavlink-nu516u1-3d720bfc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3704%3A%20Command%20Injection%20in%20Wavlink%20NU516U1&amp;severity=medium&amp;id=69acf60f2904315ca36302db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3700-buffer-overflow-in-utt-hiper-810g-be0d9392</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3700%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20810G&amp;severity=high&amp;id=69aceb852904315ca3579219</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3699-buffer-overflow-in-utt-hiper-810g-3f47767c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3699%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20810G&amp;severity=high&amp;id=69aceb852904315ca3579212</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3698-buffer-overflow-in-utt-hiper-810g-dd29f05a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3698%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20810G&amp;severity=high&amp;id=69acdd752904315ca34c9894</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3697-stack-based-buffer-overflow-in-plane-de3b04dd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3697%3A%20Stack-based%20Buffer%20Overflow%20in%20Planet%20ICG-2510&amp;severity=medium&amp;id=69acdd752904315ca34c988e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30910-cwe-190-integer-overflow-or-wraparo-164ed431</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30910%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20IAMB%20Crypt%3A%3ASodium%3A%3AXS&amp;severity=high&amp;id=69acd2e62904315ca32e173c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30909-cwe-190-integer-overflow-or-wraparo-d5f24069</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30909%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20TIMLEGGE%20Crypt%3A%3ANaCl%3A%3ASodium&amp;severity=critical&amp;id=69acc85d2904315ca3180bc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3696-os-command-injection-in-totolink-n30-86f6a631</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3696%3A%20OS%20Command%20Injection%20in%20Totolink%20N300RH&amp;severity=medium&amp;id=69acc85d2904315ca3180bd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3695-path-traversal-in-sourcecodester-mod-24d0e278</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3695%3A%20Path%20Traversal%20in%20SourceCodester%20Modern%20Image%20Gallery%20App&amp;severity=medium&amp;id=69acc85d2904315ca3180bd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3693-improper-control-of-resource-identif-100ce1bd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3693%3A%20Improper%20Control%20of%20Resource%20Identifiers%20in%20Shy2593666979%20AgentChat&amp;severity=medium&amp;id=69acc85d2904315ca3180bc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-08-0080f7fb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-08&amp;severity=medium&amp;id=69ae0f182904315ca3048175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-08-d9635b91</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-08&amp;severity=medium&amp;id=69ad89812904315ca3b2115c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-08-224dde41</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-08&amp;severity=low&amp;id=69acf95d2904315ca364a157</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3683-server-side-request-forgery-in-bufan-eb980839</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3683%3A%20Server-Side%20Request%20Forgery%20in%20bufanyun%20HotGo&amp;severity=medium&amp;id=69acb8bfc48b3f10ffdd173d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3682-argument-injection-in-welovemedia-ff-2290a593</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3682%3A%20Argument%20Injection%20in%20welovemedia%20FFmate&amp;severity=medium&amp;id=69acb8bfc48b3f10ffdd1737</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3681-server-side-request-forgery-in-welov-532d42e9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3681%3A%20Server-Side%20Request%20Forgery%20in%20welovemedia%20FFmate&amp;severity=medium&amp;id=69acb1b4c48b3f10ffd9cf2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3680-command-injection-in-ryuzakishinji-b-5a8fcafe</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3680%3A%20Command%20Injection%20in%20RyuzakiShinji%20biome-mcp-server&amp;severity=medium&amp;id=69acb1b4c48b3f10ffd9cf25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3679-stack-based-buffer-overflow-in-tenda-c7db2235</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3679%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH451&amp;severity=high&amp;id=69acaaaec48b3f10ffd665e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3678-stack-based-buffer-overflow-in-tenda-bf7fd6b8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3678%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH451&amp;severity=high&amp;id=69acaaaec48b3f10ffd665e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3677-stack-based-buffer-overflow-in-tenda-8899ba38</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3677%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH451&amp;severity=high&amp;id=69aca3a8c48b3f10ffd2f1d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3675-improper-authorization-in-freedom-fa-54da6cfe</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3675%3A%20Improper%20Authorization%20in%20Freedom%20Factory%20dGEN1&amp;severity=medium&amp;id=69aca3a8c48b3f10ffd2f1ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3674-improper-authorization-in-freedom-fa-1ab10793</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3674%3A%20Improper%20Authorization%20in%20Freedom%20Factory%20dGEN1&amp;severity=medium&amp;id=69ac9ca0c48b3f10ffcff62c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3672-sql-injection-in-jeecgboot-020abedc</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3672%3A%20SQL%20Injection%20in%20JeecgBoot&amp;severity=medium&amp;id=69ac9ca0c48b3f10ffcff626</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3671-improper-authorization-in-freedom-fa-0abbfa01</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3671%3A%20Improper%20Authorization%20in%20Freedom%20Factory%20dGEN1&amp;severity=medium&amp;id=69ac9ca0c48b3f10ffcff620</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3670-improper-authorization-in-freedom-fa-eb9496f8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3670%3A%20Improper%20Authorization%20in%20Freedom%20Factory%20dGEN1&amp;severity=medium&amp;id=69ac726ec48b3f10ffbca736</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3669-improper-authorization-in-freedom-fa-a267bda9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3669%3A%20Improper%20Authorization%20in%20Freedom%20Factory%20dGEN1&amp;severity=medium&amp;id=69ac726ec48b3f10ffbca730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2671-cleartext-transmission-of-sensitive--c642213e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2671%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Mendi%20Neurofeedback%20Headset&amp;severity=low&amp;id=69ac6b6ac48b3f10ffb9ec7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30861-cwe-78-improper-neutralization-of-s-94bf2228</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30861%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Tencent%20WeKnora&amp;severity=critical&amp;id=69ac564fc48b3f10ffb12c3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30860-cwe-89-improper-neutralization-of-s-90c4d0a6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30860%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Tencent%20WeKnora&amp;severity=critical&amp;id=69ac564fc48b3f10ffb12c38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30859-cwe-284-improper-access-control-in--fdab631b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30859%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Tencent%20WeKnora&amp;severity=medium&amp;id=69ac564fc48b3f10ffb12c35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30858-cwe-918-server-side-request-forgery-e3e1ce15</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30858%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Tencent%20WeKnora&amp;severity=medium&amp;id=69ac564fc48b3f10ffb12c32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30857-cwe-639-authorization-bypass-throug-61a41dfc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30857%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Tencent%20WeKnora&amp;severity=medium&amp;id=69ac564fc48b3f10ffb12c2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30856-cwe-706-use-of-incorrectly-resolved-a9bc30d7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30856%3A%20CWE-706%3A%20Use%20of%20Incorrectly-Resolved%20Name%20or%20Reference%20in%20Tencent%20WeKnora&amp;severity=medium&amp;id=69ac564fc48b3f10ffb12c2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30855-cwe-284-improper-access-control-in--d6ea3179</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30855%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Tencent%20WeKnora&amp;severity=high&amp;id=69ac564fc48b3f10ffb12c29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30851-cwe-287-improper-authentication-in--2fdd0c26</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30851%3A%20CWE-287%3A%20Improper%20Authentication%20in%20caddyserver%20caddy&amp;severity=high&amp;id=69ac564fc48b3f10ffb12c1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30852-cwe-200-exposure-of-sensitive-infor-f99038f8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30852%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20caddyserver%20caddy&amp;severity=medium&amp;id=69ac564fc48b3f10ffb12c24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30854-cwe-863-incorrect-authorization-in--2544594e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30854%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69ac52cfc48b3f10ffafee96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30850-cwe-862-missing-authorization-in-pa-5dc8b12f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30850%3A%20CWE-862%3A%20Missing%20Authorization%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69ac52cfc48b3f10ffafee93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30848-cwe-22-improper-limitation-of-a-pat-2ee1ac73</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30848%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69ac52cfc48b3f10ffafee90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30863-cwe-287-improper-authentication-in--0b463399</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30863%3A%20CWE-287%3A%20Improper%20Authentication%20in%20parse-community%20parse-server&amp;severity=critical&amp;id=69ac52cfc48b3f10ffafee99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29196-cwe-863-incorrect-authorization-in--29d97e27</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29196%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20gravitl%20netmaker&amp;severity=high&amp;id=69ac52cfc48b3f10ffafee8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29195-cwe-863-incorrect-authorization-in--310d1238</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29195%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20gravitl%20netmaker&amp;severity=medium&amp;id=69ac52cfc48b3f10ffafee88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29194-cwe-863-incorrect-authorization-in--74a77e13</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29194%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20gravitl%20netmaker&amp;severity=high&amp;id=69ac4f4bc48b3f10ffae7abf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29076-cwe-674-uncontrolled-recursion-in-y-995a29f7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29076%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20yhirose%20cpp-httplib&amp;severity=medium&amp;id=69ac4f4bc48b3f10ffae7aba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28678-cwe-311-missing-encryption-of-sensi-3ca6a072</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28678%3A%20CWE-311%3A%20Missing%20Encryption%20of%20Sensitive%20Data%20in%20toxicbishop%20DSA-with-tsx&amp;severity=high&amp;id=69ac4f4bc48b3f10ffae7ab6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3668-improper-access-controls-in-freedom--df3a8b4f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3668%3A%20Improper%20Access%20Controls%20in%20Freedom%20Factory%20dGEN1&amp;severity=low&amp;id=69ac4f4bc48b3f10ffae7ac3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30838-cwe-79-improper-neutralization-of-i-a2d9b480</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30838%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thephpleague%20commonmark&amp;severity=medium&amp;id=69ac4f4bc48b3f10ffae7ace</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30832-cwe-918-server-side-request-forgery-01aea4d4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30832%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20charmbracelet%20soft-serve&amp;severity=critical&amp;id=69ac4f4bc48b3f10ffae7ac9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29787-cwe-200-exposure-of-sensitive-infor-ef5ed21c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29787%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20doobidoo%20mcp-memory-service&amp;severity=medium&amp;id=69ac4840c48b3f10ffa9ddde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29786-cwe-22-improper-limitation-of-a-pat-81e9e2a0</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29786%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20isaacs%20node-tar&amp;severity=high&amp;id=69ac4840c48b3f10ffa9ddda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3667-improper-authorization-in-freedom-fa-7c9f8837</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3667%3A%20Improper%20Authorization%20in%20Freedom%20Factory%20dGEN1&amp;severity=medium&amp;id=69ac4840c48b3f10ffa9ddea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3665-null-pointer-dereference-in-xlnt-com-e02eb063</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3665%3A%20NULL%20Pointer%20Dereference%20in%20xlnt-community%20xlnt&amp;severity=medium&amp;id=69ac4840c48b3f10ffa9dde2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29784-cwe-352-cross-site-request-forgery--d730ba6f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29784%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20TryGhost%20Ghost&amp;severity=high&amp;id=69ac4840c48b3f10ffa9ddd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29781-cwe-476-null-pointer-dereference-in-1c68375a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29781%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20BishopFox%20sliver&amp;severity=low&amp;id=69ac44bec48b3f10ffa88859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29780-cwe-22-improper-limitation-of-a-pat-329b8ba7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29780%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20GOVCERT-LU%20eml_parser&amp;severity=medium&amp;id=69ac44bec48b3f10ffa88854</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29779-cwe-200-exposure-of-sensitive-infor-4843f8bd</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29779%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20lyc8503%20UptimeFlare&amp;severity=high&amp;id=69ac44bec48b3f10ffa8884f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29190-cwe-22-improper-limitation-of-a-pat-2d7fa3a5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29190%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Aiven-Open%20karapace&amp;severity=medium&amp;id=69ac44bec48b3f10ffa88848</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29771-cwe-404-improper-resource-shutdown--049544f8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29771%3A%20CWE-404%3A%20Improper%20Resource%20Shutdown%20or%20Release%20in%20gravitl%20netmaker&amp;severity=high&amp;id=69ac44bec48b3f10ffa8884c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3664-out-of-bounds-read-in-xlnt-community-ddf35f6f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3664%3A%20Out-of-Bounds%20Read%20in%20xlnt-community%20xlnt&amp;severity=medium&amp;id=69ac3a2fc48b3f10ffa2ea03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3663-out-of-bounds-read-in-xlnt-community-f71a6234</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3663%3A%20Out-of-Bounds%20Read%20in%20xlnt-community%20xlnt&amp;severity=medium&amp;id=69ac3a2fc48b3f10ffa2e9fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3662-command-injection-in-wavlink-wl-nu51-4098a232</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3662%3A%20Command%20Injection%20in%20Wavlink%20WL-NU516U1&amp;severity=medium&amp;id=69ac2c1ec48b3f10ff9be98e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3661-command-injection-in-wavlink-wl-nu51-5db35d81</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3661%3A%20Command%20Injection%20in%20Wavlink%20WL-NU516U1&amp;severity=medium&amp;id=69ac2c1ec48b3f10ff9be988</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-100-github-repositories-distributing-boryptgr-3297ebaf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%20100%20GitHub%20Repositories%20Distributing%20BoryptGrab%20Stealer&amp;severity=medium&amp;id=69ac1dd9c48b3f10ff94aae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pentagons-chief-tech-officer-says-he-clashed-with--14b6744b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pentagon%E2%80%99s%20Chief%20Tech%20Officer%20Says%20He%20Clashed%20With%20AI%20Company%20Anthropic%20Over%20Autonomous%20Warfare&amp;severity=medium&amp;id=69ac1353c48b3f10ff8eac20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-a0backdoor-linked-to-teams-impersonation-and-q-a3cec5d5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20A0Backdoor%20Linked%20to%20Teams%20Impersonation%20and%20Quick%20Assist%20Social%20Engineering&amp;severity=medium&amp;id=69aea6472904315ca3faf832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unmasking-an-attack-chain-of-muddywater-37bdf022</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unmasking%20an%20Attack%20Chain%20of%20MuddyWater&amp;severity=medium&amp;id=69aea6472904315ca3faf837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24308-cwe-532-insertion-of-sensitive-info-090ca1fd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24308%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Apache%20Software%20Foundation%20Apache%20ZooKeeper&amp;severity=medium&amp;id=69abe957c48b3f10ff7477fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24281-cwe-350-reliance-on-reverse-dns-res-ea5e3a9a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24281%3A%20CWE-350%20Reliance%20on%20Reverse%20DNS%20Resolution%20for%20a%20Security-Critical%20Action%20in%20Apache%20Software%20Foundation%20Apache%20ZooKeeper&amp;severity=medium&amp;id=69abe957c48b3f10ff7477f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2219-vulnerability-in-debian-dpkg-8c8e482a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2219%3A%20Vulnerability%20in%20Debian%20dpkg&amp;severity=high&amp;id=69abdec8c48b3f10ff6e4439</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1087-cwe-352-cross-site-request-forgery-c-e80bb5b0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1087%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20openplatform%20The%20Guardian%20News%20Feed&amp;severity=medium&amp;id=69abd7bec48b3f10ff6853ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1086-cwe-352-cross-site-request-forgery-c-73cb4e8c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1086%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpsolutions%20Font%20Pairing%20Preview%20For%20Landing%20Pages&amp;severity=medium&amp;id=69abd7bec48b3f10ff6853a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1085-cwe-352-cross-site-request-forgery-c-9eb582a4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1085%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20optimizza%20True%20Ranker&amp;severity=medium&amp;id=69abd7bec48b3f10ff6853a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1825-cwe-79-improper-neutralization-of-in-2d3f4daa</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1825%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20minor%20Show%20YouTube%20video&amp;severity=medium&amp;id=69abd7c1c48b3f10ff6855f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1824-cwe-79-improper-neutralization-of-in-99ce8457</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1824%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20leopoldinfomaniak%20Infomaniak%20Connect%20for%20OpenID&amp;severity=medium&amp;id=69abd7c1c48b3f10ff6855ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1823-cwe-79-improper-neutralization-of-in-a33c42c7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1823%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20consensusintegrations%20Consensus%20Embed&amp;severity=medium&amp;id=69abd7c1c48b3f10ff6855e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1074-cwe-79-improper-neutralization-of-in-ed135d09</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1074%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ryscript%20WP%20App%20Bar&amp;severity=high&amp;id=69abd7bec48b3f10ff68539f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1073-cwe-352-cross-site-request-forgery-c-6dff961d</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1073%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20themepul%20Purchase%20Button%20For%20Affiliate%20Link&amp;severity=medium&amp;id=69abd7bec48b3f10ff68539a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1820-cwe-79-improper-neutralization-of-in-c6432016</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1820%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brainvireinfo%20Media%20Library%20Alt%20Text%20Editor&amp;severity=medium&amp;id=69abd7c1c48b3f10ff6855e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1574-cwe-79-improper-neutralization-of-in-b377fdbc</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1574%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dgamoni%20MyQtip%20%E2%80%93%20easy%20qTip2&amp;severity=medium&amp;id=69abd7bec48b3f10ff6853b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1805-cwe-79-improper-neutralization-of-in-290380ec</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1805%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20damedialimited%20DA%20Media%20GigList&amp;severity=medium&amp;id=69abd7bec48b3f10ff6853bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1569-cwe-79-improper-neutralization-of-in-4cac7f8c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1569%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nabeghe%20Wueen&amp;severity=medium&amp;id=69abd7bec48b3f10ff6853b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2433-cwe-79-improper-neutralization-of-in-09b1d445</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2433%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rebelcode%20RSS%20Aggregator%20%E2%80%93%20RSS%20Import%2C%20News%20Feeds%2C%20Feed%20to%20Post%2C%20and%20Autoblogging&amp;severity=medium&amp;id=69abd7c1c48b3f10ff6855fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1071-cwe-79-improper-neutralization-of-in-fd15de10</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1071%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cartaonline%20Carta%20Online&amp;severity=medium&amp;id=69abd7bec48b3f10ff685395</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2420-cwe-79-improper-neutralization-of-in-850f4448</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2420%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lotekmedia%20LotekMedia%20Popup%20Form&amp;severity=medium&amp;id=69abd7c1c48b3f10ff6855f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14675-cwe-22-improper-limitation-of-a-pat-b9e91655</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14675%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20metabox%20Meta%20Box&amp;severity=high&amp;id=69abd7bec48b3f10ff68538e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27796-cwe-200-exposure-of-sensitive-infor-d2299f63</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27796%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20homarr-labs%20homarr&amp;severity=medium&amp;id=69abbf1fc48b3f10ff5c73a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27797-cwe-918-server-side-request-forgery-33b30167</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27797%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20homarr-labs%20homarr&amp;severity=medium&amp;id=69abbf1fc48b3f10ff5c73ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30830-cwe-79-improper-neutralization-of-i-f74109a3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30830%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kepano%20defuddle&amp;severity=low&amp;id=69abbf1fc48b3f10ff5c73b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8899-cwe-269-improper-privilege-managemen-76efe6d4</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8899%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20videowhisper%20Paid%20Videochat%20Turnkey%20Site%20%E2%80%93%20HTML5%20PPV%20Live%20Webcams&amp;severity=high&amp;id=69abbf1fc48b3f10ff5c73a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30829-cwe-200-exposure-of-sensitive-infor-2b9f639a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30829%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20bluewave-labs%20Checkmate&amp;severity=medium&amp;id=69abbf1fc48b3f10ff5c73b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30842-cwe-862-missing-authorization-in-el-a8b951aa</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30842%3A%20CWE-862%3A%20Missing%20Authorization%20in%20ellite%20Wallos&amp;severity=medium&amp;id=69abbb9ec48b3f10ff5a0875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30841-cwe-79-improper-neutralization-of-i-2b6679ff</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30841%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ellite%20Wallos&amp;severity=medium&amp;id=69abbb9ec48b3f10ff5a0870</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30840-cwe-918-server-side-request-forgery-b545860c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30840%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ellite%20Wallos&amp;severity=high&amp;id=69abbb9ec48b3f10ff5a086b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30839-cwe-918-server-side-request-forgery-3e3c4cf6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30839%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ellite%20Wallos&amp;severity=medium&amp;id=69abbb9ec48b3f10ff5a0866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30828-cwe-29-path-traversal-filename-in-e-986f32fb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30828%3A%20CWE-29%3A%20Path%20Traversal%3A%20&apos;..filename&apos;%20in%20ellite%20Wallos&amp;severity=high&amp;id=69abbb9ec48b3f10ff5a0861</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30824-cwe-306-missing-authentication-for--a4a97f75</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30824%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69abb819c48b3f10ff5861e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30823-cwe-639-authorization-bypass-throug-0f7787b4</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30823%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69abb819c48b3f10ff5861df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30822-cwe-915-improperly-controlled-modif-4eb54742</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30822%3A%20CWE-915%3A%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69abb493c48b3f10ff564c16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30821-cwe-434-unrestricted-upload-of-file-598fed66</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30821%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69abb493c48b3f10ff564c12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30820-cwe-863-incorrect-authorization-in--33ff046d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30820%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69abb493c48b3f10ff564c0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30247-cwe-918-server-side-request-forgery-7ae2f848</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30247%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Tencent%20WeKnora&amp;severity=medium&amp;id=69aba2fec48b3f10ff3494bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3352-cwe-94-improper-control-of-generatio-066362fa</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3352%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20shahadul878%20Easy%20PHP%20Settings&amp;severity=high&amp;id=69ac8b62c48b3f10ffc6f6be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2431-cwe-79-improper-neutralization-of-in-d9bab0c8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2431%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20creativemindssolutions%20CM%20Custom%20Reports%20%E2%80%93%20Flexible%20reporting%20to%20track%20what%20matters%20most&amp;severity=medium&amp;id=69ac8b60c48b3f10ffc6f681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2722-cwe-79-improper-neutralization-of-in-4431a517</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2722%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20urkekg%20Stock%20Ticker&amp;severity=medium&amp;id=69ac8b60c48b3f10ffc6f69e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2721-cwe-79-improper-neutralization-of-in-e9cc98a2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2721%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pierrelannoy%20MailArchiver&amp;severity=medium&amp;id=69ac8b60c48b3f10ffc6f694</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1650-cwe-862-missing-authorization-in-mdj-399bf7dc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1650%3A%20CWE-862%20Missing%20Authorization%20in%20mdjm%20MDJM%20Event%20Management&amp;severity=medium&amp;id=69ac8b60c48b3f10ffc6f667</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2429-cwe-89-improper-neutralization-of-sp-70e4bad1</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2429%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20jackdewey%20Community%20Events&amp;severity=medium&amp;id=69ac8b60c48b3f10ffc6f67b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2020-cwe-502-deserialization-of-untrusted-67fe1cb9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2020%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20skatox%20JS%20Archive%20List&amp;severity=high&amp;id=69ac8b60c48b3f10ffc6f673</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14353-cwe-89-improper-neutralization-of-s-6ded6a41</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14353%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20presstigers%20ZIP%20Code%20Based%20Content%20Protection&amp;severity=high&amp;id=69ac8b60c48b3f10ffc6f661</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2494-cwe-352-cross-site-request-forgery-c-58a3a384</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2494%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20metagauss%20ProfileGrid%20%E2%80%93%20User%20Profiles%2C%20Groups%20and%20Communities&amp;severity=medium&amp;id=69ac8b60c48b3f10ffc6f68e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2488-cwe-862-missing-authorization-in-met-30ced25f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2488%3A%20CWE-862%20Missing%20Authorization%20in%20metagauss%20ProfileGrid%20%E2%80%93%20User%20Profiles%2C%20Groups%20and%20Communities&amp;severity=medium&amp;id=69ac8b60c48b3f10ffc6f686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1902-cwe-79-improper-neutralization-of-in-ac9ae56e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1902%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20innovaatik%20Hammas%20Calendar&amp;severity=medium&amp;id=69ac8b60c48b3f10ffc6f66d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-investigating-suspicious-cyber-activity-on-sys-78683f1a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20Investigating%20%E2%80%98Suspicious%E2%80%99%20Cyber%20Activity%20on%20System%20Holding%20Sensitive%20Surveillance%20Information&amp;severity=medium&amp;id=69ab7c1fc48b3f10ff111f4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25073-cwe-79-improper-neutralization-of-i-e9f11af1</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25073%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Anhui%20Seeker%20Electronic%20Technology%20Co.%2C%20LTD.%20XikeStor%20SKS8310-8X&amp;severity=medium&amp;id=69ab78cec48b3f10ff0845b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25072-cwe-330-use-of-insufficiently-rando-9bc8c17a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25072%3A%20CWE-330%20Use%20of%20Insufficiently%20Random%20Values%20in%20Anhui%20Seeker%20Electronic%20Technology%20Co.%2C%20LTD.%20XikeStor%20SKS8310-8X&amp;severity=high&amp;id=69ab78cec48b3f10ff0845b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25071-cwe-306-missing-authentication-for--d084643f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25071%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Anhui%20Seeker%20Electronic%20Technology%20Co.%2C%20LTD.%20XikeStor%20SKS8310-8X&amp;severity=high&amp;id=69ab78cec48b3f10ff0845b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25070-cwe-78-improper-neutralization-of-s-f0039eef</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25070%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Anhui%20Seeker%20Electronic%20Technology%20Co.%2C%20LTD.%20XikeStor%20SKS8310-8X&amp;severity=critical&amp;id=69ab78cec48b3f10ff0845ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-07-fcc8041b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-07&amp;severity=medium&amp;id=69ae222d2904315ca3174075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-07-fc5fac0a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-07&amp;severity=medium&amp;id=69acbf8cc48b3f10ffe29281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-07-ceef406f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-07&amp;severity=low&amp;id=69abdb09c48b3f10ff6b424e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1981-cwe-862-missing-authorization-in-win-2496c681</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1981%3A%20CWE-862%20Missing%20Authorization%20in%20winstonai%20HUMN-1%20AI%20Website%20Scanner%20%26%20Human%20Certification%20by%20Winston%20AI&amp;severity=medium&amp;id=69ab63bbc48b3f10ffeac18d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1644-cwe-352-cross-site-request-forgery-c-36f8a669</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1644%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20glowlogix%20WP%20Frontend%20Profile&amp;severity=medium&amp;id=69ab63bbc48b3f10ffeac187</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2371-cwe-862-missing-authorization-in-wps-7a4b5cc1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2371%3A%20CWE-862%20Missing%20Authorization%20in%20wpsoul%20Greenshift%20%E2%80%93%20animation%20and%20page%20builder%20blocks&amp;severity=medium&amp;id=69ab63bbc48b3f10ffeac195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27142-cwe-79-improper-neutralization-of-i-c8bbfb70</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27142%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Go%20standard%20library%20html%2Ftemplate&amp;severity=medium&amp;id=69ab4b1fc48b3f10ffddeb19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27139-cwe-363-race-condition-enabling-lin-098c68bb</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27139%3A%20CWE-363%3A%20Race%20Condition%20Enabling%20Link%20Following%20in%20Go%20standard%20library%20os&amp;severity=low&amp;id=69ab4b1fc48b3f10ffddeb13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25679-cwe-1286-improper-validation-of-syn-ebb73155</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25679%3A%20CWE-1286%3A%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20Go%20standard%20library%20net%2Furl&amp;severity=high&amp;id=69ab4b1fc48b3f10ffddeb01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27138-cwe-1285-improper-validation-of-spe-62986369</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27138%3A%20CWE-1285%3A%20Improper%20Validation%20of%20Specified%20Index%2C%20Position%2C%20or%20Offset%20in%20Input%20in%20Go%20standard%20library%20crypto%2Fx509&amp;severity=medium&amp;id=69ab4b1fc48b3f10ffddeb0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27137-cwe-295-improper-certificate-valida-8118560e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27137%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Go%20standard%20library%20crypto%2Fx509&amp;severity=high&amp;id=69ab4b1fc48b3f10ffddeb07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30242-cwe-918-server-side-request-forgery-c687a2bc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30242%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20makeplane%20plane&amp;severity=high&amp;id=69ab479ac48b3f10ffdbff8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30244-cwe-284-improper-access-control-in--1105edaa</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30244%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20makeplane%20plane&amp;severity=high&amp;id=69ab479ac48b3f10ffdbff93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30241-cwe-863-incorrect-authorization-in--54440e88</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30241%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20mercurius-js%20mercurius&amp;severity=low&amp;id=69ab479ac48b3f10ffdbff8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30238-cwe-79-improper-neutralization-of-i-f7d87f56</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30238%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Intermesh%20groupoffice&amp;severity=medium&amp;id=69ab479ac48b3f10ffdbff88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30237-cwe-79-improper-neutralization-of-i-80bb9838</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30237%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Intermesh%20groupoffice&amp;severity=low&amp;id=69ab479ac48b3f10ffdbff85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30231-cwe-639-authorization-bypass-throug-a04ad200</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30231%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20FlintSH%20Flare&amp;severity=medium&amp;id=69ab4414c48b3f10ffd8fc2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30230-cwe-639-authorization-bypass-throug-5dd7aff8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30230%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20FlintSH%20Flare&amp;severity=high&amp;id=69ab4414c48b3f10ffd8fc2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30227-cwe-93-improper-neutralization-of-c-730af536</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30227%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20jstedfast%20MimeKit&amp;severity=medium&amp;id=69ab4414c48b3f10ffd8fc28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29795-cwe-770-allocation-of-resources-wit-b46dbb2b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29795%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20stellar%20rs-stellar-xdr&amp;severity=medium&amp;id=69ab4093c48b3f10ffd6ce0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29790-cwe-22-improper-limitation-of-a-pat-495da025</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29790%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20dbt-labs%20dbt-common&amp;severity=low&amp;id=69ab4093c48b3f10ffd6ce06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29789-cwe-862-missing-authorization-in-vi-a7e2f21c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29789%3A%20CWE-862%3A%20Missing%20Authorization%20in%20vitodeploy%20vito&amp;severity=critical&amp;id=69ab4093c48b3f10ffd6ce00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29788-cwe-283-unverified-ownership-in-mir-00a7d89c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29788%3A%20CWE-283%3A%20Unverified%20Ownership%20in%20miraheze%20TSPortal&amp;severity=high&amp;id=69ab4093c48b3f10ffd6cdfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30835-cwe-209-generation-of-error-message-2f619d80</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30835%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69ab3d0ec48b3f10ffd4f2dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30229-cwe-863-incorrect-authorization-in--3025edc1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30229%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69ab3d0ec48b3f10ffd4f2d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30228-cwe-863-incorrect-authorization-in--6cc83cac</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30228%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69ab3d0ec48b3f10ffd4f2d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29182-cwe-863-incorrect-authorization-in--5263b108</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29182%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69ab3d0ec48b3f10ffd4f2cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/middle-east-conflict-fuels-opportunistic-cyber-att-352466d7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Middle%20East%20Conflict%20Fuels%20Opportunistic%20Cyber%20Attacks&amp;severity=medium&amp;id=69aea2c22904315ca3f9aaa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29178-cwe-918-server-side-request-forgery-7d393c2d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29178%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20LemmyNet%20lemmy&amp;severity=high&amp;id=69ab19e8c48b3f10ffbbf2b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29091-cwe-95-improper-neutralization-of-d-c92d8a83</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29091%3A%20CWE-95%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20locutusjs%20locutus&amp;severity=high&amp;id=69ab1661c48b3f10ffba181e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30833-cwe-943-improper-neutralization-of--2e34817a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30833%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20RocketChat%20Rocket.Chat&amp;severity=medium&amp;id=69ab1661c48b3f10ffba1825</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30831-cwe-287-improper-authentication-in--d6e13010</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30831%3A%20CWE-287%3A%20Improper%20Authentication%20in%20RocketChat%20Rocket.Chat&amp;severity=high&amp;id=69ab1661c48b3f10ffba1822</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28514-cwe-287-improper-authentication-in--bf7998c6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28514%3A%20CWE-287%3A%20Improper%20Authentication%20in%20RocketChat%20Rocket.Chat&amp;severity=critical&amp;id=69ab1661c48b3f10ffba1819</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomware-attacks-on-schools-and-colleges-kaspers-ad8615d6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware%20attacks%20on%20schools%20and%20colleges%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69ac9a40c48b3f10ffceb05e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29089-cwe-426-untrusted-search-path-in-ti-e44a8f1d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29089%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20timescale%20timescaledb&amp;severity=high&amp;id=69ab0f59c48b3f10ffb6232f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29087-cwe-863-incorrect-authorization-in--d805d9f9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29087%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20honojs%20node-server&amp;severity=high&amp;id=69ab0f59c48b3f10ffb6232b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29783-cwe-78-improper-neutralization-of-s-97c9fcf6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29783%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20github%20copilot-cli&amp;severity=high&amp;id=69ab0852c48b3f10ffb0e5bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29082-cwe-79-improper-neutralization-of-i-06108f67</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29082%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kestra-io%20kestra&amp;severity=high&amp;id=69ab04d0c48b3f10ffaee2af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15602-cwe-915-improperly-controlled-modif-0fbe3594</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15602%3A%20CWE-915%3A%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes%20in%20Grokability%2C%20Inc.%20Snipe-IT&amp;severity=high&amp;id=69ab014fc48b3f10ffac9b50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29064-cwe-22-improper-limitation-of-a-pat-4981ec09</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29064%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20zarf-dev%20zarf&amp;severity=high&amp;id=69ab014fc48b3f10ffac9b5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-fbi-hacked-us-security-pro-killed-in-337e5e98</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20FBI%20Hacked%2C%20US%20Security%20Pro%20Killed%20in%20Iran%20War%2C%20Hijacked%20Cameras%20Used%20in%20Khamenei%20Strike&amp;severity=medium&amp;id=69aaf688c48b3f10ffa45df9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/remote-access-delivered-through-fake-zoom-and-goog-47bded52</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Remote%20Access%20Delivered%20Through%20Fake%20Zoom%20and%20Google%20Meet%20Calls&amp;severity=medium&amp;id=69ae9bba2904315ca3f470df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mobile-spyware-campaign-impersonates-israels-red-a-e5ebab35</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mobile%20spyware%20campaign%20impersonates%20Israel&apos;s%20Red%20Alert%20rocket%20warning%20system&amp;severity=medium&amp;id=69ae9f3e2904315ca3f7e27c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27027-cwe-522-in-everon-apieveronio-2ab7f513</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27027%3A%20CWE-522%20in%20Everon%20api.everon.io&amp;severity=medium&amp;id=69aaf339c48b3f10ffa20e29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20748-cwe-613-in-everon-apieveronio-677f7800</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20748%3A%20CWE-613%20in%20Everon%20api.everon.io&amp;severity=high&amp;id=69aaf339c48b3f10ffa20e17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24696-cwe-307-in-everon-apieveronio-7062e309</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24696%3A%20CWE-307%20in%20Everon%20api.everon.io&amp;severity=high&amp;id=69aaf339c48b3f10ffa20e21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26288-cwe-306-in-everon-apieveronio-4db274ef</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26288%3A%20CWE-306%20in%20Everon%20api.everon.io&amp;severity=critical&amp;id=69aaf339c48b3f10ffa20e25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27777-cwe-522-in-mobiliti-e-mobihu-e1f11063</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27777%3A%20CWE-522%20in%20Mobiliti%20e-mobi.hu&amp;severity=medium&amp;id=69aaf339c48b3f10ffa20e32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27764-cwe-613-in-mobiliti-e-mobihu-3d2562c2</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27764%3A%20CWE-613%20in%20Mobiliti%20e-mobi.hu&amp;severity=high&amp;id=69aaf339c48b3f10ffa20e2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20882-cwe-307-in-mobiliti-e-mobihu-3abeebf9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20882%3A%20CWE-307%20in%20Mobiliti%20e-mobi.hu&amp;severity=high&amp;id=69aaf339c48b3f10ffa20e1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2754-cwe-306-missing-authentication-for-c-7691b6a5</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2754%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Navtor%20NavBox&amp;severity=high&amp;id=69aaefb7c48b3f10ff9de731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2753-cwe-36-absolute-path-traversal-in-na-977a9330</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2753%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20Navtor%20NavBox&amp;severity=high&amp;id=69aaefb7c48b3f10ff9de72e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2752-cwe-209-generation-of-error-message--8ebaaf0a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2752%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Navtor%20NavBox&amp;severity=medium&amp;id=69aaefb7c48b3f10ff9de72b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26051-cwe-306-in-mobiliti-e-mobihu-70ec4ea6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26051%3A%20CWE-306%20in%20Mobiliti%20e-mobi.hu&amp;severity=critical&amp;id=69aaefb7c48b3f10ff9de726</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-adds-ios-flaws-from-coruna-exploit-kit-to-kev-c376b915</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Adds%20iOS%20Flaws%20From%20Coruna%20Exploit%20Kit%20to%20KEV%20List&amp;severity=medium&amp;id=69aad6e5c48b3f10ff88b243</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rockwell-vulnerability-allowing-remote-ics-hacking-56518a14</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Rockwell%20Vulnerability%20Allowing%20Remote%20ICS%20Hacking%20Exploited%20in%20Attacks&amp;severity=low&amp;id=69aacc59c48b3f10ff7e39bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28080-cwe-862-missing-authorization-in-ra-08d670cd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28080%3A%20CWE-862%20Missing%20Authorization%20in%20Rank%20Math%20Rank%20Math%20SEO%20PRO&amp;severity=medium&amp;id=69aac58dc48b3f10ff75bf8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28106-cwe-601-url-redirection-to-untruste-6f7aab75</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28106%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Kings%20Plugins%20B2BKing%20Premium&amp;severity=medium&amp;id=69aac20ac48b3f10ff714a0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35644-cwe-79-improper-neutralization-of-i-384a621c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35644%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Pascal%20Birchler%20Preferred%20Languages&amp;severity=medium&amp;id=69aac20ac48b3f10ff714a10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-apt-hacked-us-airport-bank-software-compan-620d8441</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20APT%20Hacked%20US%20Airport%2C%20Bank%2C%20Software%20Company&amp;severity=medium&amp;id=69aabe4dc48b3f10ff637826</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1468-cwe-352-cross-site-request-forgery-c-3fa2a3bf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1468%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20OpenSolution%20QuickCMS&amp;severity=medium&amp;id=69aab775c48b3f10ff51325c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3589-cwe-352-cross-site-request-forgery-c-929d5a57</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3589%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Automattic%20WooCommerce&amp;severity=high&amp;id=69aa9ed9c48b3f10ff40a463</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2331-cwe-552-files-or-directories-accessi-5e67b9ed</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2331%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20SICK%20AG%20SICK%20Lector85x&amp;severity=critical&amp;id=69aa89c1c48b3f10ff2e8a89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2330-cwe-552-files-or-directories-accessi-493bd9c6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2330%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20SICK%20AG%20SICK%20Lector85x&amp;severity=critical&amp;id=69aa89c1c48b3f10ff2e8a7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29074-cwe-776-improper-restriction-of-rec-bc543408</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29074%3A%20CWE-776%3A%20Improper%20Restriction%20of%20Recursive%20Entity%20References%20in%20DTDs%20(&apos;XML%20Entity%20Expansion&apos;)%20in%20svg%20svgo&amp;severity=high&amp;id=69aa82b7c48b3f10ff296e5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2830-cwe-94-improper-control-of-generatio-0bb50253</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2830%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20wpallimport%20WP%20All%20Import%20%E2%80%93%20Drag%20%26%20Drop%20Import%20for%20CSV%2C%20XML%2C%20Excel%20%26%20Google%20Sheets&amp;severity=medium&amp;id=69aa82b7c48b3f10ff296e63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29183-cwe-79-improper-neutralization-of-i-768fb7e7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29183%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=critical&amp;id=69aa82b7c48b3f10ff296e60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29073-cwe-862-missing-authorization-in-si-b68dce41</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29073%3A%20CWE-862%3A%20Missing%20Authorization%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=69aa82b7c48b3f10ff296e5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29062-cwe-770-allocation-of-resources-wit-840ac63f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29062%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20FasterXML%20jackson-core&amp;severity=high&amp;id=69aa82b7c48b3f10ff296e55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29059-cwe-22-improper-limitation-of-a-pat-9b177476</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29059%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20windmill-labs%20windmill&amp;severity=medium&amp;id=69aa82b7c48b3f10ff296e51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29058-cwe-78-improper-neutralization-of-s-6e5bf915</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29058%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20WWBN%20AVideo-Encoder&amp;severity=critical&amp;id=69aa7f36c48b3f10ff26b932</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29049-cwe-400-uncontrolled-resource-consu-caf9817c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29049%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20chainguard-dev%20melange&amp;severity=medium&amp;id=69aa7f36c48b3f10ff26b92f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29065-cwe-22-improper-limitation-of-a-pat-9b12e55d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29065%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20dgtlmoon%20changedetection.io&amp;severity=high&amp;id=69aa7f36c48b3f10ff26b935</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29039-cwe-94-improper-control-of-generati-a252bc8b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29039%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20dgtlmoon%20changedetection.io&amp;severity=high&amp;id=69aa7f36c48b3f10ff26b92a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29038-cwe-79-improper-neutralization-of-i-56be0ce4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29038%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dgtlmoon%20changedetection.io&amp;severity=medium&amp;id=69aa7f36c48b3f10ff26b925</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28804-cwe-407-inefficient-algorithmic-com-33d7baa9</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28804%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=69aa7bb0c48b3f10ff245871</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28801-cwe-94-improper-control-of-generati-c0fc0149</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28801%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NatroTeam%20NatroMacro&amp;severity=medium&amp;id=69aa7bb0c48b3f10ff24586e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28800-cwe-22-improper-limitation-of-a-pat-dfca6612</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28800%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20NatroTeam%20NatroMacro&amp;severity=medium&amp;id=69aa7bb0c48b3f10ff24586b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28438-cwe-89-improper-neutralization-of-s-5b163019</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28438%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20cocoindex-io%20cocoindex&amp;severity=medium&amp;id=69aa7bb0c48b3f10ff245863</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28799-cwe-416-use-after-free-in-pjsip-pjp-3427c3c7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28799%3A%20CWE-416%3A%20Use%20After%20Free%20in%20pjsip%20pjproject&amp;severity=high&amp;id=69aa7bb0c48b3f10ff245867</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29068-cwe-121-stack-based-buffer-overflow-0e1924ce</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29068%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20pjsip%20pjproject&amp;severity=high&amp;id=69aa7bb0c48b3f10ff245877</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28795-cwe-22-improper-limitation-of-a-pat-b24598ad</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28795%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20zhongyu09%20openchatbi&amp;severity=high&amp;id=69aa74abc48b3f10ff21035b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2446-cwe-862-missing-authorization-in-pow-801544ab</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2446%3A%20CWE-862%20Missing%20Authorization%20in%20PowerPack%20for%20LearnDash&amp;severity=critical&amp;id=69aa7125c48b3f10ff1eaaf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1128-cwe-352-cross-site-request-forgery-c-9d4324d3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1128%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WP%20eCommerce&amp;severity=medium&amp;id=69aa7125c48b3f10ff1eaaf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28794-cwe-1321-improperly-controlled-modi-427da505</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28794%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20middleapi%20orpc&amp;severity=critical&amp;id=69aa6319c48b3f10ff135409</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29084-cwe-352-cross-site-request-forgery--2e66f130</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29084%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Forceu%20Gokapi&amp;severity=medium&amp;id=69aa6319c48b3f10ff135415</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29061-cwe-284-improper-access-control-in--f342cb98</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29061%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Forceu%20Gokapi&amp;severity=medium&amp;id=69aa6319c48b3f10ff135411</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29060-cwe-284-improper-access-control-in--8b2784da</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29060%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Forceu%20Gokapi&amp;severity=medium&amp;id=69aa6319c48b3f10ff13540d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28683-cwe-79-improper-neutralization-of-i-3dead106</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28683%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Forceu%20Gokapi&amp;severity=high&amp;id=69aa6319c48b3f10ff135405</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28682-cwe-284-improper-access-control-in--00bddf4e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28682%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Forceu%20Gokapi&amp;severity=medium&amp;id=69aa6319c48b3f10ff135401</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28681-cwe-601-url-redirection-to-untruste-b554b77b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28681%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20irrdnet%20irrd&amp;severity=high&amp;id=69aa5c10c48b3f10ff0d74c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28679-cwe-22-improper-limitation-of-a-pat-2d04a517</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28679%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20xemle%20home-gallery&amp;severity=high&amp;id=69aa5c10c48b3f10ff0d74be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28509-cwe-79-improper-neutralization-of-i-e0679ca6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28509%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20langbot-app%20LangBot&amp;severity=medium&amp;id=69aa5c10c48b3f10ff0d74b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29041-cwe-434-unrestricted-upload-of-file-e999d757</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29041%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69aa5508c48b3f10fff1d3cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59544-cwe-862-missing-authorization-in-ch-f37bb7fc</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59544%3A%20CWE-862%3A%20Missing%20Authorization%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69aa5508c48b3f10fff1d3cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59543-cwe-79-improper-neutralization-of-i-0eef53dd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59543%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=critical&amp;id=69aa5508c48b3f10fff1d3c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59542-cwe-79-improper-neutralization-of-i-47c12102</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59542%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=critical&amp;id=69aa5508c48b3f10fff1d3c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59541-cwe-352-cross-site-request-forgery--e2b1d14f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59541%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69aa5508c48b3f10fff1d3bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59540-cwe-80-improper-neutralization-of-s-9a418eac</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59540%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69aa5508c48b3f10fff1d3bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55289-cwe-79-improper-neutralization-of-i-190f2e91</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55289%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69aa5508c48b3f10fff1d3b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28501-cwe-89-improper-neutralization-of-s-36e0dbd6</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28501%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=critical&amp;id=69aa4a7bc48b3f10ffe32f79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28502-cwe-434-unrestricted-upload-of-file-779981cf</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28502%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20WWBN%20AVideo&amp;severity=critical&amp;id=69aa4a7bc48b3f10ffe32f7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29093-cwe-287-improper-authentication-in--b06804e6</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29093%3A%20CWE-287%3A%20Improper%20Authentication%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69aa4a7bc48b3f10ffe32f87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29046-cwe-114-process-control-in-maximmas-416b5cf1</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29046%3A%20CWE-114%3A%20Process%20Control%20in%20maximmasiutin%20TinyWeb&amp;severity=critical&amp;id=69aa4a7bc48b3f10ffe32f83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28497-cwe-190-integer-overflow-or-wraparo-aa98a920</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28497%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20maximmasiutin%20TinyWeb&amp;severity=critical&amp;id=69aa4a7bc48b3f10ffe32f75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25962-cwe-409-improper-handling-of-highly-de5d7f5a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25962%3A%20CWE-409%3A%20Improper%20Handling%20of%20Highly%20Compressed%20Data%20(Data%20Amplification)%20in%20MarkUsProject%20Markus&amp;severity=medium&amp;id=69aa4a7bc48b3f10ffe32f6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27807-cwe-776-improper-restriction-of-rec-2352478b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27807%3A%20CWE-776%3A%20Improper%20Restriction%20of%20Recursive%20Entity%20References%20in%20DTDs%20(&apos;XML%20Entity%20Expansion&apos;)%20in%20MarkUsProject%20Markus&amp;severity=medium&amp;id=69aa4a7bc48b3f10ffe32f71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3616-sql-injection-in-defaultfuction-jeso-12cc9586</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3616%3A%20SQL%20Injection%20in%20DefaultFuction%20Jeson%20Customer%20Relationship%20Management%20System&amp;severity=medium&amp;id=69aa3c78c48b3f10ffcfb821</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3613-stack-based-buffer-overflow-in-wavli-e7d59b95</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3613%3A%20Stack-based%20Buffer%20Overflow%20in%20Wavlink%20WL-NU516U1&amp;severity=high&amp;id=69aa2e5ac48b3f10ffc36e29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3612-command-injection-in-wavlink-wl-nu51-a43ad7d5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3612%3A%20Command%20Injection%20in%20Wavlink%20WL-NU516U1&amp;severity=high&amp;id=69aa274ec48b3f10ffabbad2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3610-cross-site-scripting-in-hsc-cybersec-5db7259d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3610%3A%20Cross%20Site%20Scripting%20in%20HSC%20Cybersecurity%20Mailinspector&amp;severity=medium&amp;id=69aa274ec48b3f10ffabbacc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-06-866cbd09</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-06&amp;severity=medium&amp;id=69ab6e0cc48b3f10fff05506</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69654-na-44cf2543</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69654%3A%20n%2Fa&amp;severity=high&amp;id=69ab3283c48b3f10ffcc6477</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69653-na-661f7105</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69653%3A%20n%2Fa&amp;severity=medium&amp;id=69ab20f4c48b3f10ffc04698</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69652-na-89a022c8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69652%3A%20n%2Fa&amp;severity=medium&amp;id=69ab20f4c48b3f10ffc04694</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69650-na-8107a9f6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69650%3A%20n%2Fa&amp;severity=high&amp;id=69ab1d6dc48b3f10ffbeb7b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69649-na-a1749c93</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69649%3A%20n%2Fa&amp;severity=medium&amp;id=69ab1d6dc48b3f10ffbeb7ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69651-na-6ed8e52a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69651%3A%20n%2Fa&amp;severity=medium&amp;id=69ab19e8c48b3f10ffbbf2ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69646-na-8ed65ffb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69646%3A%20n%2Fa&amp;severity=medium&amp;id=69ab0f59c48b3f10ffb62327</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69645-na-356b454c</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69645%3A%20n%2Fa&amp;severity=medium&amp;id=69ab0f59c48b3f10ffb62323</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69644-na-e8df8165</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69644%3A%20n%2Fa&amp;severity=medium&amp;id=69ab0f59c48b3f10ffb6231f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70363-na-917512e7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70363%3A%20n%2Fa&amp;severity=high&amp;id=69ab014fc48b3f10ffac9b55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-06-394941b8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-06&amp;severity=medium&amp;id=69aabac0c48b3f10ff54eb23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-06-b3d61573</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-06&amp;severity=low&amp;id=69aabac0c48b3f10ff54eade</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28726-cwe-863-in-acronis-acronis-cyber-pr-ae9468f5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28726%3A%20CWE-863%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1cc6c48b3f10ff8f955b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28725-cwe-732-in-acronis-acronis-cyber-pr-5efe8500</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28725%3A%20CWE-732%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1cc6c48b3f10ff8f9558</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30413-cwe-732-in-acronis-acronis-cyber-pr-ecf57f6e</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30413%3A%20CWE-732%20in%20Acronis%20Acronis%20Cyber%20Protect%20Cloud%20Agent&amp;severity=medium&amp;id=69aa1962c48b3f10ff8d2b00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28724-cwe-863-in-acronis-acronis-cyber-pr-c4198fcb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28724%3A%20CWE-863%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1965c48b3f10ff8d2b87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28723-cwe-863-in-acronis-acronis-cyber-pr-5f3e63ca</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28723%3A%20CWE-863%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1965c48b3f10ff8d2b84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28722-cwe-610-in-acronis-acronis-cyber-pr-2402ead0</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28722%3A%20CWE-610%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=high&amp;id=69aa1963c48b3f10ff8d2b5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28721-cwe-610-in-acronis-acronis-cyber-pr-8b4a5c71</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28721%3A%20CWE-610%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=high&amp;id=69aa1963c48b3f10ff8d2b58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28720-cwe-863-in-acronis-acronis-cyber-pr-41955de7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28720%3A%20CWE-863%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1963c48b3f10ff8d2b55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28719-cwe-863-in-acronis-acronis-cyber-pr-6d5e2241</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28719%3A%20CWE-863%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1963c48b3f10ff8d2b52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28718-cwe-779-in-acronis-acronis-cyber-pr-a9dbceaf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28718%3A%20CWE-779%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1963c48b3f10ff8d2b4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28717-cwe-276-in-acronis-acronis-cyber-pr-83a858f6</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28717%3A%20CWE-276%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1963c48b3f10ff8d2b4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28716-cwe-863-in-acronis-acronis-cyber-pr-1699ecb1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28716%3A%20CWE-863%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1963c48b3f10ff8d2b49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28715-cwe-863-in-acronis-acronis-cyber-pr-cb280302</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28715%3A%20CWE-863%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1963c48b3f10ff8d2b46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28714-cwe-522-in-acronis-acronis-cyber-pr-b7b480ca</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28714%3A%20CWE-522%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1963c48b3f10ff8d2b43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28713-cwe-1392-in-acronis-acronis-cyber-p-ae137381</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28713%3A%20CWE-1392%20in%20Acronis%20Acronis%20Cyber%20Protect%20Cloud%20Agent&amp;severity=high&amp;id=69aa1963c48b3f10ff8d2b40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28712-cwe-427-in-acronis-acronis-cyber-pr-05ca5ab4</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28712%3A%20CWE-427%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1962c48b3f10ff8d2b17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28711-cwe-427-in-acronis-acronis-cyber-pr-9c33e230</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28711%3A%20CWE-427%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1962c48b3f10ff8d2b14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28710-cwe-1390-in-acronis-acronis-cyber-p-29d27d91</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28710%3A%20CWE-1390%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=high&amp;id=69aa1962c48b3f10ff8d2b11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28709-cwe-863-in-acronis-acronis-cyber-pr-9d9af414</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28709%3A%20CWE-863%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1962c48b3f10ff8d2b0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11790-cwe-732-in-acronis-acronis-cyber-pr-d26c0fd9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11790%3A%20CWE-732%20in%20Acronis%20Acronis%20Cyber%20Protect%20Cloud%20Agent&amp;severity=medium&amp;id=69aa1962c48b3f10ff8d2af6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11791-cwe-862-in-acronis-acronis-cyber-pr-95aaee43</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11791%3A%20CWE-862%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1962c48b3f10ff8d2afa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11792-cwe-427-in-acronis-acronis-cyber-pr-d49c2cc9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11792%3A%20CWE-427%20in%20Acronis%20Acronis%20Cyber%20Protect%20Cloud%20Agent&amp;severity=high&amp;id=69aa1962c48b3f10ff8d2afd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28727-cwe-276-in-acronis-acronis-cyber-pr-1f5f5b7d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28727%3A%20CWE-276%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=high&amp;id=69aa1965c48b3f10ff8d2b8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27770-cwe-522-in-epower-epowerie-76cf915c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27770%3A%20CWE-522%20in%20ePower%20epower.ie&amp;severity=medium&amp;id=69aa1962c48b3f10ff8d2b09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24912-cwe-613-in-epower-epowerie-3fcc469f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24912%3A%20CWE-613%20in%20ePower%20epower.ie&amp;severity=high&amp;id=69aa1962c48b3f10ff8d2b04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27778-cwe-307-in-epower-epowerie-3015e8f5</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27778%3A%20CWE-307%20in%20ePower%20epower.ie&amp;severity=high&amp;id=69aa15bec48b3f10ff8a0fdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2589-cwe-200-exposure-of-sensitive-inform-2dc93144</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2589%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20wpsoul%20Greenshift%20%E2%80%93%20animation%20and%20page%20builder%20blocks&amp;severity=medium&amp;id=69aa15bec48b3f10ff8a0fe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22552-cwe-306-in-epower-epowerie-1e2e527e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22552%3A%20CWE-306%20in%20ePower%20epower.ie&amp;severity=critical&amp;id=69aa15bec48b3f10ff8a0fda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26122-information-disclosure-in-microsoft-09c389e3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26122%3A%20CWE-1188%3A%20Initialization%20of%20a%20Resource%20with%20an%20Insecure%20Default%20in%20Microsoft%20Microsoft%20ACI%20Confidential%20Containers&amp;severity=medium&amp;id=69aa042dc48b3f10ff7dd2a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26125-cwe-306-missing-authentication-for--ae4455f5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26125%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Microsoft%20Payment%20Orchestrator%20Service&amp;severity=high&amp;id=69aa042dc48b3f10ff7dd2a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26124-cwe-35-path-traversal-in-microsoft--129daa24</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26124%3A%20CWE-35%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Microsoft%20Microsoft%20ACI%20Confidential%20Containers&amp;severity=medium&amp;id=69aa042dc48b3f10ff7dd2a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21536-cwe-434-unrestricted-upload-of-file-3dbf1775</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21536%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Microsoft%20Microsoft%20Devices%20Pricing%20Program&amp;severity=critical&amp;id=69aa042dc48b3f10ff7dd29d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23651-cwe-625-permissive-regular-expressi-1f6596b4</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23651%3A%20CWE-625%3A%20Permissive%20Regular%20Expression%20in%20Microsoft%20Microsoft%20ACI%20Confidential%20Containers&amp;severity=medium&amp;id=69aa042dc48b3f10ff7dd2a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3606-out-of-bounds-read-in-ettercap-c4751691</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3606%3A%20Out-of-Bounds%20Read%20in%20Ettercap&amp;severity=medium&amp;id=69aa00a5c48b3f10ff7ae786</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28484-fde8f0db</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28484&amp;severity=null&amp;id=69ab0852c48b3f10ffb0e5c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28474-incorrect-authorization-in-openclaw-da9baab9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28474%3A%20Incorrect%20Authorization%20in%20OpenClaw%20nextcloud-talk&amp;severity=critical&amp;id=69aa00a5c48b3f10ff7ae781</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28465-insufficient-verification-of-data-a-efea20a0</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28465%3A%20CWE-290%20Authentication%20bypass%20by%20spoofing%20in%20OpenClaw%20voice-call&amp;severity=high&amp;id=69aa00a5c48b3f10ff7ae77c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2593-cwe-79-improper-neutralization-of-in-8c16f488</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2593%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpsoul%20Greenshift%20%E2%80%93%20animation%20and%20page%20builder%20blocks&amp;severity=medium&amp;id=69a9f99ec48b3f10ff5cf16f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55208-cwe-79-improper-neutralization-of-i-f54629d8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55208%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=critical&amp;id=69a9f294c48b3f10ff5116be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0848-cwe-20-improper-input-validation-in--af71c4ce</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0848%3A%20CWE-20%20Improper%20Input%20Validation%20in%20nltk%20nltk%2Fnltk&amp;severity=critical&amp;id=69a9ef11c48b3f10ff4d0658</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22723-vulnerability-in-cloudfoundry-found-a9411f93</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22723%3A%20Vulnerability%20in%20Cloudfoundry%20Foundation%20UAA&amp;severity=medium&amp;id=69a9ef11c48b3f10ff4d065b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28442-cwe-73-external-control-of-file-nam-66c91287</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28442%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20IceWhaleTech%20ZimaOS&amp;severity=high&amp;id=69a9ef11c48b3f10ff4d065e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28413-cwe-601-url-redirection-to-untruste-64093f53</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28413%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20plone%20Products.isurlinportal&amp;severity=medium&amp;id=69a9e67761e8e69ef5f7009c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-ai-assistant-extensions-harvest-llm-chat-644bc76e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20AI%20Assistant%20Extensions%20Harvest%20LLM%20Chat%20Histories&amp;severity=medium&amp;id=69aabacfc48b3f10ff5537f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/south-american-telecommunication-providers-targete-e1d2d261</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=South%20American%20telecommunication%20providers%20targeted%20with%20three%20new%20malware%20implants&amp;severity=medium&amp;id=69aabacfc48b3f10ff55379c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28410-cwe-284-improper-access-control-in--77618731</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28410%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20graphprotocol%20contracts&amp;severity=medium&amp;id=69a9e67761e8e69ef5f70098</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28405-cwe-79-improper-neutralization-of-i-f136d9aa</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28405%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MarkUsProject%20Markus&amp;severity=high&amp;id=69a9e67761e8e69ef5f70093</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28353-cwe-506-embedded-malicious-code-in--facddd89</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28353%3A%20CWE-506%3A%20Embedded%20Malicious%20Code%20in%20aquasecurity%20trivy-vscode-extension&amp;severity=critical&amp;id=69a9e2f561e8e69ef5e92416</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28350-cwe-116-improper-encoding-or-escapi-f2a1a98e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28350%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20fedora-python%20lxml_html_clean&amp;severity=medium&amp;id=69a9e2f561e8e69ef5e92412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28348-cwe-116-improper-encoding-or-escapi-f0e49774</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28348%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20fedora-python%20lxml_html_clean&amp;severity=medium&amp;id=69a9e2f561e8e69ef5e9240e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28343-cwe-79-improper-neutralization-of-i-9756676b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28343%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ckeditor%20ckeditor5&amp;severity=medium&amp;id=69a9df7061e8e69ef5e51b1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28277-cwe-502-deserialization-of-untruste-405e3490</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28277%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20langchain-ai%20langgraph&amp;severity=medium&amp;id=69a9e2f561e8e69ef5e9241d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13350-cwe-416-use-after-free-in-canonical-d0ad2719</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13350%3A%20CWE-416%20Use%20After%20Free%20in%20Canonical%20Ubuntu%20Linux&amp;severity=high&amp;id=69a9e2f561e8e69ef5e92419</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3047-authentication-bypass-by-primary-wea-c4898340</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3047%3A%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.2&amp;severity=high&amp;id=69a9d16b61e8e69ef5d12497</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3009-improper-authorization-in-red-hat-re-a8b6d3ca</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3009%3A%20Incorrect%20Authorization%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=high&amp;id=69a9d16b61e8e69ef5d12490</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28287-cwe-78-improper-neutralization-of-s-f3029c62</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28287%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20FreePBX%20security-reporting&amp;severity=high&amp;id=69a9d16b61e8e69ef5d1248c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3459-cwe-434-unrestricted-upload-of-file--0bb23ab9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3459%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20glenwpcoder%20Drag%20and%20Drop%20Multiple%20File%20Upload%20for%20Contact%20Form%207&amp;severity=high&amp;id=69a9d16b61e8e69ef5d1249b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28284-cwe-89-improper-neutralization-of-s-1d52e754</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28284%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20FreePBX%20security-reporting&amp;severity=high&amp;id=69a9d16b61e8e69ef5d12489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28210-cwe-89-improper-neutralization-of-s-40dd310e</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28210%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20FreePBX%20security-reporting&amp;severity=high&amp;id=69a9d16b61e8e69ef5d12486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28209-cwe-78-improper-neutralization-of-s-a0f9d9d4</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28209%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20FreePBX%20security-reporting&amp;severity=high&amp;id=69a9d16b61e8e69ef5d12483</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7375-cwe-20-improper-input-validation-in--8934f0d6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7375%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TP-Link%20Systems%20Inc.%20EAP610%20v3&amp;severity=medium&amp;id=69a9c994460e1c85df139338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13476-cwe-327-use-of-a-broken-or-risky-cr-5cab70df</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13476%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Rakuten%20Viber%20Rakuten%20Viber%20Cloak%20-%20Android&amp;severity=critical&amp;id=69a9c994460e1c85df139316</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27944-cwe-311-missing-encryption-of-sensi-409464ed</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27944%3A%20CWE-311%3A%20Missing%20Encryption%20of%20Sensitive%20Data%20in%200xJacky%20nginx-ui&amp;severity=critical&amp;id=69a9c996460e1c85df139361</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24457-cwe-22-improper-limitation-of-a-pat-5ef15632</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24457%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Eclipse%20Foundation%20Eclipse%20OpenMQ&amp;severity=critical&amp;id=69a9c994460e1c85df13933d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27723-cwe-284-improper-access-control-in--932e3277</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27723%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20opf%20openproject&amp;severity=medium&amp;id=69a9c996460e1c85df13935c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27023-cwe-918-server-side-request-forgery-94391960</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27023%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20twentyhq%20twenty&amp;severity=medium&amp;id=69a9c996460e1c85df139358</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30785-cwe-257-in-rustdesk-client-rustdesk-476aaa7e</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30785%3A%20CWE-257%20in%20rustdesk-client%20RustDesk%20Client&amp;severity=high&amp;id=69a9ad6c460e1c85dfe74263</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30784-cwe-862-missing-authorization-in-ru-97b16d4b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30784%3A%20CWE-862%20Missing%20Authorization%20in%20rustdesk-server%20RustDesk%20Server&amp;severity=high&amp;id=69a9ad6c460e1c85dfe74260</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30783-cwe-602-in-rustdesk-client-rustdesk-6f13408a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30783%3A%20CWE-602%20in%20rustdesk-client%20RustDesk%20Client&amp;severity=high&amp;id=69a9ad6c460e1c85dfe7425d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30790-cwe-307-improper-restriction-of-exc-765a4f40</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30790%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20rustdesk-server-pro%20RustDesk%20Server%20Pro&amp;severity=critical&amp;id=69a9c05f460e1c85df0c5c54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30789-cwe-294-authentication-bypass-by-ca-ea65bd02</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30789%3A%20CWE-294%20Authentication%20Bypass%20by%20Capture-replay%20in%20rustdesk-client%20RustDesk%20Client&amp;severity=critical&amp;id=69a9c05f460e1c85df0c5c51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30798-cwe-345-insufficient-verification-o-6936b5e1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30798%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20rustdesk-client%20RustDesk%20Client&amp;severity=high&amp;id=69a9c05f460e1c85df0c5c5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30797-cwe-862-missing-authorization-in-ru-9b5e712b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30797%3A%20CWE-862%20Missing%20Authorization%20in%20rustdesk-client%20RustDesk%20Client&amp;severity=critical&amp;id=69a9c05f460e1c85df0c5c5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25048-cwe-674-uncontrolled-recursion-in-m-d4dc88f1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25048%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20mlc-ai%20xgrammar&amp;severity=high&amp;id=69a9c05f460e1c85df0c5c4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64166-cwe-352-cross-site-request-forgery--1601b4e4</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64166%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mercurius-js%20mercurius&amp;severity=medium&amp;id=69a9c05f460e1c85df0c5c48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30796-cwe-319-cleartext-transmission-of-s-4a9cfc73</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30796%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20rustdesk-server-pro%20RustDesk%20Server%20Pro&amp;severity=high&amp;id=69a9c05f460e1c85df0c5c57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30795-cwe-319-cleartext-transmission-of-s-73da2f1f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30795%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20rustdesk-client%20RustDesk%20Client&amp;severity=high&amp;id=69a9a2e4460e1c85dfd8771d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30794-cwe-295-improper-certificate-valida-d480f40a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30794%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20rustdesk-client%20RustDesk%20Client&amp;severity=critical&amp;id=69a9a2e4460e1c85dfd8771a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30793-cwe-285-in-rustdesk-client-rustdesk-991b7094</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30793%3A%20CWE-285%20in%20rustdesk-client%20RustDesk%20Client&amp;severity=critical&amp;id=69a9a2e4460e1c85dfd87716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30792-cwe-657-in-rustdesk-client-rustdesk-c970abe3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30792%3A%20CWE-657%20in%20rustdesk-client%20RustDesk%20Client&amp;severity=critical&amp;id=69a9a2e4460e1c85dfd87713</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-half-of-2025s-90-exploited-zero-days-aimed--f4c73b61</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%3A%20Half%20of%202025%E2%80%99s%2090%20Exploited%20Zero-Days%20Aimed%20at%20Enterprises&amp;severity=medium&amp;id=69a99b5f224272a26dae95de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30791-cwe-327-use-of-a-broken-or-risky-cr-357ade28</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30791%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20rustdesk-client%20RustDesk%20Client&amp;severity=high&amp;id=69a99d83d9f976b5b5c65c44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27748-cwe-59-improper-link-resolution-bef-b9c573ee</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27748%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Gen%20Digital%20Inc.%20Avira%20Internet%20Security&amp;severity=high&amp;id=69a993803bbe47dd19a9529b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27749-cwe-502-deserialization-of-untruste-356af843</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27749%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Gen%20Digital%20Inc.%20Avira%20Internet%20Security&amp;severity=high&amp;id=69a993803bbe47dd19a952a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27750-cwe-367-time-of-check-time-of-use-t-22539585</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27750%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Gen%20Digital%20Inc.%20Avira%20Internet%20Security&amp;severity=high&amp;id=69a993803bbe47dd19a952a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3598-cwe-327-use-of-a-broken-or-risky-cry-b5be621d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3598%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20rustdesk-server-pro%20RustDesk%20Server%20Pro&amp;severity=high&amp;id=69a993803bbe47dd19a952ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1720-cwe-862-missing-authorization-in-wpx-95778eab</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1720%3A%20CWE-862%20Missing%20Authorization%20in%20wpxpo%20WowOptin%3A%20Next-Gen%20Popup%20Maker%20%E2%80%93%20Create%20Stunning%20Popups%20and%20Optins%20for%20Lead%20Generation&amp;severity=high&amp;id=69a988fd3bbe47dd199708fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-ransomware-operator-pleads-guilty-in-us-e493b9c8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20Ransomware%20Operator%20Pleads%20Guilty%20in%20US&amp;severity=medium&amp;id=69a97ca30e5bba37cadb2726</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-tech-support-delivers-havoc-command-control-59a90ba0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Tech%20Support%20Delivers%20Havoc%20Command%20%26%20Control&amp;severity=medium&amp;id=69a99d4dd9f976b5b5c444b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2599-cwe-502-deserialization-of-untrusted-8a4a84f3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2599%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20crmperks%20Database%20for%20Contact%20Form%207%2C%20WPforms%2C%20Elementor%20forms&amp;severity=critical&amp;id=69a97ce30e5bba37cadb5ff8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-disable-unwanted-ai-assistants-and-features-54c29a8a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%20disable%20unwanted%20AI%20assistants%20and%20features%20on%20your%20PC%20and%20smartphone%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69a9798c0e5bba37cad8d7ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-warns-of-more-catalyst-sd-wan-flaws-exploite-f4918229</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Warns%20of%20More%20Catalyst%20SD-WAN%20Flaws%20Exploited%20in%20the%20Wild&amp;severity=medium&amp;id=69a9759b0e5bba37cad5da4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/leakbase-cybercrime-forum-shut-down-suspects-arres-184a6f89</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LeakBase%20Cybercrime%20Forum%20Shut%20Down%2C%20Suspects%20Arrested&amp;severity=medium&amp;id=69a960820e5bba37cabba3cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3236-cwe-863-incorrect-authorization-in-o-bc126ace</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3236%3A%20CWE-863%20Incorrect%20Authorization%20in%20Octopus%20Deploy%20Octopus%20Server&amp;severity=low&amp;id=69a96ed40e5bba37cacf0189</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1605-cwe-400-uncontrolled-resource-consum-0a9505ff</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1605%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Eclipse%20Foundation%20Eclipse%20Jetty&amp;severity=high&amp;id=69a9562d0e5bba37ca990db6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11143-cwe-20-improper-input-validation-in-5b9ca7d4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11143%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Eclipse%20Foundation%20Eclipse%20Jetty&amp;severity=low&amp;id=69a952a60e5bba37ca8f75ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21628-cwe-434-unrestricted-upload-of-file-fb005d26</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21628%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20astroidframe.work%20Astroid%20Template%20Framework&amp;severity=critical&amp;id=69a952a60e5bba37ca8f75b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-patches-critical-vulnerabilities-in-enterpri-60dcf18f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Patches%20Critical%20Vulnerabilities%20in%20Enterprise%20Networking%20Products&amp;severity=critical&amp;id=69a944620e5bba37ca7a0a1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28542-cwe-755-improper-handling-of-except-aeb52e45</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28542%3A%20CWE-755%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=69a9437a0e5bba37ca78f119</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28548-cwe-269-improper-privilege-manageme-c0b6d666</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28548%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=69a9437a0e5bba37ca78f11d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28551-cwe-362-concurrent-execution-using--6580cf78</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28551%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69a9437a0e5bba37ca78f120</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28549-cwe-362-concurrent-execution-using--acd96308</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28549%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69a93fcdd1a09e29cbfadc02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28547-cwe-824-access-of-uninitialized-poi-08c4edcc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28547%3A%20CWE-824%20Access%20of%20Uninitialized%20Pointer%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69a93fcdd1a09e29cbfadbfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28546-cwe-122-heap-based-buffer-overflow--31312413</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28546%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69a93fcdd1a09e29cbfadbfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28543-cwe-362-concurrent-execution-using--6fe78fe7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28543%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69a93c49d1a09e29cbf84a2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28541-cwe-264-permissions-privileges-and--8d92a643</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28541%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69a93c49d1a09e29cbf84a25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28540-cwe-158-improper-neutralization-of--82bd380c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28540%3A%20CWE-158%20Improper%20Neutralization%20of%20Null%20Byte%20or%20NUL%20Character%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69a93c49d1a09e29cbf84a1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28539-cwe-19-data-processing-errors-in-hu-36035c5b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28539%3A%20CWE-19%20Data%20Processing%20Errors%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69a93c49d1a09e29cbf84a1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28538-cwe-24-path-traversal-filedir-in-hu-aedb987e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28538%3A%20CWE-24%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69a93c49d1a09e29cbf84a17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66319-cwe-264-permissions-privileges-and--48be1dfd</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66319%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=low&amp;id=69a938c5d1a09e29cbf5d4c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28552-cwe-19-data-processing-errors-in-hu-1393e410</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28552%3A%20CWE-19%20Data%20Processing%20Errors%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69a938c5d1a09e29cbf5d4da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28550-cwe-840-business-logic-errors-in-hu-428a1b72</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28550%3A%20CWE-840%20Business%20Logic%20Errors%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69a938c5d1a09e29cbf5d4d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28545-cwe-362-concurrent-execution-using--c73349bc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28545%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69a938c5d1a09e29cbf5d4d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28544-cwe-362-concurrent-execution-using--e438641a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28544%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69a938c5d1a09e29cbf5d4ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1321-cwe-862-missing-authorization-in-ste-01ad73de</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1321%3A%20CWE-862%20Missing%20Authorization%20in%20stellarwp%20Membership%20Plugin%20%E2%80%93%20Restrict%20Content&amp;severity=high&amp;id=69a931c0d1a09e29cbf198c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2893-cwe-89-improper-neutralization-of-sp-0b8faf55</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2893%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20carlosfazenda%20Fast%20Page%20%26%20Post%20Duplicator&amp;severity=medium&amp;id=69a931c0d1a09e29cbf198d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21786-cwe-532-insertion-of-sensitive-info-45210306</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21786%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20HCLSoftware%20Sametime%20for%20iOS&amp;severity=low&amp;id=69a931c0d1a09e29cbf198ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28537-cwe-415-double-free-in-huawei-harmo-e37f161c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28537%3A%20CWE-415%20Double%20Free%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69a931c0d1a09e29cbf198cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28536-cwe-305-authentication-bypass-by-pr-3e5ae728</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28536%3A%20CWE-305%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20Huawei%20HarmonyOS&amp;severity=critical&amp;id=69a92e3cd1a09e29cbef609e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25702-cwe-284-improper-access-control-in--2f29ac3b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25702%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20SUSE%20SUSE%20Linux%20Enterprise%20Server&amp;severity=high&amp;id=69a92e3cd1a09e29cbef609b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1678-out-of-bounds-write-in-zephyrproject-aa51fbaa</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1678%3A%20Out-of-bounds%20Write%20in%20zephyrproject-rtos%20Zephyr&amp;severity=critical&amp;id=69a92731d1a09e29cbeaae24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2418-cwe-287-improper-authentication-in-l-1b2dce9a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2418%3A%20CWE-287%20Improper%20Authentication%20in%20Login%20with%20Salesforce&amp;severity=critical&amp;id=69a9206cd1a09e29cbe6d01e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28137-improper-neutralization-of-input-du-c941043d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28137%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20QuanticaLabs%20MediCenter%20-%20Health%20Medical%20Clinic&amp;severity=high&amp;id=69a9206cd1a09e29cbe6d01b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28135-inclusion-of-functionality-from-unt-81d65bc1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28135%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20WP%20Royal%20Royal%20Elementor%20Addons&amp;severity=high&amp;id=69a9206cd1a09e29cbe6d018</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28134-improper-control-of-generation-of-c-67944697</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28134%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Crocoblock%20JetEngine&amp;severity=high&amp;id=69a9206cd1a09e29cbe6d015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28133-unrestricted-upload-of-file-with-da-4d93fbb8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28133%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20WP%20Chill%20Filr&amp;severity=high&amp;id=69a9206cd1a09e29cbe6d012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28130-improper-neutralization-of-input-du-e3bed1ad</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28130%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AndonDesign%20UDesign&amp;severity=high&amp;id=69a9206cd1a09e29cbe6d00f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28129-improper-control-of-filename-for-in-ee00e000</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28129%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Little%20Birdies&amp;severity=high&amp;id=69a9206cd1a09e29cbe6d00c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28128-improper-control-of-filename-for-in-1923616c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28128%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Verse&amp;severity=high&amp;id=69a9206ad1a09e29cbe6cfc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28127-improper-neutralization-of-input-du-b3564c0d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28127%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20e-plugins%20Lawyer%20Directory&amp;severity=high&amp;id=69a9206ad1a09e29cbe6cfc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28126-improper-neutralization-of-input-du-65d31539</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28126%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sizam%20RH%20Frontend%20Publishing%20Pro&amp;severity=high&amp;id=69a9206ad1a09e29cbe6cfbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28125-improper-control-of-filename-for-in-e2c0f645</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28125%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Midi&amp;severity=high&amp;id=69a9206ad1a09e29cbe6cfba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28124-improper-control-of-filename-for-in-00784f3b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28124%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Notarius&amp;severity=high&amp;id=69a9206ad1a09e29cbe6cfb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28123-improper-control-of-filename-for-in-8adfb831</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28123%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Veil&amp;severity=high&amp;id=69a9206ad1a09e29cbe6cfb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28122-improper-neutralization-of-input-du-6f368f41</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28122%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CridioStudio%20ListingPro&amp;severity=high&amp;id=69a9206ad1a09e29cbe6cfa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28121-improper-control-of-filename-for-in-d1180c26</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28121%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Anderson&amp;severity=high&amp;id=69a9206ad1a09e29cbe6cfa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28120-improper-control-of-filename-for-in-fc28c46c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28120%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Dr.Patterson&amp;severity=high&amp;id=69a9206ad1a09e29cbe6cfa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28119-improper-control-of-filename-for-in-aabd1146</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28119%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Nirvana&amp;severity=high&amp;id=69a9206ad1a09e29cbe6cf9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28118-improper-control-of-filename-for-in-4860a768</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28118%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Welldone&amp;severity=high&amp;id=69a92069d1a09e29cbe6cf6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28117-improper-control-of-filename-for-in-9a4c50a7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28117%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20smart%20SEO&amp;severity=high&amp;id=69a92069d1a09e29cbe6cf67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28115-improper-neutralization-of-special--1eebab36</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28115%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20loopus%20WP%20Attractive%20Donations%20System%20-%20Easy%20Stripe%20%26%20Paypal%20donations&amp;severity=critical&amp;id=69a92069d1a09e29cbe6cf64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28114-unrestricted-upload-of-file-with-da-5f3102b7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28114%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20firassaidi%20WooCommerce%20License%20Manager&amp;severity=critical&amp;id=69a92069d1a09e29cbe6cf61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28113-improper-neutralization-of-input-du-21672d39</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28113%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20azzaroco%20Ultimate%20Learning%20Pro&amp;severity=high&amp;id=69a92069d1a09e29cbe6cf5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28112-improper-neutralization-of-input-du-ded4c6e9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28112%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20AllInOne%20-%20Banner%20Rotator&amp;severity=high&amp;id=69a92069d1a09e29cbe6cf5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28110-improper-neutralization-of-input-du-d21f4df5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28110%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20LambertGroup%20-%20AllInOne%20-%20Banner%20with%20Playlist&amp;severity=high&amp;id=69a92069d1a09e29cbe6cf58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28109-improper-neutralization-of-input-du-c0f8a99d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28109%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20LambertGroup%20-%20AllInOne%20-%20Content%20Slider&amp;severity=high&amp;id=69a92069d1a09e29cbe6cf55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28108-improper-neutralization-of-input-du-82eab159</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28108%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20LambertGroup%20-%20AllInOne%20-%20Banner%20with%20Thumbnails&amp;severity=high&amp;id=69a92069d1a09e29cbe6cf52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28107-improper-control-of-filename-for-in-510fedd4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28107%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Muzicon&amp;severity=high&amp;id=69a92069d1a09e29cbe6cf4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28105-deserialization-of-untrusted-data-i-4b189c04</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28105%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Good%20Energy&amp;severity=critical&amp;id=69a92067d1a09e29cbe6cf42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28104-missing-authorization-in-aryan-shir-cfa838ef</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28104%3A%20Missing%20Authorization%20in%20Aryan%20Shirani%20Bid%20Abadi%20Site%20Suggest&amp;severity=medium&amp;id=69a92067d1a09e29cbe6cf3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28103-improper-neutralization-of-input-du-af39aa6e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28103%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20LBG%20Zoominoutslider&amp;severity=high&amp;id=69a92067d1a09e29cbe6cf3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28102-improper-neutralization-of-input-du-97c5699a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28102%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20UberSlider%20Classic&amp;severity=high&amp;id=69a92067d1a09e29cbe6cf39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28101-improper-neutralization-of-input-du-0b6e4bbe</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28101%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20UberSlider%20MouseInteraction&amp;severity=high&amp;id=69a92067d1a09e29cbe6cf36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28100-improper-neutralization-of-input-du-34e884d2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28100%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20UberSlider%20PerpetuumMobile&amp;severity=high&amp;id=69a92067d1a09e29cbe6cf33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28099-improper-neutralization-of-input-du-19629351</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28099%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20UberSlider%20Ultra&amp;severity=high&amp;id=69a92067d1a09e29cbe6cf30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28098-improper-control-of-filename-for-in-0ec6c859</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28098%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Save%20Life&amp;severity=high&amp;id=69a92067d1a09e29cbe6cf2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28097-improper-control-of-filename-for-in-8bdc49fb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28097%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Artrium&amp;severity=high&amp;id=69a92067d1a09e29cbe6cf2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28096-improper-control-of-filename-for-in-c8db7c35</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28096%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20WealthCo&amp;severity=high&amp;id=69a92067d1a09e29cbe6cf27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28095-improper-control-of-filename-for-in-b03c4d5d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28095%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Marcell&amp;severity=high&amp;id=69a92066d1a09e29cbe6cf1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28094-improper-control-of-filename-for-in-955abaa1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28094%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20RexCoin&amp;severity=high&amp;id=69a92066d1a09e29cbe6cf17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28093-improper-control-of-filename-for-in-999684bb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28093%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Ozisti&amp;severity=high&amp;id=69a92066d1a09e29cbe6cf14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28092-improper-control-of-filename-for-in-bbc94959</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28092%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Sounder&amp;severity=high&amp;id=69a92066d1a09e29cbe6cf11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28091-improper-control-of-filename-for-in-f64daafe</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28091%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Coleo&amp;severity=high&amp;id=69a92066d1a09e29cbe6cf0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28090-improper-control-of-filename-for-in-53cfd3ce</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28090%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Gamezone&amp;severity=high&amp;id=69a92066d1a09e29cbe6cf0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28089-improper-control-of-filename-for-in-6b4eda05</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28089%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Daiquiri&amp;severity=high&amp;id=69a92066d1a09e29cbe6cf08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28088-improper-control-of-filename-for-in-ec3099b1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28088%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Aqualots&amp;severity=high&amp;id=69a92066d1a09e29cbe6cf05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28087-improper-control-of-filename-for-in-87269b7c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28087%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Filmax&amp;severity=high&amp;id=69a92066d1a09e29cbe6cf02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28086-improper-control-of-filename-for-in-f835154b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28086%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Run%20Gran&amp;severity=high&amp;id=69a92066d1a09e29cbe6ceff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28085-improper-control-of-filename-for-in-765ce10f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28085%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Mahogany&amp;severity=high&amp;id=69a92064d1a09e29cbe6cebc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28084-improper-control-of-filename-for-in-75aa4cf8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28084%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Bazinga&amp;severity=high&amp;id=69a92064d1a09e29cbe6ceb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28081-improper-control-of-filename-for-in-6619b6bb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28081%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Windsor&amp;severity=high&amp;id=69a92064d1a09e29cbe6ceb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28079-improper-control-of-filename-for-in-e5dd1b45</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28079%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Conquerors&amp;severity=high&amp;id=69a92064d1a09e29cbe6ceb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28078-improper-limitation-of-a-pathname-t-8d7dc3a8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28078%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Stylemix%20uListing&amp;severity=medium&amp;id=69a92064d1a09e29cbe6ceb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28077-improper-control-of-filename-for-in-7af042b0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28077%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Vapester&amp;severity=high&amp;id=69a92064d1a09e29cbe6cead</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28076-missing-authorization-in-frenify-gu-8487132d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28076%3A%20Missing%20Authorization%20in%20Frenify%20Guff&amp;severity=high&amp;id=69a92064d1a09e29cbe6ceaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28075-improper-neutralization-of-input-du-ca12a7f8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28075%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20p-themes%20Porto&amp;severity=high&amp;id=69a92064d1a09e29cbe6cea7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28074-deserialization-of-untrusted-data-i-0ac23ece</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28074%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Pizza%20House&amp;severity=critical&amp;id=69a92064d1a09e29cbe6cea4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28072-improper-neutralization-of-input-du-e920df06</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28072%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PixFort%20pixfort%20Core&amp;severity=high&amp;id=69a92064d1a09e29cbe6cea1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28071-missing-authorization-in-pixfort-pi-5081bcec</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28071%3A%20Missing%20Authorization%20in%20PixFort%20pixfort%20Core&amp;severity=medium&amp;id=69a92061d1a09e29cbe6ce57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28069-improper-control-of-filename-for-in-60094f69</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28069%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Le%20Truffe&amp;severity=high&amp;id=69a92061d1a09e29cbe6ce54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28068-improper-control-of-filename-for-in-b4e10189</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28068%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Rhythmo&amp;severity=high&amp;id=69a92061d1a09e29cbe6ce51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28067-improper-control-of-filename-for-in-26745f1c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28067%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Bassein&amp;severity=high&amp;id=69a92061d1a09e29cbe6ce4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28066-improper-control-of-filename-for-in-bdb29538</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28066%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Legrand&amp;severity=high&amp;id=69a92061d1a09e29cbe6ce4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28065-improper-control-of-filename-for-in-2ad80c72</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28065%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Eject&amp;severity=high&amp;id=69a92061d1a09e29cbe6ce48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28064-improper-control-of-filename-for-in-b97d1b8e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28064%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Edge%20Decor&amp;severity=high&amp;id=69a92061d1a09e29cbe6ce45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28063-improper-control-of-filename-for-in-f8decddf</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28063%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Asia%20Garden&amp;severity=high&amp;id=69a92061d1a09e29cbe6ce42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28062-improper-control-of-filename-for-in-ff932e87</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28062%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Happy%20Baby&amp;severity=high&amp;id=69a92061d1a09e29cbe6ce3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28061-improper-control-of-filename-for-in-26df6673</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28061%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Tiger%20Claw&amp;severity=high&amp;id=69a92061d1a09e29cbe6ce3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28060-improper-control-of-filename-for-in-0c15d442</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28060%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20S.King&amp;severity=high&amp;id=69a9205fd1a09e29cbe6cdb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28059-improper-control-of-filename-for-in-236499f5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28059%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Dermatology%20Clinic&amp;severity=high&amp;id=69a9205fd1a09e29cbe6cdb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28058-improper-control-of-filename-for-in-cf407b28</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28058%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Dixon&amp;severity=high&amp;id=69a9205fd1a09e29cbe6cdae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28057-improper-control-of-filename-for-in-ec1b273e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28057%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Mandala&amp;severity=high&amp;id=69a9205fd1a09e29cbe6cdab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28056-improper-control-of-filename-for-in-373db8c6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28056%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20MCKinney&apos;s%20Politics&amp;severity=high&amp;id=69a9205fd1a09e29cbe6cda8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28055-improper-control-of-filename-for-in-024d6f86</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28055%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20M.Williamson&amp;severity=high&amp;id=69a9205fd1a09e29cbe6cda5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28054-improper-control-of-filename-for-in-ade08240</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28054%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Legal%20Stone&amp;severity=high&amp;id=69a9205fd1a09e29cbe6cda2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28053-improper-control-of-filename-for-in-ba94b1aa</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28053%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Miller&amp;severity=high&amp;id=69a9205fd1a09e29cbe6cd9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28052-improper-control-of-filename-for-in-5210e6d7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28052%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Peter%20Mason&amp;severity=high&amp;id=69a9205fd1a09e29cbe6cd9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28051-improper-control-of-filename-for-in-26a00534</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28051%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Yacht%20Rental&amp;severity=high&amp;id=69a9205fd1a09e29cbe6cd99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28050-improper-control-of-filename-for-in-11ea84ac</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28050%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Beacon&amp;severity=high&amp;id=69a9205dd1a09e29cbe69bb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28049-improper-control-of-filename-for-in-8faec466</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28049%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Police%20Department&amp;severity=high&amp;id=69a9205dd1a09e29cbe69bb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28048-improper-control-of-filename-for-in-ef6a6283</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28048%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20magentech%20FlashMart&amp;severity=high&amp;id=69a9205dd1a09e29cbe69bb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28047-improper-control-of-filename-for-in-826236d9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28047%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20magentech%20Victo&amp;severity=high&amp;id=69a9205dd1a09e29cbe69baf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28046-improper-control-of-filename-for-in-51cbc58c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28046%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Law%20Office&amp;severity=high&amp;id=69a9205dd1a09e29cbe69bac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28045-improper-control-of-filename-for-in-2fdee9df</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28045%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20N7%20%7C%20Golf%20Club%20Sports%20%26%20Events&amp;severity=high&amp;id=69a9205dd1a09e29cbe69ba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28043-improper-control-of-filename-for-in-d9ece99f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28043%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Healer%20-%20Doctor%2C%20Clinic%20%26%20Medical%20WordPress%20Theme&amp;severity=critical&amp;id=69a9205dd1a09e29cbe69ba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28042-improper-neutralization-of-input-du-ff3eb323</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28042%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Astoundify%20Listify&amp;severity=high&amp;id=69a9205dd1a09e29cbe69ba3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28041-improper-control-of-filename-for-in-b50b73c4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28041%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Grit&amp;severity=high&amp;id=69a9205dd1a09e29cbe69ba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28038-missing-authorization-in-brainstorm-d0becb86</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28038%3A%20Missing%20Authorization%20in%20Brainstorm_Force%20Ultimate%20Addons%20for%20WPBakery%20Page%20Builder&amp;severity=medium&amp;id=69a9205dd1a09e29cbe69b9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28037-improper-neutralization-of-input-du-e9083dcf</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28037%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ashanjay%20EventON&amp;severity=high&amp;id=69a9205bd1a09e29cbe69b66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28036-server-side-request-forgery-ssrf-in-3609b380</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28036%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20SkatDesign%20Ratatouille&amp;severity=medium&amp;id=69a9205bd1a09e29cbe69b63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28035-improper-control-of-filename-for-in-0b6138fc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28035%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Printy&amp;severity=high&amp;id=69a9205bd1a09e29cbe69b60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28034-improper-control-of-filename-for-in-1efa764b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28034%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Progress&amp;severity=high&amp;id=69a9205bd1a09e29cbe69b5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28033-improper-control-of-filename-for-in-6042504f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28033%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Edifice&amp;severity=high&amp;id=69a9205bd1a09e29cbe69b5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28032-improper-control-of-filename-for-in-00e05904</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28032%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Tuning&amp;severity=high&amp;id=69a9205bd1a09e29cbe69b57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28031-improper-control-of-filename-for-in-2dd9c45a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28031%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Invetex&amp;severity=high&amp;id=69a9205bd1a09e29cbe69b54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28030-improper-control-of-filename-for-in-2aab436d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28030%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Bonbon&amp;severity=high&amp;id=69a9205bd1a09e29cbe69b51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28029-improper-control-of-filename-for-in-59d71a4a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28029%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20EmojiNation&amp;severity=high&amp;id=69a9205bd1a09e29cbe69b4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28028-improper-control-of-filename-for-in-685d0513</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28028%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20MoneyFlow&amp;severity=high&amp;id=69a9205bd1a09e29cbe69b4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28027-improper-control-of-filename-for-in-7d3878a6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28027%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Kayon&amp;severity=high&amp;id=69a9205ad1a09e29cbe69b3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28026-improper-control-of-filename-for-in-0e5767c8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28026%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Motorix&amp;severity=high&amp;id=69a9205ad1a09e29cbe69b39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28025-improper-control-of-filename-for-in-038c8f04</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28025%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Stargaze&amp;severity=high&amp;id=69a9205ad1a09e29cbe69b36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28024-improper-control-of-filename-for-in-35450740</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28024%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Helion&amp;severity=high&amp;id=69a9205ad1a09e29cbe69b33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28023-improper-control-of-filename-for-in-80e0d822</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28023%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Nuts&amp;severity=high&amp;id=69a9205ad1a09e29cbe69b30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28022-improper-control-of-filename-for-in-b838d177</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28022%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Foodie&amp;severity=high&amp;id=69a9205ad1a09e29cbe69b2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28021-improper-control-of-filename-for-in-27adebf3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28021%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Craftis&amp;severity=high&amp;id=69a9205ad1a09e29cbe69b2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28020-improper-control-of-filename-for-in-6406328a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28020%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Chroma&amp;severity=high&amp;id=69a9205ad1a09e29cbe69b27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28019-improper-control-of-filename-for-in-e5d0049e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28019%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Manoir&amp;severity=high&amp;id=69a9205ad1a09e29cbe69b24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28018-improper-control-of-filename-for-in-ccd68ec7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28018%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Global%20Logistics&amp;severity=high&amp;id=69a9205ad1a09e29cbe69b21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28017-improper-control-of-filename-for-in-2390eba3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28017%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Green%20Thumb&amp;severity=high&amp;id=69a92058d1a09e29cbe69b0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28016-improper-control-of-filename-for-in-7a1e7f00</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28016%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Luxury%20Wine&amp;severity=high&amp;id=69a92058d1a09e29cbe69b08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28015-improper-control-of-filename-for-in-5b68c2a4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28015%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20ShiftCV&amp;severity=high&amp;id=69a92058d1a09e29cbe69b05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28014-improper-control-of-filename-for-in-757c6072</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28014%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Translogic&amp;severity=high&amp;id=69a92058d1a09e29cbe69b02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28013-improper-control-of-filename-for-in-a1601827</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28013%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Kratz&amp;severity=high&amp;id=69a92058d1a09e29cbe69aff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28012-improper-control-of-filename-for-in-aafc03f6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28012%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Gridiron&amp;severity=high&amp;id=69a92058d1a09e29cbe69afc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28011-improper-control-of-filename-for-in-a5fc4a54</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28011%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Yottis&amp;severity=high&amp;id=69a92058d1a09e29cbe69af9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28010-improper-control-of-filename-for-in-a162a3c4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28010%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Scientia&amp;severity=high&amp;id=69a92058d1a09e29cbe69af6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28009-improper-control-of-filename-for-in-dc66f9f3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28009%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20DroneX&amp;severity=high&amp;id=69a92058d1a09e29cbe69af3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28007-improper-control-of-filename-for-in-99021ba4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28007%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Coinpress&amp;severity=high&amp;id=69a92058d1a09e29cbe69af0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28006-improper-control-of-filename-for-in-a4ecdcbe</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28006%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Yungen&amp;severity=high&amp;id=69a92057d1a09e29cbe69ab1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27998-improper-control-of-filename-for-in-12ca101c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27998%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Vixus&amp;severity=high&amp;id=69a92057d1a09e29cbe69aae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27997-improper-control-of-filename-for-in-77e50207</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27997%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Maxify&amp;severity=high&amp;id=69a92057d1a09e29cbe69aab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27996-improper-control-of-filename-for-in-62aafe73</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27996%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Lingvico&amp;severity=high&amp;id=69a92057d1a09e29cbe69aa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27995-improper-control-of-filename-for-in-aa24d396</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27995%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Justitia&amp;severity=high&amp;id=69a92057d1a09e29cbe69aa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27994-improper-control-of-filename-for-in-a1fd84c5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27994%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Tediss&amp;severity=high&amp;id=69a92057d1a09e29cbe69aa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27993-improper-control-of-filename-for-in-041f00ee</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27993%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Aldo&amp;severity=high&amp;id=69a92057d1a09e29cbe69a9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27992-improper-control-of-filename-for-in-da0000f1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27992%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Meals%20%26%20Wheels&amp;severity=high&amp;id=69a92057d1a09e29cbe69a9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27991-improper-control-of-filename-for-in-e256ab83</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27991%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Avventure&amp;severity=high&amp;id=69a92057d1a09e29cbe69a99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27990-improper-control-of-filename-for-in-a9f96a05</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27990%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20ConFix&amp;severity=high&amp;id=69a92057d1a09e29cbe69a96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27989-improper-control-of-filename-for-in-f028553d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27989%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Quanzo&amp;severity=high&amp;id=69a92055d1a09e29cbe69a6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27988-improper-control-of-filename-for-in-7f90503a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27988%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Equadio&amp;severity=high&amp;id=69a92055d1a09e29cbe69a68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27987-improper-control-of-filename-for-in-0025b225</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27987%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20The%20Qlean&amp;severity=high&amp;id=69a92055d1a09e29cbe69a65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27986-improper-control-of-filename-for-in-f2123586</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27986%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20OsTende&amp;severity=high&amp;id=69a92055d1a09e29cbe69a62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27985-improper-control-of-filename-for-in-d33935f0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27985%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Humanum&amp;severity=high&amp;id=69a92055d1a09e29cbe69a5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27984-improper-control-of-generation-of-c-d48e285a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27984%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Marketing%20Fire%20Widget%20Options&amp;severity=critical&amp;id=69a92055d1a09e29cbe69a5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27983-incorrect-privilege-assignment-in-d-cf32648b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27983%3A%20Incorrect%20Privilege%20Assignment%20in%20designthemes%20LMS%20Elementor%20Pro&amp;severity=critical&amp;id=69a92055d1a09e29cbe69a59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27541-incorrect-privilege-assignment-in-j-9a7e8fac</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27541%3A%20Incorrect%20Privilege%20Assignment%20in%20Josh%20Kohlbach%20Wholesale%20Suite&amp;severity=high&amp;id=69a92055d1a09e29cbe69a56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27439-deserialization-of-untrusted-data-i-63eba95d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27439%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Dentario&amp;severity=critical&amp;id=69a92055d1a09e29cbe69a53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27438-deserialization-of-untrusted-data-i-b424714d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27438%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Kingler&amp;severity=critical&amp;id=69a92055d1a09e29cbe69a50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27437-deserialization-of-untrusted-data-i-403814d1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27437%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Tennis%20Club&amp;severity=critical&amp;id=69a92053d1a09e29cbe69a20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27428-improper-neutralization-of-special--bfd793a5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27428%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Eagle-Themes%20Eagle%20Booking&amp;severity=high&amp;id=69a92053d1a09e29cbe69a1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27417-deserialization-of-untrusted-data-i-f4ac8888</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27417%3A%20Deserialization%20of%20Untrusted%20Data%20in%20SeventhQueen%20Sweet%20Date&amp;severity=critical&amp;id=69a92053d1a09e29cbe69a1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27411-guessable-captcha-in-jp-secure-site-7081f6e0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27411%3A%20Guessable%20CAPTCHA%20in%20jp-secure%20SiteGuard%20WP%20Plugin&amp;severity=medium&amp;id=69a92053d1a09e29cbe69a17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27406-insertion-of-sensitive-information--c759245d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27406%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Joe%20Dolson%20My%20Tickets&amp;severity=high&amp;id=69a92053d1a09e29cbe69a14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27396-missing-authorization-in-e-plugins--7a7a7e71</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27396%3A%20Missing%20Authorization%20in%20e-plugins%20Directory%20Pro&amp;severity=high&amp;id=69a92053d1a09e29cbe69a11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27390-authentication-bypass-using-an-alte-41148b94</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27390%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20designthemes%20WeDesignTech%20Ultimate%20Booking%20Addon&amp;severity=high&amp;id=69a92053d1a09e29cbe69a0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27389-authentication-bypass-using-an-alte-aec8b6d3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27389%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20designthemes%20WeDesignTech%20Ultimate%20Booking%20Addon&amp;severity=critical&amp;id=69a92053d1a09e29cbe69a0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27388-missing-authorization-in-designthem-4eb7163c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27388%3A%20Missing%20Authorization%20in%20designthemes%20DesignThemes%20Booking%20Manager&amp;severity=high&amp;id=69a92053d1a09e29cbe69a08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27386-missing-authorization-in-designthem-e450ed01</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27386%3A%20Missing%20Authorization%20in%20designthemes%20DesignThemes%20Directory%20Addon&amp;severity=high&amp;id=69a92053d1a09e29cbe69a05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27385-improper-neutralization-of-input-du-d65b28b7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27385%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20designthemes%20DesignThemes%20Portfolio&amp;severity=high&amp;id=69a92052d1a09e29cbe69995</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27384-improper-validation-of-specified-qu-541ac9e2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27384%3A%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20BoldGrid%20W3%20Total%20Cache&amp;severity=critical&amp;id=69a92052d1a09e29cbe69992</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27383-improper-control-of-filename-for-in-a0717a1e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27383%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20RadiusTheme%20Metro&amp;severity=high&amp;id=69a92052d1a09e29cbe6998f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27382-improper-neutralization-of-input-du-af6905cd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27382%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RadiusTheme%20Metro&amp;severity=high&amp;id=69a92052d1a09e29cbe6998c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27381-improper-control-of-filename-for-in-d7e4f02a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27381%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Aora&amp;severity=high&amp;id=69a92052d1a09e29cbe69989</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27376-improper-neutralization-of-input-du-d7b9308c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27376%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20JanStudio%20Claue%20-%20Clean%2C%20Minimal%20Elementor%20WooCommerce%20Theme&amp;severity=high&amp;id=69a92052d1a09e29cbe69986</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27375-improper-neutralization-of-input-du-0a641b64</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27375%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20JanStudio%20Gecko&amp;severity=high&amp;id=69a92052d1a09e29cbe69983</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27374-missing-authorization-in-vanquish-w-68390e32</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27374%3A%20Missing%20Authorization%20in%20vanquish%20WooCommerce%20Order%20Details&amp;severity=high&amp;id=69a92051d1a09e29cbe69980</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27373-improper-neutralization-of-special--971d812f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27373%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Essekia%20Tablesome&amp;severity=high&amp;id=69a92051d1a09e29cbe6997d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27370-insertion-of-sensitive-information--279a6a34</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27370%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Premio%20Chaty&amp;severity=high&amp;id=69a92051d1a09e29cbe6997a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27369-deserialization-of-untrusted-data-i-760b76dd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27369%3A%20Deserialization%20of%20Untrusted%20Data%20in%20BoldThemes%20Celeste&amp;severity=high&amp;id=69a92050d1a09e29cbe6996d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27367-improper-neutralization-of-input-du-061da31a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27367%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeGoods%20Musico&amp;severity=high&amp;id=69a92050d1a09e29cbe6996a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27363-improper-neutralization-of-input-du-2181ae7d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27363%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kamleshyadav%20WP%20Bakery%20Autoresponder%20Addon&amp;severity=high&amp;id=69a92050d1a09e29cbe69967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27362-missing-authorization-in-kamleshyad-456b5eb3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27362%3A%20Missing%20Authorization%20in%20kamleshyadav%20WP%20Bakery%20Autoresponder%20Addon&amp;severity=medium&amp;id=69a92050d1a09e29cbe69964</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27361-missing-authorization-in-webcodingp-a42d6412</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27361%3A%20Missing%20Authorization%20in%20WebCodingPlace%20Responsive%20Posts%20Carousel%20Pro&amp;severity=high&amp;id=69a92050d1a09e29cbe69961</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27359-improper-neutralization-of-input-du-dd7a632d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27359%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fox-themes%20Awa%20Plugins&amp;severity=high&amp;id=69a92050d1a09e29cbe6995e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27358-improper-neutralization-of-input-du-9ef29754</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27358%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeGoods%20Architecturer&amp;severity=high&amp;id=69a92050d1a09e29cbe6995b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27354-improper-neutralization-of-input-du-9dc82acf</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27354%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WebCodingPlace%20WooCommerce%20Coming%20Soon%20Product%20with%20Countdown&amp;severity=medium&amp;id=69a92050d1a09e29cbe69958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27353-improper-neutralization-of-input-du-6033291d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27353%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeGoods%20Grand%20News&amp;severity=high&amp;id=69a92050d1a09e29cbe69955</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27352-improper-neutralization-of-input-du-48680ff1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27352%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeGoods%20Starto&amp;severity=high&amp;id=69a92050d1a09e29cbe69952</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27348-improper-neutralization-of-input-du-916d628b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27348%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeGoods%20Photography&amp;severity=high&amp;id=69a9204fd1a09e29cbe6993a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27344-missing-authorization-in-inseriswis-acb5351c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27344%3A%20Missing%20Authorization%20in%20inseriswiss%20inseri%20core&amp;severity=medium&amp;id=69a9204fd1a09e29cbe69937</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27342-improper-control-of-filename-for-in-b223740e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27342%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20TopFit%20-%20Fitness%20and%20Gym%20WordPress%20Theme&amp;severity=high&amp;id=69a9204fd1a09e29cbe69934</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27341-improper-control-of-filename-for-in-07040eac</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27341%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20TopScorer%20-%20Sports%20WordPress%20Theme&amp;severity=high&amp;id=69a9204fd1a09e29cbe69931</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27340-improper-control-of-filename-for-in-649037d4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27340%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Apollo%20%7C%20Night%20Club%2C%20DJ%20Event%20WordPress%20Theme&amp;severity=high&amp;id=69a9204fd1a09e29cbe6992e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27339-improper-control-of-filename-for-in-0d751dca</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27339%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Buzz%20Stone%20%7C%20Magazine%20%26%20Viral%20Blog%20WordPress%20Theme&amp;severity=high&amp;id=69a9204fd1a09e29cbe6992b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27338-deserialization-of-untrusted-data-i-c9ca4dcb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27338%3A%20Deserialization%20of%20Untrusted%20Data%20in%20AivahThemes%20Car%20Zone&amp;severity=high&amp;id=69a9204fd1a09e29cbe69928</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27337-improper-control-of-filename-for-in-c7e0865a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27337%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Chronicle%20-%20Lifestyle%20Magazine%20%26%20Blog%20WordPress%20Theme&amp;severity=high&amp;id=69a9204fd1a09e29cbe69925</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27336-improper-control-of-filename-for-in-14ec8c54</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27336%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Consultor%20%7C%20Consulting%2C%20Accounting%20%26%20Legal%20Counsel%20WordPress%20Theme&amp;severity=high&amp;id=69a9204fd1a09e29cbe69922</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27335-improper-control-of-filename-for-in-81980ea3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27335%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Ekoterra%20-%20NonProfit%2C%20Green%20Energy%20%26%20Ecology%20Theme&amp;severity=high&amp;id=69a9204fd1a09e29cbe6991f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27334-improper-control-of-filename-for-in-b3419336</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27334%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20dan_fisher%20Alchemists&amp;severity=high&amp;id=69a9204dd1a09e29cbe69912</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27332-improper-neutralization-of-input-du-e06e212b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27332%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20skygroup%20Agrofood&amp;severity=high&amp;id=69a9204dd1a09e29cbe6990f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27326-improper-control-of-filename-for-in-5f8d2dda</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27326%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20AC%20Services%20%7C%20HVAC%2C%20Air%20Conditioning%20%26%20Heating%20Company%20WordPress%20Theme&amp;severity=high&amp;id=69a9204dd1a09e29cbe6990c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27098-deserialization-of-untrusted-data-i-11591bf0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27098%3A%20Deserialization%20of%20Untrusted%20Data%20in%20axiomthemes%20Au%20Pair%20Agency%20-%20Babysitting%20%26%20Nanny%20Theme&amp;severity=high&amp;id=69a9204dd1a09e29cbe69909</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27097-improper-control-of-filename-for-in-03e1caa9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27097%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20CasaMia%20%7C%20Property%20Rental%20Real%20Estate%20WordPress%20Theme&amp;severity=high&amp;id=69a9204dd1a09e29cbe69906</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24963-incorrect-privilege-assignment-in-a-797c6fe9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24963%3A%20Incorrect%20Privilege%20Assignment%20in%20ameliabooking%20Amelia&amp;severity=high&amp;id=69a9204dd1a09e29cbe69903</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24960-unrestricted-upload-of-file-with-da-2d924f8c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24960%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20zozothemes%20Charety&amp;severity=critical&amp;id=69a9204dd1a09e29cbe69900</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24385-deserialization-of-untrusted-data-i-63919416</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24385%3A%20Deserialization%20of%20Untrusted%20Data%20in%20gerritvanaaken%20Podlove%20Web%20Player&amp;severity=high&amp;id=69a9204dd1a09e29cbe698fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23802-unrestricted-upload-of-file-with-da-19d38ea8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23802%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Jordy%20Meow%20AI%20Engine&amp;severity=critical&amp;id=69a9204dd1a09e29cbe698fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23801-improper-control-of-filename-for-in-4391710d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23801%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20fuelthemes%20The%20Issue&amp;severity=high&amp;id=69a9204dd1a09e29cbe698f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23799-missing-authorization-in-themeum-tu-99e647be</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23799%3A%20Missing%20Authorization%20in%20Themeum%20Tutor%20LMS&amp;severity=medium&amp;id=69a9204cd1a09e29cbe698dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23798-deserialization-of-untrusted-data-i-1df0e723</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23798%3A%20Deserialization%20of%20Untrusted%20Data%20in%20blubrry%20PowerPress%20Podcasting&amp;severity=high&amp;id=69a9204cd1a09e29cbe698d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23546-insertion-of-sensitive-information--e32c6a86</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23546%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20RadiusTheme%20Classified%20Listing&amp;severity=medium&amp;id=69a9204cd1a09e29cbe698d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22501-deserialization-of-untrusted-data-i-99d52e1a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22501%3A%20Deserialization%20of%20Untrusted%20Data%20in%20axiomthemes%20Mounthood&amp;severity=critical&amp;id=69a9204cd1a09e29cbe698d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22497-deserialization-of-untrusted-data-i-30f5a2c9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22497%3A%20Deserialization%20of%20Untrusted%20Data%20in%20AncoraThemes%20Jardi&amp;severity=critical&amp;id=69a9204cd1a09e29cbe698d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22479-missing-authorization-in-themeruby--966dbed0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22479%3A%20Missing%20Authorization%20in%20ThemeRuby%20Easy%20Post%20Submission&amp;severity=high&amp;id=69a9204cd1a09e29cbe698cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22478-improper-control-of-filename-for-in-85bc5149</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22478%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20FindAll&amp;severity=high&amp;id=69a9204cd1a09e29cbe698ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22477-improper-control-of-filename-for-in-e68163d9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22477%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Felizia&amp;severity=high&amp;id=69a9204cd1a09e29cbe698c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22476-improper-control-of-filename-for-in-8b3dac27</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22476%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Etchy&amp;severity=high&amp;id=69a9204cd1a09e29cbe698c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22475-deserialization-of-untrusted-data-i-fdb7016e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22475%3A%20Deserialization%20of%20Untrusted%20Data%20in%20axiomthemes%20Estate&amp;severity=critical&amp;id=69a9204cd1a09e29cbe698c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22474-deserialization-of-untrusted-data-i-3cd33ca2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22474%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Equestrian%20Centre&amp;severity=critical&amp;id=69a9204ad1a09e29cbe698a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22473-deserialization-of-untrusted-data-i-73086e9e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22473%3A%20Deserialization%20of%20Untrusted%20Data%20in%20designthemes%20Dental%20Clinic&amp;severity=high&amp;id=69a9204ad1a09e29cbe698a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22471-deserialization-of-untrusted-data-i-5a025546</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22471%3A%20Deserialization%20of%20Untrusted%20Data%20in%20maximsecudeal%20Secudeal%20Payments%20for%20Ecommerce&amp;severity=high&amp;id=69a9204ad1a09e29cbe698a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22467-improper-neutralization-of-input-du-f26411c1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22467%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mwtemplates%20DeepDigital&amp;severity=high&amp;id=69a9204ad1a09e29cbe698a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22465-improper-neutralization-of-input-du-bdb628c5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22465%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SeventhQueen%20BuddyApp&amp;severity=high&amp;id=69a9204ad1a09e29cbe6989d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22460-improper-limitation-of-a-pathname-t-fd2b1f28</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22460%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wpWax%20FormGent&amp;severity=high&amp;id=69a9204ad1a09e29cbe6989a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22459-missing-authorization-in-blend-medi-92549eee</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22459%3A%20Missing%20Authorization%20in%20Blend%20Media%20WordPress%20CTA&amp;severity=medium&amp;id=69a9204ad1a09e29cbe69897</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22457-improper-control-of-filename-for-in-868a0150</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22457%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Wanderland&amp;severity=high&amp;id=69a9204ad1a09e29cbe69894</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22456-improper-control-of-filename-for-in-ae786313</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22456%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Askka&amp;severity=high&amp;id=69a9204ad1a09e29cbe69891</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22455-improper-neutralization-of-input-du-4ccc05ac</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22455%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20foreverpinetree%20Thebe&amp;severity=high&amp;id=69a9204ad1a09e29cbe6988e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22454-deserialization-of-untrusted-data-i-877aac02</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22454%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Solaris&amp;severity=critical&amp;id=69a92049d1a09e29cbe69841</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22453-deserialization-of-untrusted-data-i-d455e2c5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22453%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Pets%20Club&amp;severity=critical&amp;id=69a92049d1a09e29cbe6983e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22452-improper-control-of-filename-for-in-300b3ba9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22452%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Hoverex&amp;severity=high&amp;id=69a92049d1a09e29cbe6983b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22451-deserialization-of-untrusted-data-i-bc4a2c4f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22451%3A%20Deserialization%20of%20Untrusted%20Data%20in%20AncoraThemes%20Handyman&amp;severity=critical&amp;id=69a92049d1a09e29cbe69838</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22449-improper-control-of-filename-for-in-92a5942f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22449%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Select-Themes%20Don%20Peppe&amp;severity=high&amp;id=69a92049d1a09e29cbe69835</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22446-improper-control-of-filename-for-in-d1d7804b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22446%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Select-Themes%20Prowess&amp;severity=high&amp;id=69a92049d1a09e29cbe69832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22443-improper-control-of-filename-for-in-37f6a4c1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22443%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Alliance&amp;severity=high&amp;id=69a92049d1a09e29cbe6982f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22442-improper-control-of-filename-for-in-2b886240</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22442%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20LaunchandSell%20Tribe&amp;severity=high&amp;id=69a92049d1a09e29cbe6982c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22441-improper-control-of-filename-for-in-8462f283</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22441%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Zentrum&amp;severity=high&amp;id=69a92049d1a09e29cbe69829</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22440-improper-neutralization-of-input-du-6a9ec730</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22440%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20foreverpinetree%20Thecs&amp;severity=high&amp;id=69a92049d1a09e29cbe69826</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22439-improper-control-of-filename-for-in-92017b3b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22439%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Green%20Planet&amp;severity=high&amp;id=69a92047d1a09e29cbe69805</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22438-improper-neutralization-of-input-du-cd3f5d58</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22438%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20foreverpinetree%20TheBi&amp;severity=high&amp;id=69a92047d1a09e29cbe69802</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22437-improper-control-of-filename-for-in-c8697122</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22437%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Playa&amp;severity=high&amp;id=69a92047d1a09e29cbe697ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22436-improper-control-of-filename-for-in-d8253faf</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22436%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Helvig&amp;severity=high&amp;id=69a92047d1a09e29cbe697fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22435-improper-control-of-filename-for-in-b7bce220</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22435%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20ElectroServ&amp;severity=high&amp;id=69a92047d1a09e29cbe697f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22434-improper-control-of-filename-for-in-d5cb92d7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22434%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Crown%20Art&amp;severity=high&amp;id=69a92047d1a09e29cbe697f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22433-improper-control-of-filename-for-in-fb1443bd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22433%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20CloudMe&amp;severity=high&amp;id=69a92047d1a09e29cbe697f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22432-improper-control-of-filename-for-in-13d73b2c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22432%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Woopy&amp;severity=high&amp;id=69a92047d1a09e29cbe697f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22431-improper-control-of-filename-for-in-bfe90a6f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22431%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Wabi-Sabi&amp;severity=high&amp;id=69a92047d1a09e29cbe697ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22429-improper-control-of-filename-for-in-08e3884d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22429%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Verdure&amp;severity=high&amp;id=69a92047d1a09e29cbe697ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22428-improper-control-of-filename-for-in-543d64d0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22428%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Tooth%20Fairy&amp;severity=high&amp;id=69a92045d1a09e29cbe697a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22427-improper-control-of-filename-for-in-14d5f2b4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22427%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20GoTravel&amp;severity=high&amp;id=69a92045d1a09e29cbe697a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22425-improper-control-of-filename-for-in-f35c03aa</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22425%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Sweet%20Jane&amp;severity=high&amp;id=69a92045d1a09e29cbe697a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22424-improper-control-of-filename-for-in-ca180096</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22424%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Shaha&amp;severity=high&amp;id=69a92045d1a09e29cbe6979d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22423-improper-control-of-filename-for-in-ef3a1c6c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22423%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Select-Themes%20SetSail&amp;severity=high&amp;id=69a92045d1a09e29cbe6979a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22421-improper-control-of-filename-for-in-bb63cc46</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22421%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Quantum&amp;severity=high&amp;id=69a92045d1a09e29cbe69797</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22420-improper-control-of-filename-for-in-503c4017</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22420%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Horizon&amp;severity=high&amp;id=69a92045d1a09e29cbe69794</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22419-improper-control-of-filename-for-in-61a3c05c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22419%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Honor&amp;severity=high&amp;id=69a92045d1a09e29cbe69791</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22418-improper-control-of-filename-for-in-6486ba9a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22418%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Great%20Lotus&amp;severity=high&amp;id=69a92045d1a09e29cbe6978e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22417-deserialization-of-untrusted-data-i-623bd60f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22417%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeGoods%20Grand%20Wedding&amp;severity=critical&amp;id=69a92045d1a09e29cbe6978b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22416-improper-control-of-filename-for-in-a2d7893e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22416%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20FixTeam&amp;severity=high&amp;id=69a92043d1a09e29cbe6976b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22415-improper-control-of-filename-for-in-5cb350fc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22415%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20The%20Mounty&amp;severity=high&amp;id=69a92043d1a09e29cbe69768</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22414-improper-control-of-filename-for-in-aa35a28f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22414%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Marra&amp;severity=high&amp;id=69a92043d1a09e29cbe69765</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22413-improper-control-of-filename-for-in-ac890de3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22413%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Malgr%C3%A9&amp;severity=high&amp;id=69a92043d1a09e29cbe69762</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22412-improper-control-of-filename-for-in-d10b6e07</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22412%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Eona&amp;severity=high&amp;id=69a92043d1a09e29cbe6975f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22410-improper-control-of-filename-for-in-0e344228</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22410%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Dolcino&amp;severity=high&amp;id=69a92043d1a09e29cbe6975c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22408-improper-control-of-filename-for-in-2599dfe1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22408%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Justicia&amp;severity=high&amp;id=69a92043d1a09e29cbe69759</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22405-improper-control-of-filename-for-in-309c37ce</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22405%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Overton&amp;severity=high&amp;id=69a92043d1a09e29cbe69756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22403-improper-control-of-filename-for-in-37688ae6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22403%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Innovio&amp;severity=high&amp;id=69a92043d1a09e29cbe69753</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22399-improper-control-of-filename-for-in-9c204200</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22399%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Holmes&amp;severity=high&amp;id=69a92043d1a09e29cbe69750</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22397-improper-control-of-filename-for-in-a2cedb55</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22397%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Fleur&amp;severity=high&amp;id=69a92041d1a09e29cbe696f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22395-improper-control-of-filename-for-in-2eececbe</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22395%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Fiorello&amp;severity=high&amp;id=69a92041d1a09e29cbe696f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22394-improper-control-of-filename-for-in-35a399ba</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22394%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Evently&amp;severity=high&amp;id=69a92041d1a09e29cbe696ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22392-improper-control-of-filename-for-in-563f1427</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22392%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Cortex&amp;severity=high&amp;id=69a92041d1a09e29cbe696eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22390-improper-control-of-generation-of-c-c30abc34</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22390%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Builderall%20Builderall%20Builder%20for%20WordPress&amp;severity=critical&amp;id=69a92041d1a09e29cbe696e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22389-improper-control-of-filename-for-in-8194ceac</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22389%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Cocco&amp;severity=high&amp;id=69a92041d1a09e29cbe696e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22387-improper-control-of-filename-for-in-142b7be4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22387%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Aviana&amp;severity=high&amp;id=69a92041d1a09e29cbe696e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22385-improper-control-of-filename-for-in-02aa55fa</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22385%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20don-themes%20Wolmart&amp;severity=high&amp;id=69a92041d1a09e29cbe696df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69411-improper-limitation-of-a-pathname-t-2cfd9ad8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69411%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Robert%20Seyfriedsberger%20ionCube%20tester%20plus&amp;severity=high&amp;id=69a92041d1a09e29cbe696dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69343-improper-neutralization-of-input-du-0837cb58</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69343%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jeroen%20Schmit%20Theater%20for%20WordPress&amp;severity=medium&amp;id=69a92041d1a09e29cbe696d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69340-missing-authorization-in-buddhathem-02241919</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69340%3A%20Missing%20Authorization%20in%20BuddhaThemes%20WeDesignTech%20Ultimate%20Booking%20Addon&amp;severity=high&amp;id=69a9203fd1a09e29cbe696bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69339-improper-control-of-filename-for-in-5f15ca00</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69339%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20don-themes%20Molla&amp;severity=high&amp;id=69a9203fd1a09e29cbe696ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69338-improper-neutralization-of-special--1af8d4c8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69338%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20don-themes%20Riode%20Core&amp;severity=critical&amp;id=69a9203fd1a09e29cbe696b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69090-improper-control-of-filename-for-in-f710c44c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69090%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ovatheme%20Remons&amp;severity=high&amp;id=69a9203fd1a09e29cbe696b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68555-unrestricted-upload-of-file-with-da-5ac31c3e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68555%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20zozothemes%20Nutrie&amp;severity=critical&amp;id=69a9203fd1a09e29cbe696b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68554-unrestricted-upload-of-file-with-da-a493cdbe</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68554%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20zozothemes%20Keenarch&amp;severity=critical&amp;id=69a9203fd1a09e29cbe696ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68553-unrestricted-upload-of-file-with-da-cd37dfb8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68553%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20zozothemes%20Lendiz&amp;severity=critical&amp;id=69a9203fd1a09e29cbe696ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68515-insertion-of-sensitive-information--62331a0f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68515%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Roland%20Murg%20WP%20Booking%20System&amp;severity=medium&amp;id=69a9203fd1a09e29cbe696a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54001-deserialization-of-untrusted-data-i-e9d6138e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54001%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Classter&amp;severity=critical&amp;id=69a9203fd1a09e29cbe696a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53335-improper-control-of-filename-for-in-9d2967e7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53335%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Berger&amp;severity=high&amp;id=69a9203fd1a09e29cbe696a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29053-cwe-74-improper-neutralization-of-s-51d11c69</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29053%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20TryGhost%20Ghost&amp;severity=high&amp;id=69a91cb5d1a09e29cbe4c25b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29052-cwe-79-improper-neutralization-of-i-43c74935</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29052%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20humhub%20calendar&amp;severity=medium&amp;id=69a91cb5d1a09e29cbe4c257</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23767-missing-authentication-for-critical-37ea4536</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23767%3A%20Missing%20authentication%20for%20critical%20function%20in%20Seiko%20Epson%20Corporation%20ESC%2FPOS&amp;severity=critical&amp;id=69a91cb5d1a09e29cbe4c252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30777-authentication-bypass-using-an-alte-e04cf396</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30777%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20EC-CUBE%20CO.%2CLTD.%20EC-CUBE%204.1%20series&amp;severity=medium&amp;id=69a915a0d1a09e29cbe15ab1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27982-url-redirection-to-untrusted-site-o-049b9d08</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27982%3A%20URL%20redirection%20to%20untrusted%20site%20(&apos;Open%20Redirect&apos;)%20in%20allauth%20django-allauth&amp;severity=medium&amp;id=69a915a0d1a09e29cbe15aaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3072-cwe-862-missing-authorization-in-dgl-1e291b23</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3072%3A%20CWE-862%20Missing%20Authorization%20in%20dglingren%20Media%20Library%20Assistant&amp;severity=medium&amp;id=69a915a0d1a09e29cbe15ab5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29128-cwe-522-insufficiently-protected-cr-67a32621</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29128%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20International%20Datacasting%20Corporation%20SFX2100%20Satellite%20Receiver&amp;severity=high&amp;id=69a915a0d1a09e29cbe15aae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3523-cwe-89-improper-neutralization-of-sp-c5526c0e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3523%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20blobfolio%20Apocalypse%20Meow&amp;severity=medium&amp;id=69a90b11d1a09e29cbdaab81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nation-state-ios-exploit-kit-coruna-found-powering-b64cff88</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nation-State%20iOS%20Exploit%20Kit%20%E2%80%98Coruna%E2%80%99%20Found%20Powering%20Global%20Attacks&amp;severity=medium&amp;id=69a903d6d1a09e29cbbe0e19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2899-cwe-862-missing-authorization-in-tec-1e943f40</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2899%3A%20CWE-862%20Missing%20Authorization%20in%20techjewel%20Fluent%20Forms%20Pro%20Add%20On%20Pack&amp;severity=medium&amp;id=69a90085d1a09e29cbba97b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3034-cwe-79-improper-neutralization-of-in-49065add</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3034%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sagarpatel124%20OoohBoi%20Steroids%20for%20Elementor&amp;severity=medium&amp;id=69a90085d1a09e29cbba97b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2365-cwe-79-improper-neutralization-of-in-e1b09f37</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2365%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20techjewel%20Fluent%20Forms%20Pro%20Add%20On%20Pack&amp;severity=high&amp;id=69a90085d1a09e29cbba97ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29127-cwe-269-improper-privilege-manageme-e5c7745e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29127%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20International%20Datacasting%20Corporation%20SFX2100%20Satellite%20Receiver&amp;severity=critical&amp;id=69a8f5fbd1a09e29cbacc596</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26034-incorrect-default-permissions-in-de-ce6196d8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26034%3A%20Incorrect%20default%20permissions%20in%20Dell%20Inc.%20UPS%20Multi-UPS%20Management%20Console%20(MUMC)&amp;severity=high&amp;id=69a8f5fbd1a09e29cbacc592</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26033-unquoted-search-path-or-element-in--dd92d150</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26033%3A%20Unquoted%20search%20path%20or%20element%20in%20Dell%20Inc.%20UPS%20Multi-UPS%20Management%20Console%20(MUMC)&amp;severity=medium&amp;id=69a8f5fbd1a09e29cbacc58e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/differentiating-between-a-targeted-intrusion-and-a-40c30509</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Differentiating%20Between%20a%20Targeted%20Intrusion%20and%20an%20Automated%20Opportunistic%20Scanning%20%26%23x5b%3BGuest%20Diary%26%23x5d%3B%2C%20(Wed%2C%20Mar%204th)&amp;severity=medium&amp;id=69a8eb3ad1a09e29cba41920</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57854-cwe-338-use-of-cryptographically-we-ad4e767f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57854%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20DOUGDUDE%20Net%3A%3ANSCA%3A%3AClient&amp;severity=critical&amp;id=69a8f5fbd1a09e29cbacc58a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29126-cwe-732-incorrect-permission-assign-601890c3</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29126%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20International%20Datacasting%20Corporation%20SFX2100%20Satellite%20Receiver&amp;severity=high&amp;id=69a8e7f5d1a09e29cba26c3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40931-cwe-340-generation-of-predictable-n-2e8b6bd2</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40931%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20CHORNY%20Apache%3A%3ASession%3A%3AGenerate%3A%3AMD5&amp;severity=critical&amp;id=69a8e7f5d1a09e29cba26c30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29125-cwe-732-incorrect-permission-assign-edae591f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29125%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20International%20Datacasting%20Corporation%20SFX2100%20Satellite%20Receiver&amp;severity=high&amp;id=69a8e7f5d1a09e29cba26c37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3257-cwe-1395-dependency-on-vulnerable-th-51180545</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3257%3A%20CWE-1395%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20TOKUHIROM%20UnQLite&amp;severity=critical&amp;id=69a8e7f5d1a09e29cba26c3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3381-cwe-1395-dependency-on-vulnerable-th-477a2de6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3381%3A%20CWE-1395%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20PMQS%20Compress%3A%3ARaw%3A%3AZlib&amp;severity=critical&amp;id=69a8e7f5d1a09e29cba26c42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40926-cwe-340-generation-of-predictable-n-bc6c4282</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40926%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20KAZEBURO%20Plack%3A%3AMiddleware%3A%3ASession%3A%3ASimple&amp;severity=critical&amp;id=69a8e7f5d1a09e29cba26c29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29124-cwe-269-improper-privilege-manageme-bd7d8889</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29124%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20International%20Datacasting%20Corporation%20SFX2100%20Satellite%20Receiver&amp;severity=high&amp;id=69a8e7f5d1a09e29cba26c34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29123-cwe-269-improper-privilege-manageme-a521f86f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29123%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20International%20Datacasting%20Corporation%20SFX2100%20Satellite%20Receiver&amp;severity=high&amp;id=69a8dd5dd1a09e29cb9d46b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29122-cwe-269-improper-privilege-manageme-f4a310aa</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29122%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20International%20Datacasting%20Corporation%20SFX2100%20Satellite%20Receiver&amp;severity=high&amp;id=69a8dd5dd1a09e29cb9d46ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29121-cwe-269-improper-privilege-manageme-59cf4f7c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29121%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20International%20Datacasting%20Corporation%20SFX2100%20Satellite%20Receiver&amp;severity=high&amp;id=69a8d655d1a09e29cb94528d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-05-ac68c866</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-05&amp;severity=medium&amp;id=69aa1c8cc48b3f10ff8ed5b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70995-na-8ec01cad</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70995%3A%20n%2Fa&amp;severity=high&amp;id=69a9f294c48b3f10ff5116cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70949-na-4f28d6ff</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70949%3A%20n%2Fa&amp;severity=high&amp;id=69a9f294c48b3f10ff5116c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70948-na-00703f46</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70948%3A%20n%2Fa&amp;severity=critical&amp;id=69a9f294c48b3f10ff5116c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70614-na-ea052519</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70614%3A%20n%2Fa&amp;severity=high&amp;id=69a9e67761e8e69ef5f70090</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29165-na-53b6caed</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29165%3A%20n%2Fa&amp;severity=critical&amp;id=69a9e2f561e8e69ef5e92409</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70616-na-996c656a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70616%3A%20n%2Fa&amp;severity=high&amp;id=69a9d16b61e8e69ef5d12480</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26418-na-62db3068</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26418%3A%20n%2Fa&amp;severity=high&amp;id=69a9c996460e1c85df139353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26417-na-8d4849de</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26417%3A%20n%2Fa&amp;severity=high&amp;id=69a9c996460e1c85df13934f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26416-na-edaf16a6</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26416%3A%20n%2Fa&amp;severity=high&amp;id=69a9c994460e1c85df139340</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70233-na-c8f3916e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70233%3A%20n%2Fa&amp;severity=critical&amp;id=69a9c994460e1c85df139333</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70232-na-2519a946</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70232%3A%20n%2Fa&amp;severity=critical&amp;id=69a9c994460e1c85df13932e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70231-na-dfe379a2</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70231%3A%20n%2Fa&amp;severity=critical&amp;id=69a9c994460e1c85df139329</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70230-na-1652c7b5</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70230%3A%20n%2Fa&amp;severity=critical&amp;id=69a9c994460e1c85df139324</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70229-na-248a175b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70229%3A%20n%2Fa&amp;severity=critical&amp;id=69a9c994460e1c85df13931f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45691-na-928afead</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45691%3A%20n%2Fa&amp;severity=high&amp;id=69a9c994460e1c85df139319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26377-na-1652a603</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26377%3A%20n%2Fa&amp;severity=medium&amp;id=69a9a2e4460e1c85dfd8770e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69534-na-6020ab11</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69534%3A%20n%2Fa&amp;severity=high&amp;id=69a99d83d9f976b5b5c65c3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-05-130e5843</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-05&amp;severity=medium&amp;id=69a99b5b224272a26dae5f6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-05-3423470b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-05&amp;severity=low&amp;id=69a99b5b224272a26dae5f0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2836-vulnerability-in-cloudflare-httpsgit-c71c61fe</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2836%3A%20Vulnerability%20in%20Cloudflare%20https%3A%2F%2Fgithub.com%2Fcloudflare%2Fpingora&amp;severity=high&amp;id=69a8c847d1a09e29cb860502</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2835-cwe-444-inconsistent-interpretation--a3f6db67</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2835%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Cloudflare%20https%3A%2F%2Fgithub.com%2Fcloudflare%2Fpingora&amp;severity=critical&amp;id=69a8c4c1d1a09e29cb83c419</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22052-209-in-netapp-ontap-9-6c596002</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22052%3A%20209%20in%20NETAPP%20ONTAP%209&amp;severity=medium&amp;id=69a8c142d1a09e29cb82aab1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2833-cwe-444-inconsistent-interpretation--c3ebdcf0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2833%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Cloudflare%20https%3A%2F%2Fgithub.com%2Fcloudflare%2Fpingora&amp;severity=critical&amp;id=69a8c142d1a09e29cb82aab4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41257-cwe-20-improper-input-validation-in-7d1c9b29</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41257%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Suprema%20BioStar%202&amp;severity=medium&amp;id=69a8cbd6d1a09e29cb893ba7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2297-vulnerability-in-python-software-fou-a603ade6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2297%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=69a8afacd1a09e29cb7ac729</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29085-cwe-74-improper-neutralization-of-s-f874f2fb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29085%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20honojs%20hono&amp;severity=medium&amp;id=69a8afacd1a09e29cb7ac721</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29045-cwe-177-improper-handling-of-url-en-89e68b18</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29045%3A%20CWE-177%3A%20Improper%20Handling%20of%20URL%20Encoding%20(Hex%20Encoding)%20in%20honojs%20hono&amp;severity=high&amp;id=69a8afacd1a09e29cb7ac71d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29086-cwe-1113-inappropriate-comment-styl-b5935525</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29086%3A%20CWE-1113%3A%20Inappropriate%20Comment%20Style%20in%20honojs%20hono&amp;severity=medium&amp;id=69a8afacd1a09e29cb7ac725</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26002-cwe-74-improper-neutralization-of-s-04c291ca</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26002%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20OSC%20ondemand&amp;severity=medium&amp;id=69a8afacd1a09e29cb7ac718</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25750-cwe-74-improper-neutralization-of-s-2b0c1429</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25750%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20langchain-ai%20helm&amp;severity=high&amp;id=69a8cbd6d1a09e29cb893bab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29000-cwe-347-improper-verification-of-cr-c33a53b1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29000%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20pac4j%20pac4j-jwt&amp;severity=critical&amp;id=69a8ac26d1a09e29cb796104</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66024-cwe-79-improper-neutralization-of-i-78d8568e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66024%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xwiki-contrib%20application-blog-ui&amp;severity=high&amp;id=69a8ac26d1a09e29cb7960f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27898-cwe-639-authorization-bypass-throug-bcfc5722</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27898%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20dani-garcia%20vaultwarden&amp;severity=medium&amp;id=69a8ac26d1a09e29cb796101</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27803-cwe-269-improper-privilege-manageme-445e7709</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27803%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20dani-garcia%20vaultwarden&amp;severity=high&amp;id=69a8ac26d1a09e29cb7960fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27802-cwe-269-improper-privilege-manageme-b8681d39</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27802%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20dani-garcia%20vaultwarden&amp;severity=high&amp;id=69a8ac26d1a09e29cb7960fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27801-cwe-307-improper-restriction-of-exc-ca82586a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27801%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20dani-garcia%20vaultwarden&amp;severity=medium&amp;id=69a8a8a2d1a09e29cb7830cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-tycoon2fa-how-a-leading-aitm-phishing-kit-o-304fb781</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20Tycoon2FA%3A%20How%20a%20leading%20AiTM%20phishing%20kit%20operated%20at%20scale&amp;severity=medium&amp;id=69a94eed0e5bba37ca88cea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-apt-infrastructure-in-focus-mapping-state--e1c5a95a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20APT%20Infrastructure%20in%20Focus%3A%20Mapping%20State-Aligned%20Clusters%20During%20Geopolitical%20Escalation&amp;severity=medium&amp;id=69a94eed0e5bba37ca88ce8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/using-ssl-certificates-and-graph-theory-to-uncover-fac7451c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Using%20SSL%20Certificates%20and%20Graph%20Theory%20to%20Uncover%20Threat%20Actors&amp;severity=medium&amp;id=69a952710e5bba37ca8f2edc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28435-cwe-400-uncontrolled-resource-consu-a7a1b56e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28435%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20yhirose%20cpp-httplib&amp;severity=high&amp;id=69a88c81d1a09e29cb6b4cbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28434-cwe-200-exposure-of-sensitive-infor-53bb8ea6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28434%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20yhirose%20cpp-httplib&amp;severity=medium&amp;id=69a88c81d1a09e29cb6b4cb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28427-cwe-22-improper-limitation-of-a-pat-1d9c15cf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28427%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20nekename%20OpenDeck&amp;severity=medium&amp;id=69a88c81d1a09e29cb6b4cb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3545-insufficient-data-validation-in-goog-72f3544b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3545%3A%20Insufficient%20data%20validation%20in%20Google%20Chrome&amp;severity=critical&amp;id=69a88902d1a09e29cb6a246a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3544-heap-buffer-overflow-in-google-chrom-fc3d6571</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3544%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69a88902d1a09e29cb6a2466</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3543-inappropriate-implementation-in-goog-9824fbf6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3543%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=69a88902d1a09e29cb6a2462</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3542-inappropriate-implementation-in-goog-a5d2125e</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3542%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=69a88902d1a09e29cb6a245e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3541-inappropriate-implementation-in-goog-eb2f2edf</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3541%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=69a88902d1a09e29cb6a245a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3540-inappropriate-implementation-in-goog-75231b89</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3540%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=69a88902d1a09e29cb6a2456</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3539-object-lifecycle-issue-in-google-chr-f63ab81a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3539%3A%20Object%20lifecycle%20issue%20in%20Google%20Chrome&amp;severity=high&amp;id=69a88902d1a09e29cb6a2452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3538-integer-overflow-in-google-chrome-0397ca92</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3538%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69a88902d1a09e29cb6a244e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3537-object-lifecycle-issue-in-google-chr-f7411df0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3537%3A%20Object%20lifecycle%20issue%20in%20Google%20Chrome&amp;severity=high&amp;id=69a88902d1a09e29cb6a244a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3536-integer-overflow-in-google-chrome-bf0554c7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3536%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69a88902d1a09e29cb6a2446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tycoon-2fa-phishing-platform-dismantled-in-global--237fbcd2</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tycoon%202FA%20Phishing%20Platform%20Dismantled%20in%20Global%20Takedown&amp;severity=medium&amp;id=69a87e3ed1a09e29cb5e7591</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20064-null-pointer-dereference-in-cisco-c-b5c944c8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20064%3A%20NULL%20Pointer%20Dereference%20in%20Cisco%20Cisco%20Secure%20Firewall%20Threat%20Defense%20(FTD)%20Software&amp;severity=medium&amp;id=69a881f6d1a09e29cb67597f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20025-integer-overflow-or-wraparound-in-c-fc9799cb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20025%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a881f6d1a09e29cb67597c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20024-improper-restriction-of-operations--d2ad4715</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20024%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a881f6d1a09e29cb675979</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20023-out-of-bounds-write-in-cisco-cisco--9399b4a2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20023%3A%20Out-of-bounds%20Write%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a881f6d1a09e29cb675976</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20022-use-of-out-of-range-pointer-offset--13763524</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20022%3A%20Use%20of%20Out-of-range%20Pointer%20Offset%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a881f6d1a09e29cb675973</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20021-missing-release-of-memory-after-eff-9fbf8fbb</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20021%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a881f6d1a09e29cb675970</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20020-improper-input-validation-in-cisco--701d124c</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20020%3A%20Improper%20Input%20Validation%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a881f6d1a09e29cb67596d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20016-improper-neutralization-of-argument-f7993022</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20016%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Cisco%20Cisco%20Secure%20Firewall%20Threat%20Defense%20(FTD)%20Software&amp;severity=medium&amp;id=69a881f6d1a09e29cb67596a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0847-cwe-22-improper-limitation-of-a-path-c024e0ef</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0847%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20nltk%20nltk%2Fnltk&amp;severity=high&amp;id=69a87af1d1a09e29cb563d89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3125-cwe-918-server-side-request-forgery--e34410dc</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3125%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20opennextjs%20%40opennextjs%2Fcloudflare&amp;severity=high&amp;id=69a87af1d1a09e29cb563d8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20073-improper-access-control-in-cisco-ci-042a5698</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20073%3A%20Improper%20Access%20Control%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a8777ad1a09e29cb54d38c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20102-improper-neutralization-of-input-du-903da884</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20102%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a8777ad1a09e29cb54d38f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20070-improper-neutralization-of-script-r-ad534a20</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20070%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a8777ad1a09e29cb54d389</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20069-inconsistent-interpretation-of-http-b9c2ece6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20069%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a8777ad1a09e29cb54d386</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20068-uncaught-exception-in-cisco-cisco-c-e719f1cd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20068%3A%20Uncaught%20Exception%20in%20Cisco%20Cisco%20Cyber%20Vision&amp;severity=medium&amp;id=69a8777ad1a09e29cb54d383</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20067-out-of-bounds-write-in-cisco-cisco--054c9a9c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20067%3A%20Out-of-bounds%20Write%20in%20Cisco%20Cisco%20Cyber%20Vision&amp;severity=medium&amp;id=69a8777ad1a09e29cb54d380</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20066-uncontrolled-resource-consumption-i-8c53c7b7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20066%3A%20Uncontrolled%20Resource%20Consumption%20in%20Cisco%20Cisco%20Secure%20Firewall%20Threat%20Defense%20(FTD)%20Software&amp;severity=medium&amp;id=69a8777ad1a09e29cb54d37d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20065-improper-locking-in-cisco-cisco-sec-f70efa5e</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20065%3A%20Improper%20Locking%20in%20Cisco%20Cisco%20Secure%20Firewall%20Threat%20Defense%20(FTD)%20Software&amp;severity=medium&amp;id=69a8777ad1a09e29cb54d37a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20063-improper-neutralization-of-argument-93cf348b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20063%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Cisco%20Cisco%20Secure%20Firewall%20Threat%20Defense%20(FTD)%20Software&amp;severity=medium&amp;id=69a87779d1a09e29cb54d344</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20058-access-of-memory-location-before-st-b82bac04</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20058%3A%20Access%20of%20Memory%20Location%20Before%20Start%20of%20Buffer%20in%20Cisco%20Cisco%20Secure%20Firewall%20Threat%20Defense%20(FTD)%20Software&amp;severity=medium&amp;id=69a87779d1a09e29cb54d33e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20057-divide-by-zero-in-cisco-cisco-cyber-ef2d4a2e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20057%3A%20Divide%20By%20Zero%20in%20Cisco%20Cisco%20Cyber%20Vision&amp;severity=medium&amp;id=69a87779d1a09e29cb54d338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20054-loop-with-unreachable-exit-conditio-15e8c0bc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20054%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Cisco%20Cisco%20Cyber%20Vision&amp;severity=medium&amp;id=69a87779d1a09e29cb54d332</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20053-heap-based-buffer-overflow-in-cisco-9c77fb8d</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20053%3A%20Heap-based%20Buffer%20Overflow%20in%20Cisco%20Cisco%20Cyber%20Vision&amp;severity=medium&amp;id=69a87779d1a09e29cb54d326</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20052-access-of-memory-location-after-end-f524f4da</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20052%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20in%20Cisco%20Cisco%20Secure%20Firewall%20Threat%20Defense%20(FTD)%20Software&amp;severity=medium&amp;id=69a87779d1a09e29cb54d318</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20050-improper-resource-shutdown-or-relea-7f79f018</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20050%3A%20Improper%20Resource%20Shutdown%20or%20Release%20in%20Cisco%20Cisco%20Secure%20Firewall%20Threat%20Defense%20(FTD)%20Software&amp;severity=medium&amp;id=69a87779d1a09e29cb54d309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-lexisnexis-data-breach-confirmed-after-hackers-8edd7e0b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20LexisNexis%20Data%20Breach%20Confirmed%20After%20Hackers%20Leak%20Files&amp;severity=medium&amp;id=69a8702ed1a09e29cb5049be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20017-execution-with-unnecessary-privileg-f18e1fea</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20017%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Cisco%20Cisco%20Secure%20Firewall%20Threat%20Defense%20(FTD)%20Software&amp;severity=medium&amp;id=69a87779d1a09e29cb54d2f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20018-path-traversal-dirfilename-in-cisco-e91f7016</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20018%3A%20Path%20Traversal%3A%20&apos;dir%2F..%2F..%2Ffilename&apos;%20in%20Cisco%20Cisco%20Secure%20Firewall%20Management%20Center%20(FMC)&amp;severity=medium&amp;id=69a87779d1a09e29cb54d2fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20007-improper-access-control-in-cisco-ci-6e2cb5b8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20007%3A%20Improper%20Access%20Control%20in%20Cisco%20Cisco%20Secure%20Firewall%20Threat%20Defense%20(FTD)%20Software&amp;severity=medium&amp;id=69a87078d1a09e29cb506b6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20006-error-handling-in-cisco-cisco-secur-055f6d78</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20006%3A%20Error%20Handling%20in%20Cisco%20Cisco%20Secure%20Firewall%20Threat%20Defense%20(FTD)%20Software&amp;severity=medium&amp;id=69a87078d1a09e29cb506b6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20149-improper-neutralization-of-input-du-f3875916</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20149%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Webex%20Meetings&amp;severity=medium&amp;id=69a87078d1a09e29cb506b74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20082-missing-release-of-resource-after-e-84837444</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20082%3A%20Missing%20Release%20of%20Resource%20after%20Effective%20Lifetime%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=high&amp;id=69a87078d1a09e29cb506b71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20062-incorrect-execution-assigned-permis-46e51a53</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20062%3A%20Incorrect%20Execution-Assigned%20Permissions%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=high&amp;id=69a86ce0d1a09e29cb4f1556</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20049-incorrect-calculation-of-buffer-siz-37ef86ec</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20049%3A%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=high&amp;id=69a86ce0d1a09e29cb4f1553</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20015-missing-release-of-memory-after-eff-d89d440f</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20015%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a86cded1a09e29cb4f1520</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20014-missing-release-of-memory-after-eff-1c5c9b32</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20014%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=high&amp;id=69a86cded1a09e29cb4f151d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20013-missing-release-of-memory-after-eff-d21a0470</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20013%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a86cded1a09e29cb4f151a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20106-missing-release-of-memory-after-eff-bbf2d623</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20106%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a86ce0d1a09e29cb4f1568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20105-missing-release-of-memory-after-eff-0d6ecaf2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20105%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=high&amp;id=69a86ce0d1a09e29cb4f1565</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20103-allocation-of-resources-without-lim-32655776</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20103%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=high&amp;id=69a86ce0d1a09e29cb4f1562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20101-use-of-insufficiently-random-values-b5449b43</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20101%3A%20Use%20of%20Insufficiently%20Random%20Values%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=high&amp;id=69a86ce0d1a09e29cb4f155f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20100-buffer-copy-without-checking-size-o-1555caf4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20100%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=high&amp;id=69a86ce0d1a09e29cb4f155c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20003-improper-neutralization-of-special--469e2eb9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20003%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Cisco%20Cisco%20Secure%20Firewall%20Management%20Center%20(FMC)&amp;severity=medium&amp;id=69a86cded1a09e29cb4f1511</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20002-improper-neutralization-of-special--ff656b71</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20002%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Cisco%20Cisco%20Secure%20Firewall%20Management%20Center%20(FMC)&amp;severity=high&amp;id=69a86cded1a09e29cb4f150e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20131-deserialization-of-untrusted-data-i-460d28f0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20131%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Cisco%20Cisco%20Secure%20Firewall%20Management%20Center%20(FMC)&amp;severity=critical&amp;id=69a86ce0d1a09e29cb4f156b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20039-improper-clearing-of-heap-memory-be-eea5d267</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20039%3A%20Improper%20Clearing%20of%20Heap%20Memory%20Before%20Release%20(&apos;Heap%20Inspection&apos;)%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=high&amp;id=69a86cded1a09e29cb4f1526</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20044-improper-privilege-management-in-ci-07510da0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20044%3A%20Improper%20Privilege%20Management%20in%20Cisco%20Cisco%20Secure%20Firewall%20Management%20Center%20(FMC)&amp;severity=medium&amp;id=69a86ce0d1a09e29cb4f1550</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20079-authentication-bypass-using-an-alte-6aa92e25</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20079%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Cisco%20Cisco%20Secure%20Firewall%20Management%20Center%20(FMC)&amp;severity=critical&amp;id=69a86ce0d1a09e29cb4f1559</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20031-uncaught-exception-in-cisco-cisco-s-63948540</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20031%3A%20Uncaught%20Exception%20in%20Cisco%20Cisco%20Secure%20Endpoint&amp;severity=medium&amp;id=69a86cded1a09e29cb4f1523</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20008-improper-neutralization-of-special--36bd7983</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20008%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a86cded1a09e29cb4f1514</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20009-improper-neutralization-of-special--6d7f9f80</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20009%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a86cded1a09e29cb4f1517</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26949-cwe-863-incorrect-authorization-in--6d18db81</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26949%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Dell%20Device%20Management%20Agent%20(DDMA)&amp;severity=medium&amp;id=69a86ce2d1a09e29cb4f15a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20001-improper-neutralization-of-special--26b5bf7e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20001%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Cisco%20Cisco%20Secure%20Firewall%20Management%20Center%20(FMC)&amp;severity=medium&amp;id=69a86cded1a09e29cb4f150b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20005-missing-report-of-error-condition-i-a73a7227</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20005%3A%20Missing%20Report%20of%20Error%20Condition%20in%20Cisco%20Cisco%20Secure%20Firewall%20Threat%20Defense%20(FTD)%20Software&amp;severity=medium&amp;id=69a8695ad1a09e29cb4e1dbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22760-cwe-754-improper-check-for-unusual--d65624cd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22760%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Dell%20Device%20Management%20Agent%20(DDMA)&amp;severity=low&amp;id=69a8695ad1a09e29cb4e1dbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29069-cwe-639-authorization-bypass-throug-7de34f87</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29069%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20craftcms%20cms&amp;severity=medium&amp;id=69a8695ad1a09e29cb4e1dca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28784-cwe-1336-improper-neutralization-of-6d4747ab</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28784%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20craftcms%20cms&amp;severity=high&amp;id=69a8695ad1a09e29cb4e1dc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28783-cwe-94-improper-control-of-generati-7ec769f0</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28783%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20craftcms%20cms&amp;severity=critical&amp;id=69a8695ad1a09e29cb4e1dc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28782-cwe-639-authorization-bypass-throug-1f0840cb</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28782%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20craftcms%20cms&amp;severity=medium&amp;id=69a86252d1a09e29cb4c0647</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28781-cwe-639-authorization-bypass-throug-af2be907</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28781%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20craftcms%20cms&amp;severity=high&amp;id=69a86252d1a09e29cb4c0642</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28697-cwe-1336-improper-neutralization-of-86895bc1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28697%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20craftcms%20cms&amp;severity=critical&amp;id=69a86252d1a09e29cb4c063c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28696-cwe-639-authorization-bypass-throug-f6975608</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28696%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20craftcms%20cms&amp;severity=high&amp;id=69a85ed1d1a09e29cb4aedf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3520-cwe-674-uncontrolled-recursion-in-ex-e7bd9e89</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3520%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20expressjs%20multer&amp;severity=high&amp;id=69a85ed2d1a09e29cb4aee03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28695-cwe-1336-improper-neutralization-of-2d24d5c9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28695%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20craftcms%20cms&amp;severity=high&amp;id=69a85ed1d1a09e29cb4aedf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15558-cwe-427-uncontrolled-search-path-el-4142348f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15558%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Docker%20Docker%20CLI&amp;severity=high&amp;id=69a85ed0d1a09e29cb4aedd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23812-vulnerability-in-hewlett-packard-en-fc1f0311</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23812%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20Wireless%20Operating%20Systems%20(AOS-8%20%26%20AOS-10)&amp;severity=medium&amp;id=69a85ed1d1a09e29cb4aedee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23811-vulnerability-in-hewlett-packard-en-53c9b810</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23811%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20Wireless%20Operating%20Systems%20(AOS-8%20%26%20AOS-10)&amp;severity=medium&amp;id=69a85ed1d1a09e29cb4aedeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23810-vulnerability-in-hewlett-packard-en-adecc1e6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23810%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20Wireless%20Operating%20Systems%20(AOS-8%20%26%20AOS-10)&amp;severity=medium&amp;id=69a85ed1d1a09e29cb4aede8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23809-vulnerability-in-hewlett-packard-en-471585d8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23809%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20Wireless%20Operating%20System%20(AOS-10%20%26%20AOS-8)&amp;severity=medium&amp;id=69a85ed1d1a09e29cb4aede5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23808-vulnerability-in-hewlett-packard-en-d30f105d</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23808%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20Wireless%20Operating%20System%20(AOS-10%20%26%20AOS-8)&amp;severity=medium&amp;id=69a85ed1d1a09e29cb4aede2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23601-vulnerability-in-hewlett-packard-en-1539a793</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23601%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20Wireless%20Operating%20System%20(AOS-10%20%26%20AOS-8)&amp;severity=medium&amp;id=69a85ed0d1a09e29cb4aeddf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22285-cwe-256-plaintext-storage-of-a-pass-5adf26e1</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22285%3A%20CWE-256%3A%20Plaintext%20Storage%20of%20a%20Password%20in%20Dell%20Device%20Management%20Agent%20(DDMA)&amp;severity=medium&amp;id=69a85b4ad1a09e29cb49b9b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59787-cwe-703-improper-check-or-handling--6afd3d95</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59787%3A%20CWE-703%20%E2%80%93%20Improper%20Check%20or%20Handling%20of%20Exceptional%20Conditions%20in%202N%20Telekomunikace%20a.s.%202N%20Access%20Commander&amp;severity=medium&amp;id=69a857c5d1a09e29cb48ad3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59786-cwe-613-insufficient-session-expira-e20f0d55</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59786%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%202N%20Telekomunikace%20a.s.%202N%20Access%20Commander&amp;severity=medium&amp;id=69a850c1d1a09e29cb458b57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59785-cwe-1286-improper-validation-of-syn-fc0665bc</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59785%3A%20CWE-1286%20%E2%80%93%20Improper%20Validation%20of%20Syntactic%20Correctness%20in%202N%20Telekomunikace%20a.s.%202N%20Access%20Commander&amp;severity=medium&amp;id=69a850c1d1a09e29cb458b54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59784-cwe-117-improper-output-neutralizat-b29a7020</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59784%3A%20CWE-117%3A%20Improper%20Output%20Neutralization%20for%20Logs%20in%202N%20Telekomunikace%20a.s.%202N%20Access%20Commander&amp;severity=medium&amp;id=69a850c1d1a09e29cb458b51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12801-incorrect-execution-assigned-permis-f3da6224</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12801%3A%20Incorrect%20Execution-Assigned%20Permissions%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69a850c1d1a09e29cb458b4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59783-cwe-78-improper-neutralization-of-s-43df8c67</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59783%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%202N%20Telekomunikace%20a.s.%202N%20Access%20Commander&amp;severity=high&amp;id=69a850c1d1a09e29cb458b4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62879-cwe-532-insertion-of-sensitive-info-83298e10</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62879%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20SUSE%20Rancher&amp;severity=medium&amp;id=69a84d3dd1a09e29cb445d68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/what-a-browser-in-the-browser-attack-is-and-how-to-37ccdfd0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=What%20a%20browser-in-the-browser%20attack%20is%2C%20and%20how%20to%20spot%20a%20fake%20login%20window%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69a83f64d1a09e29cb4001d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40896-cwe-295-improper-certificate-valida-e039e616</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40896%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Nozomi%20Networks%20Arc&amp;severity=medium&amp;id=69a83ba8d1a09e29cb3ef915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40895-cwe-79-improper-neutralization-of-i-9666fc7c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40895%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nozomi%20Networks%20CMC&amp;severity=low&amp;id=69a83ba8d1a09e29cb3ef912</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40894-cwe-79-improper-neutralization-of-i-3bb0f271</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40894%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nozomi%20Networks%20Guardian&amp;severity=low&amp;id=69a83ba8d1a09e29cb3ef90f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3103-cwe-863-incorrect-authorization-in-c-37ac62bc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3103%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=medium&amp;id=69a83824d1a09e29cb3d0c0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25907-cwe-645-overly-restrictive-account--85d43e55</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25907%3A%20CWE-645%3A%20Overly%20Restrictive%20Account%20Lockout%20Mechanism%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=69a8311cd1a09e29cb391c06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21422-cwe-15-external-control-of-system-o-d4521675</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21422%3A%20CWE-15%3A%20External%20Control%20of%20System%20or%20Configuration%20Setting%20in%20Dell%20PowerScale%20OneFS&amp;severity=low&amp;id=69a8311cd1a09e29cb391c00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21424-cwe-250-execution-with-unnecessary--85c5dbe8</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21424%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=69a8311cd1a09e29cb391c03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-pirated-software-turns-helpful-employees-into--e143ab30</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20Pirated%20Software%20Turns%20Helpful%20Employees%20Into%20Malware%20Delivery%20Agents&amp;severity=medium&amp;id=69a82d61d1a09e29cb385855</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21421-cwe-250-execution-with-unnecessary--dc94552d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21421%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=69a8311cd1a09e29cb391bfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21426-cwe-250-execution-with-unnecessary--f2a3a244</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21426%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=69a82a17d1a09e29cb37418b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21423-cwe-276-incorrect-default-permissio-16f56bc8</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21423%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=69a82a17d1a09e29cb374188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22270-cwe-427-uncontrolled-search-path-el-faa8a16a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22270%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Dell%20PowerScale%20OneFS%2C&amp;severity=medium&amp;id=69a8268fd1a09e29cb360760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21425-cwe-266-incorrect-privilege-assignm-7c2392aa</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21425%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=69a8268fd1a09e29cb36075d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24732-cwe-552-files-or-directories-access-875d70e0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24732%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20Hallo%20Welt!%20GmbH%20BlueSpice&amp;severity=medium&amp;id=69a8268fd1a09e29cb360763</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lastpass-warns-of-new-phishing-campaign-68f9fe7f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LastPass%20Warns%20of%20New%20Phishing%20Campaign&amp;severity=medium&amp;id=69a822ddd1a09e29cb33b6f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-plans-two-week-release-schedule-for-chrome-e83c4767</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Plans%20Two-Week%20Release%20Schedule%20for%20Chrome&amp;severity=medium&amp;id=69a81f54d1a09e29cb327b52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3058-cwe-200-exposure-of-sensitive-inform-df9403c7</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3058%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20seraphinitesoft%20Seraphinite%20Accelerator&amp;severity=medium&amp;id=69a81880d1a09e29cb2f531b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3056-cwe-862-missing-authorization-in-ser-1a9ff84b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3056%3A%20CWE-862%20Missing%20Authorization%20in%20seraphinitesoft%20Seraphinite%20Accelerator&amp;severity=medium&amp;id=69a81880d1a09e29cb2f5315</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1674-cwe-862-missing-authorization-in-saa-d553536a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1674%3A%20CWE-862%20Missing%20Authorization%20in%20saadiqbal%20Gutena%20Forms%20%E2%80%93%20Contact%20Form%2C%20Survey%20Form%2C%20Feedback%20Form%2C%20Booking%20Form%2C%20and%20Custom%20Form%20Builder&amp;severity=medium&amp;id=69a81880d1a09e29cb2f5309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2355-cwe-79-improper-neutralization-of-in-a026c4a4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2355%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20joedolson%20My%20Calendar%20%E2%80%93%20Accessible%20Event%20Manager&amp;severity=medium&amp;id=69a81880d1a09e29cb2f530d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/global-coalition-publishes-6g-security-and-resilie-388a8ce5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Global%20Coalition%20Publishes%206G%20Security%20and%20Resilience%20Principles&amp;severity=medium&amp;id=69a81142d1a09e29cb2bb85e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-packagist-packages-disguised-as-laravel--5cae3aaa</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Packagist%20Packages%20Disguised%20as%20Laravel%20Utilities%20Deploy%20Encrypted%20RAT&amp;severity=medium&amp;id=69a81150d1a09e29cb2bba0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/want-more-xwormx3f-wed-mar-4th-7c048a3b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Want%20More%20XWorm%26%23x3f%3B%2C%20(Wed%2C%20Mar%204th)&amp;severity=medium&amp;id=69a80331d1a09e29cb253e94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1706-cwe-79-improper-neutralization-of-in-b105f9ac</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1706%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20plugins360%20All-in-One%20Video%20Gallery&amp;severity=medium&amp;id=69a7ffe4d1a09e29cb23bf8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3439-cwe-121-stack-based-buffer-overflow--c2c70c41</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3439%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20SonicWall%20SonicOS&amp;severity=medium&amp;id=69a7fc60d1a09e29cb22b3e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-freescout-vulnerability-leads-to-full-ser-b01b887c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20FreeScout%20Vulnerability%20Leads%20to%20Full%20Server%20Compromise&amp;severity=critical&amp;id=69a7f8a6d1a09e29cb211a5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27441-cwe-78-improper-neutralization-of-s-6ebb3f5d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27441%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=critical&amp;id=69a7f558d1a09e29cb1e3721</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2748-cwe-295-improper-certificate-validat-38d0817d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2748%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=high&amp;id=69a7f558d1a09e29cb1e3739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27446-cwe-306-missing-authentication-for--ed42be89</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27446%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Apache%20Software%20Foundation%20Apache%20Artemis&amp;severity=critical&amp;id=69a7f558d1a09e29cb1e3730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27442-cwe-22-improper-limitation-of-a-pat-0a99510b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27442%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=critical&amp;id=69a7f558d1a09e29cb1e3724</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27445-cwe-347-improper-verification-of-cr-b3b62ae0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27445%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=medium&amp;id=69a7f558d1a09e29cb1e372d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27444-cwe-436-interpretation-conflict-in--c2527164</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27444%3A%20CWE-436%20Interpretation%20Conflict%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=high&amp;id=69a7f558d1a09e29cb1e372a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2747-cwe-200-exposure-of-sensitive-inform-4ebc278d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2747%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=medium&amp;id=69a7f558d1a09e29cb1e3736</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27443-cwe-20-improper-input-validation-in-69377cc9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27443%3A%20CWE-20%20Improper%20Input%20Validation%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=high&amp;id=69a7f558d1a09e29cb1e3727</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66168-cwe-190-integer-overflow-or-wraparo-89bd59bb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66168%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Apache%20Software%20Foundation%20Apache%20ActiveMQ&amp;severity=medium&amp;id=69a7f558d1a09e29cb1e371e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2746-cwe-347-improper-verification-of-cry-abd6ee7d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2746%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=medium&amp;id=69a7f558d1a09e29cb1e3733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3094-cwe-787-out-of-bounds-write-in-delta-cd2be670</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3094%3A%20CWE-787%20Out-of-bounds%20Write%20in%20deltaww%20CNCSoft-G2&amp;severity=high&amp;id=69a7f1d4d1a09e29cb1c93fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1236-cwe-79-improper-neutralization-of-in-f48799b7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1236%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20smub%20Envira%20Gallery%20%E2%80%93%20Image%20Photo%20Gallery%2C%20Albums%2C%20Video%20Gallery%2C%20Slideshows%20%26%20More&amp;severity=medium&amp;id=69a7ee50d1a09e29cb1a949b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29120-cwe-798-use-of-hard-coded-credentia-587f7886</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29120%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20International%20Datacasting%20Corporation%20IDC%20SFX2100%20SuperFlex%20Satellite%20Receiver&amp;severity=critical&amp;id=69a7eacbd1a09e29cb189c89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29119-cwe-798-use-of-hard-coded-credentia-f3e1ee95</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29119%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20International%20Datacasting%20Corporation%20(IDC)%20SFX2100%20Series%20SuperFlex%20SatelliteReceiver&amp;severity=high&amp;id=69a7eacbd1a09e29cb189c86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28778-cwe-798-use-of-hard-coded-credentia-1fca65f0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28778%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20International%20Datacasting%20Corporation%20(IDC)%20IDC%20SFX2100%20SuperFlex%20Satellite%20Receiver&amp;severity=high&amp;id=69a7e744d1a09e29cb1613f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28777-cwe-798-use-of-hard-coded-credentia-95918f9b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28777%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20International%20Datacasting%20Corporation%20(IDC)%20SFX2100%20Satellite%20Receiver&amp;severity=critical&amp;id=69a7ee50d1a09e29cb1a94a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28776-cwe-798-use-of-hard-coded-credentia-194a6e0a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28776%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20International%20Datacasting%20Corporation%20(IDC)%20IDC%20SFX2100%20SuperFlex%20Satellite%20Receiver&amp;severity=high&amp;id=69a7ee50d1a09e29cb1a94a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28775-cwe-1188-insecure-default-initializ-ec9ac65b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28775%3A%20CWE-1188%3A%20Insecure%20Default%20Initialization%20of%20Resource%20in%20International%20Datacasting%20Corporation%20(IDC)%20SFX2100%20Series%20SuperFlex%20SatelliteReceiver&amp;severity=critical&amp;id=69a7e053d1a09e29cb12bc27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vmware-aria-operations-vulnerability-exploited-in--b3fcfdae</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VMware%20Aria%20Operations%20Vulnerability%20Exploited%20in%20the%20Wild&amp;severity=critical&amp;id=69a7e009d1a09e29cb127e3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28774-cwe-78-improper-neutralization-of-s-9d1f2b51</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28774%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20International%20Datacasting%20Corporation%20(IDC)%20SFX%20Series%20SuperFlex%20SatelliteReceiver%20Web%20Management%20Interface&amp;severity=critical&amp;id=69a7e053d1a09e29cb12bc24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28773-cwe-78-improper-neutralization-of-s-2d1431d7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28773%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20International%20Datacasting%20Corporation%20(IDC)%20SFX%20Series%20SuperFlex%20SatelliteReceiver%20Web%20Management%20Interface&amp;severity=critical&amp;id=69a7e053d1a09e29cb12bc21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28772-cwe-79-improper-neutralization-of-i-28c11935</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28772%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20International%20Datacasting%20Corporation%20(IDC)%20SFX%20Series%20SuperFlex%20SatelliteReceiver%20Web%20Management%20Interface&amp;severity=medium&amp;id=69a7e053d1a09e29cb12bc1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28771-cwe-79-improper-neutralization-of-i-de558893</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28771%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20International%20Datacasting%20Corporation%20(IDC)%20SFX%20Series%20SuperFlex%20Satellite%20Receiver%20Web%20Management%20Interface&amp;severity=medium&amp;id=69a7e053d1a09e29cb12bc1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28770-cwe-91-xml-injection-aka-blind-xpat-60625725</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28770%3A%20CWE-91%3A%20XML%20Injection%20(aka%20Blind%20XPath%20Injection)%20in%20International%20Datacasting%20Corporation%20(IDC)%20SFX%20Series%20SuperFlex%20Satellite%20Receiver%20Web%20management%20interface&amp;severity=medium&amp;id=69a7dcb8d1a09e29cb1037d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28769-cwe-22-improper-limitation-of-a-pat-0b859350</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28769%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20International%20Datacasting%20Corporation%20(IDC)%20SFX%20Series%20SuperFlex%20Satellite%20Receiver%20Web%20management%20interface&amp;severity=medium&amp;id=69a7dcb8d1a09e29cb1037d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2732-cwe-862-missing-authorization-in-sho-b873a3d0</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2732%3A%20CWE-862%20Missing%20Authorization%20in%20shortpixel%20Enable%20Media%20Replace&amp;severity=medium&amp;id=69a7d22fd1a09e29cb0618c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2363-cwe-89-improper-neutralization-of-sp-58ca4161</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2363%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20cbutlerjr%20WP-Members%20Membership%20Plugin&amp;severity=medium&amp;id=69a7d22fd1a09e29cb0618c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2025-cwe-200-information-exposure-in-mail-212f0a08</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2025%3A%20CWE-200%20Information%20Exposure%20in%20Mail%20Mint&amp;severity=high&amp;id=69a7ceacd1a09e29cb03bd89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/interplay-between-iranian-targeting-of-ip-cameras--12391dc0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Interplay%20between%20Iranian%20Targeting%20of%20IP%20Cameras%20and%20Physical%20Warfare%20in%20the%20Middle%20East&amp;severity=high&amp;id=69a8ca74d1a09e29cb878a10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1651-cwe-89-improper-neutralization-of-sp-a775ea66</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1651%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20icegram%20Email%20Subscribers%20%26%20Newsletters%20%E2%80%93%20Email%20Marketing%2C%20Post%20Notifications%20%26%20Newsletter%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=69a79342d1a09e29cbc204c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2292-cwe-79-improper-neutralization-of-in-f50ba6f3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2292%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bandido%20Morkva%20UA%20Shipping&amp;severity=medium&amp;id=69a79342d1a09e29cbc204e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1273-cwe-918-server-side-request-forgery--e1f87754</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1273%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20wpxpo%20Post%20Grid%20Gutenberg%20Blocks%20for%20News%2C%20Magazines%2C%20Blog%20Websites%20%E2%80%93%20PostX&amp;severity=high&amp;id=69a79342d1a09e29cbc204c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1980-cwe-200-exposure-of-sensitive-inform-b43a0148</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1980%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20iqonicdesign%20WPBookit&amp;severity=medium&amp;id=69a79342d1a09e29cbc204d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2289-cwe-79-improper-neutralization-of-in-b360cfc0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2289%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20taskbuilder%20Taskbuilder%20%E2%80%93%20Project%20Management%20%26%20Task%20Management%20Tool%20With%20Kanban%20Board&amp;severity=medium&amp;id=69a79342d1a09e29cbc204dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1945-cwe-79-improper-neutralization-of-in-6840e229</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1945%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20iqonicdesign%20WPBookit&amp;severity=high&amp;id=69a79342d1a09e29cbc204d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/signed-malware-impersonating-workplace-apps-deploy-d90a7c2b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Signed%20malware%20impersonating%20workplace%20apps%20deploys%20RMM%20backdoors&amp;severity=medium&amp;id=69a814c4d1a09e29cb2cff34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-04-f30e740f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-04&amp;severity=medium&amp;id=69a8ca08d1a09e29cb86d4bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70222-na-75b37c96</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70222%3A%20n%2Fa&amp;severity=critical&amp;id=69a8a51ed1a09e29cb769eec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70225-na-bb06acd6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70225%3A%20n%2Fa&amp;severity=critical&amp;id=69a89a91d1a09e29cb719abf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70221-na-01c26696</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70221%3A%20n%2Fa&amp;severity=critical&amp;id=69a89710d1a09e29cb6fec01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46108-na-f9f47e59</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46108%3A%20n%2Fa&amp;severity=critical&amp;id=69a89710d1a09e29cb6febfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70219-na-7e103d52</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70219%3A%20n%2Fa&amp;severity=critical&amp;id=69a89005d1a09e29cb6c63ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70226-na-82054904</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70226%3A%20n%2Fa&amp;severity=critical&amp;id=69a8857dd1a09e29cb68bd86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70223-na-9cba1f25</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70223%3A%20n%2Fa&amp;severity=critical&amp;id=69a881f6d1a09e29cb675965</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-04-89d845b3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-04&amp;severity=medium&amp;id=69a87ab7d1a09e29cb55b54b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70220-na-363a1ddd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70220%3A%20n%2Fa&amp;severity=critical&amp;id=69a87779d1a09e29cb54d2e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70218-na-dce67160</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70218%3A%20n%2Fa&amp;severity=critical&amp;id=69a87078d1a09e29cb506b66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66944-na-8319490b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66944%3A%20n%2Fa&amp;severity=critical&amp;id=69a8695ad1a09e29cb4e1db7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66678-na-dc18e3f6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66678%3A%20n%2Fa&amp;severity=critical&amp;id=69a8695ad1a09e29cb4e1db3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69969-na-e74f3aeb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69969%3A%20n%2Fa&amp;severity=critical&amp;id=69a85ed0d1a09e29cb4aeddb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26478-na-4a7e88a8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26478%3A%20n%2Fa&amp;severity=critical&amp;id=69a85b4ad1a09e29cb49b9ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26673-na-e8c6ae05</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26673%3A%20n%2Fa&amp;severity=high&amp;id=69a857c5d1a09e29cb48ad42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26514-na-4630cd19</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26514%3A%20n%2Fa&amp;severity=high&amp;id=69a84d3dd1a09e29cb445d6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70342-na-9e196b94</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70342%3A%20n%2Fa&amp;severity=medium&amp;id=69a849bdd1a09e29cb42f6ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70341-na-aebf9e80</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70341%3A%20n%2Fa&amp;severity=high&amp;id=69a849bdd1a09e29cb42f6c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-04-2321d5d5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-04&amp;severity=low&amp;id=69a7ee16d1a09e29cb1a6587</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28289-cwe-434-unrestricted-upload-of-file-e2a6fd58</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28289%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20freescout-help-desk%20freescout&amp;severity=critical&amp;id=69a79342d1a09e29cbc204ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27971-cwe-502-deserialization-of-untruste-b59de789</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27971%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20QwikDev%20qwik&amp;severity=critical&amp;id=69a79342d1a09e29cbc204eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27932-cwe-770-allocation-of-resources-wit-c0c8d6c5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27932%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20authlib%20joserfc&amp;severity=high&amp;id=69a768b5d1a09e29cb82cc7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27622-cwe-787-out-of-bounds-write-in-acad-a42f61d9</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27622%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20AcademySoftwareFoundation%20openexr&amp;severity=high&amp;id=69a76534d1a09e29cb81f9b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27601-cwe-770-allocation-of-resources-wit-ae5cd70d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27601%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20jashkenas%20underscore&amp;severity=high&amp;id=69a76534d1a09e29cb81f9ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3266-cwe-862-missing-authorization-in-ope-7599e051</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3266%3A%20CWE-862%20Missing%20Authorization%20in%20OpenText%E2%84%A2%20Filr&amp;severity=high&amp;id=69a76534d1a09e29cb81f9b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27981-cwe-307-improper-restriction-of-exc-f8c6fc4d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27981%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20sysadminsmedia%20homebox&amp;severity=high&amp;id=69a76534d1a09e29cb81f9b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27600-cwe-918-server-side-request-forgery-b5ba57bb</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27600%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20sysadminsmedia%20homebox&amp;severity=medium&amp;id=69a761b1d1a09e29cb80d3ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26272-cwe-79-improper-neutralization-of-i-52fa5733</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26272%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sysadminsmedia%20homebox&amp;severity=medium&amp;id=69a761b1d1a09e29cb80d3fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25590-cwe-79-improper-neutralization-of-i-13ff0ec3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25590%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20glpi-project%20glpi-inventory-plugin&amp;severity=medium&amp;id=69a761b1d1a09e29cb80d3f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27012-cwe-306-missing-authentication-for--435d22b5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27012%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20devcode-it%20openstamanager&amp;severity=critical&amp;id=69a79342d1a09e29cbc204f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24415-cwe-79-improper-neutralization-of-i-caa3b439</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24415%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devcode-it%20openstamanager&amp;severity=medium&amp;id=69a75aa5d1a09e29cb7e0992</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21866-cwe-79-improper-neutralization-of-i-2499aded</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21866%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20langgenius%20dify&amp;severity=medium&amp;id=69a75aa5d1a09e29cb7e098d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3487-sql-injection-in-itsourcecode-colleg-91aac2aa</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3487%3A%20SQL%20Injection%20in%20itsourcecode%20College%20Management%20System&amp;severity=medium&amp;id=69a75724d1a09e29cb7c9d36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3130-cwe-841-improper-enforcement-of-beha-bdd93806</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3130%3A%20CWE-841%3A%20Improper%20Enforcement%20of%20Behavioral%20Workflow%20in%20Devolutions%20Server&amp;severity=critical&amp;id=69a75724d1a09e29cb7c9d2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3204-cwe-20-improper-input-validation-in--25dfb824</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3204%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Devolutions%20Server&amp;severity=critical&amp;id=69a75724d1a09e29cb7c9d30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2590-vulnerability-in-devolutions-remote--692ec7bc</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2590%3A%20Vulnerability%20in%20Devolutions%20Remote%20Desktop%20Manager&amp;severity=critical&amp;id=69a75724d1a09e29cb7c9d2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3224-cwe-287-improper-authentication-cwe--6697497e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3224%3A%20CWE-287%20Improper%20Authentication%2C%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Devolutions%20Server&amp;severity=critical&amp;id=69a75724d1a09e29cb7c9d33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1775-cwe-306-missing-authentication-for-c-0d6416a6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1775%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Labkotec%20LID-3300IP&amp;severity=high&amp;id=69a75724d1a09e29cb7c9d27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3486-sql-injection-in-itsourcecode-colleg-d8a60b02</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3486%3A%20SQL%20Injection%20in%20itsourcecode%20College%20Management%20System&amp;severity=medium&amp;id=69a7501dd1a09e29cb7a3ff2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3485-os-command-injection-in-d-link-dir-8-905d15ee</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3485%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-868L&amp;severity=critical&amp;id=69a7501dd1a09e29cb7a3feb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25906-cwe-59-improper-link-resolution-bef-44e1a0d6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25906%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Dell%20Optimizer&amp;severity=high&amp;id=69a7501dd1a09e29cb7a3fe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13686-cwe-78-improper-neutralization-of-s-0ca7a52d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13686%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20IBM%20DataStage%20on%20Cloud%20Pak%20for%20Data&amp;severity=medium&amp;id=69a74c95d1a09e29cb79af15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13687-cwe-78-improper-neutralization-of-s-48c22113</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13687%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20IBM%20DataStage%20on%20Cloud%20Pak%20for%20Data&amp;severity=medium&amp;id=69a74c95d1a09e29cb79af18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13688-cwe-78-improper-neutralization-of-s-1fd1738a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13688%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20IBM%20DataStage%20on%20Cloud%20Pak%20for%20Data&amp;severity=medium&amp;id=69a74c95d1a09e29cb79af1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24502-cwe-427-uncontrolled-search-path-el-f6578229</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24502%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Dell%20Dell%20Command%20%7C%20Intel%20vPro%20Out%20of%20Band&amp;severity=high&amp;id=69a74c95d1a09e29cb79af24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14456-cwe-327-use-of-a-broken-or-risky-cr-a1a22bf8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14456%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20IBM%20MQ%20Appliance&amp;severity=medium&amp;id=69a74c95d1a09e29cb79af1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14480-cwe-327-use-of-a-broken-or-risky-cr-3f20f205</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14480%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20IBM%20Aspera%20faspio%20Gateway&amp;severity=medium&amp;id=69a74c95d1a09e29cb79af21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1567-cwe-611-improper-restriction-of-xml--a1c9e77f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1567%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=high&amp;id=69a74916d1a09e29cb78e8dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1713-cwe-305-authentication-bypass-by-pri-f8f08c4c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1713%3A%20CWE-305%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20IBM%20MQ&amp;severity=medium&amp;id=69a74916d1a09e29cb78e8e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/silver-dragon-targets-organizations-in-southeast-a-3eb9b653</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Silver%20Dragon%20Targets%20Organizations%20in%20Southeast%20Asia%20and%20Europe&amp;severity=medium&amp;id=69a814c4d1a09e29cb2cff01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0869-cwe-305-authentication-bypass-by-pri-f26fec73</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0869%3A%20CWE-305%3A%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20Brocade%20ASCG&amp;severity=high&amp;id=69a7420dd1a09e29cb75a987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13490-vulnerability-in-ibm-app-connect-op-a38ba731</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13490%3A%20Vulnerability%20in%20IBM%20App%20Connect%20Operator&amp;severity=medium&amp;id=69a73e9ad1a09e29cb7489bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-strikes-on-amazon-data-centers-highlight-i-daf77fd0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20Strikes%20on%20Amazon%20Data%20Centers%20Highlight%20Industry%E2%80%99s%20Vulnerability%20to%20Physical%20Disasters&amp;severity=high&amp;id=69a73e52d1a09e29cb7481dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13616-cwe-497-exposure-of-sensitive-syste-f677746c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13616%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20IBM%20DataStage%20on%20Cloud%20Pak%20for%20Data&amp;severity=medium&amp;id=69a73e9ad1a09e29cb7489be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13734-cwe-862-missing-authorization-in-ib-55112373</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13734%3A%20CWE-862%20Missing%20Authorization%20in%20IBM%20Engineering%20Requirements%20Management%20DOORS%20Next&amp;severity=medium&amp;id=69a73e9ad1a09e29cb7489c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29022-cwe-122-heap-based-buffer-overflow--f0fcfc02</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29022%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20mackron%20dr_libs%20dr_wav.h&amp;severity=medium&amp;id=69a73e9ad1a09e29cb7489d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14604-cwe-732-incorrect-permission-assign-6b2bd9ed</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14604%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20IBM%20Storage%20Scale&amp;severity=medium&amp;id=69a73e9ad1a09e29cb7489c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14923-cwe-321-use-of-hard-coded-cryptogra-94170a5c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14923%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20IBM%20WebSphere%20Application%20Server%20-%20Liberty&amp;severity=medium&amp;id=69a73e9ad1a09e29cb7489c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36363-cwe-307-improper-restriction-of-exc-6d356cfa</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36363%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20IBM%20DevOps%20Plan&amp;severity=medium&amp;id=69a73e9ad1a09e29cb7489ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36364-cwe-525-use-of-web-browser-cache-co-182fb3f1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36364%3A%20CWE-525%20Use%20of%20Web%20Browser%20Cache%20Containing%20Sensitive%20Information%20in%20IBM%20DevOps%20Plan&amp;severity=medium&amp;id=69a73e9ad1a09e29cb7489cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1265-cwe-532-insertion-of-sensitive-infor-f251bfd5</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1265%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=69a73e9ad1a09e29cb7489d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2606-cwe-22-improper-limitation-of-a-path-d0fb6498</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2606%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20IBM%20webMethods%20API%20Gateway%20(on-prem)&amp;severity=medium&amp;id=69a73e9ad1a09e29cb7489d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3484-command-injection-in-phialsbasement--113d49cd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3484%3A%20Command%20Injection%20in%20PhialsBasement%20nmap-mcp-server&amp;severity=medium&amp;id=69a73e9cd1a09e29cb748a1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2915-hp-system-event-utility-denial-of-se-f0d4d0bf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2915%3A%20HP%20System%20Event%20Utility%20%E2%80%93%20Denial%20of%20Service%20in%20HP%20Inc%20HP%20System%20Event%20Utility&amp;severity=medium&amp;id=69a73782d1a09e29cb722154</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3494-cwe-778-insufficient-logging-in-mari-263ef839</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3494%3A%20CWE-778%20(Insufficient%20Logging)%20in%20MariaDB%20Foundation%20MariaDB%20Server&amp;severity=medium&amp;id=69a72971d1a09e29cb6b58e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3437-cwe-119-improper-restriction-of-oper-291f400a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3437%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Portwell%20Portwell%20Engineering%20Toolkits&amp;severity=critical&amp;id=69a71f08d1a09e29cb64f6f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0540-improper-neutralization-of-input-dur-fcf39a86</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0540%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20cure53%20DOMPurify&amp;severity=medium&amp;id=69a71bdad1a09e29cb636912</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15599-improper-neutralization-of-input-du-fc0586ce</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15599%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cure53%20DOMPurify&amp;severity=medium&amp;id=69a71bdad1a09e29cb63690d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3136-cwe-863-incorrect-authorization-perm-64a726f7</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3136%3A%20CWE-863%20Incorrect%20Authorization%20(Permission%20Bypass)%20in%20Google%20Cloud%20Cloud%20Build&amp;severity=high&amp;id=69a70d52d1a09e29cb5a67e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-assistant-in-kaspersky-container-security-ab3f1b7b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20assistant%20in%20Kaspersky%20Container%20Security&amp;severity=medium&amp;id=69a70a03d1a09e29cb58b507</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/silver-dragon-targets-organizations-in-southeast-a-f6a8d11c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Silver%20Dragon%20Targets%20Organizations%20in%20Southeast%20Asia%20and%20Europe&amp;severity=medium&amp;id=69a7067dd1a09e29cb571fae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/an-ai-powered-bot-actively-exploiting-github-actio-7268fc31</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=An%20AI-Powered%20Bot%20Actively%20Exploiting%20GitHub%20Actions%20-%20Microsoft%2C%20DataDog%2C%20and%20CNCF%20Projects%20Hit%20So%20Far&amp;severity=medium&amp;id=69a7109dd1a09e29cb5bd47e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/web-based-indirect-prompt-injection-observed-in-th-e7ae89ea</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Web-Based%20Indirect%20Prompt%20Injection%20Observed%20in%20the%20Wild%3A%20Fooling%20AI%20Agents&amp;severity=medium&amp;id=69a7109dd1a09e29cb5bd468</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/redalert-trojan-campaign-fake-emergency-alert-app--4ce3c6ee</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RedAlert%20Trojan%20Campaign%3A%20Fake%20Emergency%20Alert%20App%20Spread%20via%20SMS%20Spoofing%20Israeli%20Home%20Front%20Command&amp;severity=medium&amp;id=69a71422d1a09e29cb5de9e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/honeywell-researcher-clash-over-impact-of-building-ce2dff31</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Honeywell%2C%20Researcher%20Clash%20Over%20Impact%20of%20Building%20Controller%20Vulnerability&amp;severity=medium&amp;id=69a6ff0ad1a09e29cb536182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3465-denial-of-service-in-tuya-app-58df3c71</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3465%3A%20Denial%20of%20Service%20in%20Tuya%20App&amp;severity=low&amp;id=69a6fbbdd1a09e29cb5117be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bruteforce-scans-for-crushftp-tue-mar-3rd-cfb37f98</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bruteforce%20Scans%20for%20CrushFTP%20%2C%20(Tue%2C%20Mar%203rd)&amp;severity=medium&amp;id=69a79367d1a09e29cbc29e9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28518-cwe-22-improper-limitation-of-a-pat-ac4b7555</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28518%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Volcengine%20OpenViking&amp;severity=high&amp;id=69a6f4b6d1a09e29cb4db07f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64736-cwe-125-out-of-bounds-read-in-the-b-2ca06079</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64736%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=medium&amp;id=69a6f4b6d1a09e29cb4db068</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22891-cwe-122-heap-based-buffer-overflow--50121360</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22891%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=69a6f4b6d1a09e29cb4db072</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20777-cwe-122-heap-based-buffer-overflow--3231c396</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20777%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=high&amp;id=69a6f4b6d1a09e29cb4db06f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25674-cwe-362-concurrent-execution-using--1957efe8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25674%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20djangoproject%20Django&amp;severity=low&amp;id=69a6f4b6d1a09e29cb4db07a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25673-cwe-400-uncontrolled-resource-consu-2c418a56</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25673%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20djangoproject%20Django&amp;severity=high&amp;id=69a6f4b6d1a09e29cb4db075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2637-cwe-732-incorrect-permission-assignm-a25e0e26</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2637%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20iBoysoft%20iBoysoft%20NTFS&amp;severity=high&amp;id=69a6f130d1a09e29cb4be7a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/quantum-decryption-of-rsa-is-much-closer-than-expe-e9305bca</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Quantum%20Decryption%20of%20RSA%20is%20Much%20Closer%20than%20Expected&amp;severity=medium&amp;id=69a79331d1a09e29cbc1fa65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-airsnitch-attack-shows-wi-fi-client-isolation--2c13ae0b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20%E2%80%98AirSnitch%E2%80%99%20Attack%20Shows%20Wi-Fi%20Client%20Isolation%20Could%20Be%20a%20False%20Sense%20of%20Security&amp;severity=low&amp;id=69a6e9f3d1a09e29cb4846fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/12-million-affected-by-university-of-hawaii-cancer-29e7f1e4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=1.2%20Million%20Affected%20by%20University%20of%20Hawaii%20Cancer%20Center%20Data%20Breach&amp;severity=medium&amp;id=69a6e66ed1a09e29cb45c03d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3344-cwe-440-expected-behavior-violation--1a487772</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3344%3A%20CWE-440%3A%20Expected%20Behavior%20Violation%20in%20WatchGuard%20Fireware%20OS&amp;severity=medium&amp;id=69a6e6b4d1a09e29cb46e4dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3343-cwe-79-improper-neutralization-of-in-593abd20</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3343%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WatchGuard%20Fireware%20OS&amp;severity=medium&amp;id=69a6e6b4d1a09e29cb46e4da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3342-cwe-787-out-of-bounds-write-in-watch-9d2fb839</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3342%3A%20CWE-787%20Out-of-bounds%20Write%20in%20WatchGuard%20Fireware%20OS&amp;severity=high&amp;id=69a6e6b4d1a09e29cb46e4d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3351-cwe-862-missing-authorization-in-can-6fb176f8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3351%3A%20CWE-862%20Missing%20Authorization%20in%20Canonical%20lxd&amp;severity=low&amp;id=69a9c996460e1c85df139364</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/android-update-patches-exploited-qualcomm-zero-day-0500373e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Android%20Update%20Patches%20Exploited%20Qualcomm%20Zero-Day&amp;severity=low&amp;id=69a6d85ed1a09e29cb229150</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iran-cyber-front-hacktivist-activity-rises-but-sta-4523c09d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran%20Cyber%20Front%3A%20Hacktivist%20Activity%20Rises%2C%20but%20State-Sponsored%20Attacks%20Stay%20Low&amp;severity=low&amp;id=69a6d4dad1a09e29cb19b432</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3463-heap-based-buffer-overflow-in-xlnt-c-54baebc2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3463%3A%20Heap-based%20Buffer%20Overflow%20in%20xlnt-community%20xlnt&amp;severity=medium&amp;id=69a6d18cd1a09e29cb1024e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sloppylemming-deploys-burrowshell-and-rust-based-r-fe380f33</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SloppyLemming%20Deploys%20BurrowShell%20and%20Rust-Based%20RAT%20to%20Target%20Pakistan%20and%20Bangladesh&amp;severity=medium&amp;id=69a71422d1a09e29cb5de9b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59060-cwe-297-improper-validation-of-cert-9be8c153</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59060%3A%20CWE-297%20Improper%20Validation%20of%20Certificate%20with%20Host%20Mismatch%20in%20Apache%20Software%20Foundation%20Apache%20Ranger&amp;severity=medium&amp;id=69a6bff6d1a09e29cbfe3b24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59059-cwe-94-improper-control-of-generati-43809e3b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59059%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Ranger&amp;severity=critical&amp;id=69a6bff6d1a09e29cbfe3b21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vulnerability-in-ms-agent-ai-framework-can-allow-f-d035faeb</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vulnerability%20in%20MS-Agent%20AI%20Framework%20Can%20Allow%20Full%20System%20Compromise&amp;severity=low&amp;id=69a6bc3dd1a09e29cbfca855</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-uncover-method-to-track-cars-via-tire--dd7b05ab</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Uncover%20Method%20to%20Track%20Cars%20via%20Tire%20Sensors&amp;severity=low&amp;id=69a6ae2dd1a09e29cbf5c440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15598-improper-verification-of-cryptograp-d643f0bb</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15598%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Dataease%20SQLBot&amp;severity=medium&amp;id=69a6ae74d1a09e29cbf6065d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2568-cwe-79-improper-neutralization-of-in-6840f089</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2568%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20crmperks%20WP%20Zendesk%20for%20Contact%20Form%207%2C%20WPForms%2C%20Elementor%2C%20Formidable%20and%20Ninja%20Forms&amp;severity=high&amp;id=69a6ae74d1a09e29cbf60663</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22886-cwe-1392-use-of-default-credentials-68ab8e2b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22886%3A%20CWE-1392%20Use%20of%20Default%20Credentials%20in%20Eclipse%20Foundation%20Eclipse%20OpenMQ&amp;severity=critical&amp;id=69a6aadfd1a09e29cbf4c05c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1876-cwe-404-improper-resource-shutdown-o-b1e51223</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1876%3A%20CWE-404%20Improper%20Resource%20Shutdown%20or%20Release%20in%20Mitsubishi%20Electric%20Corporation%20MELSEC%20iQ-F%20Series%20FX5-ENET%2FIP%20Ethernet%20Module%20FX5-ENET%2FIP&amp;severity=high&amp;id=69a6fbbdd1a09e29cb5117c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1875-cwe-404-improper-resource-shutdown-o-290a0193</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1875%3A%20CWE-404%20Improper%20Resource%20Shutdown%20or%20Release%20in%20Mitsubishi%20Electric%20Corporation%20MELSEC%20iQ-F%20Series%20FX5-EIP%20EtherNet%2FIP%20Module%20FX5-EIP&amp;severity=high&amp;id=69a687b5d1a09e29cbe1300a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1874-cwe-670-always-incorrect-control-flo-ab07aefb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1874%3A%20CWE-670%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20Mitsubishi%20Electric%20Corporation%20MELSEC%20iQ-F%20Series%20FX5-ENET%2FIP%20Ethernet%20Module%20FX5-ENET%2FIP&amp;severity=high&amp;id=69a687b5d1a09e29cbe13006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-brief-march-2026-escalation-of-cyber-risk-r-965c4d14</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Brief%3A%20March%202026%20Escalation%20of%20Cyber%20Risk%20Related%20to%20Iran&amp;severity=medium&amp;id=69a71422d1a09e29cb5de9b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12345-buffer-overflow-in-llm-claw-ea370fec</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12345%3A%20Buffer%20Overflow%20in%20LLM-Claw&amp;severity=high&amp;id=69a68433d1a09e29cbdf37a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15595-cwe-1390-weak-authentication-in-mls-f8e093b2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15595%3A%20CWE-1390%3A%20Weak%20Authentication%20in%20mlsoft%20Inno%20Setup&amp;severity=medium&amp;id=69a67d2dd1a09e29cbdc2f96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3455-cross-site-scripting-xss-in-mailpars-8034f691</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3455%3A%20Cross-site%20Scripting%20(XSS)%20in%20mailparser&amp;severity=medium&amp;id=69a66f1fd1a09e29cbd3d46c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3449-incorrect-control-flow-scoping-in-to-763d30d6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3449%3A%20Incorrect%20Control%20Flow%20Scoping%20in%20%40tootallnate%2Fonce&amp;severity=medium&amp;id=69a66f1fd1a09e29cbd3d467</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1492-cwe-269-improper-privilege-managemen-edd7f3b1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1492%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20wpeverest%20User%20Registration%20%26%20Membership%20%E2%80%93%20Free%20%26%20Paid%20Memberships%2C%20Subscriptions%2C%20Content%20Restriction%2C%20User%20Profile%2C%20Custom%20User%20Registration%20%26%20Login%20Builder&amp;severity=critical&amp;id=69a66813d1a09e29cbd10aab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20801-cwe-319-cleartext-transmission-of-s-9442dc8e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20801%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Gallagher%20NxWitness%20VMS%20and%20Hanwha%20VMS%20Integrations&amp;severity=medium&amp;id=69a652fcd1a09e29cba9d61c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20757-cwe-667-improper-locking-in-gallagh-92af19ee</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20757%3A%20CWE-667%20Improper%20Locking%20in%20Gallagher%20Command%20Centre%20Server&amp;severity=low&amp;id=69a652fcd1a09e29cba9d619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47147-cwe-312-cleartext-storage-of-sensit-da3da127</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47147%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Gallagher%20Command%20Centre%20Mobile%20Client&amp;severity=medium&amp;id=69a652fcd1a09e29cba9d616</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1487-cwe-89-improper-neutralization-of-sp-8e8ecf27</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1487%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20latepoint%20LatePoint%20%E2%80%93%20Calendar%20Booking%20Plugin%20for%20Appointments%20and%20Events&amp;severity=medium&amp;id=69a644edd1a09e29cb9ed2a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2448-cwe-22-improper-limitation-of-a-path-365740f6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2448%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20gpriday%20Page%20Builder%20by%20SiteOrigin&amp;severity=high&amp;id=69a644edd1a09e29cb9ed2af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2269-cwe-434-unrestricted-upload-of-file--aa73faba</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2269%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20uncannyowl%20Uncanny%20Automator%20%E2%80%93%20Easy%20Automation%2C%20Integration%2C%20Webhooks%20%26%20Workflow%20Builder%20Plugin&amp;severity=high&amp;id=69a644edd1a09e29cb9ed2ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2628-cwe-288-authentication-bypass-using--3ce6682b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2628%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20cyberlord92%20All-in-One%20Microsoft%20365%20%26%20Entra%20ID%20%2F%20Azure%20AD%20SSO%20Login&amp;severity=critical&amp;id=69a644edd1a09e29cb9ed2b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0754-cwe-321-in-hp-inc-vvx-cff5c471</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0754%3A%20CWE-321%20in%20HP%20Inc%20VVX&amp;severity=high&amp;id=69a63a5fd1a09e29cb891967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/boss-mini-v140-local-file-inclusion-lfi-5031ed92</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Boss%20Mini%20v1.4.0%20-%20Local%20File%20Inclusion%20(LFI)&amp;severity=medium&amp;id=69a792c9d1a09e29cbc1c319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wegia-350-sql-injection-e53976a1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WeGIA%203.5.0%20-%20SQL%20Injection&amp;severity=medium&amp;id=69a792c9d1a09e29cbc1c314</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/easy-file-sharing-web-server-v72-buffer-overflow-0b6ea038</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Easy%20File%20Sharing%20Web%20Server%20v7.2%20-%20Buffer%20Overflow&amp;severity=medium&amp;id=69a792c9d1a09e29cbc1c30f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mailcow-2025-01a-host-header-password-reset-poison-0f65742b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=mailcow%202025-01a%20-%20Host%20Header%20Password%20Reset%20Poisoning&amp;severity=medium&amp;id=69a792c9d1a09e29cbc1c30a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wordpress-backup-migration-137-remote-command-exec-1e4d134b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WordPress%20Backup%20Migration%201.3.7%20-%20Remote%20Command%20Execution&amp;severity=medium&amp;id=69a792c9d1a09e29cbc1c305</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-03-c1c93c7e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-03&amp;severity=medium&amp;id=69a77a12d1a09e29cb894e4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70239-na-bcdf699f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70239%3A%20n%2Fa&amp;severity=high&amp;id=69a7501dd1a09e29cb7a3fe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70234-na-e1524ae3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70234%3A%20n%2Fa&amp;severity=high&amp;id=69a74916d1a09e29cb78e8d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70240-na-50a4c245</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70240%3A%20n%2Fa&amp;severity=high&amp;id=69a74590d1a09e29cb76d1a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70241-na-6c90335a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70241%3A%20n%2Fa&amp;severity=high&amp;id=69a7420dd1a09e29cb75a982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70237-na-d3da279e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70237%3A%20n%2Fa&amp;severity=high&amp;id=69a7420dd1a09e29cb75a97d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70236-na-3a6cfb2e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70236%3A%20n%2Fa&amp;severity=medium&amp;id=69a733fdd1a09e29cb7091b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55027-na-950573eb</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55027%3A%20n%2Fa&amp;severity=high&amp;id=69a733fdd1a09e29cb7091b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55026-na-960f708a</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55026%3A%20n%2Fa&amp;severity=high&amp;id=69a72cf6d1a09e29cb6e26ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55025-na-3e6b6400</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55025%3A%20n%2Fa&amp;severity=medium&amp;id=69a72cf6d1a09e29cb6e26a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55024-na-e8f2b8bb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55024%3A%20n%2Fa&amp;severity=high&amp;id=69a72cf6d1a09e29cb6e26a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55023-na-424244fa</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55023%3A%20n%2Fa&amp;severity=medium&amp;id=69a72cf6d1a09e29cb6e26a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55022-na-988739b7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55022%3A%20n%2Fa&amp;severity=high&amp;id=69a72cf6d1a09e29cb6e269d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55021-na-4783609f</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55021%3A%20n%2Fa&amp;severity=high&amp;id=69a72cf6d1a09e29cb6e2699</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55020-na-475e8194</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55020%3A%20n%2Fa&amp;severity=critical&amp;id=69a72cf6d1a09e29cb6e2695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55019-na-0e0331e9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55019%3A%20n%2Fa&amp;severity=medium&amp;id=69a72cf6d1a09e29cb6e2691</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67840-na-9c79dfe6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67840%3A%20n%2Fa&amp;severity=high&amp;id=69a72973d1a09e29cb6b58fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63912-na-c669e470</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63912%3A%20n%2Fa&amp;severity=null&amp;id=69a72973d1a09e29cb6b58fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63911-na-5ae6ed65</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63911%3A%20n%2Fa&amp;severity=high&amp;id=69a72971d1a09e29cb6b58ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63910-na-af3aa22f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63910%3A%20n%2Fa&amp;severity=high&amp;id=69a72971d1a09e29cb6b58e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63909-na-432945e9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63909%3A%20n%2Fa&amp;severity=high&amp;id=69a72971d1a09e29cb6b58e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26892-na-d839fbc2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26892%3A%20n%2Fa&amp;severity=low&amp;id=69a72971d1a09e29cb6b58dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26891-na-06626ce8</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26891%3A%20n%2Fa&amp;severity=low&amp;id=69a72971d1a09e29cb6b58da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26889-na-5be92f85</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26889%3A%20n%2Fa&amp;severity=low&amp;id=69a72971d1a09e29cb6b58d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26888-na-39cc2ebd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26888%3A%20n%2Fa&amp;severity=low&amp;id=69a72971d1a09e29cb6b58d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26887-na-40a87163</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26887%3A%20n%2Fa&amp;severity=low&amp;id=69a72971d1a09e29cb6b58d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66945-na-f1fe5e8f</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66945%3A%20n%2Fa&amp;severity=critical&amp;id=69a72971d1a09e29cb6b58cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26890-na-be65dbb2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26890%3A%20n%2Fa&amp;severity=low&amp;id=69a71f08d1a09e29cb64f6f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69765-na-f2b1b26e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69765%3A%20n%2Fa&amp;severity=high&amp;id=69a71f08d1a09e29cb64f6f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62817-na-f6cd3503</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62817%3A%20n%2Fa&amp;severity=high&amp;id=69a717ddd1a09e29cb604239</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62816-na-a64776a4</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62816%3A%20n%2Fa&amp;severity=medium&amp;id=69a717ddd1a09e29cb604235</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26886-na-455c504f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26886%3A%20n%2Fa&amp;severity=low&amp;id=69a70d52d1a09e29cb5a67dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26885-na-cd64dccd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26885%3A%20n%2Fa&amp;severity=low&amp;id=69a70d52d1a09e29cb5a67da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26884-na-b2057dd2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26884%3A%20n%2Fa&amp;severity=low&amp;id=69a70d52d1a09e29cb5a67d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26883-na-2f92fcad</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26883%3A%20n%2Fa&amp;severity=low&amp;id=69a70d52d1a09e29cb5a67d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66363-na-17acbebe</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66363%3A%20n%2Fa&amp;severity=high&amp;id=69a709cdd1a09e29cb586e4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62815-na-479affcd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62815%3A%20n%2Fa&amp;severity=medium&amp;id=69a709cdd1a09e29cb586e46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62814-na-f81aae41</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62814%3A%20n%2Fa&amp;severity=high&amp;id=69a709cdd1a09e29cb586e42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66680-na-5c7c12b6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66680%3A%20n%2Fa&amp;severity=high&amp;id=69a702c6d1a09e29cb555065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24103-na-193bbf7b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24103%3A%20n%2Fa&amp;severity=critical&amp;id=69a6fbbdd1a09e29cb5117ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70821-na-2b04e81e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70821%3A%20n%2Fa&amp;severity=critical&amp;id=69a6f4b6d1a09e29cb4db06b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57622-na-a66bcb69</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57622%3A%20n%2Fa&amp;severity=critical&amp;id=69a6f4b6d1a09e29cb4db064</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52365-na-4d2fce57</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52365%3A%20n%2Fa&amp;severity=high&amp;id=69a6f4b6d1a09e29cb4db05f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-03-5919e9d7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-03&amp;severity=medium&amp;id=69a6cdd0d1a09e29cb03ee1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-03-e9f917ae</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-03&amp;severity=low&amp;id=69a6cdcfd1a09e29cb03edd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1566-cwe-269-improper-privilege-managemen-02d5d7d7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1566%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20latepoint%20LatePoint%20%E2%80%93%20Calendar%20Booking%20Plugin%20for%20Appointments%20and%20Events&amp;severity=high&amp;id=69a61e3fd1a09e29cb5e40e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1336-cwe-862-missing-authorization-in-ays-22761aa4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1336%3A%20CWE-862%20Missing%20Authorization%20in%20ays-pro%20AI%20ChatBot%20with%20ChatGPT%20and%20Content%20Generator%20by%20AYS&amp;severity=medium&amp;id=69a61e3fd1a09e29cb5e40e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2583-cwe-79-improper-neutralization-of-in-8a361860</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2583%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20creativethemeshq%20Blocksy&amp;severity=medium&amp;id=69a61033d1a09e29cb5548b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/oauth-redirection-abuse-enables-phishing-and-malwa-79407cf1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OAuth%20redirection%20abuse%20enables%20phishing%20and%20malware%20delivery&amp;severity=medium&amp;id=69a71422d1a09e29cb5de9ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3338-cwe-347-improper-verification-of-cry-5dba1e3f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3338%3A%20CWE-347%20(Improper%20Verification%20of%20Cryptographic%20Signature)%20in%20AWS%20AWS-LC&amp;severity=high&amp;id=69a605a4d1a09e29cb50c698</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3337-cwe-208-observable-timing-discrepanc-002f7127</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3337%3A%20CWE-208%20(Observable%20Timing%20Discrepancy)%20in%20AWS%20AWS-LC&amp;severity=medium&amp;id=69a605a4d1a09e29cb50c694</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3336-cwe-295-improper-certificate-validat-82b96840</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3336%3A%20CWE-295%20(Improper%20Certificate%20Validation)%20in%20AWS%20AWS-LC&amp;severity=high&amp;id=69a60221d1a09e29cb4eac7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2256-cwe-94-improper-control-of-generatio-97245d82</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2256%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ModelScope%20ms-agent&amp;severity=medium&amp;id=69a5f410d1a09e29cb4859d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21882-cwe-273-improper-check-for-dropped--74c9d20e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21882%3A%20CWE-273%3A%20Improper%20Check%20for%20Dropped%20Privileges%20in%20AsfhtgkDavid%20theshit&amp;severity=high&amp;id=69a5e601d1a09e29cb3f7137</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25477-cwe-601-url-redirection-to-untruste-6451e338</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25477%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20toeverything%20AFFiNE&amp;severity=medium&amp;id=69a5e601d1a09e29cb3f713b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48636-elevation-of-privilege-in-google-an-b192bfbd</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48636%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5e27dd1a09e29cb26d64e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31328-elevation-of-privilege-in-google-an-fe323a94</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31328%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5e27dd1a09e29cb26d64b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21853-cwe-94-improper-control-of-generati-d73fe22a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21853%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20toeverything%20AFFiNE&amp;severity=high&amp;id=69a5e27dd1a09e29cb26d651</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0047-elevation-of-privilege-in-google-and-04b2cabf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0047%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db84d1a09e29cb1cf120</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0038-elevation-of-privilege-in-google-and-14616300</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0038%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db84d1a09e29cb1cf116</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0037-elevation-of-privilege-in-google-and-0e2ff1a1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0037%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db84d1a09e29cb1cf112</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0035-elevation-of-privilege-in-google-and-f24ee122</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0035%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db84d1a09e29cb1cf10f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0034-elevation-of-privilege-in-google-and-69a10312</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0034%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db84d1a09e29cb1cf10c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0032-elevation-of-privilege-in-google-and-c7533730</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0032%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db82d1a09e29cb1cf03f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0031-elevation-of-privilege-in-google-and-4ddd3481</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0031%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db82d1a09e29cb1cf039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0030-elevation-of-privilege-in-google-and-a9413c8f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0030%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db82d1a09e29cb1cf033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0029-elevation-of-privilege-in-google-and-6f20c44d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0029%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db82d1a09e29cb1cf02d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0028-elevation-of-privilege-in-google-and-b3d2b6b1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0028%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db82d1a09e29cb1cf027</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0027-elevation-of-privilege-in-google-and-740034f5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0027%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=69a5db82d1a09e29cb1cf021</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0026-elevation-of-privilege-in-google-and-79b503be</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0026%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db82d1a09e29cb1cf01e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0025-information-disclosure-in-google-and-3961b952</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0025%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=high&amp;id=69a5db82d1a09e29cb1cf01b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0024-information-disclosure-in-google-and-775cabbf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0024%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=69a5db82d1a09e29cb1cf018</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0023-elevation-of-privilege-in-google-and-d9d12d55</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0023%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db82d1a09e29cb1cf015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0021-elevation-of-privilege-in-google-and-9579343b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0021%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db80d1a09e29cb1cb9c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0020-elevation-of-privilege-in-google-and-05bc707d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0020%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db80d1a09e29cb1cb9c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0017-elevation-of-privilege-in-google-and-18b4b83e</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0017%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db80d1a09e29cb1cb9c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0015-denial-of-service-in-google-android-16844ccf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0015%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=69a5db80d1a09e29cb1cb9c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0014-denial-of-service-in-google-android-501e5c3d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0014%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=69a5db80d1a09e29cb1cb9bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0013-elevation-of-privilege-in-google-and-3a77d566</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0013%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db80d1a09e29cb1cb9ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0012-information-disclosure-in-google-and-a8d58aff</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0012%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=69a5db80d1a09e29cb1cb9b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0011-elevation-of-privilege-in-google-and-410c9f78</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0011%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db80d1a09e29cb1cb9b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0010-elevation-of-privilege-in-google-and-7fdb3b3e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0010%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db80d1a09e29cb1cb9b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0008-elevation-of-privilege-in-google-and-1785e1d5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0008%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db80d1a09e29cb1cb9ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0007-elevation-of-privilege-in-google-and-58f6e174</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0007%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db7ed1a09e29cb1cb982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0006-remote-code-execution-in-google-andr-79236030</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0006%3A%20Remote%20code%20execution%20in%20Google%20Android&amp;severity=critical&amp;id=69a5db7ed1a09e29cb1cb97f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0005-information-disclosure-in-google-and-ed74d6c9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0005%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=69a5db7ed1a09e29cb1cb97c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48654-elevation-of-privilege-in-google-an-568e7f98</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48654%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db7ed1a09e29cb1cb979</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48653-elevation-of-privilege-in-google-an-f693d7f3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48653%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db7ed1a09e29cb1cb976</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48650-elevation-of-privilege-in-google-an-25ed2fac</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48650%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db7ed1a09e29cb1cb973</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48646-elevation-of-privilege-in-google-an-ab9c8f05</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48646%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db7ed1a09e29cb1cb970</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48645-elevation-of-privilege-in-google-an-505c2e59</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48645%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=critical&amp;id=69a5db7ed1a09e29cb1cb96d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48644-denial-of-service-in-google-android-1bb8488f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48644%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=69a5db7ed1a09e29cb1cb96a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48642-information-disclosure-in-google-an-da2f0b4c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48642%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=69a5db7ed1a09e29cb1cb967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48641-elevation-of-privilege-in-google-an-24d420bc</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48641%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db7cd1a09e29cb1cade9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48635-elevation-of-privilege-in-google-an-9a208ff4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48635%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db7cd1a09e29cb1cade6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48634-elevation-of-privilege-in-google-an-0d0d6816</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48634%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db7cd1a09e29cb1cade3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48630-information-disclosure-in-google-an-fa70f5ef</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48630%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=high&amp;id=69a5db7cd1a09e29cb1cade0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48619-elevation-of-privilege-in-google-an-ef2f931c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48619%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db7cd1a09e29cb1caddd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48613-unknown-in-google-android-902667f0</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48613%3A%20Unknown%20in%20Google%20Android&amp;severity=high&amp;id=69a5db7cd1a09e29cb1cadda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48609-denial-of-service-in-google-android-ba7218a0</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48609%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=critical&amp;id=69a5db7cd1a09e29cb1cadd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48605-elevation-of-privilege-in-google-an-583c11dd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48605%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db7cd1a09e29cb1cadd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48602-elevation-of-privilege-in-google-an-8d7bfe7c</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48602%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db7cd1a09e29cb1cadd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48587-denial-of-service-in-google-android-0feec96e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48587%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=69a5db7cd1a09e29cb1cadc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48585-denial-of-service-in-google-android-73d035df</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48585%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=69a5db79d1a09e29cb1c9aea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48582-elevation-of-privilege-in-google-an-2b3a2c37</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48582%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db79d1a09e29cb1c9ae7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48579-elevation-of-privilege-in-google-an-9e39edc4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48579%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db79d1a09e29cb1c9ae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48578-elevation-of-privilege-in-google-an-1a2b535e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48578%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db79d1a09e29cb1c9ae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48577-elevation-of-privilege-in-google-an-f2946dae</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48577%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db79d1a09e29cb1c9ade</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48574-elevation-of-privilege-in-google-an-6f67eeda</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48574%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db79d1a09e29cb1c9adb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48568-elevation-of-privilege-in-google-an-701b0b4a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48568%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db79d1a09e29cb1c9ad8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48567-elevation-of-privilege-in-google-an-ccaedf6d</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48567%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db79d1a09e29cb1c9ad5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32313-elevation-of-privilege-in-google-an-c7ea5cd5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32313%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db79d1a09e29cb1c9ad2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43766-information-disclosure-in-google-an-4a2fe7e9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43766%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=69a5db79d1a09e29cb1c9acf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dust-specter-apt-targets-government-officials-in-i-87553f50</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dust%20Specter%20APT%20Targets%20Government%20Officials%20in%20Iraq&amp;severity=medium&amp;id=69a717a5d1a09e29cb601ed4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0654-cwe-78-improper-neutralization-of-sp-6feb9749</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0654%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Deco%20BE25%20v1.0&amp;severity=high&amp;id=69a5d050b6c0d8506fbcb7bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/funnull-resurfaces-exposing-ringh23-arsenal-and-ma-172367c9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Funnull%20Resurfaces%3A%20Exposing%20RingH23%20Arsenal%20and%20MacCMS%20Supply%20Chain%20Attacks&amp;severity=medium&amp;id=69a717a5d1a09e29cb601e3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0655-cwe-22-improper-limitation-of-a-path-0f110460</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0655%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20TP-Link%20Systems%20Inc.%20Deco%20BE25%20v1.0&amp;severity=medium&amp;id=69a5d050b6c0d8506fbcb7c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3180-cwe-89-improper-neutralization-of-sp-98c584af</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3180%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20contest-gallery%20Contest%20Gallery%20%E2%80%93%20Upload%20%26%20Vote%20Photos%2C%20Media%2C%20Sell%20with%20PayPal%20%26%20Stripe&amp;severity=high&amp;id=69a5ccceb6c0d8506fb7921b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3132-cwe-94-improper-control-of-generatio-60f29397</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3132%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Jewel%20Theme%20Master%20Addons%20for%20Elementor%20Premium&amp;severity=high&amp;id=69a5ccceb6c0d8506fb79216</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/novel-dprk-stager-using-pastebin-and-text-steganog-700c0da3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Novel%20DPRK%20stager%20using%20Pastebin%20and%20text%20steganography&amp;severity=medium&amp;id=69a6056dd1a09e29cb500441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21385-cwe-190-integer-overflow-or-wraparo-b6c506df</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21385%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a5c5c8b6c0d8506faa297e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59603-cwe-787-out-of-bounds-write-in-qual-4c38cf97</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59603%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a5c5c8b6c0d8506faa297b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59600-cwe-126-buffer-over-read-in-qualcom-c7eb4244</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59600%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a5c5c8b6c0d8506faa2978</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47386-cwe-416-use-after-free-in-qualcomm--ce0f17d0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47386%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a5c5cab6c0d8506faa2cfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47385-cwe-1262-improper-access-control-fo-d2e4d6d6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47385%3A%20CWE-1262%3A%20Improper%20Access%20Control%20for%20Register%20Interface%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a5c5cab6c0d8506faa2cf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47384-cwe-617-reachable-assertion-in-qual-817ade50</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47384%3A%20CWE-617%20Reachable%20Assertion%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=69a5c5cab6c0d8506faa2cf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47383-cwe-325-missing-cryptographic-step--582b986b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47383%3A%20CWE-325%3A%20Missing%20Cryptographic%20Step%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a5c5cab6c0d8506faa2aa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47381-cwe-416-use-after-free-in-qualcomm--a1d53b23</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47381%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a5c5cab6c0d8506faa2aa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47379-cwe-416-use-after-free-in-qualcomm--34172ec0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47379%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a5c5c8b6c0d8506faa2993</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47378-cwe-497-exposure-of-sensitive-syste-00d19e62</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47378%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a5c5c8b6c0d8506faa2990</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47377-cwe-416-use-after-free-in-qualcomm--ea0d7bb3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47377%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a5c5c8b6c0d8506faa298d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47376-cwe-416-use-after-free-in-qualcomm--24bbb384</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47376%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a5c5c8b6c0d8506faa298a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47375-cwe-416-use-after-free-in-qualcomm--f83573a6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47375%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a5c5c8b6c0d8506faa2987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47373-cwe-787-out-of-bounds-write-in-qual-dafd73bc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47373%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a5c5c8b6c0d8506faa2984</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47371-cwe-617-reachable-assertion-in-qual-add108d9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47371%3A%20CWE-617%20Reachable%20Assertion%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=69a5c5c8b6c0d8506faa2981</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/2nd-march-threat-intelligence-report-b9e4863c</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=2nd%20March%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=low&amp;id=69a5bddb32ffcdb8a2768b71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64427-cwe-918-server-side-request-forgery-938d592d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64427%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20IceWhaleTech%20ZimaOS&amp;severity=high&amp;id=69a5bdaa32ffcdb8a2762eb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28286-cwe-73-external-control-of-file-nam-7cb314e5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28286%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20IceWhaleTech%20ZimaOS&amp;severity=high&amp;id=69a5bdaa32ffcdb8a2762eb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52564-cwe-80-improper-neutralization-of-s-45e6f918</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52564%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69a5b69f32ffcdb8a2520668</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52998-cwe-502-deserialization-of-untruste-bdb241bc</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52998%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5b69f32ffcdb8a252066e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50199-cwe-918-server-side-request-forgery-087d001b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50199%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5b69f32ffcdb8a2520647</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52563-cwe-79-improper-neutralization-of-i-5645040f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52563%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69a5b69f32ffcdb8a2520664</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52475-cwe-79-improper-neutralization-of-i-8242ec9b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52475%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69a5b69f32ffcdb8a252065a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52476-cwe-79-improper-neutralization-of-i-065db084</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52476%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69a5b69f32ffcdb8a252065f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52470-cwe-79-improper-neutralization-of-i-07562d58</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52470%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69a5b69f32ffcdb8a2520655</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52469-cwe-841-improper-enforcement-of-beh-d8af2236</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52469%3A%20CWE-841%3A%20Improper%20Enforcement%20of%20Behavioral%20Workflow%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5b69f32ffcdb8a2520650</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52468-cwe-79-improper-neutralization-of-i-af315191</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52468%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5b69f32ffcdb8a252064b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28412-cwe-400-uncontrolled-resource-consu-ee59b501</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28412%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20textream&amp;severity=medium&amp;id=69a5b6a132ffcdb8a25206aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50198-cwe-502-deserialization-of-untruste-f2b04235</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50198%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5b69f32ffcdb8a2520640</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28403-cwe-346-origin-validation-error-in--510c10f2</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28403%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20textream&amp;severity=high&amp;id=69a5b6a132ffcdb8a25206a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vulnerability-allowed-hijacking-chromes-gemini-liv-b93c9281</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vulnerability%20Allowed%20Hijacking%20Chrome%E2%80%99s%20Gemini%20Live%20AI%20Assistant&amp;severity=low&amp;id=69a5af6132ffcdb8a2437a40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50197-cwe-78-improper-neutralization-of-s-930b378b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50197%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5ac1332ffcdb8a23ff402</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50196-cwe-78-improper-neutralization-of-s-c384cdc9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50196%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5ac1332ffcdb8a23ff3fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3102-macos-exiftool-image-processing-vuln-b769fd1f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3102%3A%20macOS%20ExifTool%20image-processing%20vulnerability%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69a63f7bd1a09e29cb92fd0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50195-cwe-78-improper-neutralization-of-s-04fa43e9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50195%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5ac1332ffcdb8a23ff3f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0689-cwe-522-insufficiently-protected-cre-f23e5b11</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0689%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Extreme%20Networks%20ExtremeCloud%20IQ%20-%20Site%20Engine&amp;severity=medium&amp;id=69a5ac1332ffcdb8a23ff40b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50194-cwe-78-improper-neutralization-of-s-98ee3848</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50194%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5ac1332ffcdb8a23ff3f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50193-cwe-78-improper-neutralization-of-s-b5f5a81f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50193%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5ac1332ffcdb8a23ff3ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50192-cwe-89-improper-neutralization-of-s-c4433473</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50192%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5a89032ffcdb8a23d2f40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50191-cwe-89-improper-neutralization-of-s-962362cb</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50191%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5a89032ffcdb8a23d2f3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50190-cwe-89-improper-neutralization-of-s-ba698467</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50190%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5a89032ffcdb8a23d2f36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0995-cwe-362-concurrent-execution-using-s-15e51ab8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0995%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Arm%20C1%20Pro&amp;severity=low&amp;id=69a5a89032ffcdb8a23d2f45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50189-cwe-89-improper-neutralization-of-s-ddcfb698</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50189%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5a89032ffcdb8a23d2f2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50188-cwe-89-improper-neutralization-of-s-36e03404</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50188%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5a89032ffcdb8a23d2f2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52482-cwe-79-improper-neutralization-of-i-52a860bc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52482%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5a50b32ffcdb8a23b6e52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50187-cwe-95-improper-neutralization-of-d-2855170f</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50187%3A%20CWE-95%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=critical&amp;id=69a5a50b32ffcdb8a23b6e4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50186-cwe-79-improper-neutralization-of-i-6bc2aea3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50186%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69a5a50b32ffcdb8a23b6e49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50337-cwe-918-server-side-request-forgery-13c8b2e4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50337%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69a5a50b32ffcdb8a23b6e44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openclaw-vulnerability-allowed-websites-to-hijack--4d33e471</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenClaw%20Vulnerability%20Allowed%20Websites%20to%20Hijack%20AI%20Agents&amp;severity=low&amp;id=69a5a15132ffcdb8a2372e13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47886-cwe-502-deserialization-of-untruste-fc9008b4</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47886%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5c4fdb6c0d8506fa86d51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23600-vulnerability-in-hewlett-packard-en-a5e8a398</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23600%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20AutoPass%20License%20Server%20(APLS)&amp;severity=critical&amp;id=69a5a89232ffcdb8a23d2f96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/madison-square-garden-data-breach-confirmed-months-e72fb31f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Madison%20Square%20Garden%20Data%20Breach%20Confirmed%20Months%20After%20Hacker%20Attack&amp;severity=medium&amp;id=69a596c532ffcdb8a22d0c8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3432-cwe-862-missing-authorization-in-sim-04668d1b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3432%3A%20CWE-862%20Missing%20Authorization%20in%20SimStudioAI%20sim&amp;severity=critical&amp;id=69a5937832ffcdb8a228be36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3431-cwe-862-missing-authorization-in-sim-98ba3f10</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3431%3A%20CWE-862%20Missing%20Authorization%20in%20SimStudioAI%20sim&amp;severity=critical&amp;id=69a5937832ffcdb8a228be33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14532-cwe-434-unrestricted-upload-of-file-a08baa22</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14532%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Studio%20Fabryka%20DobryCMS&amp;severity=critical&amp;id=69a5937832ffcdb8a228be30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12462-cwe-89-improper-neutralization-of-s-e4bc6af2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12462%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Studio%20Fabryka%20DobryCMS&amp;severity=critical&amp;id=69a5937832ffcdb8a228be2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-apt-targets-air-gapped-systems-in-rec-01a77ed4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20APT%20Targets%20Air-Gapped%20Systems%20in%20Recent%20Campaign&amp;severity=medium&amp;id=69a57aa532ffcdb8a20f84b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-working-towards-quantum-safe-chrome-https-c-51a02371</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Working%20Towards%20Quantum-Safe%20Chrome%20HTTPS%20Certificates&amp;severity=medium&amp;id=69a5772032ffcdb8a208e196</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58406-cwe-693-protection-mechanism-failur-90e01dfe</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58406%3A%20CWE-693%20Protection%20Mechanism%20Failure%20in%20CGM%20CGM%20CLININET&amp;severity=medium&amp;id=69a573fd32ffcdb8a20705f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58405-cwe-1021-improper-restriction-of-re-3693e469</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58405%3A%20CWE-1021%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20CGM%20CGM%20CLININET&amp;severity=medium&amp;id=69a573fd32ffcdb8a20705ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58402-cwe-639-authorization-bypass-throug-e811e431</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58402%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20CGM%20CGM%20CLININET&amp;severity=high&amp;id=69a573fd32ffcdb8a20705ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30062-cwe-89-improper-neutralization-of-s-406cf469</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30062%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20CGM%20CGM%20CLININET&amp;severity=medium&amp;id=69a573fd32ffcdb8a20705e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30044-cwe-78-improper-neutralization-of-s-2f406f65</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30044%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20CommandInjection&apos;)%20in%20CGM%20CGM%20CLININET&amp;severity=critical&amp;id=69a573fd32ffcdb8a20705e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30042-cwe-603-use-of-client-side-authenti-9e79f8b6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30042%3A%20CWE-603%20Use%20of%20Client-Side%20Authentication%20in%20CGM%20CGM%20CLININET&amp;severity=critical&amp;id=69a573fd32ffcdb8a20705de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30035-cwe-306-missing-authentication-for--80df036f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30035%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20CGM%20CGM%20CLININET&amp;severity=critical&amp;id=69a573fd32ffcdb8a20705da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/quick-howto-zip-files-inside-rtf-mon-mar-2nd-0c33c52b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Quick%20Howto%3A%20ZIP%20Files%20Inside%20RTF%2C%20(Mon%2C%20Mar%202nd)&amp;severity=medium&amp;id=69a5739d32ffcdb8a206dff0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wireshark-464-released-mon-mar-2nd-1c22c94e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Wireshark%204.6.4%20Released%2C%20(Mon%2C%20Mar%202nd)&amp;severity=medium&amp;id=69a5739d32ffcdb8a206dff3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10350-cwe-89-improper-neutralization-of-s-d1330e4f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10350%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20CGM%20CGM%20NETRAAD&amp;severity=high&amp;id=69a573fd32ffcdb8a20705d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-israel-and-iran-trade-cyberattacks-pro-west-hac-ac7cd7b8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US-Israel%20and%20Iran%20Trade%20Cyberattacks%3A%20Pro-West%20Hacks%20Cause%20Disruption%20as%20Tehran%20Retaliates&amp;severity=critical&amp;id=69a5701932ffcdb8a20320c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2584-cwe-89-improper-neutralization-of-sp-3951e11b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2584%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ciser%20System%20SL%20CSIP%20firmware&amp;severity=critical&amp;id=69a5542f32ffcdb8a2ddad39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20416-cwe-787-out-of-bounds-write-in-medi-250df18d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20416%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=69a550ac32ffcdb8a2d8ac67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20445-cwe-367-time-of-check-time-of-use-t-1aacf4d1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20445%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550b032ffcdb8a2d8ad3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20429-cwe-125-out-of-bounds-read-in-media-47f3aa2b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20429%3A%20CWE-125%20Out-of-bounds%20Read%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ac32ffcdb8a2d8ac7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20424-cwe-125-out-of-bounds-read-in-media-a029e3f2</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20424%3A%20CWE-125%20Out-of-bounds%20Read%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ac32ffcdb8a2d8ac6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20444-cwe-787-out-of-bounds-write-in-medi-7a1940a7</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20444%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ae32ffcdb8a2d8aceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20443-cwe-416-use-after-free-in-mediatek--5d941cf9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20443%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ae32ffcdb8a2d8ace8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20442-cwe-416-use-after-free-in-mediatek--fadd9fca</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20442%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ae32ffcdb8a2d8ace5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20441-cwe-787-out-of-bounds-write-in-medi-009447e6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20441%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ae32ffcdb8a2d8ace2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20440-cwe-1285-specified-index-position-o-c6257827</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20440%3A%20CWE-1285%20Specified%20Index%2C%20Position%2C%20or%20Offset%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ae32ffcdb8a2d8acdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20439-cwe-416-use-after-free-in-mediatek--27fbcc84</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20439%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ae32ffcdb8a2d8acdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20438-cwe-367-time-of-check-time-of-use-t-14669464</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20438%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ae32ffcdb8a2d8acd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20437-cwe-416-use-after-free-in-mediatek--12a7a5b8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20437%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ae32ffcdb8a2d8acd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20436-cwe-120-classic-buffer-overflow-in--1dd491fe</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20436%3A%20CWE-120%20Classic%20Buffer%20Overflow%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ae32ffcdb8a2d8acd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20435-cwe-522-insufficiently-protected-cr-c10cbe25</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20435%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ae32ffcdb8a2d8acd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20434-cwe-787-out-of-bounds-write-in-medi-48a3728c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20434%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=69a550ac32ffcdb8a2d8ac82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20430-cwe-787-out-of-bounds-write-in-medi-388e7108</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20430%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=69a550ac32ffcdb8a2d8ac7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20428-cwe-787-out-of-bounds-write-in-medi-870c8926</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20428%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ac32ffcdb8a2d8ac79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20427-cwe-787-out-of-bounds-write-in-medi-d3e944a5</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20427%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ac32ffcdb8a2d8ac76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20426-cwe-787-out-of-bounds-write-in-medi-97a580b1</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20426%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ac32ffcdb8a2d8ac73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20425-cwe-787-out-of-bounds-write-in-medi-4edb3ff4</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20425%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ac32ffcdb8a2d8ac70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20423-cwe-749-exposed-dangerous-method-or-377e62dc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20423%3A%20CWE-749%20Exposed%20Dangerous%20Method%20or%20Function%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=69a550ac32ffcdb8a2d8ac6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3422-cwe-502-deserialization-of-untrusted-c53bebca</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3422%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20e-Excellence%20U-Office%20Force&amp;severity=critical&amp;id=69a52d8232ffcdb8a2a6ad05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15597-improper-access-controls-in-dataeas-ce1dc337</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15597%3A%20Improper%20Access%20Controls%20in%20Dataease%20SQLBot&amp;severity=medium&amp;id=69a52d8232ffcdb8a2a6ace1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3000-cwe-494-download-of-code-without-int-6f96a540</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3000%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20Changing%20IDExpert%20Windows%20Logon%20Agent&amp;severity=critical&amp;id=69a52d8232ffcdb8a2a6acf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3413-sql-injection-in-itsourcecode-univer-983c6ee5</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3413%3A%20SQL%20Injection%20in%20itsourcecode%20University%20Management%20System&amp;severity=medium&amp;id=69a52d8232ffcdb8a2a6acfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2999-cwe-494-download-of-code-without-int-5d28b8bc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2999%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20Changing%20IDExpert%20Windows%20Logon%20Agent&amp;severity=critical&amp;id=69a52d8232ffcdb8a2a6acf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3412-cross-site-scripting-in-itsourcecode-e5baf82a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3412%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20University%20Management%20System&amp;severity=medium&amp;id=69a522f732ffcdb8a29725e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3411-sql-injection-in-itsourcecode-univer-e960a20a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3411%3A%20SQL%20Injection%20in%20itsourcecode%20University%20Management%20System&amp;severity=medium&amp;id=69a51bef32ffcdb8a28abb89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3410-sql-injection-in-itsourcecode-societ-8229ef18</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3410%3A%20SQL%20Injection%20in%20itsourcecode%20Society%20Management%20System&amp;severity=medium&amp;id=69a5186a32ffcdb8a2864e00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3409-code-injection-in-eosphoros-ai-db-gp-fe6781c2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3409%3A%20Code%20Injection%20in%20eosphoros-ai%20db-gpt&amp;severity=medium&amp;id=69a5186a32ffcdb8a2864dfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3408-null-pointer-dereference-in-open-bab-da0da361</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3408%3A%20NULL%20Pointer%20Dereference%20in%20Open%20Babel&amp;severity=medium&amp;id=69a50ddf32ffcdb8a25b4131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3407-heap-based-buffer-overflow-in-yosysh-dca42c3b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3407%3A%20Heap-based%20Buffer%20Overflow%20in%20YosysHQ%20yosys&amp;severity=medium&amp;id=69a5348c32ffcdb8a2af2b44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3406-sql-injection-in-projectworlds-onlin-9eac0e99</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3406%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Art%20Gallery%20Shop&amp;severity=medium&amp;id=69a5348c32ffcdb8a2af2b3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3405-path-traversal-in-thinkgem-jeesite-5196bf01</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3405%3A%20Path%20Traversal%20in%20thinkgem%20JeeSite&amp;severity=low&amp;id=69a4f1c732ffcdb8a223af3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3404-xml-external-entity-reference-in-thi-51b249e5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3404%3A%20XML%20External%20Entity%20Reference%20in%20thinkgem%20JeeSite&amp;severity=low&amp;id=69a4f1c732ffcdb8a223af35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3403-cross-site-scripting-in-phpgurukul-s-17adf644</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3403%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Student%20Record%20Management%20System&amp;severity=medium&amp;id=69a4e73232ffcdb8a20beade</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3402-cross-site-scripting-in-phpgurukul-s-3b0afb5a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3402%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Student%20Record%20Management%20System&amp;severity=medium&amp;id=69a4e02a32ffcdb8a2fae9bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3401-session-expiration-in-sourcecodester-da3b4f23</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3401%3A%20Session%20Expiration%20in%20SourceCodester%20Web-based%20Pharmacy%20Product%20Management%20System&amp;severity=low&amp;id=69a4e02a32ffcdb8a2fae9b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-02-63e7627a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-02&amp;severity=medium&amp;id=69a62892d1a09e29cb62b7a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26713-na-7bedeb27</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26713%3A%20n%2Fa&amp;severity=critical&amp;id=69a5e601d1a09e29cb3f7141</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26712-na-24d0bc2c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26712%3A%20n%2Fa&amp;severity=critical&amp;id=69a5e601d1a09e29cb3f713e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26711-na-6f7b1ca4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26711%3A%20n%2Fa&amp;severity=critical&amp;id=69a5d7f0d1a09e29cb15f964</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26710-na-b38411d2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26710%3A%20n%2Fa&amp;severity=critical&amp;id=69a5d7f0d1a09e29cb15f961</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26709-na-883f5184</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26709%3A%20n%2Fa&amp;severity=critical&amp;id=69a5d7f0d1a09e29cb15f95d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26706-na-5cbb336a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26706%3A%20n%2Fa&amp;severity=critical&amp;id=69a5d050b6c0d8506fbcb7cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26705-na-a9848195</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26705%3A%20n%2Fa&amp;severity=critical&amp;id=69a5d050b6c0d8506fbcb7cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26704-na-28680e8c</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26704%3A%20n%2Fa&amp;severity=critical&amp;id=69a5d050b6c0d8506fbcb7c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26707-na-6e668b1d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26707%3A%20n%2Fa&amp;severity=critical&amp;id=69a5ccceb6c0d8506fb79213</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26708-na-9d3ae846</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26708%3A%20n%2Fa&amp;severity=critical&amp;id=69a5c5cab6c0d8506faa2d17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26700-na-7f4834e3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26700%3A%20n%2Fa&amp;severity=critical&amp;id=69a5c5cab6c0d8506faa2d10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24105-na-2160bf38</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24105%3A%20n%2Fa&amp;severity=critical&amp;id=69a5c5cab6c0d8506faa2d02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24115-na-134d08de</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24115%3A%20n%2Fa&amp;severity=critical&amp;id=69a5c4fdb6c0d8506fa86d66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24108-na-e5dd6352</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24108%3A%20n%2Fa&amp;severity=critical&amp;id=69a5c4fdb6c0d8506fa86d62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24107-na-70a14196</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24107%3A%20n%2Fa&amp;severity=critical&amp;id=69a5c4fdb6c0d8506fa86d5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65465-na-fdf17c91</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65465%3A%20n%2Fa&amp;severity=medium&amp;id=69a5c4fdb6c0d8506fa86d58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58107-na-d7a73217</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58107%3A%20n%2Fa&amp;severity=high&amp;id=69a5c4fdb6c0d8506fa86d55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70252-na-41578cab</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70252%3A%20n%2Fa&amp;severity=high&amp;id=69a5ba2232ffcdb8a272b11b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26699-na-e2fc148c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26699%3A%20n%2Fa&amp;severity=high&amp;id=69a5b31c32ffcdb8a247ea24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24110-na-365c0423</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24110%3A%20n%2Fa&amp;severity=critical&amp;id=69a5b31c32ffcdb8a247ea20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24101-na-d4673fac</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24101%3A%20n%2Fa&amp;severity=critical&amp;id=69a5b31c32ffcdb8a247ea1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-02-9a2afa6f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-02&amp;severity=medium&amp;id=69a5af5e32ffcdb8a243307b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26720-na-2ff82cfc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26720%3A%20n%2Fa&amp;severity=critical&amp;id=69a5ac1332ffcdb8a23ff415</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26701-na-f7f6a089</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26701%3A%20n%2Fa&amp;severity=critical&amp;id=69a5ac1332ffcdb8a23ff412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24112-na-7748f962</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24112%3A%20n%2Fa&amp;severity=high&amp;id=69a5ac1332ffcdb8a23ff40e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66880-na-5a19d613</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66880%3A%20n%2Fa&amp;severity=medium&amp;id=69a5ac1332ffcdb8a23ff407</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26703-na-12ee013e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26703%3A%20n%2Fa&amp;severity=critical&amp;id=69a5a89232ffcdb8a23d2f93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26702-na-04c047b8</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26702%3A%20n%2Fa&amp;severity=critical&amp;id=69a5a89232ffcdb8a23d2f90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26696-na-579f0a76</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26696%3A%20n%2Fa&amp;severity=critical&amp;id=69a5a89032ffcdb8a23d2f52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26695-na-2c54b368</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26695%3A%20n%2Fa&amp;severity=critical&amp;id=69a5a89032ffcdb8a23d2f4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26694-na-9ad189bd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26694%3A%20n%2Fa&amp;severity=critical&amp;id=69a5a89032ffcdb8a23d2f4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24111-na-6172e3d9</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24111%3A%20n%2Fa&amp;severity=critical&amp;id=69a5a89032ffcdb8a23d2f48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24114-na-ff78d00a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24114%3A%20n%2Fa&amp;severity=high&amp;id=69a5a50b32ffcdb8a23b6e61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24113-na-9be2e8f0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24113%3A%20n%2Fa&amp;severity=critical&amp;id=69a5a50b32ffcdb8a23b6e5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24109-na-d78e78dc</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24109%3A%20n%2Fa&amp;severity=critical&amp;id=69a5a50b32ffcdb8a23b6e59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26698-na-2e1f1f94</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26698%3A%20n%2Fa&amp;severity=medium&amp;id=69a59a7f32ffcdb8a231556f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26697-na-0f327e0e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26697%3A%20n%2Fa&amp;severity=medium&amp;id=69a59a7f32ffcdb8a231556c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-02-646a39fa</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-02&amp;severity=low&amp;id=69a51f3932ffcdb8a2918c3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3400-stack-based-buffer-overflow-in-tenda-c665b93a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3400%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC15&amp;severity=high&amp;id=69a4ce9732ffcdb8a239391b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3399-buffer-overflow-in-tenda-f453-2372f90c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3399%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69a4c78f32ffcdb8a20b0e7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3398-buffer-overflow-in-tenda-f453-735bc013</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3398%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69a4b98032ffcdb8a289904f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3395-code-injection-in-maxsite-cms-3bfdaf81</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3395%3A%20Code%20Injection%20in%20MaxSite%20CMS&amp;severity=medium&amp;id=69a44c8232ffcdb8a22bcf2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3394-memory-corruption-in-jarikomppa-solo-211ba7f8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3394%3A%20Memory%20Corruption%20in%20jarikomppa%20soloud&amp;severity=medium&amp;id=69a4343532ffcdb8a2227d6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-weaponize-claude-code-in-mexican-governmen-ba878574</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Weaponize%20Claude%20Code%20in%20Mexican%20Government%20Cyberattack&amp;severity=medium&amp;id=69a433f132ffcdb8a2227866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3393-heap-based-buffer-overflow-in-jariko-5c5d7c47</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3393%3A%20Heap-based%20Buffer%20Overflow%20in%20jarikomppa%20soloud&amp;severity=medium&amp;id=69a4306332ffcdb8a22142d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3392-null-pointer-dereference-in-fascinat-e8321564</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3392%3A%20NULL%20Pointer%20Dereference%20in%20FascinatedBox%20lily&amp;severity=medium&amp;id=69a425d832ffcdb8a21d5292</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3391-out-of-bounds-read-in-fascinatedbox--9a203fbf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3391%3A%20Out-of-Bounds%20Read%20in%20FascinatedBox%20lily&amp;severity=medium&amp;id=69a425d832ffcdb8a21d528a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3390-out-of-bounds-read-in-fascinatedbox--3e1232d9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3390%3A%20Out-of-Bounds%20Read%20in%20FascinatedBox%20lily&amp;severity=medium&amp;id=69a410be32ffcdb8a216f793</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3389-null-pointer-dereference-in-squirrel-0cdfbe54</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3389%3A%20NULL%20Pointer%20Dereference%20in%20Squirrel&amp;severity=medium&amp;id=69a410be32ffcdb8a216f78c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3388-uncontrolled-recursion-in-squirrel-9607a98f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3388%3A%20Uncontrolled%20Recursion%20in%20Squirrel&amp;severity=medium&amp;id=69a40d3b32ffcdb8a215b143</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3387-null-pointer-dereference-in-wren-lan-d9c45b90</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3387%3A%20NULL%20Pointer%20Dereference%20in%20wren-lang%20wren&amp;severity=medium&amp;id=69a40d3b32ffcdb8a215b13b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3386-out-of-bounds-read-in-wren-lang-wren-34b2743d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3386%3A%20Out-of-Bounds%20Read%20in%20wren-lang%20wren&amp;severity=medium&amp;id=69a3ff2a32ffcdb8a20f9a6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3385-uncontrolled-recursion-in-wren-lang--328bcef5</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3385%3A%20Uncontrolled%20Recursion%20in%20wren-lang%20wren&amp;severity=medium&amp;id=69a3ff2a32ffcdb8a20f9a64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3384-uncontrolled-recursion-in-chaiscript-987eeee8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3384%3A%20Uncontrolled%20Recursion%20in%20ChaiScript&amp;severity=medium&amp;id=69a3f82232ffcdb8a20b78ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3383-divide-by-zero-in-chaiscript-a72de4d0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3383%3A%20Divide%20By%20Zero%20in%20ChaiScript&amp;severity=medium&amp;id=69a3e31832ffcdb8a2033ae5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3382-memory-corruption-in-chaiscript-4e28e43c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3382%3A%20Memory%20Corruption%20in%20ChaiScript&amp;severity=medium&amp;id=69a3d17732ffcdb8a2ed6d85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-zoom-meeting-update-silently-installs-unautho-4e0297d7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Zoom%20meeting%20&apos;update&apos;%20silently%20installs%20unauthorized%20version%20of%20monitoring%20tool%20abused%20by%20cybercriminals%20to%20spy%20on%20victims&amp;severity=medium&amp;id=69a57ab332ffcdb8a20f8734</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/plugx-meeting-invitation-via-msbuild-and-gdata-6eb1b765</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PlugX%20Meeting%20Invitation%20via%20MSBuild%20and%20GDATA&amp;severity=medium&amp;id=69a57ab332ffcdb8a20f871d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/abusing-windows-file-explorer-and-webdav-for-malwa-66456dc7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Abusing%20Windows%20File%20Explorer%20and%20WebDAV%20for%20Malware%20Delivery&amp;severity=medium&amp;id=69a57ab332ffcdb8a20f870b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3380-buffer-overflow-in-tenda-f453-54481f34</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3380%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69a3b55632ffcdb8a2b4b44d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3379-buffer-overflow-in-tenda-f453-63a79945</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3379%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69a3a74732ffcdb8a2a0f4d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3378-buffer-overflow-in-tenda-f453-0b5023a3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3378%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69a3a74732ffcdb8a2a0f4d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-01-27955616</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-01&amp;severity=medium&amp;id=69a4d56532ffcdb8a278469f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-01-5c769887</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-01&amp;severity=medium&amp;id=69a48f1632ffcdb8a2432fca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-01-665b3e85</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-01&amp;severity=low&amp;id=69a3fef132ffcdb8a20f79ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3377-buffer-overflow-in-tenda-f453-c140c206</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3377%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69a37d1832ffcdb8a2775af2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3376-buffer-overflow-in-tenda-f453-d5150655</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3376%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69a3760f32ffcdb8a2754357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28562-improper-neutralization-of-special--22c35314</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28562%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20gVectors%20Team%20wpForo%20Forum&amp;severity=high&amp;id=69a3647b32ffcdb8a26ae37a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28561-improper-neutralization-of-input-du-2ab57de1</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28561%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gVectors%20Team%20wpForo%20Forum&amp;severity=medium&amp;id=69a3647b32ffcdb8a26ae375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28560-improper-neutralization-of-input-du-8faa806d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28560%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gVectors%20Team%20wpForo%20Forum&amp;severity=medium&amp;id=69a3647b32ffcdb8a26ae370</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28559-exposure-of-sensitive-information-t-63f9c324</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28559%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20gVectors%20Team%20wpForo%20Forum&amp;severity=medium&amp;id=69a3647b32ffcdb8a26ae36b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28558-improper-neutralization-of-input-du-ef0d4882</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28558%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gVectors%20Team%20wpForo%20Forum&amp;severity=medium&amp;id=69a3647b32ffcdb8a26ae366</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28557-missing-authorization-in-gvectors-t-52ac189f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28557%3A%20Missing%20Authorization%20in%20gVectors%20Team%20wpForo%20Forum&amp;severity=high&amp;id=69a3647b32ffcdb8a26ae361</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28556-missing-authorization-in-gvectors-t-7c48eb32</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28556%3A%20Missing%20Authorization%20in%20gVectors%20Team%20wpForo%20Forum&amp;severity=medium&amp;id=69a3647b32ffcdb8a26ae35c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28555-missing-authorization-in-gvectors-t-0d98cbfc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28555%3A%20Missing%20Authorization%20in%20gVectors%20Team%20wpForo%20Forum&amp;severity=medium&amp;id=69a3647b32ffcdb8a26ae357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28554-missing-authorization-in-gvectors-t-03297c73</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28554%3A%20Missing%20Authorization%20in%20gVectors%20Team%20wpForo%20Forum&amp;severity=medium&amp;id=69a3647b32ffcdb8a26ae352</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/canadian-tire-data-breach-impacts-38-million-accou-c239d541</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Canadian%20Tire%20Data%20Breach%20Impacts%2038%20Million%20Accounts&amp;severity=medium&amp;id=69a2d7a532ffcdb8a23552b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3010-cwe-79-improper-neutralization-of-in-f593f595</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3010%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Microchip%20TimePictra&amp;severity=critical&amp;id=69a2d7ea32ffcdb8a2355e96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2844-cwe-306-missing-authentication-for-c-aa868998</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2844%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Microchip%20TimePictra&amp;severity=critical&amp;id=69a2d7ea32ffcdb8a2355e93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13673-cwe-89-improper-neutralization-of-s-d43b2ec0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13673%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=high&amp;id=69a29c1732ffcdb8a21a67e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2471-cwe-502-deserialization-of-untrusted-d6318999</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2471%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20smub%20WP%20Mail%20Logging&amp;severity=high&amp;id=69a2918b32ffcdb8a20eaa4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1542-cwe-502-deserialization-of-untrusted-59f81670</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1542%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Super%20Stage%20WP&amp;severity=medium&amp;id=69a2bbbc32ffcdb8a227e261</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-28-bf794239</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-28&amp;severity=medium&amp;id=69a383e532ffcdb8a279ce9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-28-cdec1619</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-28&amp;severity=low&amp;id=69a2520932ffcdb8a2a9c846</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-02-28-c6fb4a83</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-02-28&amp;severity=medium&amp;id=69a2520932ffcdb8a2a9c83f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28426-cwe-79-improper-neutralization-of-i-60e5cc52</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28426%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20statamic%20cms&amp;severity=high&amp;id=69a2210832ffcdb8a2802147</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28425-cwe-94-improper-control-of-generati-a87384ad</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28425%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20statamic%20cms&amp;severity=high&amp;id=69a21f2232ffcdb8a27f4a94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27759-cwe-918-server-side-request-forgery-7b0812f9</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27759%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Dhrumil%20Kumbhani%20Featured%20Image%20from%20Content&amp;severity=medium&amp;id=69a21f2232ffcdb8a27f4a7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28424-cwe-862-missing-authorization-in-st-0c75739a</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28424%3A%20CWE-862%3A%20Missing%20Authorization%20in%20statamic%20cms&amp;severity=medium&amp;id=69a21f2232ffcdb8a27f4a8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28423-cwe-918-server-side-request-forgery-eabbe53b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28423%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20statamic%20cms&amp;severity=medium&amp;id=69a21f2232ffcdb8a27f4a84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28411-cwe-288-authentication-bypass-using-7167a2c8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28411%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=69a212fb32ffcdb8a2777760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28409-cwe-78-improper-neutralization-of-s-258821fc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28409%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=69a212fb32ffcdb8a277775c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28408-cwe-862-missing-authorization-in-la-ddacfcff</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28408%3A%20CWE-862%3A%20Missing%20Authorization%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=69a212fb32ffcdb8a2777758</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28416-cwe-918-server-side-request-forgery-7592cbef</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28416%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20gradio-app%20gradio&amp;severity=high&amp;id=69a212fb32ffcdb8a2777772</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28415-cwe-200-exposure-of-sensitive-infor-dbcfee5e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28415%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20gradio-app%20gradio&amp;severity=medium&amp;id=69a212fb32ffcdb8a277776d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28414-cwe-36-absolute-path-traversal-in-g-feb1c031</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28414%3A%20CWE-36%3A%20Absolute%20Path%20Traversal%20in%20gradio-app%20gradio&amp;severity=high&amp;id=69a212fb32ffcdb8a277777c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27939-cwe-287-improper-authentication-in--447d0594</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27939%3A%20CWE-287%3A%20Improper%20Authentication%20in%20statamic%20cms&amp;severity=high&amp;id=69a212fb32ffcdb8a2777778</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trump-orders-all-federal-agencies-to-phase-out-use-baea88a4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trump%20Orders%20All%20Federal%20Agencies%20to%20Phase%20Out%20Use%20of%20Anthropic%20Technology&amp;severity=medium&amp;id=69a20f4132ffcdb8a275b2bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28407-cwe-703-improper-check-or-handling--2f677404</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28407%3A%20CWE-703%3A%20Improper%20Check%20or%20Handling%20of%20Exceptional%20Conditions%20in%20chainguard-dev%20malcontent&amp;severity=medium&amp;id=69a20f8732ffcdb8a275da20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28406-cwe-22-improper-limitation-of-a-pat-c28b7a73</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28406%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20chainguard-forks%20kaniko&amp;severity=high&amp;id=69a20f8732ffcdb8a275da1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28402-cwe-354-improper-validation-of-inte-be34d944</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28402%3A%20CWE-354%3A%20Improper%20Validation%20of%20Integrity%20Check%20Value%20in%20nimiq%20core-rs-albatross&amp;severity=high&amp;id=69a20bf332ffcdb8a2748336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28400-cwe-749-exposed-dangerous-method-or-da335de5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28400%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20docker%20model-runner&amp;severity=high&amp;id=69a20bf332ffcdb8a2748332</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28355-cwe-79-improper-neutralization-of-i-7d738047</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28355%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thinkst%20canarytokens&amp;severity=low&amp;id=69a2087132ffcdb8a2724a77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28351-cwe-400-uncontrolled-resource-consu-1ca949cb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28351%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=69a2087132ffcdb8a2724a71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28288-cwe-204-observable-response-discrep-609a4992</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28288%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20langgenius%20dify&amp;severity=medium&amp;id=69a2016632ffcdb8a26f324d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28272-cwe-79-improper-neutralization-of-i-47808143</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28272%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kiteworks%20security-advisories&amp;severity=high&amp;id=69a2016632ffcdb8a26f324a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28271-cwe-350-reliance-on-reverse-dns-res-d5eb1b08</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28271%3A%20CWE-350%3A%20Reliance%20on%20Reverse%20DNS%20Resolution%20for%20a%20Security-Critical%20Action%20in%20kiteworks%20security-advisories&amp;severity=medium&amp;id=69a2016632ffcdb8a26f3247</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28270-cwe-434-unrestricted-upload-of-file-06e3aca0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28270%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20kiteworks%20security-advisories&amp;severity=medium&amp;id=69a2016632ffcdb8a26f3244</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28268-cwe-459-incomplete-cleanup-in-go-vi-0517b158</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28268%3A%20CWE-459%3A%20Incomplete%20Cleanup%20in%20go-vikunja%20vikunja&amp;severity=critical&amp;id=69a2016632ffcdb8a26f323f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28231-cwe-125-out-of-bounds-read-in-bigca-c6bc910b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28231%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20bigcat88%20pillow_heif&amp;severity=medium&amp;id=69a1fde732ffcdb8a26e412b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3255-cwe-340-generation-of-predictable-nu-990287a2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3255%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20TOKUHIROM%20HTTP%3A%3ASession2&amp;severity=medium&amp;id=69a1fde732ffcdb8a26e4130</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27836-cwe-862-missing-authorization-in-th-18400afc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27836%3A%20CWE-862%3A%20Missing%20Authorization%20in%20thorsten%20phpMyFAQ&amp;severity=high&amp;id=69a1fa6032ffcdb8a26d1c5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27947-cwe-88-improper-neutralization-of-a-24402a59</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27947%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Intermesh%20groupoffice&amp;severity=critical&amp;id=69a1fa6032ffcdb8a26d1c61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27832-cwe-89-improper-neutralization-of-s-6c490a3a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27832%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Intermesh%20groupoffice&amp;severity=high&amp;id=69a1f6db32ffcdb8a26bc2e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27824-cwe-307-improper-restriction-of-exc-39b00782</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27824%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20kovidgoyal%20calibre&amp;severity=medium&amp;id=69a1f6db32ffcdb8a26bc2e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27810-cwe-113-improper-neutralization-of--a1ce14fa</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27810%3A%20CWE-113%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20in%20HTTP%20Headers%20(&apos;HTTP%20Request%2FResponse%20Splitting&apos;)%20in%20kovidgoyal%20calibre&amp;severity=medium&amp;id=69a1f6db32ffcdb8a26bc2e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27734-cwe-22-improper-limitation-of-a-pat-4f122212</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27734%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20henrygd%20beszel&amp;severity=medium&amp;id=69a1f6db32ffcdb8a26bc2d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27793-cwe-639-authorization-bypass-throug-84a88cae</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27793%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20seerr-team%20seerr&amp;severity=medium&amp;id=69a1f6db32ffcdb8a26bc2dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27792-cwe-862-missing-authorization-in-se-260eb1fa</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27792%3A%20CWE-862%3A%20Missing%20Authorization%20in%20seerr-team%20seerr&amp;severity=medium&amp;id=69a1f35732ffcdb8a26a7753</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27707-cwe-288-authentication-bypass-using-d68532fd</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27707%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20seerr-team%20seerr&amp;severity=high&amp;id=69a1f35732ffcdb8a26a774e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28354-cwe-639-authorization-bypass-throug-2e337172</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28354%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20MacWarrior%20clipbucket-v5&amp;severity=medium&amp;id=69a1efd532ffcdb8a269c95a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26997-cwe-79-improper-neutralization-of-i-1ccfba73</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26997%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MacWarrior%20clipbucket-v5&amp;severity=low&amp;id=69a1efd332ffcdb8a269c8fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22717-cwe-125-out-of-bounds-read-in-vmwar-9dea0b38</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22717%3A%20CWE-125%20Out-of-bounds%20Read%20in%20VMware%20Workstation&amp;severity=low&amp;id=69a1efd332ffcdb8a269c8f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22716-cwe-125-out-of-bounds-read-in-vmwar-8d78d628</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22716%3A%20CWE-787%20Out-of-bounds%20Write%20in%20VMware%20Workstation&amp;severity=medium&amp;id=69a1ec5132ffcdb8a267e1ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27758-cwe-352-cross-site-request-forgery--f8983b9c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27758%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Shenzhen%20Hongyavision%20Technology%20Co.%2C%20Ltd.%20(Sodola%20Networks)%20SODOLA%20SL902-SWTGW124AS&amp;severity=medium&amp;id=69a1e1c432ffcdb8a2634783</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27757-cwe-620-unverified-password-change--836b6108</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27757%3A%20CWE-620%20Unverified%20Password%20Change%20in%20Shenzhen%20Hongyavision%20Technology%20Co.%2C%20Ltd.%20(Sodola%20Networks)%20SODOLA%20SL902-SWTGW124AS&amp;severity=high&amp;id=69a1e1c432ffcdb8a263477f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27756-cwe-79-improper-neutralization-of-i-56dffe32</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27756%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Shenzhen%20Hongyavision%20Technology%20Co.%2C%20Ltd.%20(Sodola%20Networks)%20SODOLA%20SL902-SWTGW124AS&amp;severity=medium&amp;id=69a1e1c432ffcdb8a263477b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27755-cwe-330-use-of-insufficiently-rando-27c7bdab</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27755%3A%20CWE-330%20Use%20of%20Insufficiently%20Random%20Values%20in%20Shenzhen%20Hongyavision%20Technology%20Co.%2C%20Ltd.%20(Sodola%20Networks)%20SODOLA%20SL902-SWTGW124AS&amp;severity=critical&amp;id=69a1e1c432ffcdb8a2634777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27754-cwe-328-use-of-weak-hash-in-shenzhe-a0a4ca86</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27754%3A%20CWE-328%20Use%20of%20Weak%20Hash%20in%20Shenzhen%20Hongyavision%20Technology%20Co.%2C%20Ltd.%20(Sodola%20Networks)%20SODOLA%20SL902-SWTGW124AS&amp;severity=medium&amp;id=69a1e1c432ffcdb8a2634773</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27753-cwe-307-improper-restriction-of-exc-f450d076</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27753%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Shenzhen%20Hongyavision%20Technology%20Co.%2C%20Ltd.%20(Sodola%20Networks)%20SODOLA%20SL902-SWTGW124AS&amp;severity=medium&amp;id=69a1de4132ffcdb8a26144d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27752-cwe-319-cleartext-transmission-of-s-f729bb7e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27752%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Shenzhen%20Hongyavision%20Technology%20Co.%2C%20Ltd.%20(Sodola%20Networks)%20SODOLA%20SL902-SWTGW124AS&amp;severity=high&amp;id=69a1de4132ffcdb8a26144d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27751-cwe-1392-use-of-default-credentials-706a3fb0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27751%3A%20CWE-1392%20Use%20of%20Default%20Credentials%20in%20Shenzhen%20Hongyavision%20Technology%20Co.%2C%20Ltd.%20(Sodola%20Networks)%20SODOLA%20SL902-SWTGW124AS&amp;severity=critical&amp;id=69a1de4132ffcdb8a26144d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21619-cwe-400-uncontrolled-resource-consu-f28b2248</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21619%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20hexpm%20hex_core&amp;severity=low&amp;id=69a1de4132ffcdb8a26144c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/local-ktae-and-the-ida-pro-plugin-kaspersky-offici-3a13a807</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Local%20KTAE%20and%20the%20IDA%20Pro%20plugin%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69a1ccf432ffcdb8a24a1deb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3304-cwe-459-in-expressjs-multer-22a5e3c2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3304%3A%20CWE-459%20in%20expressjs%20multer&amp;severity=high&amp;id=69a1be9b32ffcdb8a23e705d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2359-cwe-772-in-expressjs-multer-b3f304cc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2359%3A%20CWE-772%20in%20expressjs%20multer&amp;severity=high&amp;id=69a1be9b32ffcdb8a23e7057</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-attck-advisory-council-russian-cyber-536a6441</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20ATT%26CK%20Advisory%20Council%2C%20Russian%20Cyberattacks%20Aid%20Missile%20Strikes%2C%20Predator%20Bypasses%20iOS%20Indicators&amp;severity=medium&amp;id=69a1b75d32ffcdb8a23cc5e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3277-cwe-312-cleartext-storage-of-sensiti-cd3f3fd4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3277%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Devolutions%20PowerShell%20Universal&amp;severity=medium&amp;id=69a1b7a632ffcdb8a23ccfc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2749-e23f9297</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2749&amp;severity=critical&amp;id=69a1b7a632ffcdb8a23ccfbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2750-cwe-20-improper-input-validation-in--d73d2c78</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2750%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Centreon%20Centreon%20Open%20Tickets%20on%20Central%20Server&amp;severity=critical&amp;id=69a1b7a632ffcdb8a23ccfc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3327-cwe-79-improper-neutralization-of-in-970903af</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3327%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20DatoCMS%20Web%20Previews&amp;severity=medium&amp;id=69a1a98332ffcdb8a2378ffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15498-cwe-89-improper-neutralization-of-s-0a597b74</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15498%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Pro3W%20Pro3W%20CMS&amp;severity=critical&amp;id=69a1a5fe32ffcdb8a235f6e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/38-million-allegedly-impacted-by-manomano-data-bre-81de6c83</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=38%20Million%20Allegedly%20Impacted%20by%20ManoMano%20Data%20Breach&amp;severity=medium&amp;id=69a1a24532ffcdb8a2343cb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2751-blind-sql-injection-via-unsanitized--3cc96648</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2751%3A%20Blind%20SQL%20Injection%20via%20unsanitized%20array%20keys%20in%20Service%20Dependencies%20deletion.%20in%20Centreon%20Centreon%20Web%20on%20Central%20Server&amp;severity=high&amp;id=69a19ef732ffcdb8a232d2ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10990-inefficient-regular-expression-comp-66f11e14</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10990%3A%20Inefficient%20Regular%20Expression%20Complexity&amp;severity=high&amp;id=69a19ef732ffcdb8a232d2bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/900-sangoma-freepbx-instances-infected-with-web-sh-4c7fa87f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=900%20Sangoma%20FreePBX%20Instances%20Infected%20With%20Web%20Shells&amp;severity=medium&amp;id=69a19b3e32ffcdb8a231cb05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3223-cwe-22-improper-limitation-of-a-path-65bbd039</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3223%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Google%20Web%20Designer&amp;severity=high&amp;id=69a19ef732ffcdb8a232d2cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11950-cwe-79-improper-neutralization-of-i-394c2718</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11950%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20KNOWHY%20Advanced%20Technology%20Trading%20Ltd.%20Co.%20EduAsist&amp;severity=medium&amp;id=69a197f132ffcdb8a2305706</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chilean-carding-shop-operator-extradited-to-us-ff61a7f3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chilean%20Carding%20Shop%20Operator%20Extradited%20to%20US&amp;severity=medium&amp;id=69a190b232ffcdb8a22da550</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/anthropic-refuses-to-bend-to-pentagon-on-ai-safegu-724d3d36</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Anthropic%20Refuses%20to%20Bend%20to%20Pentagon%20on%20AI%20Safeguards%20as%20Dispute%20Nears%20Deadline&amp;severity=medium&amp;id=69a190b232ffcdb8a22da553</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11252-cwe-89-improper-neutralization-of-s-229dc350</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11252%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Signum%20Technology%20Promotion%20and%20Training%20Inc.%20windesk.fm&amp;severity=critical&amp;id=69a21f2232ffcdb8a27f4aa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-fedex-email-delivers-donutsx21-fri-feb-27th-a42d059d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Fedex%20Email%20Delivers%20Donuts%26%23x21%3B%2C%20(Fri%2C%20Feb%2027th)&amp;severity=medium&amp;id=69a18d2c32ffcdb8a22c9d0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aeternum-botnet-loader-employs-polygon-blockchain--89cf856e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Aeternum%20Botnet%20Loader%20Employs%20Polygon%20Blockchain%20C%26C%20to%20Boost%20Resilience&amp;severity=medium&amp;id=69a189a832ffcdb8a22adfbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11251-cwe-89-improper-neutralization-of-s-0669f2cc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11251%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Dayneks%20Software%20Industry%20and%20Trade%20Inc.%20E-Commerce%20Platform&amp;severity=critical&amp;id=69a189f332ffcdb8a22b00e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24352-cwe-384-session-fixation-in-pluxml--87293653</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24352%3A%20CWE-384%20Session%20Fixation%20in%20PluXml%20PluXml%20CMS&amp;severity=medium&amp;id=69a182d732ffcdb8a2282727</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24351-cwe-79-improper-neutralization-of-i-5535a71d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24351%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20PluXml%20PluXml%20CMS&amp;severity=medium&amp;id=69a182d732ffcdb8a2282723</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24350-cwe-79-improper-neutralization-of-i-ca539a49</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24350%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20PluXml%20PluXml%20CMS&amp;severity=medium&amp;id=69a182d732ffcdb8a228271f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2831-cwe-89-improper-neutralization-of-sp-79154bf9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2831%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20pierrelannoy%20MailArchiver&amp;severity=medium&amp;id=69a182d732ffcdb8a228272b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/juniper-networks-ptx-routers-affected-by-critical--b59873d6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Juniper%20Networks%20PTX%20Routers%20Affected%20by%20Critical%20Vulnerability&amp;severity=critical&amp;id=69a1749132ffcdb8a21d7bf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1434-cwe-79-improper-neutralization-of-in-4ad955e8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1434%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Politechnika%20Warszawska%20Omega-PSIR&amp;severity=medium&amp;id=69a1784b32ffcdb8a21fae63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-dohdoor-malware-campaign-targets-education-and-d356513f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Dohdoor%20malware%20campaign%20targets%20education%20and%20health%20care&amp;severity=medium&amp;id=69a16d8732ffcdb8a2195d9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/contagious-interview-evolution-of-vs-code-and-curs-6afe0a1f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Contagious%20Interview%3A%20Evolution%20of%20VS%20Code%20and%20Cursor%20Tasks%20Infection%20Chains%20-%20Part%201&amp;severity=medium&amp;id=69a16a0332ffcdb8a2171d68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/botnet-trojan-delivered-through-clickfix-and-ether-d3b38f2a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Botnet%20Trojan%20delivered%20through%20ClickFix%20and%20EtherHiding&amp;severity=medium&amp;id=69a16a0332ffcdb8a2171d3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/abusing-arpa-the-tld-that-isnt-supposed-to-host-an-36609fd3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Abusing%20.arpa%3A%20The%20TLD%20That%20Isn&apos;t%20Supposed%20to%20Host%20Anything&amp;severity=medium&amp;id=69a16a0332ffcdb8a2171d59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1305-cwe-287-improper-authentication-in-s-96cc64c0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1305%3A%20CWE-287%20Improper%20Authentication%20in%20shoheitanaka%20Japanized%20for%20WooCommerce&amp;severity=medium&amp;id=69a166b732ffcdb8a2157df0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14142-cwe-79-improper-neutralization-of-i-049f904d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14142%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20electriccode%20Electric%20Enquiries&amp;severity=medium&amp;id=69a166b732ffcdb8a2157deb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10938-cwe-506-embedded-malicious-code-in--4a12daaf</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10938%3A%20CWE-506%20Embedded%20Malicious%20Code%20in%20moneytigo%20OVRI%20Payment&amp;severity=medium&amp;id=69a166b732ffcdb8a2157de6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21660-cwe-256-plaintext-storage-of-a-pass-aad934b3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21660%3A%20CWE-256%3A%20Plaintext%20Storage%20of%20a%20Password%20in%20Johnson%20Controls%20Frick%20Controls%20Quantum%20HD&amp;severity=medium&amp;id=69a1633532ffcdb8a2131e54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-malicious-npm-package-ambar-src-targets-develo-1c59a0c4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20malicious%20npm%20package%20&apos;ambar-src&apos;%20targets%20developers%20with%20open%20source%20malware&amp;severity=medium&amp;id=69a16a0332ffcdb8a2171d2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21659-cwe-22-improper-limitation-of-a-pat-3400c9c3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21659%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20Johnson%20Controls%20Frick%20Controls%20Quantum%20HD&amp;severity=high&amp;id=69a1633532ffcdb8a2131e50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21658-cwe-94-improper-control-of-generati-f2d5d005</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21658%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Johnson%20Controls%20Frick%20Controls%20Quantum%20HD&amp;severity=high&amp;id=69a15faf32ffcdb8a2106787</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21657-cwe-94-improper-control-of-generati-ac9104a8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21657%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Johnson%20Controls%20Frick%20Controls%20Quantum%20HD&amp;severity=high&amp;id=69a15faf32ffcdb8a2106783</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21656-cwe-94-improper-control-of-generati-591cf794</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21656%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Johnson%20Controls%20Frick%20Controls%20Quantum%20HD&amp;severity=high&amp;id=69a15faf32ffcdb8a210677f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1627-cwe-327-use-of-a-broken-or-risky-cry-3510b538</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1627%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20SICK%20AG%20SICK%20LMS1000&amp;severity=medium&amp;id=69a15faf32ffcdb8a2106777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1626-cwe-327-use-of-a-broken-or-risky-cry-6e2a50f4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1626%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20SICK%20AG%20SICK%20LMS1000&amp;severity=medium&amp;id=69a15faf32ffcdb8a210676f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21654-cwe-78-improper-neutralization-of-s-fee4b2ef</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21654%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Johnson%20Controls%20Frick%20Controls%20Quantum%20HD&amp;severity=high&amp;id=69a158a732ffcdb8a20b09cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2362-cwe-79-improper-neutralization-of-in-7f8990ef</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2362%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20joedolson%20WP%20Accessibility&amp;severity=medium&amp;id=69a158a732ffcdb8a20b09cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2383-cwe-79-improper-neutralization-of-in-34b3f279</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2383%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mra13%20Simple%20Download%20Monitor&amp;severity=medium&amp;id=69a158a732ffcdb8a20b09d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2252-cwe-611-improper-restriction-of-xml--6b6b1047</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2252%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Xerox%20FreeFlow%20Core&amp;severity=high&amp;id=69a1552332ffcdb8a208e3f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2251-cwe-22-improper-limitation-of-a-path-309f50e5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2251%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Xerox%20FreeFlow%20Core&amp;severity=critical&amp;id=69a1552332ffcdb8a208e3f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27776-deserialization-of-untrusted-data-i-dbd89a5e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27776%3A%20Deserialization%20of%20untrusted%20data%20in%20NTT%20DATA%20INTRAMART%20Corporation%20intra-mart%20Accel%20Platform&amp;severity=high&amp;id=69a1519e32ffcdb8a205ced7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-flaws-exposed-gardyn-smart-gardens-to-rem-6afe633e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Flaws%20Exposed%20Gardyn%20Smart%20Gardens%20to%20Remote%20Hacking&amp;severity=critical&amp;id=69a14a6132ffcdb8a2012a44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0980-improper-neutralization-of-special-e-8f324e87</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0980%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Red%20Hat%20Red%20Hat%20Satellite%206.16%20for%20RHEL%208&amp;severity=high&amp;id=69a14e1a32ffcdb8a203afe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0871-incorrect-privilege-assignment-in-re-d9362869</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0871%3A%20Incorrect%20Privilege%20Assignment%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=medium&amp;id=69a14e1a32ffcdb8a203afda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13327-improper-validation-of-syntactic-co-5f074485</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13327%3A%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20astral-sh%20uv&amp;severity=medium&amp;id=69a14e1a32ffcdb8a203afb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9909-use-of-non-canonical-url-paths-for-a-ff141764</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9909%3A%20Use%20of%20Non-Canonical%20URL%20Paths%20for%20Authorization%20Decisions%20in%20Red%20Hat%20Red%20Hat%20Ansible%20Automation%20Platform%202.5%20for%20RHEL%208&amp;severity=medium&amp;id=69a14e1a32ffcdb8a203afd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9908-exposure-of-sensitive-information-to-01a50cc7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9908%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Red%20Hat%20Red%20Hat%20Ansible%20Automation%20Platform%202.5%20for%20RHEL%208&amp;severity=medium&amp;id=69a14e1a32ffcdb8a203afca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9907-exposure-of-sensitive-information-to-cc86b7aa</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9907%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Red%20Hat%20Red%20Hat%20Ansible%20Automation%20Platform%202.5%20for%20RHEL%208&amp;severity=medium&amp;id=69a14e1a32ffcdb8a203afc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9572-exposure-of-sensitive-information-to-9f64e32c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9572%3A%20Incorrect%20Authorization%20in%20The%20Foreman%20Foreman&amp;severity=medium&amp;id=69a14e1a32ffcdb8a203afb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15567-cwe-306-missing-authentication-for--6aaaa9dc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15567%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20vivo%20Health&amp;severity=medium&amp;id=69a1438e32ffcdb8a2fbeb07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15509-cwe-306-missing-authentication-for--e81e4acc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15509%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20vivo%20SmartRemote&amp;severity=high&amp;id=69a1438e32ffcdb8a2fbeb04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12981-cwe-269-improper-privilege-manageme-e6893456</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12981%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20dreamstechnologies%20Listee&amp;severity=critical&amp;id=69a1438e32ffcdb8a2fbeaf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14149-cwe-79-improper-neutralization-of-i-23af593b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14149%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xpro%20Xpro%20Addons%20%E2%80%94%20140%2B%20Widgets%20for%20Elementor&amp;severity=medium&amp;id=69a1438e32ffcdb8a2fbeb00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14040-cwe-79-improper-neutralization-of-i-7f5c8007</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14040%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themesuite%20Automotive%20Car%20Dealership%20Business%20WordPress%20Theme&amp;severity=medium&amp;id=69a1438e32ffcdb8a2fbeafb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3302-cross-site-scripting-in-sourcecodest-7e2a663c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3302%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Doctor%20Appointment%20System&amp;severity=medium&amp;id=69a1390232ffcdb8a2f493bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27653-incorrect-default-permissions-in-so-72204038</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27653%3A%20Incorrect%20default%20permissions%20in%20Soliton%20Systems%20K.K.%20Soliton%20SecureBrowser%20for%20OneGate&amp;severity=medium&amp;id=69a1357f32ffcdb8a2f19b11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3301-os-command-injection-in-totolink-n30-8ab5e0b9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3301%3A%20OS%20Command%20Injection%20in%20Totolink%20N300RH&amp;severity=critical&amp;id=69a12e7632ffcdb8a2ebeaba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3293-inefficient-regular-expression-compl-fdcbf38b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3293%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20snowflakedb%20snowflake-jdbc&amp;severity=medium&amp;id=69a12e7632ffcdb8a2ebeaaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28372-cwe-829-inclusion-of-functionality--04030f82</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28372%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20GNU%20inetutils&amp;severity=high&amp;id=69a12e7632ffcdb8a2ebeaa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-go-crypto-module-steals-passwords-and-de-5a9ea1a4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Go%20&apos;crypto&apos;%20Module%20Steals%20Passwords%20and%20Deploys%20Rekoobe%20Backdoor&amp;severity=medium&amp;id=69a15f7732ffcdb8a2102f0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3292-sql-injection-in-jizhicms-d8105f3a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3292%3A%20SQL%20Injection%20in%20jizhiCMS&amp;severity=medium&amp;id=69a1276f32ffcdb8a2e563fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28370-cwe-95-improper-neutralization-of-d-e403f347</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28370%3A%20CWE-95%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20OpenStack%20Vitrage&amp;severity=critical&amp;id=69a1276f32ffcdb8a2e563fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1558-cwe-639-authorization-bypass-through-08601960</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1558%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20brechtvds%20WP%20Recipe%20Maker&amp;severity=medium&amp;id=69a1be9b32ffcdb8a23e7063</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3289-path-traversal-in-sanluan-publiccms-7a278269</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3289%3A%20Path%20Traversal%20in%20Sanluan%20PublicCMS&amp;severity=medium&amp;id=69a1ec5132ffcdb8a267e1f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1442-cwe-321-use-of-hard-coded-cryptograp-3990dc00</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1442%3A%20CWE-321%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Unitree%20UPK&amp;severity=high&amp;id=69a1c21f32ffcdb8a23fb748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3287-sql-injection-in-youlaitech-youlai-m-f54637dd</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3287%3A%20SQL%20Injection%20in%20youlaitech%20youlai-mall&amp;severity=medium&amp;id=69a1ec5132ffcdb8a267e1ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3286-server-side-request-forgery-in-itwan-92eaf84b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3286%3A%20Server-Side%20Request%20Forgery%20in%20itwanger%20paicoding&amp;severity=medium&amp;id=69a1195f32ffcdb8a2c64269</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2428-cwe-345-insufficient-verification-of-33fd59e1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2428%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20techjewel%20Fluent%20Forms%20Pro%20Add%20On%20Pack&amp;severity=high&amp;id=69a1195f32ffcdb8a2c64265</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3285-out-of-bounds-read-in-berry-lang-ber-d0a248e3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3285%3A%20Out-of-Bounds%20Read%20in%20berry-lang%20berry&amp;severity=medium&amp;id=69a10ed332ffcdb8a2b614ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3284-integer-overflow-in-libvips-1f40665b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3284%3A%20Integer%20Overflow%20in%20libvips&amp;severity=medium&amp;id=69a10ed332ffcdb8a2b614c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3283-out-of-bounds-read-in-libvips-2cba54fa</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3283%3A%20Out-of-Bounds%20Read%20in%20libvips&amp;severity=medium&amp;id=69a10ed332ffcdb8a2b614ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3282-out-of-bounds-read-in-libvips-63ed8a34</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3282%3A%20Out-of-Bounds%20Read%20in%20libvips&amp;severity=medium&amp;id=69a10ed332ffcdb8a2b614b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3281-heap-based-buffer-overflow-in-libvip-f2781821</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3281%3A%20Heap-based%20Buffer%20Overflow%20in%20libvips&amp;severity=medium&amp;id=69a100c232ffcdb8a2a64fa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24498-cwe-200-exposure-of-sensitive-infor-4726610a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24498%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20EFM-Networks%2C%20Inc.%20ipTIME%20T5008&amp;severity=medium&amp;id=69a100c232ffcdb8a2a64f97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24497-cwe-121-stack-based-buffer-overflow-0433973b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24497%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20SimTech%20Systems%2C%20Inc.%20ThinkWise&amp;severity=high&amp;id=69a100c232ffcdb8a2a64f93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3275-buffer-overflow-in-tenda-f453-d6d6eb24</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3275%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69a100c232ffcdb8a2a64f9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3037-cwe-78-in-copeland-copeland-xweb-300-4ecbd821</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3037%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0f2b332ffcdb8a2981630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20797-we-121-in-copeland-copeland-xweb-30-b49b097a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20797%3A%20WE-121%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=medium&amp;id=69a0f2b332ffcdb8a2981608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3274-buffer-overflow-in-tenda-f453-d6a76b12</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3274%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69a0f2b532ffcdb8a2981649</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22877-cwe-22-in-copeland-copeland-xweb-30-79b6e451</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22877%3A%20CWE-22%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=low&amp;id=69a0f2b332ffcdb8a298160d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25037-cwe-78-in-copeland-copeland-xweb-30-b7a79975</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25037%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0f2b332ffcdb8a298161c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25196-cwe-78-in-copeland-copeland-xweb-30-2b443476</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25196%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0f2b332ffcdb8a2981626</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20764-cwe-78-in-copeland-copeland-xweb-30-48ae0445</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20764%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0f2b332ffcdb8a2981603</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25721-cwe-78-in-copeland-copeland-xweb-30-ba83d670</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25721%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0f2b332ffcdb8a298162b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23702-cwe-78-in-copeland-copeland-xweb-30-ce9fc762</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23702%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0f2b332ffcdb8a2981612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24452-cwe-78-in-copeland-copeland-xweb-30-a7dbfe59</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24452%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0f2b332ffcdb8a2981617</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25105-cwe-78-in-copeland-copeland-xweb-30-8d544ce0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25105%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0f2b332ffcdb8a2981621</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24695-cwe-78-in-copeland-copeland-xweb-30-3fd00bbd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24695%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0ebae32ffcdb8a293f308</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20902-cwe-78-in-copeland-copeland-xweb-30-17710e48</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20902%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0ebad32ffcdb8a293f29f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25109-cwe-78-in-copeland-copeland-xweb-30-a3a48ca5</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25109%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0ebae32ffcdb8a293f313</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24689-cwe-78-in-copeland-copeland-xweb-30-b9bf45c6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24689%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0ebad32ffcdb8a293f2c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20910-cwe-78-in-copeland-copeland-xweb-30-0f4f16cc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20910%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0ebad32ffcdb8a293f2a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25195-cwe-78-in-copeland-copeland-xweb-30-5749903d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25195%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0ebae32ffcdb8a293f31d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24517-cwe-78-in-copeland-copeland-xweb-30-4bcf5b64</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24517%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0ebad32ffcdb8a293f2bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20742-cwe-78-in-copeland-copeland-xweb-30-03607d5f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20742%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0ebad32ffcdb8a293f29a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25111-cwe-78-in-copeland-copeland-xweb-30-30ddd8b7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25111%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0ebae32ffcdb8a293f318</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21389-cwe-78-in-copeland-copeland-xweb-30-ce8a90ae</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21389%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0ebad32ffcdb8a293f2a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24663-cwe-78-in-copeland-copeland-xweb-30-1c773deb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24663%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=critical&amp;id=69a0ebad32ffcdb8a293f2c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21718-cwe-327-in-copeland-copeland-xweb-3-124474ba</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21718%3A%20CWE-327%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=critical&amp;id=69a0ebad32ffcdb8a293f2ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25085-cwe-394-in-copeland-copeland-xweb-3-48dec72e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25085%3A%20CWE-394%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0ebae32ffcdb8a293f30e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3273-buffer-overflow-in-tenda-f453-f5bf905b</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3273%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69a0ebb032ffcdb8a293f38d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22878-cwe-522-in-mobility46-mobility46se-77fe6773</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22878%3A%20CWE-522%20in%20Mobility46%20mobility46.se&amp;severity=medium&amp;id=69a0ebad32ffcdb8a293f2b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27647-cwe-613-in-mobility46-mobility46se-cccd2724</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27647%3A%20CWE-613%20in%20Mobility46%20mobility46.se&amp;severity=high&amp;id=69a0ebae32ffcdb8a293f336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26305-cwe-307-in-mobility46-mobility46se-6a9fcc57</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26305%3A%20CWE-307%20in%20Mobility46%20mobility46.se&amp;severity=high&amp;id=69a0ebae32ffcdb8a293f32c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27028-cwe-306-in-mobility46-mobility46se-f694ef80</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27028%3A%20CWE-306%20in%20Mobility46%20mobility46.se&amp;severity=critical&amp;id=69a0ebae32ffcdb8a293f331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25774-cwe-522-in-ev-energy-evenergy-ed954fdd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25774%3A%20CWE-522%20in%20EV%20Energy%20ev.energy&amp;severity=medium&amp;id=69a0ebae32ffcdb8a293f322</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26290-cwe-613-in-ev-energy-evenergy-314e9523</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26290%3A%20CWE-613%20in%20EV%20Energy%20ev.energy&amp;severity=high&amp;id=69a0ebae32ffcdb8a293f327</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24445-cwe-307-in-ev-energy-evenergy-00628f02</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24445%3A%20CWE-307%20in%20EV%20Energy%20ev.energy&amp;severity=high&amp;id=69a0ebad32ffcdb8a293f2b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27772-cwe-306-in-ev-energy-evenergy-c0de6f7c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27772%3A%20CWE-306%20in%20EV%20Energy%20ev.energy&amp;severity=critical&amp;id=69a0e11f32ffcdb8a28c26e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27773-cwe-522-in-switch-ev-swtchenergycom-bfd87103</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27773%3A%20CWE-522%20in%20SWITCH%20EV%20swtchenergy.com&amp;severity=medium&amp;id=69a0e11f32ffcdb8a28c26ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25778-cwe-613-insufficient-session-expira-d088f686</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25778%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20SWITCH%20EV%20swtchenergy.com&amp;severity=high&amp;id=69a0e11f32ffcdb8a28c26de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3272-buffer-overflow-in-tenda-f453-6c03efcb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3272%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69a0e11f32ffcdb8a28c26f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3271-buffer-overflow-in-tenda-f453-18d7b3b1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3271%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69a0e11f32ffcdb8a28c26f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-27-1b73d646</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-27&amp;severity=medium&amp;id=69a2326532ffcdb8a287db63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69437-na-b96d7eab</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69437%3A%20n%2Fa&amp;severity=high&amp;id=69a1f6db32ffcdb8a26bc2eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26862-na-a9be2f89</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26862%3A%20n%2Fa&amp;severity=high&amp;id=69a1de4132ffcdb8a26144cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26861-na-9b5ca2ae</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26861%3A%20n%2Fa&amp;severity=high&amp;id=69a1d3b432ffcdb8a252c3ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-02-27-571218db</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-02-27&amp;severity=medium&amp;id=69a1c1e632ffcdb8a23f4ccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-27-8182491f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-27&amp;severity=low&amp;id=69a131c132ffcdb8a2ee864c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25113-cwe-307-improper-restriction-of-exc-c7aaebdb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25113%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20SWITCH%20EV%20swtchenergy.com&amp;severity=high&amp;id=69a0e11f32ffcdb8a28c26d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27767-cwe-306-missing-authentication-for--085d946c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27767%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20SWITCH%20EV%20swtchenergy.com&amp;severity=critical&amp;id=69a0e11f32ffcdb8a28c26e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22890-cwe-522-in-ev2go-ev2goio-f788729f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22890%3A%20CWE-522%20in%20EV2GO%20ev2go.io&amp;severity=medium&amp;id=69a0e11f32ffcdb8a28c2705</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20895-cwe-613-in-ev2go-ev2goio-b11f74c6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20895%3A%20CWE-613%20in%20EV2GO%20ev2go.io&amp;severity=high&amp;id=69a0e11f32ffcdb8a28c2700</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25945-cwe-307-improper-restriction-of-exc-27342830</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25945%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20EV2GO%20ev2go.io&amp;severity=high&amp;id=69a0e11f32ffcdb8a28c270a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24731-cwe-306-in-ev2go-ev2goio-e42cb5b8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24731%3A%20CWE-306%20in%20EV2GO%20ev2go.io&amp;severity=critical&amp;id=69a0dd9b32ffcdb8a288c769</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1585-cwe-428-unquoted-search-path-or-elem-2e6b8a09</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1585%3A%20CWE-428%3A%20Unquoted%20Search%20Path%20or%20Element%20in%20Canon%20Inc.%20IJ%20Scan%20Utility&amp;severity=high&amp;id=69a0dd9b32ffcdb8a288c75e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20733-cwe-522-insufficiently-protected-cr-046de446</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20733%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20CloudCharge%20cloudcharge.se&amp;severity=medium&amp;id=69a0dd9b32ffcdb8a288c764</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27652-cwe-613-in-cloudcharge-cloudcharges-a9fdd39d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27652%3A%20CWE-613%20in%20CloudCharge%20cloudcharge.se&amp;severity=high&amp;id=69a0dd9b32ffcdb8a288c76e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40932-cwe-340-generation-of-predictable-n-34a891cb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40932%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20GRICHTER%20Apache%3A%3ASessionX&amp;severity=high&amp;id=69a0dd9b32ffcdb8a288c75b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3270-server-side-request-forgery-in-psi-p-4de13069</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3270%3A%20Server-Side%20Request%20Forgery%20in%20psi-probe%20PSI%20Probe&amp;severity=medium&amp;id=69a0dd9b32ffcdb8a288c779</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3269-denial-of-service-in-psi-probe-psi-p-a71eeb31</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3269%3A%20Denial%20of%20Service%20in%20psi-probe%20PSI%20Probe&amp;severity=medium&amp;id=69a0dd9b32ffcdb8a288c773</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2597-cwe-122-heap-based-buffer-overflow-i-3a4a94eb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2597%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20LEONT%20Crypt%3A%3ASysRandom%3A%3AXS&amp;severity=high&amp;id=69a0da1732ffcdb8a272349d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25114-cwe-307-in-cloudcharge-cloudcharges-c78f10eb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25114%3A%20CWE-307%20in%20CloudCharge%20cloudcharge.se&amp;severity=high&amp;id=69a0da1732ffcdb8a2723497</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20781-cwe-306-missing-authentication-for--5f002d44</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20781%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20CloudCharge%20cloudcharge.se&amp;severity=critical&amp;id=69a0da1732ffcdb8a2723492</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20791-cwe-522-insufficiently-protected-cr-a6313152</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20791%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Chargemap%20chargemap.com&amp;severity=medium&amp;id=69a0d69332ffcdb8a26c7035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25711-cwe-613-in-chargemap-chargemapcom-86410309</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25711%3A%20CWE-613%20in%20Chargemap%20chargemap.com&amp;severity=high&amp;id=69a0d69332ffcdb8a26c703f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20792-cwe-307-in-chargemap-chargemapcom-e8eb6a77</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20792%3A%20CWE-307%20in%20Chargemap%20chargemap.com&amp;severity=high&amp;id=69a0d69332ffcdb8a26c703a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25851-cwe-306-in-chargemap-chargemapcom-07488433</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25851%3A%20CWE-306%20in%20Chargemap%20chargemap.com&amp;severity=critical&amp;id=69a0d69332ffcdb8a26c7044</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3268-improper-access-controls-in-psi-prob-37c8b51d</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3268%3A%20Improper%20Access%20Controls%20in%20psi-probe%20PSI%20Probe&amp;severity=medium&amp;id=69a0d31032ffcdb8a2667e09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28280-cwe-79-improper-neutralization-of-i-a42fca44</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28280%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jmpsec%20osctrl&amp;severity=medium&amp;id=69a0d31032ffcdb8a2667e04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28279-cwe-78-improper-neutralization-of-s-292cda7c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28279%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20jmpsec%20osctrl&amp;severity=high&amp;id=69a0d31032ffcdb8a2667dff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28276-cwe-200-exposure-of-sensitive-infor-80ecf535</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28276%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Morelitea%20initiative&amp;severity=high&amp;id=69a0d31032ffcdb8a2667dfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28275-cwe-613-insufficient-session-expira-233ae79c</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28275%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20Morelitea%20initiative&amp;severity=high&amp;id=69a0d31032ffcdb8a2667df7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28274-cwe-79-improper-neutralization-of-i-f245f683</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28274%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Morelitea%20initiative&amp;severity=high&amp;id=69a0d31032ffcdb8a2667df3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28269-cwe-78-improper-neutralization-of-s-9e79a839</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28269%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20kiteworks%20security-advisories&amp;severity=medium&amp;id=69a0d31032ffcdb8a2667df0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28230-cwe-284-improper-access-control-in--646c9b77</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28230%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20steve-community%20steve&amp;severity=medium&amp;id=69a0d31032ffcdb8a2667dec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28225-cwe-639-authorization-bypass-throug-5e6738cd</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28225%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20manyfold3d%20manyfold&amp;severity=medium&amp;id=69a0cf8b32ffcdb8a25ff602</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3265-improper-authorization-in-go2ismail--e27a9de6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3265%3A%20Improper%20Authorization%20in%20go2ismail%20Free-CRM&amp;severity=medium&amp;id=69a0cf8b32ffcdb8a25ff606</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28213-cwe-200-exposure-of-sensitive-infor-f157ccc0</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28213%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20evershopcommerce%20evershop&amp;severity=critical&amp;id=69a0cf8b32ffcdb8a25ff5fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28211-cwe-943-improper-neutralization-of--f8f2771b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28211%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20CyrilleB79%20NVDA-Dev-Test-Toolbox&amp;severity=high&amp;id=69a0cf8b32ffcdb8a25ff60f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28207-cwe-78-improper-neutralization-of-s-41bc76f8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28207%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20z-libs%20Zen-C&amp;severity=medium&amp;id=69a0cf8b32ffcdb8a25ff60c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27638-cwe-862-missing-authorization-in-ac-cb832dee</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27638%3A%20CWE-862%3A%20Missing%20Authorization%20in%20actualbudget%20actual&amp;severity=medium&amp;id=69a0c89232ffcdb8a25244f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27839-cwe-639-authorization-bypass-throug-b27f012f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27839%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wger-project%20wger&amp;severity=medium&amp;id=69a0c89232ffcdb8a2524560</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27838-cwe-639-authorization-bypass-throug-bca4d59d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27838%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wger-project%20wger&amp;severity=low&amp;id=69a0c89232ffcdb8a2524530</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3264-execution-after-redirect-in-go2ismai-6072652e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3264%3A%20Execution%20After%20Redirect%20in%20go2ismail%20Free-CRM&amp;severity=medium&amp;id=69a0c89232ffcdb8a2524567</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27835-cwe-639-authorization-bypass-throug-ba34a038</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27835%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wger-project%20wger&amp;severity=medium&amp;id=69a0c5b685912abc710cd5d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27457-cwe-862-missing-authorization-in-we-94c4aebe</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27457%3A%20CWE-862%3A%20Missing%20Authorization%20in%20WeblateOrg%20weblate&amp;severity=medium&amp;id=69a0c5b685912abc710cd5ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27449-cwe-284-improper-access-control-in--fadf6848</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27449%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20umbraco%20Umbraco.Engage.Forms&amp;severity=high&amp;id=69a0c5b685912abc710cd5cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3263-improper-authorization-in-go2ismail--ff0dc732</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3263%3A%20Improper%20Authorization%20in%20go2ismail%20Asp.Net-Core-Inventory-Order-Management-System&amp;severity=medium&amp;id=69a0beae85912abc7105bcf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3262-execution-after-redirect-in-go2ismai-85012419</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3262%3A%20Execution%20After%20Redirect%20in%20go2ismail%20Asp.Net-Core-Inventory-Order-Management-System&amp;severity=medium&amp;id=69a0cebb32ffcdb8a25eeab6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3261-sql-injection-in-itsourcecode-school-f3a6a27d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3261%3A%20SQL%20Injection%20in%20itsourcecode%20School%20Management%20System&amp;severity=medium&amp;id=69a0cebb32ffcdb8a25eeaac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22207-cwe-306-missing-authentication-for--eb53d5ff</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22207%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Volcengine%20OpenViking&amp;severity=critical&amp;id=69a0cebb32ffcdb8a25eeabd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1565-cwe-434-unrestricted-upload-of-file--1dad0f30</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1565%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20wedevs%20User%20Frontend%3A%20AI%20Powered%20Frontend%20Posting%2C%20User%20Directory%2C%20Profile%2C%20Membership%20%26%20User%20Registration&amp;severity=high&amp;id=69a0a61285912abc71d87503</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1241-cwe-288-authentication-bypass-using--e922bfa1</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1241%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Pelco%2C%20Inc.%20Sarix%20Professional%20IMP%203%20Series&amp;severity=high&amp;id=69a0a61285912abc71d87500</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27510-cwe-345-insufficient-verification-o-de32c7cb</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27510%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20UnitreeRobotics%20Unitree%20Go2&amp;severity=medium&amp;id=69a0a43885912abc71d61abb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27509-cwe-306-missing-authentication-for--3f85db2e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27509%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20UnitreeRobotics%20Unitree%20Go2&amp;severity=high&amp;id=69a0a43885912abc71d61ab6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27141-cwe-476-null-pointer-dereference-in-ff058581</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27141%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20golang.org%2Fx%2Fnet%20golang.org%2Fx%2Fnet%2Fhttp2&amp;severity=high&amp;id=69a0a43885912abc71d61ab0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22722-cwe-476-null-pointer-dereference-in-830c2dae</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22722%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20VMware%20Workstation&amp;severity=medium&amp;id=69a0a1b885912abc71d0a0b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22715-vulnerability-in-vmware-workstation-760959ba</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22715%3A%20Vulnerability%20in%20VMware%20Workstation&amp;severity=medium&amp;id=69a0a1b885912abc71d0a0ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-iphone-and-ipad-cleared-for-classified-nato--f1bb26b4</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20iPhone%20and%20iPad%20Cleared%20for%20Classified%20NATO%20Use&amp;severity=medium&amp;id=69a08c9eb7ef31ef0b9c5689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26938-cwe-1336-improper-neutralization-of-1437c993</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26938%3A%20CWE-1336%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20Elastic%20Kibana&amp;severity=high&amp;id=69a0a1ca85912abc71d0bb6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26937-cwe-400-uncontrolled-resource-consu-7b66a2f4</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26937%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=69a0a1ca85912abc71d0bb6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26227-cwe-307-improper-restriction-of-exc-57ef4910</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26227%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20VideoLAN%20VLC%20for%20Android&amp;severity=medium&amp;id=69a0a1ca85912abc71d0bb59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23750-cwe-122-heap-based-buffer-overflow--7501864a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23750%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Golioth%20Pouch&amp;severity=high&amp;id=69a0a1ca85912abc71d0bb54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23749-cwe-170-improper-null-termination-i-19f097f4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23749%3A%20CWE-170%3A%20Improper%20Null%20Termination%20in%20Golioth%20Firmware%20SDK&amp;severity=low&amp;id=69a0a1ca85912abc71d0bb4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23748-cwe-191-integer-underflow-wrap-or-w-ee9ee329</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23748%3A%20CWE-191%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Golioth%20Firmware%20SDK&amp;severity=medium&amp;id=69a0a1ca85912abc71d0bb48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23747-cwe-121-stack-based-buffer-overflow-cac35f20</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23747%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Golioth%20Firmware%20SDK&amp;severity=medium&amp;id=69a0a1c885912abc71d0baa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/four-risks-boards-cannot-treat-as-background-noise-939afcf9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Four%20Risks%20Boards%20Cannot%20Treat%20as%20Background%20Noise&amp;severity=medium&amp;id=69a0861fb7ef31ef0b964ef8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26936-cwe-1333-inefficient-regular-expres-bf9eee54</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26936%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=69a0826ab7ef31ef0b92a680</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26935-cwe-20-improper-input-validation-in-2ab6f3da</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26935%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=69a0826ab7ef31ef0b92a67d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26934-cwe-1284-improper-validation-of-spe-425cff70</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26934%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=69a0826ab7ef31ef0b92a67a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26932-cwe-129-improper-validation-of-arra-b827d994</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26932%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20Elastic%20Packetbeat&amp;severity=medium&amp;id=69a0826ab7ef31ef0b92a677</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apt37-adds-new-capabilities-for-air-gapped-network-5692440f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APT37%20Adds%20New%20Capabilities%20for%20Air-Gapped%20Networks&amp;severity=medium&amp;id=69a0ace185912abc71e473ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28295-server-side-request-forgery-ssrf-in-187eca66</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28295%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69a0a1ca85912abc71d0bb68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26228-cwe-22-improper-limitation-of-a-pat-e609e7ec</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26228%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20VideoLAN%20VLC%20for%20Android&amp;severity=low&amp;id=69a0a1ca85912abc71d0bb64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28296-improper-neutralization-of-crlf-seq-7df1d4b2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28296%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69a06645b7ef31ef0b73ce1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2244-cwe-200-exposure-of-sensitive-inform-77100ce1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2244%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Google%20Cloud%20Vertex%20AI%20Workbench&amp;severity=high&amp;id=69a05b9eb7ef31ef0b68a5f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/claude-code-flaws-exposed-developer-devices-to-sil-c98dfc93</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Claude%20Code%20Flaws%20Exposed%20Developer%20Devices%20to%20Silent%20Hacking&amp;severity=medium&amp;id=69a04d56b7ef31ef0b544dd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/finding-signal-in-the-noise-lessons-learned-runnin-c4433059</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Finding%20Signal%20in%20the%20Noise%3A%20Lessons%20Learned%20Running%20a%20Honeypot%20with%20AI%20Assistance%20%26%23x5b%3BGuest%20Diary%26%23x5d%3B%2C%20(Tue%2C%20Feb%2024th)&amp;severity=medium&amp;id=699faf21b7ef31ef0b7fed42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-clair-model-a-synthesized-conceptual-framework-298e7e4e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20CLAIR%20Model%3A%20A%20Synthesized%20Conceptual%20Framework%20for%20Mapping%20Critical%20Infrastructure%20Interdependencies%20%26%23x5b%3BGuest%20Diary%26%23x5d%3B%2C%20(Wed%2C%20Feb%2025th)&amp;severity=critical&amp;id=699f6598b7ef31ef0b50ca3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zyxel-patches-critical-vulnerability-in-many-devic-523ddaa3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Zyxel%20Patches%20Critical%20Vulnerability%20in%20Many%20Device%20Models&amp;severity=critical&amp;id=69a0383eb7ef31ef0b397aa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14343-cwe-79-improper-neutralization-of-i-eef0abf6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14343%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Dokuzsoft%20Technology%20Ltd.%20E-Commerce%20Product&amp;severity=high&amp;id=69a03f7bb7ef31ef0b3f555c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1198-cwe-89-improper-neutralization-of-sp-3b46b959</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1198%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Simple%20SA%20Simple.ERP&amp;severity=high&amp;id=69a0316db7ef31ef0b2da192</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/disrupting-the-gridtide-global-cyber-espionage-cam-ef6113c4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Disrupting%20the%20GRIDTIDE%20Global%20Cyber%20Espionage%20Campaign&amp;severity=medium&amp;id=69a042c8b7ef31ef0b424ee0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-sanctions-russian-exploit-broker-operation-zero-75531468</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Sanctions%20Russian%20Exploit%20Broker%20Operation%20Zero&amp;severity=medium&amp;id=69a02326b7ef31ef0b082dae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64999-cwe-79-improper-neutralization-of-i-ecc6390b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64999%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=high&amp;id=69a02368b7ef31ef0b08990e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trend-micro-patches-critical-apex-one-vulnerabilit-6afeacc3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trend%20Micro%20Patches%20Critical%20Apex%20One%20Vulnerabilities&amp;severity=critical&amp;id=69a01c1eb7ef31ef0bfb5f94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-patches-catalyst-sd-wan-zero-day-exploited-b-c55ec69f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Patches%20Catalyst%20SD-WAN%20Zero-Day%20Exploited%20by%20Highly%20Sophisticated%20Hackers&amp;severity=high&amp;id=69a01191b7ef31ef0be29255</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28138-deserialization-of-untrusted-data-i-23ed4314</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28138%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Stylemix%20uListing&amp;severity=high&amp;id=69a00ac0b7ef31ef0bdd3046</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28136-improper-neutralization-of-special--ad5c4742</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28136%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20VeronaLabs%20WP%20SMS&amp;severity=high&amp;id=69a00ac0b7ef31ef0bdd3043</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28132-improper-neutralization-of-script-r-c4977c49</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28132%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20villatheme%20WooCommerce%20Photo%20Reviews&amp;severity=medium&amp;id=69a00ac0b7ef31ef0bdd3040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28131-insertion-of-sensitive-information--c8914030</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28131%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20WPVibes%20Elementor%20Addon%20Elements&amp;severity=medium&amp;id=69a00ac0b7ef31ef0bdd303d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28083-improper-neutralization-of-input-du-dac8d5cc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28083%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20UX-themes%20Flatsome&amp;severity=medium&amp;id=69a00ac0b7ef31ef0bdd303a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1698-cwe-644-improper-neutralization-of-h-04573e8c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1698%3A%20CWE-644%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20arcinfo%20PcVue&amp;severity=medium&amp;id=69a00034b7ef31ef0bd4069e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1697-cwe-614-sensitive-cookie-in-https-se-000f8650</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1697%3A%20CWE-614%20Sensitive%20Cookie%20in%20HTTPS%20Session%20Without%20&apos;Secure&apos;%20Attribute%20in%20arcinfo%20PcVue&amp;severity=medium&amp;id=69a00034b7ef31ef0bd4069b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1696-cwe-79-improper-neutralization-of-in-5fb33f1b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1696%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20arcinfo%20PcVue&amp;severity=low&amp;id=69a00034b7ef31ef0bd40698</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1695-cwe-79-improper-neutralization-of-in-7eca6c71</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1695%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20arcinfo%20PcVue&amp;severity=medium&amp;id=69a00034b7ef31ef0bd40695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1694-cwe-201-insertion-of-sensitive-infor-0503a7bc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1694%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20into%20Sent%20Data%20in%20arcinfo%20PcVue&amp;severity=low&amp;id=69a00034b7ef31ef0bd40692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1693-cwe-1390-weak-authentication-in-arci-7231b5ea</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1693%3A%20CWE-1390%20Weak%20Authentication%20in%20arcinfo%20PcVue&amp;severity=medium&amp;id=69a00034b7ef31ef0bd4068f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1692-cwe-1385-missing-origin-validation-i-4c16ce65</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1692%3A%20CWE-1385%20Missing%20Origin%20Validation%20in%20WebSockets%20in%20arcinfo%20PcVue&amp;severity=medium&amp;id=69a00034b7ef31ef0bd4068c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25191-uncontrolled-search-path-element-in-34c03d5f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25191%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Digital%20Arts%20Inc.%20FinalCode%20Ver.5%20series&amp;severity=high&amp;id=699fe090b7ef31ef0bbb51b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23703-incorrect-default-permissions-in-di-0baa4b8d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23703%3A%20Incorrect%20default%20permissions%20in%20Digital%20Arts%20Inc.%20FinalCode%20Ver.5%20series&amp;severity=high&amp;id=699fe090b7ef31ef0bbb51b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1311-cwe-22-improper-limitation-of-a-path-245cd234</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1311%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20bearsthemes%20Worry%20Proof%20Backup&amp;severity=high&amp;id=699fd280b7ef31ef0bb488bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27465-cwe-201-insertion-of-sensitive-info-d63e9e3f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27465%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20fleetdm%20fleet&amp;severity=low&amp;id=69a05b9eb7ef31ef0b68a604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25963-cwe-863-incorrect-authorization-in--2d2f916a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25963%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20fleetdm%20fleet&amp;severity=low&amp;id=69a05b9eb7ef31ef0b68a601</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23999-cwe-330-use-of-insufficiently-rando-2363c4fa</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23999%3A%20CWE-330%3A%20Use%20of%20Insufficiently%20Random%20Values%20in%20fleetdm%20fleet&amp;severity=low&amp;id=69a06645b7ef31ef0b73ce20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24004-cwe-862-missing-authorization-in-fl-988a60f2</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24004%3A%20CWE-862%3A%20Missing%20Authorization%20in%20fleetdm%20fleet&amp;severity=low&amp;id=69a05b9eb7ef31ef0b68a5fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1779-cwe-288-authentication-bypass-using--c715b4b7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1779%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20wpeverest%20User%20Registration%20%26%20Membership%20%E2%80%93%20Free%20%26%20Paid%20Memberships%2C%20Subscriptions%2C%20Content%20Restriction%2C%20User%20Profile%2C%20Custom%20User%20Registration%20%26%20Login%20Builder&amp;severity=high&amp;id=69a05b9eb7ef31ef0b68a5fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2356-cwe-284-improper-access-control-in-w-3646e401</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2356%3A%20CWE-284%20Improper%20Access%20Control%20in%20wpeverest%20User%20Registration%20%26%20Membership%20%E2%80%93%20Free%20%26%20Paid%20Memberships%2C%20Subscriptions%2C%20Content%20Restriction%2C%20User%20Profile%2C%20Custom%20User%20Registration%20%26%20Login%20Builder&amp;severity=medium&amp;id=69a062b5b7ef31ef0b701612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27974-cwe-79-improper-neutralization-of-i-489e365f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27974%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20advplyr%20audiobookshelf-app&amp;severity=medium&amp;id=69a062b5b7ef31ef0b70160e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27963-cwe-79-improper-neutralization-of-i-13a3dc2b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27963%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20advplyr%20audiobookshelf&amp;severity=medium&amp;id=69a062b5b7ef31ef0b70160a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27973-cwe-79-improper-neutralization-of-i-d42c2cca</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27973%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20advplyr%20audiobookshelf&amp;severity=medium&amp;id=699fabd8b7ef31ef0b7dea2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27966-cwe-94-improper-control-of-generati-8ac7c0b0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27966%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20langflow-ai%20langflow&amp;severity=critical&amp;id=699fabd8b7ef31ef0b7dea23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27969-cwe-22-improper-limitation-of-a-pat-4b60f36b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27969%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20vitessio%20vitess&amp;severity=critical&amp;id=699fabd8b7ef31ef0b7dea27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27965-cwe-78-improper-neutralization-of-s-92b79488</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27965%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20vitessio%20vitess&amp;severity=high&amp;id=699fabd8b7ef31ef0b7dea1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27959-cwe-20-improper-input-validation-in-ce484d7c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27959%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20koajs%20koa&amp;severity=high&amp;id=699fabd8b7ef31ef0b7dea15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27961-cwe-1336-improper-neutralization-of-89dbc720</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27961%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20Agenta-AI%20agenta&amp;severity=high&amp;id=699fabd8b7ef31ef0b7dea1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27952-cwe-94-improper-control-of-generati-de9bd46d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27952%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Agenta-AI%20agenta-api&amp;severity=high&amp;id=699fabd8b7ef31ef0b7dea12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27948-cwe-79-improper-neutralization-of-i-af27e043</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27948%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%209001%20copyparty&amp;severity=medium&amp;id=699fabd8b7ef31ef0b7dea0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2499-cwe-79-improper-neutralization-of-in-c0dc3012</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2499%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tgrk%20Custom%20Logo&amp;severity=medium&amp;id=699fabd9b7ef31ef0b7dea4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2029-cwe-79-improper-neutralization-of-in-066236f2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2029%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20livemesh%20Livemesh%20Addons%20for%20Beaver%20Builder&amp;severity=medium&amp;id=699fabd9b7ef31ef0b7dea3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2489-cwe-79-improper-neutralization-of-in-8979fb6c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2489%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20readymadeweb%20TP2WP%20Importer&amp;severity=medium&amp;id=699fabd9b7ef31ef0b7dea3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2498-cwe-79-improper-neutralization-of-in-c6873f44</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2498%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bulktheme%20WP%20Social%20Meta&amp;severity=medium&amp;id=699fabd9b7ef31ef0b7dea44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1557-cwe-22-improper-limitation-of-a-path-8855fcee</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1557%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20stuartbates%20WP%20Responsive%20Images&amp;severity=high&amp;id=699fabd8b7ef31ef0b7dea00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2506-cwe-79-improper-neutralization-of-in-742fe189</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2506%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20motahar1%20EM%20Cost%20Calculator&amp;severity=medium&amp;id=699fabd9b7ef31ef0b7dea50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27942-cwe-120-buffer-copy-without-checkin-fb63e4d8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27942%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20NaturalIntelligence%20fast-xml-parser&amp;severity=low&amp;id=699fabd8b7ef31ef0b7dea09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27904-cwe-1333-inefficient-regular-expres-decea18d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27904%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20isaacs%20minimatch&amp;severity=high&amp;id=699fa148b7ef31ef0b7796b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27903-cwe-407-inefficient-algorithmic-com-f3f31176</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27903%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20isaacs%20minimatch&amp;severity=high&amp;id=699fa148b7ef31ef0b7796b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27902-cwe-79-improper-neutralization-of-i-31462c5d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27902%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sveltejs%20svelte&amp;severity=medium&amp;id=699fa148b7ef31ef0b7796ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27901-cwe-79-improper-neutralization-of-i-27a56aa6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27901%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sveltejs%20svelte&amp;severity=medium&amp;id=699fa148b7ef31ef0b7796a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27887-cwe-770-allocation-of-resources-wit-73cfbd0c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27887%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20spinframework%20spin&amp;severity=medium&amp;id=699fa148b7ef31ef0b77969d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27900-cwe-532-insertion-of-sensitive-info-4a37c898</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27900%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20linode%20terraform-provider-linode&amp;severity=medium&amp;id=699fa148b7ef31ef0b7796a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22728-cwe-284-in-bitnami-sealed-secrets-5b4a5a73</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22728%3A%20CWE-284%20in%20Bitnami%20sealed-secrets&amp;severity=medium&amp;id=699fa148b7ef31ef0b77969a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27899-cwe-269-improper-privilege-manageme-f3381704</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27899%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20h44z%20wg-portal&amp;severity=high&amp;id=699fa148b7ef31ef0b7796a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27896-cwe-178-improper-handling-of-case-s-047c4414</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27896%3A%20CWE-178%3A%20Improper%20Handling%20of%20Case%20Sensitivity%20in%20modelcontextprotocol%20go-sdk&amp;severity=high&amp;id=699f9a40b7ef31ef0b726109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27830-cwe-502-deserialization-of-untruste-8c764401</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27830%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20swaldman%20c3p0&amp;severity=high&amp;id=699f9a40b7ef31ef0b7260eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27888-cwe-400-uncontrolled-resource-consu-fcc40868</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27888%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=699f9a40b7ef31ef0b726103</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27884-cwe-22-improper-limitation-of-a-pat-6a3213c4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27884%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Pennyw0rth%20NetExec&amp;severity=medium&amp;id=699f9a40b7ef31ef0b7260fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27829-cwe-918-server-side-request-forgery-8b06cfbd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27829%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20withastro%20astro&amp;severity=medium&amp;id=699f9a40b7ef31ef0b7260e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27837-cwe-1321-improperly-controlled-modi-ec3116e3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27837%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20mickhansen%20dottie.js&amp;severity=medium&amp;id=699f9a40b7ef31ef0b7260f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27831-cwe-125-out-of-bounds-read-in-blued-851df2f0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27831%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20bluedragonsecurity%20rldns&amp;severity=high&amp;id=699f9a40b7ef31ef0b7260f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26186-cwe-89-improper-neutralization-of-s-d124966d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26186%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20fleetdm%20fleet&amp;severity=medium&amp;id=699f8fb4b7ef31ef0b6dc8be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27818-cwe-20-improper-input-validation-in-ff48f4c1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27818%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20TerriaJS%20terriajs-server&amp;severity=high&amp;id=699f8fb4b7ef31ef0b6dc8c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27812-cwe-116-improper-encoding-or-escapi-0ec87a03</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27812%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Wei-Shaw%20sub2api&amp;severity=high&amp;id=699f8fb4b7ef31ef0b6dc8c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-26-f35e5c14</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-26&amp;severity=medium&amp;id=69a0e0e532ffcdb8a28b810e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50857-na-cde40b1d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50857%3A%20n%2Fa&amp;severity=critical&amp;id=69a0a1cf85912abc71d0bf29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56605-na-c59c1be3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56605%3A%20n%2Fa&amp;severity=medium&amp;id=69a0826ab7ef31ef0b92a683</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26682-na-caa850a3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26682%3A%20n%2Fa&amp;severity=high&amp;id=69a0826ab7ef31ef0b92a673</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71057-na-f9840d49</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71057%3A%20n%2Fa&amp;severity=high&amp;id=69a06645b7ef31ef0b73ce17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-02-26-57a0eba7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-02-26&amp;severity=medium&amp;id=69a01513b7ef31ef0be66b83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-26-0c6bbf64</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-26&amp;severity=low&amp;id=69a01513b7ef31ef0be66b3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27808-cwe-918-server-side-request-forgery-0907ab33</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27808%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20axllent%20mailpit&amp;severity=medium&amp;id=699f8fb4b7ef31ef0b6dc8d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27804-cwe-327-use-of-a-broken-or-risky-cr-9a87af7c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27804%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20parse-community%20parse-server&amp;severity=critical&amp;id=699f8fb4b7ef31ef0b6dc8cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27735-cwe-22-improper-limitation-of-a-pat-cbe310bc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27735%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20modelcontextprotocol%20servers&amp;severity=medium&amp;id=699f8fb4b7ef31ef0b6dc8c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27711-cwe-125-out-of-bounds-read-in-m2tea-1a6755bd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27711%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20M2Team%20NanaZip&amp;severity=medium&amp;id=699f8c2fb7ef31ef0b6c21cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27710-cwe-191-integer-underflow-wrap-or-w-6d6f93e8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27710%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20M2Team%20NanaZip&amp;severity=medium&amp;id=699f8c2fb7ef31ef0b6c21c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27709-cwe-125-out-of-bounds-read-in-m2tea-36da9c67</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27709%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20M2Team%20NanaZip&amp;severity=medium&amp;id=699f8c2fb7ef31ef0b6c21c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27976-cwe-61-unix-symbolic-link-symlink-f-275886dd</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27976%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20zed-industries%20zed&amp;severity=high&amp;id=699f8c2fb7ef31ef0b6c21d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27967-cwe-59-improper-link-resolution-bef-66fdc1ad</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27967%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20zed-industries%20zed&amp;severity=high&amp;id=699f8c2fb7ef31ef0b6c21ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27800-cwe-22-improper-limitation-of-a-pat-e91aae3a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27800%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20zed-industries%20zed&amp;severity=high&amp;id=699f88afb7ef31ef0b6add23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27933-cwe-613-insufficient-session-expira-39a8e3c7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27933%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20manyfold3d%20manyfold&amp;severity=medium&amp;id=699f8527b7ef31ef0b6936d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27635-cwe-78-improper-neutralization-of-s-ea449436</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27635%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20manyfold3d%20manyfold&amp;severity=high&amp;id=699f8527b7ef31ef0b6936d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27633-cwe-400-uncontrolled-resource-consu-d8ccb557</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27633%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20maximmasiutin%20TinyWeb&amp;severity=high&amp;id=699f8527b7ef31ef0b6936cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27630-cwe-400-uncontrolled-resource-consu-a65a120f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27630%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20maximmasiutin%20TinyWeb&amp;severity=high&amp;id=699f8527b7ef31ef0b6936c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3209-improper-access-controls-in-fosrl-pa-9b724eee</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3209%3A%20Improper%20Access%20Controls%20in%20fosrl%20Pangolin&amp;severity=medium&amp;id=699f81a4b7ef31ef0b675cc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27613-cwe-78-improper-neutralization-of-s-552b887a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27613%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20maximmasiutin%20TinyWeb&amp;severity=critical&amp;id=699f81a4b7ef31ef0b675cc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27498-cwe-94-improper-control-of-generati-673d3ea0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27498%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=699f7e1fb7ef31ef0b65d59c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27578-cwe-80-improper-neutralization-of-s-45b6ec8e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27578%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20n8n-io%20n8n&amp;severity=high&amp;id=699f7e1fb7ef31ef0b65d5a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27577-cwe-94-improper-control-of-generati-fe1b37b0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27577%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=699f7a9cb7ef31ef0b62e4df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27497-cwe-94-improper-control-of-generati-7583bd72</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27497%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=699f7a9cb7ef31ef0b62e4d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27495-cwe-94-improper-control-of-generati-32b06175</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27495%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=699f7718b7ef31ef0b6119ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27494-cwe-497-exposure-of-sensitive-syste-451de5e4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27494%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20n8n-io%20n8n&amp;severity=high&amp;id=699f7718b7ef31ef0b6119e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27493-cwe-94-improper-control-of-generati-920a070d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27493%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=699f7718b7ef31ef0b6119dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27148-cwe-74-improper-neutralization-of-s-5a9d6dc6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27148%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20storybookjs%20storybook&amp;severity=high&amp;id=699f7012b7ef31ef0b5b7bb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27819-cwe-22-improper-limitation-of-a-pat-a38aca2c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27819%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20go-vikunja%20vikunja&amp;severity=high&amp;id=699f7012b7ef31ef0b5b7bc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27616-cwe-79-improper-neutralization-of-i-6e63a630</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27616%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20go-vikunja%20vikunja&amp;severity=high&amp;id=699f7012b7ef31ef0b5b7bc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27575-cwe-521-weak-password-requirements--02691e1b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27575%3A%20CWE-521%3A%20Weak%20Password%20Requirements%20in%20go-vikunja%20vikunja&amp;severity=critical&amp;id=699f7012b7ef31ef0b5b7bbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27116-cwe-79-improper-neutralization-of-i-8c728693</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27116%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=699f7012b7ef31ef0b5b7bce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26985-cwe-22-improper-limitation-of-a-pat-134e54a4</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26985%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20aces%20Loris&amp;severity=high&amp;id=699f7012b7ef31ef0b5b7bc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2694-cwe-285-improper-authorization-in-st-aacdc266</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2694%3A%20CWE-285%20Improper%20Authorization%20in%20stellarwp%20The%20Events%20Calendar&amp;severity=medium&amp;id=699f7012b7ef31ef0b5b7bd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26984-cwe-22-improper-limitation-of-a-pat-189f270a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26984%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20aces%20Loris&amp;severity=high&amp;id=699f6d86b7ef31ef0b587d27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3172-integer-underflow-or-wraparound-in-p-4fc97e5b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3172%3A%20Integer%20Underflow%20or%20Wraparound%20in%20pgvector&amp;severity=high&amp;id=699f6b0db7ef31ef0b54d928</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0542-cwe-653-improper-isolation-or-compar-5d8d7dac</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0542%3A%20CWE-653%3A%20Improper%20Isolation%20or%20Compartmentalization%20in%20ServiceNow%20ServiceNow%20AI%20Platform&amp;severity=critical&amp;id=699f6203b7ef31ef0b506075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3200-sql-injection-in-z-9527-admin-11a7aee8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3200%3A%20SQL%20Injection%20in%20z-9527%20admin&amp;severity=medium&amp;id=699f5b59b7ef31ef0b4d0f06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unmasking-agent-tesla-a-deep-dive-into-a-multi-sta-ba77bd32</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unmasking%20Agent%20Tesla%3A%20A%20Deep%20Dive%20into%20a%20Multi-Stage%20Campaign&amp;severity=medium&amp;id=699f5e46b7ef31ef0b4e8a72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22721-cwe-269-improper-privilege-manageme-49e5e7d1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22721%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20VMware%20VMware%20Aria%20Operations&amp;severity=medium&amp;id=699f5b59b7ef31ef0b4d0f02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22720-cwe-79-improper-neutralization-of-i-fdb8baf3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22720%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20VMware%20VMware%20Aria%20Operations&amp;severity=high&amp;id=699f6b0db7ef31ef0b54d932</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22719-vulnerability-in-vmware-aria-operat-d1a0f7ce</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22719%3A%20Vulnerability%20in%20VMware%20VMware%20Aria%20Operations&amp;severity=high&amp;id=699f6b2db7ef31ef0b54f05e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2636-cwe-159-improper-handling-of-invalid-c9000dfa</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2636%3A%20CWE-159%20%20Improper%20Handling%20of%20Invalid%20Use%20of%20Special%20Elements%20in%20Microsoft%20Windows%20OS&amp;severity=medium&amp;id=699f6b2db7ef31ef0b54f063</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3221-cwe-312-cleartext-storage-of-sensiti-b543f909</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3221%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Devolutions%20Server&amp;severity=medium&amp;id=699f6c30b7ef31ef0b560f48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27795-cwe-918-server-side-request-forgery-f4816062</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27795%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20langchain-ai%20langchainjs&amp;severity=medium&amp;id=699f6c30b7ef31ef0b560f39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3194-missing-authentication-in-chia-block-e4dfa1da</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3194%3A%20Missing%20Authentication%20in%20Chia%20Blockchain&amp;severity=low&amp;id=699f6c30b7ef31ef0b560f42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21902-cwe-732-incorrect-permission-assign-a3c54a93</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21902%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Juniper%20Networks%20Junos%20OS%20Evolved&amp;severity=critical&amp;id=699f6b6fb7ef31ef0b5556ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27850-cwe-940-improper-verification-of-so-51bb8bbe</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27850%3A%20cwe-940%20Improper%20Verification%20of%20Source%20of%20a%20Communication%20Channel%20in%20Linksys%20MR9600&amp;severity=high&amp;id=699f6b6fb7ef31ef0b5556b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27794-cwe-502-deserialization-of-untruste-3cd0df7e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27794%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20langchain-ai%20langgraph-checkpoint&amp;severity=medium&amp;id=699f6d86b7ef31ef0b587d30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27739-cwe-918-server-side-request-forgery-9cfbc4e8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27739%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20angular%20angular-cli&amp;severity=critical&amp;id=699f6e6fb7ef31ef0b5a094a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27738-cwe-601-url-redirection-to-untruste-c2409b1d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27738%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20angular%20angular-cli&amp;severity=medium&amp;id=699f6e70b7ef31ef0b5a0a07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3193-cross-site-request-forgery-in-chia-b-660586ac</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3193%3A%20Cross-Site%20Request%20Forgery%20in%20Chia%20Blockchain&amp;severity=low&amp;id=699f6e70b7ef31ef0b5a0a10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20033-buffer-access-with-incorrect-length-01834230</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20033%3A%20Buffer%20Access%20with%20Incorrect%20Length%20Value%20in%20Cisco%20Cisco%20NX-OS%20System%20Software%20in%20ACI%20Mode&amp;severity=high&amp;id=699f6b6eb7ef31ef0b555634</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20048-uncontrolled-memory-allocation-in-c-9630ca06</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20048%3A%20Uncontrolled%20Memory%20Allocation%20in%20Cisco%20Cisco%20NX-OS%20System%20Software%20in%20ACI%20Mode&amp;severity=high&amp;id=699f6b6eb7ef31ef0b55563a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20099-improper-neutralization-of-special--2103b41c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20099%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Cisco%20Cisco%20Firepower%20Extensible%20Operating%20System%20(FXOS)&amp;severity=medium&amp;id=699f6b6fb7ef31ef0b55569b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20091-improper-neutralization-of-input-du-03ee8a0e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20091%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Firepower%20Extensible%20Operating%20System%20(FXOS)&amp;severity=medium&amp;id=699f6b6fb7ef31ef0b555698</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20037-execution-with-unnecessary-privileg-92e47074</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20037%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Cisco%20Cisco%20Unified%20Computing%20System%20(Managed)&amp;severity=medium&amp;id=699f6b6eb7ef31ef0b555637</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27849-cwe-78-improper-neutralization-of-s-ae598b62</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27849%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Linksys%20MR9600&amp;severity=critical&amp;id=699f6e70b7ef31ef0b5a0a0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20010-buffer-access-with-incorrect-length-e06a1787</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20010%3A%20Buffer%20Access%20with%20Incorrect%20Length%20Value%20in%20Cisco%20Cisco%20NX-OS%20Software&amp;severity=high&amp;id=699f6b6eb7ef31ef0b555631</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-blast-radius-problem-stolen-credentials-are-we-1d748531</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Blast%20Radius%20Problem%3A%20Stolen%20Credentials%20are%20Weaponizing%20Agentic%20AI&amp;severity=medium&amp;id=699f2282b7ef31ef0b357ae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20036-improper-neutralization-of-special--5fab8f84</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20036%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Cisco%20Cisco%20Unified%20Computing%20System%20(Managed)&amp;severity=medium&amp;id=699f6d14b7ef31ef0b56db7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20107-insufficient-granularity-of-access--f4ddc726</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20107%3A%20Insufficient%20Granularity%20of%20Access%20Control%20in%20Cisco%20Cisco%20Application%20Policy%20Infrastructure%20Controller%20(APIC)&amp;severity=medium&amp;id=699f6b6fb7ef31ef0b55569e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20051-use-of-uninitialized-variable-in-ci-5f25aa8d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20051%3A%20Use%20of%20Uninitialized%20Variable%20in%20Cisco%20Cisco%20NX-OS%20Software&amp;severity=high&amp;id=699f6b6eb7ef31ef0b55563d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20122-incorrect-use-of-privileged-apis-in-90ab3c7c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20122%3A%20Incorrect%20Use%20of%20Privileged%20APIs%20in%20Cisco%20Cisco%20Catalyst%20SD-WAN%20Manager&amp;severity=medium&amp;id=699f6d14b7ef31ef0b56db81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20127-improper-authentication-in-cisco-ci-2ddcf584</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20127%3A%20Improper%20Authentication%20in%20Cisco%20Cisco%20Catalyst%20SD-WAN%20Manager&amp;severity=critical&amp;id=699f6dd9b7ef31ef0b58f88d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20128-storing-passwords-in-a-recoverable--b14fe640</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20128%3A%20Storing%20Passwords%20in%20a%20Recoverable%20Format%20in%20Cisco%20Cisco%20Catalyst%20SD-WAN%20Manager&amp;severity=high&amp;id=699f6b6fb7ef31ef0b5556a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20129-improper-authentication-in-cisco-ci-ca713753</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20129%3A%20Improper%20Authentication%20in%20Cisco%20Cisco%20Catalyst%20SD-WAN%20Manager&amp;severity=critical&amp;id=699f6b6fb7ef31ef0b5556a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20126-incorrect-use-of-privileged-apis-in-0b35fe35</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20126%3A%20Incorrect%20Use%20of%20Privileged%20APIs%20in%20Cisco%20Cisco%20Catalyst%20SD-WAN%20Manager&amp;severity=high&amp;id=699f6b6fb7ef31ef0b5556a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20133-exposure-of-sensitive-information-t-5512c3fb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20133%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Cisco%20Cisco%20Catalyst%20SD-WAN%20Manager&amp;severity=medium&amp;id=699f6b6fb7ef31ef0b5556aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3192-improper-authentication-in-chia-bloc-1561c236</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3192%3A%20Improper%20Authentication%20in%20Chia%20Blockchain&amp;severity=medium&amp;id=699f5e7eb7ef31ef0b4e9b5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3189-server-side-request-forgery-in-feiyu-14bb2646</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3189%3A%20Server-Side%20Request%20Forgery%20in%20feiyuchuixue%20sz-boot-parent&amp;severity=low&amp;id=699f5e7eb7ef31ef0b4e9b52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-disrupts-chinese-cyberespionage-campaign-ta-1b7a1764</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Disrupts%20Chinese%20Cyberespionage%20Campaign%20Targeting%20Telecoms%2C%20Governments&amp;severity=medium&amp;id=699f1efeb7ef31ef0b33341e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27727-cwe-74-improper-neutralization-of-s-8287b1ed</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27727%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20swaldman%20mchange-commons-java&amp;severity=high&amp;id=699f5e7eb7ef31ef0b4e9b4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27706-cwe-918-server-side-request-forgery-f42319c4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27706%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20makeplane%20plane&amp;severity=high&amp;id=699f5b59b7ef31ef0b4d0f16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27705-cwe-639-authorization-bypass-throug-ded9079b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27705%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20makeplane%20plane&amp;severity=medium&amp;id=699f5b59b7ef31ef0b4d0f11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22866-cwe-347-improper-verification-of-cr-1cf14df0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22866%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20ensdomains%20ens-contracts&amp;severity=low&amp;id=699f6203b7ef31ef0b506078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27730-cwe-918-server-side-request-forgery-b582d8e6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27730%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20esm-dev%20esm.sh&amp;severity=high&amp;id=699f6203b7ef31ef0b50607d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50180-cwe-918-server-side-request-forgery-1e770482</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50180%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20esm-dev%20esm.sh&amp;severity=high&amp;id=699f6e70b7ef31ef0b5a0a15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3188-path-traversal-in-feiyuchuixue-sz-bo-801a6dfd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3188%3A%20Path%20Traversal%20in%20feiyuchuixue%20sz-boot-parent&amp;severity=medium&amp;id=699f6e70b7ef31ef0b5a0a2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/solarwinds-patches-four-critical-serv-u-vulnerabil-ecdae751</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SolarWinds%20Patches%20Four%20Critical%20Serv-U%20Vulnerabilities&amp;severity=critical&amp;id=699f17f7b7ef31ef0b2ea26b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1242-cwe-798-use-of-hard-coded-credential-3c49accf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1242%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Gardyn%20Home%20Kit&amp;severity=critical&amp;id=699f183fb7ef31ef0b2eb1bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27704-cwe-22-improper-limitation-of-a-pat-7ee8fa72</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27704%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20dart-lang%20sdk&amp;severity=medium&amp;id=699f183fb7ef31ef0b2eb1cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27848-cwe-78-improper-neutralization-of-s-d78302ba</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27848%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Linksys%20MR9600&amp;severity=critical&amp;id=699f183fb7ef31ef0b2eb1d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/variations-of-the-clickfix-kaspersky-official-blog-8cce2ef7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Variations%20of%20the%20ClickFix%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=699f14e0b7ef31ef0b2d24ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3206-cwe-404-improper-resource-shutdown-o-0fa6e2e4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3206%3A%20CWE-404%20Improper%20Resource%20Shutdown%20or%20Release%20in%20KrakenD%20KrakenD-CE&amp;severity=low&amp;id=699f183fb7ef31ef0b2eb1da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27847-cwe-89-improper-neutralization-of-s-a7b0346f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27847%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Linksys%20MR9600&amp;severity=critical&amp;id=699f183fb7ef31ef0b2eb1d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27701-cwe-94-improper-control-of-generati-c2099fec</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27701%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20live-codes%20livecodes&amp;severity=high&amp;id=699f183fb7ef31ef0b2eb1c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27846-cwe-306-missing-authentication-for--6692e99e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27846%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Linksys%20MR9600&amp;severity=medium&amp;id=699f183fb7ef31ef0b2eb1d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27700-cwe-345-insufficient-verification-o-a50ef423</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27700%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20honojs%20hono&amp;severity=high&amp;id=699f183fb7ef31ef0b2eb1c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27699-cwe-22-improper-limitation-of-a-pat-a776ea60</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27699%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20patrickjuchli%20basic-ftp&amp;severity=critical&amp;id=699f1123b7ef31ef0b2a7c5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27695-cwe-770-allocation-of-resources-wit-bff82a68</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27695%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20zeroae%20zae-limiter&amp;severity=medium&amp;id=699f1123b7ef31ef0b2a7c58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2878-cwe-331-insufficient-entropy-in-prog-d8a9f60b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2878%3A%20CWE-331%20Insufficient%20Entropy%20in%20Progress%20Software%20Telerik%20UI%20for%20ASP.NET%20AJAX&amp;severity=medium&amp;id=699f1123b7ef31ef0b2a7c61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27692-cwe-125-out-of-bounds-read-in-inter-7b596b3c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27692%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=699f1123b7ef31ef0b2a7c52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27691-cwe-190-integer-overflow-or-wraparo-efb0b7d2</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27691%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=699f0a1db7ef31ef0b25eb0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3203-cwe-126-buffer-over-read-in-wireshar-77866e88</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3203%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=699f0a1db7ef31ef0b25eb21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3202-cwe-476-null-pointer-dereference-in--91e773e9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3202%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=699f0a1db7ef31ef0b25eb1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3201-cwe-1325-improperly-controlled-seque-eee636bd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3201%3A%20CWE-1325%3A%20Improperly%20Controlled%20Sequential%20Memory%20Allocation%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=699f0a1db7ef31ef0b25eb19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3187-unrestricted-upload-in-feiyuchuixue--6e14b61f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3187%3A%20Unrestricted%20Upload%20in%20feiyuchuixue%20sz-boot-parent&amp;severity=medium&amp;id=699f0a1db7ef31ef0b25eb10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/caught-in-the-hook-rce-and-api-token-exfiltration--467253d7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Caught%20in%20the%20Hook%3A%20RCE%20and%20API%20Token%20Exfiltration%20Through%20Claude%20Code%20Project%20Files%20%7C%20CVE-2025-59536%20%7C%20CVE-2026-21852&amp;severity=critical&amp;id=699f0345b7ef31ef0b20b850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/medical-device-maker-ufp-technologies-hit-by-cyber-b573b4f1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Medical%20Device%20Maker%20UFP%20Technologies%20Hit%20by%20Cyberattack&amp;severity=medium&amp;id=699eff5ab7ef31ef0b1d212e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3186-use-of-default-password-in-feiyuchui-c666b76c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3186%3A%20Use%20of%20Default%20Password%20in%20feiyuchuixue%20sz-boot-parent&amp;severity=medium&amp;id=699effa2b7ef31ef0b1d5ea1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3185-authorization-bypass-in-feiyuchuixue-2638462c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3185%3A%20Authorization%20Bypass%20in%20feiyuchuixue%20sz-boot-parent&amp;severity=medium&amp;id=699effa2b7ef31ef0b1d5e98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ex-us-defense-contractor-executive-jailed-for-sell-1eace578</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ex-US%20Defense%20Contractor%20Executive%20Jailed%20for%20Selling%20Exploits%20to%20Russia&amp;severity=medium&amp;id=699ef4ceb7ef31ef0b09b97d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28196-cwe-459-in-jetbrains-teamcity-d58b6a40</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28196%3A%20CWE-459%20in%20JetBrains%20TeamCity&amp;severity=low&amp;id=699ef887b7ef31ef0b0c395d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28195-cwe-862-in-jetbrains-teamcity-83b0a743</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28195%3A%20CWE-862%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=699ef887b7ef31ef0b0c395a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28194-cwe-601-in-jetbrains-teamcity-eefbaf9e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28194%3A%20CWE-601%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=699ef887b7ef31ef0b0c3957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28193-cwe-862-in-jetbrains-youtrack-02c83ca9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28193%3A%20CWE-862%20in%20JetBrains%20YouTrack&amp;severity=high&amp;id=699ef887b7ef31ef0b0c3954</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2624-cwe-306-missing-authentication-for-c-f523ffcf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2624%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20ePati%20Cyber%20%E2%80%8B%E2%80%8BSecurity%20Technologies%20Inc.%20Antikor%20Next%20Generation%20Firewall%20(NGFW)&amp;severity=critical&amp;id=699ef17fb7ef31ef0b08499b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-12-million-users-impacted-by-cargurus-data-br-be873cf0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%2012%20Million%20Users%20Impacted%20by%20CarGurus%20Data%20Breach&amp;severity=medium&amp;id=699eedc5b7ef31ef0b06ebdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0704-file-modificationdeletion-path-trave-a67d541f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0704%3A%20File%20Modification%2FDeletion%20Path%20Traversal%20in%20Octopus%20Deploy%20Octopus%20Server&amp;severity=medium&amp;id=699eee0bb7ef31ef0b07114d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-latest-plugx-variant-executed-by-staticplugin-5267edd3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Latest%20PlugX%20Variant%20Executed%20by%20STATICPLUGIN&amp;severity=medium&amp;id=699ee338b7ef31ef0b0201e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wynn-resorts-confirms-data-breach-after-hackers-re-66a2b7ea</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Wynn%20Resorts%20Confirms%20Data%20Breach%20After%20Hackers%20Remove%20It%20From%20Leak%20Site&amp;severity=high&amp;id=699edfb6b7ef31ef0b00cd80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mercenary-akula-hits-ukraine-supporting-financial-3cdfd2cf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mercenary%20Akula%20Hits%20Ukraine-Supporting%20Financial...&amp;severity=medium&amp;id=699ee338b7ef31ef0b0201d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3118-improper-neutralization-of-special-e-de20a68b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3118%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Red%20Hat%20Red%20Hat%20Developer%20Hub%201.8&amp;severity=medium&amp;id=699edffab7ef31ef0b00d523</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25701-cwe-377-insecure-temporary-file-in--ca7227b6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25701%3A%20CWE-377%3A%20Insecure%20Temporary%20File%20in%20openSUSE%20sdbootutil&amp;severity=high&amp;id=699edc67b7ef31ef0bffee91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26104-missing-authorization-in-red-hat-re-e49792af</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26104%3A%20Missing%20Authorization%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=699ed8e3b7ef31ef0bfe5906</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62878-cwe-23-relative-path-traversal-in-s-e8aa8cda</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62878%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20SUSE%20Rancher&amp;severity=critical&amp;id=699ed8e3b7ef31ef0bfe58fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67601-cwe-295-improper-certificate-valida-cd78fd99</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67601%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20SUSE%20rancher&amp;severity=high&amp;id=699ed8e3b7ef31ef0bfe5902</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67860-cwe-522-insufficiently-protected-cr-b1edb39d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67860%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20SUSE%20harvester&amp;severity=low&amp;id=699ed1dfb7ef31ef0bfbbf25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26103-missing-authorization-in-red-hat-re-f6e8c238</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26103%3A%20Missing%20Authorization%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=699ed1dfb7ef31ef0bfbbf29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/reddit-hit-with-20-million-uk-data-privacy-fine-ov-a3954f96</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Reddit%20Hit%20With%20%2420%20Million%20UK%20Data%20Privacy%20Fine%20Over%20Child%20Safety%20Failings&amp;severity=medium&amp;id=699eca9db7ef31ef0bf8a751</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/claudes-new-ai-vulnerability-scanner-sends-cyberse-3472c897</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Claude%E2%80%99s%20New%20AI%20Vulnerability%20Scanner%20Sends%20Cybersecurity%20Shares%20Plunging&amp;severity=medium&amp;id=699ec71ab7ef31ef0bf720a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2367-cwe-79-improper-neutralization-of-in-8070a879</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2367%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ays-pro%20Secure%20Copy%20Content%20Protection%20and%20Content%20Locking&amp;severity=medium&amp;id=699ec3cbb7ef31ef0bf52b13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2301-cwe-862-missing-authorization-in-met-411cd241</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2301%3A%20CWE-862%20Missing%20Authorization%20in%20metaphorcreations%20Post%20Duplicator&amp;severity=medium&amp;id=699ec3cbb7ef31ef0bf52b0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2410-cwe-352-cross-site-request-forgery-c-d12db616</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2410%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20themeisle%20Disable%20Admin%20Notices%20%E2%80%93%20Hide%20Dashboard%20Notifications&amp;severity=medium&amp;id=699ec3cbb7ef31ef0bf52b19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14742-cwe-639-authorization-bypass-throug-cb27f6e8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14742%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20brechtvds%20WP%20Recipe%20Maker&amp;severity=medium&amp;id=699ec3cbb7ef31ef0bf52b05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3171-cross-site-scripting-in-sourcecodest-da1bd858</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3171%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Patients%20Waiting%20Area%20Queue%20Management%20System&amp;severity=medium&amp;id=699eb93fb7ef31ef0bf05d49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1929-cwe-94-improper-control-of-generatio-d104e328</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1929%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20mihail-barinov%20Advanced%20Woo%20Labels%20%E2%80%93%20Product%20Labels%20%26%20Badges%20for%20WooCommerce&amp;severity=high&amp;id=699eb5bab7ef31ef0bee1261</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2416-cwe-89-improper-neutralization-of-sp-2ddd610e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2416%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20cyberhobo%20Geo%20Mashup&amp;severity=high&amp;id=699eb5bab7ef31ef0bee1268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1916-cwe-862-missing-authorization-in-jav-8b4073b4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1916%3A%20CWE-862%20Missing%20Authorization%20in%20javmah%20WPGSI%3A%20Spreadsheet%20Integration&amp;severity=high&amp;id=699eb5bab7ef31ef0bee1257</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2479-cwe-918-server-side-request-forgery--d3147280</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2479%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20dfactory%20Responsive%20Lightbox%20%26%20Gallery&amp;severity=medium&amp;id=699eb5bab7ef31ef0bee126e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ad-tech-company-optimizely-targeted-in-cyberattack-701553b3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ad%20Tech%20Company%20Optimizely%20Targeted%20in%20Cyberattack&amp;severity=medium&amp;id=699eb201b7ef31ef0beb30e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3170-cross-site-scripting-in-sourcecodest-7369a4ba</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3170%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Patients%20Waiting%20Area%20Queue%20Management%20System&amp;severity=medium&amp;id=699eaeb3b7ef31ef0be98664</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3169-buffer-overflow-in-tenda-f453-69816231</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3169%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=699eab2eb7ef31ef0be89303</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3168-buffer-overflow-in-tenda-f453-508dab5e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3168%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=699ea0a3b7ef31ef0be4a302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3167-buffer-overflow-in-tenda-f453-afffcc0b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3167%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=699ea0a3b7ef31ef0be4a2fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1614-cwe-79-improper-neutralization-of-in-97325495</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1614%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eaglethemes%20Rise%20Blocks%20%E2%80%93%20A%20Complete%20Gutenberg%20Page%20Builder&amp;severity=medium&amp;id=699ea0a3b7ef31ef0be4a2f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3166-buffer-overflow-in-tenda-f453-624b36c0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3166%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=699e999bb7ef31ef0be2319c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3165-buffer-overflow-in-tenda-f453-c9971778</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3165%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=699f6d86b7ef31ef0b587d3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3164-sql-injection-in-itsourcecode-news-p-dfd28c6e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3164%3A%20SQL%20Injection%20in%20itsourcecode%20News%20Portal%20Project&amp;severity=medium&amp;id=699f6d86b7ef31ef0b587d36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25785-improper-limitation-of-a-pathname-t-f44e9ddb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25785%3A%20Improper%20limitation%20of%20a%20pathname%20to%20a%20restricted%20directory%20(&apos;Path%20Traversal&apos;)%20in%20MOTEX%20Inc.%20Lanscope%20Endpoint%20Manager%20(On-Premises)%20Sub-Manager%20Server&amp;severity=critical&amp;id=699f6d86b7ef31ef0b587d2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3179-cwe-22-improper-limitation-of-a-path-180a5bd6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3179%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ASUSTOR%20ADM&amp;severity=critical&amp;id=699e999bb7ef31ef0be231a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3100-cwe-295-improper-certificate-validat-103fbf82</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3100%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20ASUSTOR%20ADM&amp;severity=high&amp;id=699e999bb7ef31ef0be231a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3163-server-side-request-forgery-in-sourc-a598193f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3163%3A%20Server-Side%20Request%20Forgery%20in%20SourceCodester%20Website%20Link%20Extractor&amp;severity=medium&amp;id=699e8f0fb7ef31ef0bdc6155</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3153-sql-injection-in-itsourcecode-docume-715dc6d4</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3153%3A%20SQL%20Injection%20in%20itsourcecode%20Document%20Management%20System&amp;severity=medium&amp;id=699e8f0fb7ef31ef0bdc614e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3152-sql-injection-in-itsourcecode-colleg-aad2116a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3152%3A%20SQL%20Injection%20in%20itsourcecode%20College%20Management%20System&amp;severity=medium&amp;id=699e8808b7ef31ef0bd9ce55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3151-sql-injection-in-itsourcecode-colleg-2aed5ab2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3151%3A%20SQL%20Injection%20in%20itsourcecode%20College%20Management%20System&amp;severity=medium&amp;id=699e8808b7ef31ef0bd9ce4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3150-sql-injection-in-itsourcecode-colleg-d243c4d1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3150%3A%20SQL%20Injection%20in%20itsourcecode%20College%20Management%20System&amp;severity=medium&amp;id=699e80ffb7ef31ef0bd6daa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0976-cwe-532-insertion-of-sensitive-infor-fc9d9bab</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0976%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Hitachi%20Hitachi%20Ops%20Center%20API%20Configuration%20Manager&amp;severity=medium&amp;id=699e80ffb7ef31ef0bd6da5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27696-cwe-918-server-side-request-forgery-86f48884</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27696%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20dgtlmoon%20changedetection.io&amp;severity=high&amp;id=699e80ffb7ef31ef0bd6da90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27645-cwe-79-improper-neutralization-of-i-cd313692</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27645%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dgtlmoon%20changedetection.io&amp;severity=medium&amp;id=699e80ffb7ef31ef0bd6da77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3149-sql-injection-in-itsourcecode-colleg-99c7b07a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3149%3A%20SQL%20Injection%20in%20itsourcecode%20College%20Management%20System&amp;severity=medium&amp;id=699e80ffb7ef31ef0bd6da9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3148-sql-injection-in-sourcecodester-simp-ec2a2164</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3148%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20and%20Nice%20Shopping%20Cart%20Script&amp;severity=medium&amp;id=699e80ffb7ef31ef0bd6da98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27597-cwe-94-improper-control-of-generati-c298fcde</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27597%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20agentfront%20enclave&amp;severity=critical&amp;id=699e7673b7ef31ef0bd379a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27641-cwe-1336-improper-neutralization-of-693604e2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27641%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20jugmac00%20flask-reuploaded&amp;severity=critical&amp;id=699e7673b7ef31ef0bd379c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27640-cwe-212-improper-removal-of-sensiti-42d4b470</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27640%3A%20CWE-212%3A%20Improper%20Removal%20of%20Sensitive%20Information%20Before%20Storage%20or%20Transfer%20in%20oocx%20tfplan2md&amp;severity=high&amp;id=699e7673b7ef31ef0bd379bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27627-cwe-79-improper-neutralization-of-i-373ae35f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27627%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20karakeep-app%20karakeep&amp;severity=high&amp;id=699e7673b7ef31ef0bd379a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27639-cwe-79-improper-neutralization-of-i-5d8db224</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27639%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dbarzin%20mercator&amp;severity=high&amp;id=699e7673b7ef31ef0bd379b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27636-cwe-434-unrestricted-upload-of-file-b2fdd401</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27636%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=699e7673b7ef31ef0bd379ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27637-cwe-330-use-of-insufficiently-rando-8f97b2e6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27637%3A%20CWE-330%3A%20Use%20of%20Insufficiently%20Random%20Values%20in%20freescout-help-desk%20freescout&amp;severity=critical&amp;id=699e7673b7ef31ef0bd379b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3147-heap-based-buffer-overflow-in-libvip-1354e241</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3147%3A%20Heap-based%20Buffer%20Overflow%20in%20libvips&amp;severity=medium&amp;id=699e7674b7ef31ef0bd379e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27743-cwe-89-improper-neutralization-of-s-0723b396</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27743%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20SPIP%20referer_spam&amp;severity=critical&amp;id=699e7673b7ef31ef0bd379c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27744-cwe-94-improper-control-of-generati-6654b571</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27744%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20SPIP%20tickets&amp;severity=critical&amp;id=699e7673b7ef31ef0bd379ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27745-cwe-94-improper-control-of-generati-57f4fcf8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27745%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20SPIP%20interface_traduction_objets&amp;severity=high&amp;id=699e7673b7ef31ef0bd379cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27746-cwe-79-improper-neutralization-of-i-90ae5a56</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27746%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20SPIP%20jeux&amp;severity=medium&amp;id=699e7674b7ef31ef0bd379de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27747-cwe-89-improper-neutralization-of-s-2659fae3</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27747%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20SPIP%20interface_traduction_objets&amp;severity=high&amp;id=699e7674b7ef31ef0bd379e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3146-null-pointer-dereference-in-libvips-513efbb0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3146%3A%20NULL%20Pointer%20Dereference%20in%20libvips&amp;severity=medium&amp;id=699e6866b7ef31ef0bae9df2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5781-cwe-532-insertion-of-sensitive-infor-aae3b878</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5781%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Hitachi%20Hitachi%20Ops%20Center%20API%20Configuration%20Manager&amp;severity=medium&amp;id=699e6864b7ef31ef0bae9cfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27628-cwe-835-loop-with-unreachable-exit--62eb22d7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27628%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20py-pdf%20pypdf&amp;severity=low&amp;id=699e6864b7ef31ef0bae9d21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27612-cwe-79-improper-neutralization-of-i-96b43164</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27612%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20denpiligrim%20repostat&amp;severity=medium&amp;id=699e6864b7ef31ef0bae9d16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27621-cwe-79-improper-neutralization-of-i-b8844ad0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27621%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20TypiCMS%20Core&amp;severity=medium&amp;id=699e6864b7ef31ef0bae9d1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27615-cwe-40-path-traversal-uncsharename--b9cde004</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27615%3A%20CWE-40%3A%20Path%20Traversal%3A%20&apos;UNCsharename&apos;%20(Windows%20UNC%20Share)%20in%20Alex4SSB%20ADB-Explorer&amp;severity=high&amp;id=699e6864b7ef31ef0bae9d1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27611-cwe-200-exposure-of-sensitive-infor-a3c67993</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27611%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20gtsteffaniak%20filebrowser&amp;severity=high&amp;id=699e6864b7ef31ef0bae9d12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27595-cwe-306-missing-authentication-for--2da76779</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27595%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20parse-community%20parse-dashboard&amp;severity=critical&amp;id=699e6864b7ef31ef0bae9d01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27610-cwe-1289-improper-validation-of-uns-48254a1b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27610%3A%20CWE-1289%3A%20Improper%20Validation%20of%20Unsafe%20Equivalence%20in%20Input%20in%20parse-community%20parse-dashboard&amp;severity=high&amp;id=699e6864b7ef31ef0bae9d0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27609-cwe-352-cross-site-request-forgery--dfc8a5e8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27609%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20parse-community%20parse-dashboard&amp;severity=high&amp;id=699e6864b7ef31ef0bae9d09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27608-cwe-862-missing-authorization-in-pa-52557f8e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27608%3A%20CWE-862%3A%20Missing%20Authorization%20in%20parse-community%20parse-dashboard&amp;severity=critical&amp;id=699e6864b7ef31ef0bae9d05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3145-memory-corruption-in-libvips-2bae8caa</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3145%3A%20Memory%20Corruption%20in%20libvips&amp;severity=medium&amp;id=699e6866b7ef31ef0bae9de9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2914-insecure-permissions-in-cyberark-sof-877fa41a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2914%3A%20Insecure%20Permissions%20in%20CyberArk%20Software%2C%20a%20Palo%20Alto%20Networks%20Company%20Endpoint%20Privilege%20Manager%20Agent&amp;severity=high&amp;id=699e5a58b7ef31ef0b9afd2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3137-stack-based-buffer-overflow-in-codea-4a89e8a5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3137%3A%20Stack-based%20Buffer%20Overflow%20in%20CodeAstro%20Food%20Ordering%20System&amp;severity=medium&amp;id=699e48bfb7ef31ef0b85c3f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27598-cwe-22-improper-limitation-of-a-pat-337a2a17</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27598%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20dagu-org%20dagu&amp;severity=high&amp;id=699e48bfb7ef31ef0b85c3ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3135-sql-injection-in-itsourcecode-news-p-0a7c6d73</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3135%3A%20SQL%20Injection%20in%20itsourcecode%20News%20Portal%20Project&amp;severity=medium&amp;id=699e48bfb7ef31ef0b85c3f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-25-e6cbb2ff</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-25&amp;severity=medium&amp;id=699f8f7ab7ef31ef0b6d58b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69771-na-113581c4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69771%3A%20n%2Fa&amp;severity=critical&amp;id=699f6e70b7ef31ef0b5a0a22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26717-na-808c7875</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26717%3A%20n%2Fa&amp;severity=medium&amp;id=699f6e70b7ef31ef0b5a0a02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-02-25-9eec935b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-02-25&amp;severity=medium&amp;id=699ef84fb7ef31ef0b0b64a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-25-b8278a68</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-25&amp;severity=low&amp;id=699e682bb7ef31ef0bae3509</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3134-sql-injection-in-itsourcecode-news-p-8a5e3d8d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3134%3A%20SQL%20Injection%20in%20itsourcecode%20News%20Portal%20Project&amp;severity=medium&amp;id=699e3aafb7ef31ef0b769651</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3133-sql-injection-in-itsourcecode-docume-93ea08f5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3133%3A%20SQL%20Injection%20in%20itsourcecode%20Document%20Management%20System&amp;severity=medium&amp;id=699e3aafb7ef31ef0b76964a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27117-cwe-22-improper-limitation-of-a-pat-c5a5b2bb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27117%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20rikyoz%20bit7z&amp;severity=medium&amp;id=699e1e91b7ef31ef0b4dd8d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27593-cwe-640-weak-password-recovery-mech-d0c0ac0e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27593%3A%20CWE-640%3A%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20statamic%20cms&amp;severity=critical&amp;id=699e1e91b7ef31ef0b4dd8db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27572-cwe-770-allocation-of-resources-wit-1e2e3060</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27572%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20bytecodealliance%20wasmtime&amp;severity=medium&amp;id=699e1b0db7ef31ef0b464b8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/developer-targeting-campaign-using-malicious-nextj-0d448287</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Developer-targeting%20campaign%20using%20malicious%20Next.js%20repositories&amp;severity=medium&amp;id=699e1e59b7ef31ef0b4da0b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27204-cwe-400-uncontrolled-resource-consu-e113940a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27204%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20bytecodealliance%20wasmtime&amp;severity=medium&amp;id=699e1b0db7ef31ef0b464b82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27195-cwe-755-improper-handling-of-except-2af78dcd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27195%3A%20CWE-755%3A%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20bytecodealliance%20wasmtime&amp;severity=medium&amp;id=699e178ab7ef31ef0b4219f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25899-cwe-789-memory-allocation-with-exce-25b0b15f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25899%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20gofiber%20fiber&amp;severity=high&amp;id=699e178ab7ef31ef0b4219f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25891-cwe-22-improper-limitation-of-a-pat-54f51692</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25891%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20gofiber%20fiber&amp;severity=high&amp;id=699e178ab7ef31ef0b4219ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25882-cwe-129-improper-validation-of-arra-fc87a38b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25882%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20gofiber%20fiber&amp;severity=medium&amp;id=699e140db7ef31ef0b397342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22553-cwe-78-in-insat-masterscada-buk-ts-da2080e7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22553%3A%20CWE-78%20in%20InSAT%20MasterSCADA%20BUK-TS&amp;severity=critical&amp;id=699e140db7ef31ef0b39733e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21410-cwe-89-in-insat-masterscada-buk-ts-10cd43d6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21410%3A%20CWE-89%20in%20InSAT%20MasterSCADA%20BUK-TS&amp;severity=critical&amp;id=699e140db7ef31ef0b39733a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-zoom-meeting-update-silently-installs-surveil-2fbb42c0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Zoom%20meeting%20&apos;update&apos;%20silently%20installs%20surveillance%20software&amp;severity=medium&amp;id=699e0e19be58cf853b27f354</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46320-a-cross-site-scripting-xss-vulnerab-84cf6eee</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46320%3A%20A%20cross-site%20scripting%20(XSS)%20vulnerability%20in%20a%20FileMaker%20WebDirect%20custom%20homepage%20could%20lead%20to%20unauthorized%20access%20and%20remote%20code%20execution.%20in%20Claris%20FileMaker%20Server&amp;severity=medium&amp;id=699e0e51be58cf853b283374</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24443-cwe-620-unverified-password-change--b7991ec8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24443%3A%20CWE-620%20Unverified%20Password%20Change%20in%20NETIKUS.NET%20ltd%20EventSentry&amp;severity=high&amp;id=699e0acebe58cf853b264b13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23859-cwe-602-client-side-enforcement-of--f49cfd91</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23859%3A%20CWE-602%3A%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20Dell%20Wyse%20Management%20Suite&amp;severity=low&amp;id=699e0f3bbe58cf853b2906c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23858-cwe-79-improper-neutralization-of-i-0c121421</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23858%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dell%20Wyse%20Management%20Suite&amp;severity=medium&amp;id=699e0f3bbe58cf853b2906c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22766-cwe-434-unrestricted-upload-of-file-cb813835</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22766%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Dell%20Wyse%20Management%20Suite&amp;severity=high&amp;id=699e0f3bbe58cf853b2906c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22765-cwe-862-missing-authorization-in-de-bdb3a520</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22765%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Dell%20Wyse%20Management%20Suite&amp;severity=high&amp;id=699e0f3bbe58cf853b2906c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3131-cwe-200-exposure-of-sensitive-inform-b9371043</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3131%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Devolutions%20Server&amp;severity=medium&amp;id=699df940be58cf853b1d7ea7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1768-cwe-863-incorrect-authorization-in-d-757628e7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1768%3A%20CWE-863%20Incorrect%20Authorization%20in%20Devolutions%20Devolutions%20Server&amp;severity=medium&amp;id=699df93ebe58cf853b1d7e86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1789-incorrect-default-permissions-in-gen-4aea821b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1789%3A%20Incorrect%20Default%20Permissions%20in%20Genetec%20Inc.%20Genetec%20Update%20Service&amp;severity=medium&amp;id=699df93ebe58cf853b1d7e74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1787-cwe-346-origin-validation-error-in-g-a3f949ce</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1787%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20Genetec%20Inc.%20Genetec%20Update%20Service&amp;severity=medium&amp;id=699df93ebe58cf853b1d7e71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24241-cwe-287-improper-authentication-in--f6ee97c0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24241%3A%20CWE-287%20Improper%20Authentication%20in%20NVIDIA%20DLS%20component%20of%20NVIDIA%20License%20System&amp;severity=medium&amp;id=699df93ebe58cf853b1d7e89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33181-cwe-77-improper-neutralization-of-s-a9d11bfd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33181%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20NVIDIA%20Cumulus%20Linux%20GA&amp;severity=high&amp;id=699df93ebe58cf853b1d7e81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33180-cwe-77-improper-neutralization-of-s-84bb56a2</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33180%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20NVIDIA%20Cumulus%20Linux%20GA&amp;severity=high&amp;id=699df93ebe58cf853b1d7e7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33179-cwe-266-incorrect-privilege-assignm-36a7a0f9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33179%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20NVIDIA%20Cumulus%20Linux%20GA&amp;severity=high&amp;id=699df93ebe58cf853b1d7e77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26342-cwe-613-insufficient-session-expira-5e45b75e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26342%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20Tattile%20s.r.l.%20Smart%2B&amp;severity=high&amp;id=699df93ebe58cf853b1d7e98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26341-cwe-1392-use-of-default-credentials-b1797eea</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26341%3A%20CWE-1392%20Use%20of%20Default%20Credentials%20in%20Tattile%20s.r.l.%20Smart%2B&amp;severity=critical&amp;id=699df93ebe58cf853b1d7e93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26340-cwe-306-missing-authentication-for--b67ea307</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26340%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Tattile%20s.r.l.%20Smart%2B&amp;severity=high&amp;id=699df93ebe58cf853b1d7e8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/open-redirects-a-forgotten-vulnerabilityx3f-tue-fe-264b2774</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Open%20Redirects%3A%20A%20Forgotten%20Vulnerability%26%23x3f%3B%2C%20(Tue%2C%20Feb%2024th)&amp;severity=medium&amp;id=699de770be58cf853b0d95d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26222-cwe-502-deserialization-of-untruste-e414adc9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26222%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Beyond%20Limits%20Inc.%20Altec%20DocLink&amp;severity=critical&amp;id=699e0f3bbe58cf853b2906cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25603-cwe-22-improper-limitation-of-a-pat-a874863b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25603%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Linksys%20MR9600&amp;severity=medium&amp;id=699e0f3bbe58cf853b2906cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14963-cwe-20-improper-input-validation-in-f0e2d925</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14963%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Trellix%20Endpoint%20HX%20Agent%20(xAgent)&amp;severity=medium&amp;id=699e0f3bbe58cf853b2906d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27156-cwe-79-improper-neutralization-of-i-4af1ee20</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27156%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zauberzeug%20nicegui&amp;severity=medium&amp;id=699e0f3bbe58cf853b2906d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/moonrise-rat-a-new-low-detection-threat-with-high--f024cb0c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Moonrise%20RAT%3A%20A%20New%20Low-Detection%20Threat%20with%20High-Cost%20Consequences&amp;severity=medium&amp;id=699e0e19be58cf853b27f359</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27590-cwe-20-improper-input-validation-in-7b21592c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27590%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20caddyserver%20caddy&amp;severity=high&amp;id=699e0f3cbe58cf853b290cdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27589-cwe-352-cross-site-request-forgery--489061df</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27589%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20caddyserver%20caddy&amp;severity=medium&amp;id=699e0f3cbe58cf853b290cd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27588-cwe-178-improper-handling-of-case-s-9da8a007</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27588%3A%20CWE-178%3A%20Improper%20Handling%20of%20Case%20Sensitivity%20in%20caddyserver%20caddy&amp;severity=high&amp;id=699e0f3bbe58cf853b2906de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27587-cwe-178-improper-handling-of-case-s-d8aff9af</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27587%3A%20CWE-178%3A%20Improper%20Handling%20of%20Case%20Sensitivity%20in%20caddyserver%20caddy&amp;severity=high&amp;id=699e0f3bbe58cf853b2906da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27586-cwe-755-improper-handling-of-except-26e6760a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27586%3A%20CWE-755%3A%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20caddyserver%20caddy&amp;severity=high&amp;id=699e0f3cbe58cf853b290cf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27585-cwe-20-improper-input-validation-in-aa8fd750</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27585%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20caddyserver%20caddy&amp;severity=medium&amp;id=699e0f3cbe58cf853b290cee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27571-cwe-409-improper-handling-of-highly-87bdeb7f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27571%3A%20CWE-409%3A%20Improper%20Handling%20of%20Highly%20Compressed%20Data%20(Data%20Amplification)%20in%20nats-io%20nats-server&amp;severity=medium&amp;id=699e0f3cbe58cf853b290ce8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13776-cwe-798-use-of-hard-coded-credentia-9501fe87</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13776%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20TIK-SOFT%20Finka-FK&amp;severity=high&amp;id=699e0f3cbe58cf853b290ce4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47904-cwe-494-download-of-code-without-in-e960b4d6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47904%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20Microchip%20Time%20Provider%204100&amp;severity=medium&amp;id=699e0f3cbe58cf853b290cf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/arkanix-stealer-malware-disappears-shortly-after-d-1a307deb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%98Arkanix%20Stealer%E2%80%99%20Malware%20Disappears%20Shortly%20After%20Debut&amp;severity=medium&amp;id=699dc448be58cf853bf0ea31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27521-cwe-307-improper-restriction-of-exc-c078447a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27521%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Binardat%20Ltd.%2010G08-0800GSM%20Network%20Switch&amp;severity=medium&amp;id=699e0f3fbe58cf853b290d8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27520-cwe-312-cleartext-storage-of-sensit-09493c83</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27520%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Binardat%20Ltd.%2010G08-0800GSM%20Network%20Switch&amp;severity=high&amp;id=699e0f3fbe58cf853b290d88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27519-cwe-321-use-of-hard-coded-cryptogra-94d78496</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27519%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Binardat%20Ltd.%2010G08-0800GSM%20Network%20Switch&amp;severity=high&amp;id=699e0f3ebe58cf853b290d76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27518-cwe-352-cross-site-request-forgery--ddf83b1f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27518%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Binardat%20Ltd.%2010G08-0800GSM%20Network%20Switch&amp;severity=medium&amp;id=699e0f3ebe58cf853b290d71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27517-cwe-79-improper-neutralization-of-i-baeb6519</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27517%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Binardat%20Ltd.%2010G08-0800GSM%20Network%20Switch&amp;severity=medium&amp;id=699e0f3ebe58cf853b290d6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27516-cwe-201-insertion-of-sensitive-info-c7219ab3</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27516%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Binardat%20Ltd.%2010G08-0800GSM%20Network%20Switch&amp;severity=high&amp;id=699e0f3ebe58cf853b290d5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27515-cwe-330-use-of-insufficiently-rando-99761ece</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27515%3A%20CWE-330%20Use%20of%20Insufficiently%20Random%20Values%20in%20Binardat%20Ltd.%2010G08-0800GSM%20Network%20Switch&amp;severity=critical&amp;id=699e0f3ebe58cf853b290d57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27507-cwe-798-use-of-hard-coded-credentia-55a024a1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27507%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Binardat%20Ltd.%2010G08-0800GSM%20Network%20Switch&amp;severity=critical&amp;id=699e0f3ebe58cf853b290d53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23678-cwe-78-improper-neutralization-of-s-d736646c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23678%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Binardat%20Ltd.%2010G08-0800GSM%20Network%20Switch&amp;severity=high&amp;id=699e0f3ebe58cf853b290d4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27584-cwe-306-missing-authentication-for--1cea9ea4</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27584%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20actualbudget%20actual&amp;severity=critical&amp;id=699e0f3fbe58cf853b290da0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0402-cwe-125-out-of-bounds-read-in-sonicw-650941e7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0402%3A%20CWE-125%20Out-of-bounds%20Read%20in%20SonicWall%20SonicOS&amp;severity=medium&amp;id=699e0f3ebe58cf853b290d44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27732-cwe-918-server-side-request-forgery-664ae78b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27732%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=699e0f3fbe58cf853b290da4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0401-cwe-476-null-pointer-dereference-in--37b8ba10</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0401%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20SonicWall%20SonicOS&amp;severity=medium&amp;id=699e0f3cbe58cf853b290d02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0400-cwe-134-use-of-externally-controlled-8c81d50f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0400%3A%20CWE-134%20Use%20of%20Externally-Controlled%20Format%20String%20in%20SonicWall%20SonicOS&amp;severity=medium&amp;id=699e0f3cbe58cf853b290cff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27568-cwe-79-improper-neutralization-of-i-3872684f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27568%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=699e0f3fbe58cf853b290d9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0399-cwe-121-stack-based-buffer-overflow--a0c7be97</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0399%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20SonicWall%20SonicOS&amp;severity=medium&amp;id=699e0f3cbe58cf853b290cfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3102-os-command-injection-in-exiftool-3a183022</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3102%3A%20OS%20Command%20Injection%20in%20exiftool&amp;severity=medium&amp;id=699db9f0be58cf853be5ecac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3101-os-command-injection-in-intelbras-ti-e14b0379</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3101%3A%20OS%20Command%20Injection%20in%20Intelbras%20TIP%20635G&amp;severity=medium&amp;id=699db9f0be58cf853be5eca6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vmware-aria-operations-vulnerability-could-allow-r-1fe31f0a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VMware%20Aria%20Operations%20Vulnerability%20Could%20Allow%20Remote%20Code%20Execution&amp;severity=critical&amp;id=699db638be58cf853be39fe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27567-cwe-918-server-side-request-forgery-6aff0dba</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27567%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20payloadcms%20payload&amp;severity=medium&amp;id=699db9f0be58cf853be5eca1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10010-cwe-353-missing-support-for-integri-1ee3965a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10010%3A%20CWE-353%20Missing%20Support%20for%20Integrity%20Check%20in%20CPSD%20IT%20SERVICES%20GMBH%20CryptoPro%20Secure%20Disk%20for%20BitLocker&amp;severity=medium&amp;id=699e0f3fbe58cf853b290da9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27208-cwe-78-improper-neutralization-of-s-983562b3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27208%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20bleon-ethical%20api-gateway-deploy&amp;severity=critical&amp;id=699e0f3fbe58cf853b290dac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-sandwormmode-supply-chain-attack-hits-npm-0a6fbb0e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20%E2%80%98Sandworm_Mode%E2%80%99%20Supply%20Chain%20Attack%20Hits%20NPM&amp;severity=medium&amp;id=699dabadbe58cf853bd9ca32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2807-vulnerability-in-mozilla-firefox-7b7fdcd9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2807%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf72be58cf853bdde2c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2806-vulnerability-in-mozilla-firefox-4330b422</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2806%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf72be58cf853bdde2bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2805-vulnerability-in-mozilla-firefox-ad33e68e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2805%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf72be58cf853bdde2b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2804-vulnerability-in-mozilla-firefox-12858c36</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2804%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=699daf72be58cf853bdde2b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2803-vulnerability-in-mozilla-firefox-34cfc56c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2803%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf72be58cf853bdde2b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2802-vulnerability-in-mozilla-firefox-c2727259</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2802%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=699daf71be58cf853bdde278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2801-vulnerability-in-mozilla-firefox-c6bc2714</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2801%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf71be58cf853bdde274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2800-vulnerability-in-mozilla-firefox-f1e052df</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2800%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf71be58cf853bdde270</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2799-vulnerability-in-mozilla-firefox-e1242b75</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2799%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf71be58cf853bdde26c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2798-vulnerability-in-mozilla-firefox-fc6b6733</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2798%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf71be58cf853bdde268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2797-vulnerability-in-mozilla-firefox-21b1b9fa</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2797%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf71be58cf853bdde264</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2796-vulnerability-in-mozilla-firefox-e6fcc340</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2796%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf71be58cf853bdde260</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2795-vulnerability-in-mozilla-firefox-2510859e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2795%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf71be58cf853bdde25c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2794-vulnerability-in-mozilla-firefox-dec444fb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2794%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=699daf71be58cf853bdde258</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2634-vulnerability-in-mozilla-firefox-for-558bf208</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2634%3A%20Vulnerability%20in%20Mozilla%20Firefox%20for%20iOS&amp;severity=critical&amp;id=699daf6bbe58cf853bdddd68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2793-vulnerability-in-mozilla-firefox-9218e885</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2793%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf71be58cf853bdde252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2792-vulnerability-in-mozilla-firefox-88665c56</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2792%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf70be58cf853bdde234</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2791-vulnerability-in-mozilla-firefox-129224c8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2791%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf70be58cf853bdde22f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2790-vulnerability-in-mozilla-firefox-a2cce219</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2790%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf70be58cf853bdde22a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2789-vulnerability-in-mozilla-firefox-cd6165cf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2789%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf70be58cf853bdde224</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2788-vulnerability-in-mozilla-firefox-51148c31</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2788%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf70be58cf853bdde21e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2787-vulnerability-in-mozilla-firefox-99349e0d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2787%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf70be58cf853bdde218</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2786-vulnerability-in-mozilla-firefox-fb95e8e0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2786%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf70be58cf853bdde213</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2785-vulnerability-in-mozilla-firefox-6fc98356</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2785%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf70be58cf853bdde20e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2784-vulnerability-in-mozilla-firefox-b8ed28c0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2784%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf70be58cf853bdde209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2783-vulnerability-in-mozilla-firefox-9e492a9c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2783%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=699daf70be58cf853bdde204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2782-vulnerability-in-mozilla-firefox-961efa1e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2782%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf6fbe58cf853bdde1ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2781-vulnerability-in-mozilla-firefox-e3d3b895</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2781%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf6fbe58cf853bdde1e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2780-vulnerability-in-mozilla-firefox-67fb735b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2780%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf6fbe58cf853bdde1e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2779-vulnerability-in-mozilla-firefox-637601e6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2779%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6fbe58cf853bdde1de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2778-vulnerability-in-mozilla-firefox-a2efee7a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2778%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6fbe58cf853bdde1d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2777-vulnerability-in-mozilla-firefox-23a61c9a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2777%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6fbe58cf853bdde1d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2776-vulnerability-in-mozilla-firefox-aecaf008</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2776%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6fbe58cf853bdde1cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2775-vulnerability-in-mozilla-firefox-705fae87</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2775%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6fbe58cf853bdde1c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2774-vulnerability-in-mozilla-firefox-7a87e224</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2774%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf6fbe58cf853bdde1c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2773-vulnerability-in-mozilla-firefox-168ce6bf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2773%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6fbe58cf853bdde1ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2772-vulnerability-in-mozilla-firefox-2427429c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2772%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf6dbe58cf853bdde194</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2771-vulnerability-in-mozilla-firefox-b1c396b5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2771%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6dbe58cf853bdde18e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2770-vulnerability-in-mozilla-firefox-cdc3b286</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2770%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf6dbe58cf853bdde188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2769-vulnerability-in-mozilla-firefox-d07a057c</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2769%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf6dbe58cf853bdde182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2768-vulnerability-in-mozilla-firefox-22e282bf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2768%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6dbe58cf853bdde17d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2767-vulnerability-in-mozilla-firefox-8ddcd7e3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2767%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf6dbe58cf853bdde178</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2766-vulnerability-in-mozilla-firefox-cf3992e1</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2766%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6dbe58cf853bdde173</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2765-vulnerability-in-mozilla-firefox-21f8ff58</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2765%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6dbe58cf853bdde16e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2764-vulnerability-in-mozilla-firefox-f42df24a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2764%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6dbe58cf853bdde168</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2763-vulnerability-in-mozilla-firefox-f8a7d148</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2763%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6dbe58cf853bdde162</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2762-vulnerability-in-mozilla-firefox-9f81a8d1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2762%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6bbe58cf853bdddd8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2761-vulnerability-in-mozilla-firefox-31b382de</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2761%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6bbe58cf853bdddd84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2760-vulnerability-in-mozilla-firefox-ed19354d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2760%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6bbe58cf853bdddd7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2759-vulnerability-in-mozilla-firefox-44d5c550</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2759%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6bbe58cf853bdddd78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2758-vulnerability-in-mozilla-firefox-254a6777</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2758%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6bbe58cf853bdddd72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2757-vulnerability-in-mozilla-firefox-5913ed24</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2757%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6bbe58cf853bdddd6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2460-cwe-267-privilege-defined-with-unsaf-5f6cf7ac</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2460%3A%20CWE-267%20Privilege%20Defined%20with%20Unsafe%20Actions%20in%20Hitachi%20Energy%20Relion%20REB500&amp;severity=high&amp;id=699daf6bbe58cf853bdddd65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2459-cwe-267-privilege-defined-with-unsaf-7562341c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2459%3A%20CWE-267%20Privilege%20Defined%20with%20Unsafe%20Actions%20in%20Hitachi%20Energy%20Relion%20REB500&amp;severity=high&amp;id=699daf6bbe58cf853bdddd62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14577-cwe-306-missing-authentication-for--6857041d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14577%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Slican%20NCP&amp;severity=critical&amp;id=699daf6bbe58cf853bdddd5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1773-cwe-20-improper-input-validation-in--220535b9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1773%3A%20CWE-184%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20Hitachi%20Energy%20RTU500%20series%20CMU%20firmware&amp;severity=high&amp;id=699da85ebe58cf853bd63632</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1772-cwe-287-improper-authentication-in-h-849f1103</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1772%3A%20CWE-280%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Hitachi%20Energy%20RTU500%20series%20CMU%20firmware&amp;severity=medium&amp;id=699da85ebe58cf853bd6362f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23969-cwe-89-improper-neutralization-of-s-52e98444</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23969%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Superset&amp;severity=medium&amp;id=699da85ebe58cf853bd63635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23980-cwe-89-improper-neutralization-of-s-641d36bb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23980%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Superset&amp;severity=medium&amp;id=699da85ebe58cf853bd63638</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23982-cwe-863-incorrect-authorization-in--16335c07</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23982%3A%20CWE-863%20Incorrect%20Authorization%20in%20Apache%20Software%20Foundation%20Apache%20Superset&amp;severity=high&amp;id=699da85ebe58cf853bd6363b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23983-cwe-200-exposure-of-sensitive-infor-28a635f8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23983%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Apache%20Software%20Foundation%20Apache%20Superset&amp;severity=low&amp;id=699da85ebe58cf853bd6363e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23984-cwe-863-incorrect-authorization-in--27e36bda</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23984%3A%20CWE-863%20Incorrect%20Authorization%20in%20Apache%20Software%20Foundation%20Apache%20Superset&amp;severity=high&amp;id=699da85ebe58cf853bd63641</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-lazarus-group-now-working-with-medusa-e96d15e3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20Lazarus%20Group%20Now%20Working%20With%20Medusa%20Ransomware&amp;severity=medium&amp;id=699e0e19be58cf853b27f362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/github-issues-abused-in-copilot-attack-leading-to--1f686409</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GitHub%20Issues%20Abused%20in%20Copilot%20Attack%20Leading%20to%20Repository%20Takeover&amp;severity=medium&amp;id=699d9a19be58cf853bcbde28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/taiwan-security-firm-confirms-flaw-flagged-by-cisa-09d184a7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Taiwan%20Security%20Firm%20Confirms%20Flaw%20Flagged%20by%20CISA%20Likely%20Exploited%20by%20Chinese%20APTs&amp;severity=medium&amp;id=699d9310be58cf853bc6f17d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27555-cwe-201-insertion-of-sensitive-info-4a1ea050</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27555%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=medium&amp;id=699d7ab4be58cf853bad4712</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2664-cwe-125-out-of-bounds-read-in-docker-0cedbcfc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2664%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Docker%20Docker%20Desktop&amp;severity=medium&amp;id=699d7ab4be58cf853bad4716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56373-cwe-94-improper-control-of-generati-6e419591</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56373%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=high&amp;id=699d7ab4be58cf853bad470e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/anonymous-fnix-members-arrested-in-spain-e869e34a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Anonymous%20F%C3%A9nix%20Members%20Arrested%20in%20Spain&amp;severity=medium&amp;id=699d7a75be58cf853bace567</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1524-cwe-290-authentication-bypass-by-spo-45d10e8f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1524%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20WSO2%20WSO2%20API%20Manager&amp;severity=high&amp;id=699d6c99be58cf853b9c9dbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/four-malicious-nuget-packages-target-aspnet-develo-3558d828</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Four%20Malicious%20NuGet%20Packages%20Target%20ASP.NET%20Developers%20With%20JIT%20Hooking%20and%20Credential%20Exfiltration&amp;severity=medium&amp;id=699d68e0be58cf853b9798dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1229-cwe-682-incorrect-calculation-in-clo-52f8a557</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1229%3A%20CWE-682%20Incorrect%20Calculation%20in%20Cloudflare%20CIRCL&amp;severity=low&amp;id=699e0f3fbe58cf853b290d94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40541-cwe-704-incorrect-type-conversion-o-153e8f0e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40541%3A%20CWE-704%20Incorrect%20Type%20Conversion%20or%20Cast%20in%20SolarWinds%20Serv-U&amp;severity=critical&amp;id=699e0f3fbe58cf853b290d90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40540-cwe-704-incorrect-type-conversion-o-393839b7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40540%3A%20CWE-704%20Incorrect%20Type%20Conversion%20or%20Cast%20in%20SolarWinds%20Serv-U&amp;severity=critical&amp;id=699d5781be58cf853b851ce5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40539-cwe-704-incorrect-type-conversion-o-7631618c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40539%3A%20CWE-704%20Incorrect%20Type%20Conversion%20or%20Cast%20in%20SolarWinds%20Serv-U&amp;severity=critical&amp;id=699d5781be58cf853b851ce1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40538-cwe-269-improper-privilege-manageme-e66e0c99</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40538%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20SolarWinds%20Serv-U&amp;severity=critical&amp;id=699d5781be58cf853b851cdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15386-cwe-79-cross-site-scripting-xss-in--43bb529b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15386%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Responsive%20Lightbox%20%26%20Gallery&amp;severity=high&amp;id=699d4271be58cf853b689cc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15589-path-traversal-in-muyucms-df4dace0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15589%3A%20Path%20Traversal%20in%20MuYuCMS&amp;severity=medium&amp;id=699d4271be58cf853b689cc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24314-cwe-497-exposure-of-sensitive-syste-37035500</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24314%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20SAP_SE%20S%2F4HANA%20(Manage%20Payment%20Media)&amp;severity=medium&amp;id=699d3b61be58cf853b5fc3e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3070-cross-site-scripting-in-sourcecodest-3e0ce52e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3070%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Modern%20Image%20Gallery%20App&amp;severity=medium&amp;id=699d347abe58cf853b589ce0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3069-sql-injection-in-itsourcecode-docume-630afbd9</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3069%3A%20SQL%20Injection%20in%20itsourcecode%20Document%20Management%20System&amp;severity=medium&amp;id=699d29efbe58cf853b4f36be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3068-sql-injection-in-itsourcecode-docume-9b86d381</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3068%3A%20SQL%20Injection%20in%20itsourcecode%20Document%20Management%20System&amp;severity=medium&amp;id=699d1f63be58cf853b2dec7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3067-path-traversal-in-hummerrisk-3ded3089</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3067%3A%20Path%20Traversal%20in%20HummerRisk&amp;severity=medium&amp;id=699d1f63be58cf853b2dec75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3066-command-injection-in-hummerrisk-8f2007d1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3066%3A%20Command%20Injection%20in%20HummerRisk&amp;severity=medium&amp;id=699d1f63be58cf853b2dec6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1459-cwe-78-improper-neutralization-of-sp-f412c512</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1459%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Zyxel%20VMG3625-T50B%20firmware&amp;severity=high&amp;id=699d14d6be58cf853b182c26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27129-cwe-918-server-side-request-forgery-bfb112ef</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27129%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20craftcms%20cms&amp;severity=medium&amp;id=699d14d8be58cf853b182c4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27128-cwe-367-time-of-check-time-of-use-t-c9b0d5dd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27128%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20craftcms%20cms&amp;severity=medium&amp;id=699d14d6be58cf853b182c3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27127-cwe-367-time-of-check-time-of-use-t-5842a733</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27127%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20craftcms%20cms&amp;severity=high&amp;id=699d14d6be58cf853b182c37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13943-cwe-78-improper-neutralization-of-s-420a90c3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13943%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Zyxel%20EX3301-T0%20firmware&amp;severity=high&amp;id=699d14d6be58cf853b182c23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13942-cwe-78-improper-neutralization-of-s-dbc807d4</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13942%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Zyxel%20EX3510-B0%20firmware&amp;severity=critical&amp;id=699d14d6be58cf853b182c20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3065-command-injection-in-hummerrisk-ca310b2d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3065%3A%20Command%20Injection%20in%20HummerRisk&amp;severity=medium&amp;id=699d14d8be58cf853b182c65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3064-command-injection-in-hummerrisk-b16e562e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3064%3A%20Command%20Injection%20in%20HummerRisk&amp;severity=medium&amp;id=699d14d8be58cf853b182c5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3091-uncontrolled-search-path-element-in--0806b6af</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3091%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Synology%20Synology%20Presto%20Client&amp;severity=medium&amp;id=699d14d8be58cf853b182c6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27126-cwe-79-improper-neutralization-of-i-eb6f17da</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27126%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20cms&amp;severity=medium&amp;id=699d14d6be58cf853b182c33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26981-cwe-195-signed-to-unsigned-conversi-204c3c44</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26981%3A%20CWE-195%3A%20Signed%20to%20Unsigned%20Conversion%20Error%20in%20AcademySoftwareFoundation%20openexr&amp;severity=medium&amp;id=699d14d6be58cf853b182c2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11848-cwe-476-null-pointer-dereference-in-105c946a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11848%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Zyxel%20VMG3625-T50B%20firmware&amp;severity=medium&amp;id=699d14d6be58cf853b182c1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11847-cwe-476-null-pointer-dereference-in-ff3f069c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11847%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Zyxel%20VMG3625-T50B%20firmware&amp;severity=medium&amp;id=699d14d6be58cf853b182c1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26198-cwe-89-improper-neutralization-of-s-7460e41f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26198%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20collerek%20ormar&amp;severity=critical&amp;id=699d14d6be58cf853b182c29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3057-sql-injection-in-a54552239-pearproje-adecca21</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3057%3A%20SQL%20Injection%20in%20a54552239%20pearProjectApi&amp;severity=medium&amp;id=699d14d8be58cf853b182c58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3054-cross-site-scripting-in-alinto-sogo-403be324</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3054%3A%20Cross%20Site%20Scripting%20in%20Alinto%20SOGo&amp;severity=medium&amp;id=699d14d8be58cf853b182c53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11846-cwe-476-null-pointer-dereference-in-3381f5d9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11846%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Zyxel%20VMG3625-T50B%20firmware&amp;severity=medium&amp;id=699d06cabe58cf853b07ca60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3053-missing-authentication-in-datalinkdc-e60a8a1f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3053%3A%20Missing%20Authentication%20in%20DataLinkDC%20dinky&amp;severity=medium&amp;id=699d06cabe58cf853b07ca6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3052-server-side-request-forgery-in-datal-340d6c23</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3052%3A%20Server-Side%20Request%20Forgery%20in%20DataLinkDC%20dinky&amp;severity=medium&amp;id=699d06cabe58cf853b07ca63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11845-cwe-476-null-pointer-dereference-in-bbab33dc</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11845%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Zyxel%20VMG3625-T50B%20firmware&amp;severity=medium&amp;id=699d06cabe58cf853b07ca5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3051-path-traversal-in-datalinkdc-dinky-173f35b8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3051%3A%20Path%20Traversal%20in%20DataLinkDC%20dinky&amp;severity=medium&amp;id=699cfc3cbe58cf853bfd2f5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3050-cross-site-scripting-in-horilla-open-fd660903</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3050%3A%20Cross%20Site%20Scripting%20in%20horilla-opensource%20horilla&amp;severity=medium&amp;id=699cfc3cbe58cf853bfd2f57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27729-cwe-770-allocation-of-resources-wit-e5a15975</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27729%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20withastro%20astro&amp;severity=medium&amp;id=699cfc3cbe58cf853bfd2f51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25802-cwe-79-improper-neutralization-of-i-48d25c61</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25802%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20QuantumNous%20new-api&amp;severity=high&amp;id=699cfc3cbe58cf853bfd2f4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25591-cwe-943-improper-neutralization-of--2ce4358a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25591%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20QuantumNous%20new-api&amp;severity=high&amp;id=699cfc3cbe58cf853bfd2f48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25545-cwe-918-server-side-request-forgery-da1603da</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25545%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20withastro%20astro&amp;severity=medium&amp;id=699cf533be58cf853bf604dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3049-open-redirect-in-horilla-opensource--27a936b1</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3049%3A%20Open%20Redirect%20in%20horilla-opensource%20horilla&amp;severity=medium&amp;id=699cf534be58cf853bf60511</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3046-sql-injection-in-itsourcecode-e-logb-a4efe6dc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3046%3A%20SQL%20Injection%20in%20itsourcecode%20E-Logbook%20with%20Health%20Monitoring%20System%20for%20COVID-19&amp;severity=medium&amp;id=699cf533be58cf853bf604f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21864-cwe-20-improper-input-validation-in-7c8ea75e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21864%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20valkey-io%20valkey-bloom&amp;severity=medium&amp;id=699cf533be58cf853bf604d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27643-cwe-209-generation-of-error-message-2622d2b5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27643%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20free5gc%20udr&amp;severity=medium&amp;id=699cf533be58cf853bf604ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27642-cwe-20-improper-input-validation-in-be522119</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27642%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20free5gc%20udm&amp;severity=medium&amp;id=699cf533be58cf853bf604e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26025-cwe-476-null-pointer-dereference-in-3b4027a1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26025%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20free5gc%20smf&amp;severity=medium&amp;id=699cf533be58cf853bf604e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26024-cwe-476-null-pointer-dereference-in-e26d8b24</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26024%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20free5gc%20smf&amp;severity=medium&amp;id=699cf533be58cf853bf604e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25501-cwe-476-null-pointer-dereference-in-1f72e97a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25501%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20free5gc%20smf&amp;severity=medium&amp;id=699cf533be58cf853bf604d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9120-cwe-94-improper-control-of-generatio-9ed3eff4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9120%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20OpenText%E2%84%A2%20Carbonite%20Safe%20Server%20Backup&amp;severity=high&amp;id=699cf533be58cf853bf604d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69253-cwe-209-generation-of-error-message-d29135ec</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69253%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20free5gc%20udr&amp;severity=medium&amp;id=699cf533be58cf853bf604cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-24-e8f8d164</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-24&amp;severity=medium&amp;id=699e3dfab7ef31ef0b77ae66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67445-na-faa393bc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67445%3A%20n%2Fa&amp;severity=medium&amp;id=699e0f3fbe58cf853b290d97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69985-na-4f2ec836</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69985%3A%20n%2Fa&amp;severity=critical&amp;id=699e0f3ebe58cf853b290d4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63409-na-7f1dcd5e</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63409%3A%20n%2Fa&amp;severity=high&amp;id=699e0f3ebe58cf853b290d47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-02-24-3a80d607</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-02-24&amp;severity=medium&amp;id=699dd95dbe58cf853b0239a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-24-21d76c33</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-24&amp;severity=low&amp;id=699d4cbebe58cf853b76a245</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69252-cwe-476-null-pointer-dereference-in-80fd7d12</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69252%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20free5gc%20udm&amp;severity=medium&amp;id=699cee30be58cf853bef4e71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58041-cwe-338-use-of-cryptographically-we-a78c8e9e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58041%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20WONKO%20Smolder&amp;severity=critical&amp;id=699cee30be58cf853bef4e64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69251-cwe-20-improper-input-validation-in-196cf2df</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69251%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20free5gc%20udm&amp;severity=medium&amp;id=699cee30be58cf853bef4e6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69250-cwe-754-improper-check-for-unusual--3c39503e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69250%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20free5gc%20udm&amp;severity=medium&amp;id=699ceab4be58cf853bdfbf54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3044-stack-based-buffer-overflow-in-tenda-c3428cc0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3044%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC8&amp;severity=high&amp;id=699ce723be58cf853bdd38db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3043-cross-site-scripting-in-itsourcecode-9b765d7c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3043%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20Event%20Management%20System&amp;severity=medium&amp;id=699ce39fbe58cf853bdb3eb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3042-sql-injection-in-itsourcecode-event--cdf5b04f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3042%3A%20SQL%20Injection%20in%20itsourcecode%20Event%20Management%20System&amp;severity=medium&amp;id=699ce39fbe58cf853bdb3eb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-openclaw-skills-used-to-distribute-atomi-1ab81aed</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20OpenClaw%20Skills%20Used%20to%20Distribute%20Atomic%20MacOS%20Stealer&amp;severity=medium&amp;id=699d68e0be58cf853b9798e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21665-vulnerability-in-fiserv-originate-l-7a298a26</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21665%3A%20Vulnerability%20in%20Fiserv%20Originate%20Loans%20Peripherals%20(formerly%20Velocity%20Services)%20--%20Print%20Service%20component&amp;severity=high&amp;id=699cd8f4be58cf853bd429b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3063-inappropriate-implementation-in-goog-4f7bfd85</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3063%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=699cd56ebe58cf853bd2d6a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3062-out-of-bounds-read-and-write-in-goog-9826ac8a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3062%3A%20Out%20of%20bounds%20read%20and%20write%20in%20Google%20Chrome&amp;severity=high&amp;id=699cd56ebe58cf853bd2d69c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3061-out-of-bounds-read-in-google-chrome-0054353c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3061%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=high&amp;id=699cd56ebe58cf853bd2d698</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3041-cross-site-scripting-in-xingfuggz-ba-5f6e055c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3041%3A%20Cross%20Site%20Scripting%20in%20xingfuggz%20BaykeShop&amp;severity=medium&amp;id=699cd1ebbe58cf853bd0c5a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3040-os-command-injection-in-draytek-vigo-57c5d6ef</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3040%3A%20OS%20Command%20Injection%20in%20DrayTek%20Vigor%20300B&amp;severity=medium&amp;id=699cd1ebbe58cf853bd0c5a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69248-cwe-129-improper-validation-of-arra-5330a8bd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69248%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20free5gc%20amf&amp;severity=medium&amp;id=699ccae3be58cf853bccd9f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69247-cwe-122-heap-based-buffer-overflow--08fe6e18</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69247%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20free5gc%20go-upf&amp;severity=low&amp;id=699ccae3be58cf853bccd9f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3028-cross-site-scripting-in-erzhongxmu-j-8e46de0b</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3028%3A%20Cross%20Site%20Scripting%20in%20erzhongxmu%20JEEWMS&amp;severity=medium&amp;id=699ccae3be58cf853bccda00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69232-cwe-20-improper-input-validation-in-8b0905ae</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69232%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20free5gc%20go-upf&amp;severity=low&amp;id=699ccae3be58cf853bccd9ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69208-cwe-209-generation-of-error-message-4967da13</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69208%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20free5gc%20udr&amp;severity=low&amp;id=699cc75ebe58cf853bcb5ec0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3027-cross-site-scripting-in-erzhongxmu-j-0bf04477</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3027%3A%20Cross%20Site%20Scripting%20in%20erzhongxmu%20JEEWMS&amp;severity=medium&amp;id=699cc3dbbe58cf853bc8ee23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3075-exposure-of-sensitive-system-informa-6b46d1ac</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3075%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Jeff%20Starr%20Simple%20Ajax%20Chat&amp;severity=medium&amp;id=699cc3dbbe58cf853bc8ee29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23693-cwe-306-missing-authentication-for--873ad830</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23693%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Roxnor%20ElementsKit%20Elementor%20Addons%20%E2%80%93%20Advanced%20Widgets%20%26%20Templates%20Addons%20for%20Elementor&amp;severity=critical&amp;id=699cee30be58cf853bef4e7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23694-cwe-352-cross-site-request-forgery--43b258cd</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23694%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Aruba.it%20Aruba%20HiSpeed%20Cache&amp;severity=medium&amp;id=699cee30be58cf853bef4e81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3026-server-side-request-forgery-in-erzho-9622fd01</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3026%3A%20Server-Side%20Request%20Forgery%20in%20erzhongxmu%20JEEWMS&amp;severity=medium&amp;id=699cbd8cbe58cf853bc4b3bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3025-unrestricted-upload-in-shuoren-smart-03a84ad2</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3025%3A%20Unrestricted%20Upload%20in%20ShuoRen%20Smart%20Heating%20Integrated%20Management%20Platform&amp;severity=medium&amp;id=699cbd8cbe58cf853bc4b3b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27623-cwe-20-improper-input-validation-in-08357453</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27623%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20valkey-io%20valkey&amp;severity=high&amp;id=699cbd8cbe58cf853bc4b3f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21863-cwe-125-out-of-bounds-read-in-valke-7a33c1e6</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21863%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20valkey-io%20valkey&amp;severity=high&amp;id=699cbd8cbe58cf853bc4b3eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67733-cwe-74-improper-neutralization-of-s-dcc8bdf1</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67733%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20valkey-io%20valkey&amp;severity=high&amp;id=699cbd8cbe58cf853bc4b3d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2698-cwe-639-authorization-bypass-through-2795e5b8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2698%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Tenable%20Security%20Center&amp;severity=medium&amp;id=699c852abe58cf853ba9853b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27514-cwe-201-insertion-of-sensitive-info-a2b48227</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27514%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20Tenda%20F3&amp;severity=high&amp;id=699c852abe58cf853ba98537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27513-cwe-352-cross-site-request-forgery--75243c1a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27513%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20Tenda%20F3&amp;severity=medium&amp;id=699c852abe58cf853ba98533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27512-cwe-79-improper-neutralization-of-i-a19304cd</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27512%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20Tenda%20F3&amp;severity=medium&amp;id=699c852abe58cf853ba9852f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27511-cwe-1021-improper-restriction-of-re-64ef0ade</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27511%3A%20CWE-1021%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20Tenda%20F3&amp;severity=medium&amp;id=699c852abe58cf853ba9852b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22567-cwe-20-improper-input-validation-in-63d0c936</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22567%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Zscaler%20ZIA%20Admin%20UI&amp;severity=high&amp;id=699cbd8cbe58cf853bc4b462</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22568-cwe-20-improper-input-validation-in-14777d68</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22568%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Zscaler%20ZIA%20Admin%20UI&amp;severity=medium&amp;id=699cbd8cbe58cf853bc4b465</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14905-heap-based-buffer-overflow-in-red-h-35910148</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14905%3A%20Heap-based%20Buffer%20Overflow%20in%20Red%20Hat%20Red%20Hat%20Directory%20Server%2011.5%20E4S%20for%20RHEL%208&amp;severity=high&amp;id=699c7b9bbe58cf853ba52827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-healthcare-diagnostic-firm-says-140000-affected-8cf2ff6f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Healthcare%20Diagnostic%20Firm%20Says%20140%2C000%20Affected%20by%20Data%20Breach&amp;severity=medium&amp;id=699c7451be58cf853ba092b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/2025-the-untold-stories-of-check-point-research-ca2e7873</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=2025%3A%20The%20Untold%20Stories%20of%20Check%20Point%20Research&amp;severity=high&amp;id=699c74cbbe58cf853ba0e606</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2697-cwe-639-authorization-bypass-through-2cdeceab</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2697%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Tenable%20Security%20Center&amp;severity=medium&amp;id=699cbd8ebe58cf853bc4b505</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3016-buffer-overflow-in-utt-hiper-810g-d2bb40c6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3016%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20810G&amp;severity=high&amp;id=699c7b9bbe58cf853ba52830</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-huorong-security-site-infects-users-with-vall-431a5b9a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Huorong%20security%20site%20infects%20users%20with%20ValleyRAT&amp;severity=medium&amp;id=699cdc61be58cf853bd5eac3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3015-buffer-overflow-in-utt-hiper-810g-03f10e33</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3015%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20810G&amp;severity=high&amp;id=699cbd8cbe58cf853bc4b468</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/another-day-another-malicious-jpeg-mon-feb-23rd-e56dc9d4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Another%20day%2C%20another%20malicious%20JPEG%2C%20(Mon%2C%20Feb%2023rd)&amp;severity=medium&amp;id=699c5811be58cf853b908718</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21420-cwe-427-uncontrolled-search-path-el-d39a8b17</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21420%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Dell%20Repository%20Manager&amp;severity=high&amp;id=699c625dbe58cf853b95454c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ukrainian-gets-5-years-in-us-prison-for-aiding-nor-3773a458</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ukrainian%20Gets%205%20Years%20in%20US%20Prison%20for%20Aiding%20North%20Korean%20IT%20Fraud&amp;severity=low&amp;id=699c5babbe58cf853b9201f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/autonomous-ai-agents-provide-new-class-of-supply-c-5fa92ec8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Autonomous%20AI%20Agents%20Provide%20New%20Class%20of%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=699c48adbe58cf853b83ceca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/romanian-hacker-pleads-guilty-to-selling-access-to-a925b71f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Romanian%20Hacker%20Pleads%20Guilty%20to%20Selling%20Access%20to%20US%20State%20Network&amp;severity=medium&amp;id=699c41d8be58cf853b80437c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hundreds-of-fortigate-firewalls-hacked-in-ai-power-9152681d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hundreds%20of%20FortiGate%20Firewalls%20Hacked%20in%20AI-Powered%20Attacks%3A%20AWS&amp;severity=medium&amp;id=699c3f2ebe58cf853b7ecfba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59873-vulnerability-in-hcl-software-zie-f-4e64c827</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59873%3A%20Vulnerability%20in%20HCL%20Software%20ZIE%20for%20Web&amp;severity=medium&amp;id=699c33c0be58cf853b7818c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/recent-roundcube-webmail-vulnerability-exploited-i-f1f3083a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Recent%20RoundCube%20Webmail%20Vulnerability%20Exploited%20in%20Attacks&amp;severity=medium&amp;id=699c3380be58cf853b77f148</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2985-server-side-request-forgery-in-tiand-d99c179a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2985%3A%20Server-Side%20Request%20Forgery%20in%20Tiandy%20Video%20Surveillance%20System%20%E8%A7%86%E9%A2%91%E7%9B%91%E6%8E%A7%E5%B9%B3%E5%8F%B0&amp;severity=medium&amp;id=699c3035be58cf853b75f0fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mississippi-hospital-system-closes-all-clinics-aft-12980cb9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mississippi%20Hospital%20System%20Closes%20All%20Clinics%20After%20Ransomware%20Attack&amp;severity=medium&amp;id=699c2c78be58cf853b742b34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40701-cwe-79-improper-neutralization-of-i-a0c042b4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40701%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20SOTE%20SOTESHOP&amp;severity=medium&amp;id=699c3035be58cf853b75f0fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-olalampo-inside-muddywaters-latest-campa-56d8b12a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Olalampo%3A%20Inside%20MuddyWater&apos;s%20Latest%20Campaign&amp;severity=medium&amp;id=699c28f3be58cf853b724307</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sandwormmode-shai-hulud-style-npm-worm-hijacks-ci--970e0fb3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SANDWORM_MODE%3A%20Shai-Hulud-Style%20npm%20Worm%20Hijacks%20CI%20Workflows%20and%20Poisons%20AI%20Toolchains&amp;severity=medium&amp;id=699c28f3be58cf853b72434e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2984-denial-of-service-in-sourcecodester--85191ae6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2984%3A%20Denial%20of%20Service%20in%20SourceCodester%20Student%20Result%20Management%20System&amp;severity=medium&amp;id=699c2930be58cf853b7275d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chronology-of-muddywater-apt-attacks-targeting-the-33954b79</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chronology%20of%20MuddyWater%20APT%20Attacks%20Targeting%20the%20Middle%20East&amp;severity=medium&amp;id=699c256fbe58cf853b6f4a7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2983-improper-access-controls-in-sourceco-8f46df55</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2983%3A%20Improper%20Access%20Controls%20in%20SourceCodester%20Student%20Result%20Management%20System&amp;severity=medium&amp;id=699c25a9be58cf853b6f8c78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41002-cwe-89-improper-neutralization-of-s-7d1e6964</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41002%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20MANANTIAL%20DE%20IDEAS%20Infoticketing&amp;severity=critical&amp;id=699c25a9be58cf853b6f8c75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/paypal-data-breach-led-to-fraudulent-transactions-0fd4c8b2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PayPal%20Data%20Breach%20Led%20to%20Fraudulent%20Transactions&amp;severity=medium&amp;id=699c1ae4be58cf853b65d710</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2981-buffer-overflow-in-utt-hiper-810g-ebbad869</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2981%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20810G&amp;severity=high&amp;id=699c1b36be58cf853b6616ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/23rd-february-threat-intelligence-report-fb0a35b7</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=23rd%20February%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=699cec45be58cf853be40e74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25747-cwe-502-deserialization-of-untruste-ad77e0d8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25747%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Camel%20LevelDB&amp;severity=high&amp;id=699c1b36be58cf853b6616a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23552-cwe-346-origin-validation-error-in--099c72c7</loc>
    <lastmod>2026-04-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23552%3A%20CWE-346%20Origin%20Validation%20Error%20in%20Apache%20Software%20Foundation%20Apache%20Camel&amp;severity=critical&amp;id=699c1b36be58cf853b6616a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2980-buffer-overflow-in-utt-hiper-810g-30621ae4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2980%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20810G&amp;severity=high&amp;id=699c1416be58cf853b60d4cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2979-unrestricted-upload-in-fastapiadmin-06d9cf68</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2979%3A%20Unrestricted%20Upload%20in%20FastApiAdmin&amp;severity=medium&amp;id=699c1094be58cf853b5f1afa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2978-unrestricted-upload-in-fastapiadmin-ddf67fcc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2978%3A%20Unrestricted%20Upload%20in%20FastApiAdmin&amp;severity=medium&amp;id=699c0601be58cf853b557229</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2977-unrestricted-upload-in-fastapiadmin-d14e9069</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2977%3A%20Unrestricted%20Upload%20in%20FastApiAdmin&amp;severity=medium&amp;id=699c027dbe58cf853b5217e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1367-cwe-89-improper-neutralization-of-sp-dbb8032b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1367%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Zohocorp%20ManageEngine%20ADSelfService%20Plus&amp;severity=high&amp;id=699c027dbe58cf853b5217e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2976-information-disclosure-in-fastapiadm-86338872</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2976%3A%20Information%20Disclosure%20in%20FastApiAdmin&amp;severity=medium&amp;id=699bfb74be58cf853b4ca3ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2975-information-disclosure-in-fastapiadm-e687242b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2975%3A%20Information%20Disclosure%20in%20FastApiAdmin&amp;severity=medium&amp;id=699bf46dbe58cf853b4576f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2974-exposure-of-backup-file-to-an-unauth-cd87fe58</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2974%3A%20Exposure%20of%20Backup%20File%20to%20an%20Unauthorized%20Control%20Sphere%20in%20AliasVault%20App&amp;severity=low&amp;id=699bed72be58cf853b3d54c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2972-cross-site-scripting-in-a466350665-s-53a6567b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2972%3A%20Cross%20Site%20Scripting%20in%20a466350665%20Smart-SSO&amp;severity=medium&amp;id=699c5bedbe58cf853b920fc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2971-cross-site-scripting-in-a466350665-s-22186f60</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2971%3A%20Cross%20Site%20Scripting%20in%20a466350665%20Smart-SSO&amp;severity=medium&amp;id=699bdf53be58cf853b335276</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2970-deserialization-in-datapizza-labs-da-52f20926</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2970%3A%20Deserialization%20in%20datapizza-labs%20datapizza-ai&amp;severity=low&amp;id=699bd4c9be58cf853b2b9049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2969-improper-neutralization-of-special-e-6d54c976</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2969%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20datapizza-labs%20datapizza-ai&amp;severity=medium&amp;id=699bd4c9be58cf853b2b9042</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2968-improper-verification-of-cryptograph-cb146a79</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2968%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Cesanta%20Mongoose&amp;severity=medium&amp;id=699bca3ebe58cf853b0516da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2998-cwe-426-untrusted-search-path-in-eai-2fea061f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2998%3A%20CWE-426%20Untrusted%20Search%20Path%20in%20eAI%20Technologies%20ERP%20F2&amp;severity=high&amp;id=699bca3ebe58cf853b0516e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2967-improper-verification-of-source-of-a-57b8c69e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2967%3A%20Improper%20Verification%20of%20Source%20of%20a%20Communication%20Channel%20in%20Cesanta%20Mongoose&amp;severity=medium&amp;id=699bca3ebe58cf853b0516d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2966-insufficiently-random-values-in-cesa-e29cea84</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2966%3A%20Insufficiently%20Random%20Values%20in%20Cesanta%20Mongoose&amp;severity=medium&amp;id=699bbc2cbe58cf853bf32018</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2997-cwe-639-authorization-bypass-through-f3504232</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2997%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20WisdomGarden%20Tronclass&amp;severity=medium&amp;id=699bbc2cbe58cf853bf3201f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2965-cross-site-scripting-in-07flycms-9d8672b7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2965%3A%20Cross%20Site%20Scripting%20in%2007FLYCMS&amp;severity=medium&amp;id=699bbc2cbe58cf853bf32012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24494-cwe-89-improper-neutralization-of-s-fae4075c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24494%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Order%20Up%20Online%20Ordering%20System&amp;severity=critical&amp;id=699bae1dbe58cf853be51a23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2964-improperly-controlled-modification-o-1db41d02</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2964%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20in%20higuma%20web-audio-recorder-js&amp;severity=low&amp;id=699bae1dbe58cf853be51a26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2963-sql-injection-in-jinher-oa-c6-9c9c2ebe</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2963%3A%20SQL%20Injection%20in%20Jinher%20OA%20C6&amp;severity=medium&amp;id=699ba713be58cf853bda304f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2962-stack-based-buffer-overflow-in-d-lin-37c3a76b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2962%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699ba713be58cf853bda3048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2961-stack-based-buffer-overflow-in-d-lin-722e4783</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2961%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699ba00cbe58cf853bd054b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2960-stack-based-buffer-overflow-in-d-lin-29b3b35d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2960%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699ba00cbe58cf853bd054ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71056-na-32de5bd1</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71056%3A%20n%2Fa&amp;severity=high&amp;id=699cee30be58cf853bef4e77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-23-1e99d923</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-23&amp;severity=medium&amp;id=699cebebbe58cf853be165c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70045-na-e43003f6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70045%3A%20n%2Fa&amp;severity=high&amp;id=699cbd8ebe58cf853bc4b508</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70044-na-ecdebec6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70044%3A%20n%2Fa&amp;severity=medium&amp;id=699cbd8ebe58cf853bc4b500</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70043-na-753ec698</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70043%3A%20n%2Fa&amp;severity=critical&amp;id=699cbd8cbe58cf853bc4b489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61146-na-c537bae5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61146%3A%20n%2Fa&amp;severity=medium&amp;id=699cbd8cbe58cf853bc4b484</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61145-na-b8ca930f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61145%3A%20n%2Fa&amp;severity=medium&amp;id=699cbd8cbe58cf853bc4b47f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61144-na-a864084d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61144%3A%20n%2Fa&amp;severity=critical&amp;id=699cbd8cbe58cf853bc4b478</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61143-na-6d6fd10d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61143%3A%20n%2Fa&amp;severity=medium&amp;id=699cbd8cbe58cf853bc4b473</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26464-na-9c4ae060</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26464%3A%20n%2Fa&amp;severity=medium&amp;id=699cbd8cbe58cf853bc4b46f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61147-na-7a270c4f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61147%3A%20n%2Fa&amp;severity=medium&amp;id=699cbd8cbe58cf853bc4b45d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63946-na-a5435ae2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63946%3A%20n%2Fa&amp;severity=high&amp;id=699cbd8cbe58cf853bc4b41b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63945-na-2233fd7d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63945%3A%20n%2Fa&amp;severity=high&amp;id=699cbd8cbe58cf853bc4b40c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70329-na-e700a716</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70329%3A%20n%2Fa&amp;severity=high&amp;id=699cbd8cbe58cf853bc4b404</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70328-na-5c36c839</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70328%3A%20n%2Fa&amp;severity=high&amp;id=699cbd8cbe58cf853bc4b3ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70327-na-d22f971f</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70327%3A%20n%2Fa&amp;severity=critical&amp;id=699cbd8cbe58cf853bc4b3a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-02-23-50f3ad29</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-02-23&amp;severity=medium&amp;id=699cbc9bbe58cf853bc24344</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70058-na-32d6ca8c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70058%3A%20n%2Fa&amp;severity=high&amp;id=699c7b9bbe58cf853ba5282b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69700-na-5de56747</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69700%3A%20n%2Fa&amp;severity=high&amp;id=699c625dbe58cf853b954549</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-23-f5ab6aae</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-23&amp;severity=low&amp;id=699c2ff9be58cf853b75cfa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26365-cwe-444-inconsistent-interpretation-96fb7f75</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26365%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Akamai%20Ghost&amp;severity=medium&amp;id=699c1094be58cf853b5f1af7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2959-stack-based-buffer-overflow-in-d-lin-54cc012d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2959%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699b9581be58cf853bc3dfaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2958-stack-based-buffer-overflow-in-d-lin-bf6778d2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2958%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699b9581be58cf853bc3dfa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2588-cwe-190-integer-overflow-or-wraparou-4f2a3d33</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2588%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20TIMLEGGE%20Crypt%3A%3ANaCl%3A%3ASodium&amp;severity=critical&amp;id=699b9581be58cf853bc3df9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2957-denial-of-service-in-qinming99-dst-a-0aef73fb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2957%3A%20Denial%20of%20Service%20in%20qinming99%20dst-admin&amp;severity=medium&amp;id=699b8e79be58cf853bbd6216</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2956-command-injection-in-qinming99-dst-a-1c74e846</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2956%3A%20Command%20Injection%20in%20qinming99%20dst-admin&amp;severity=medium&amp;id=699b8069be58cf853bb3c827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2954-injection-in-dromara-ujcms-b332a795</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2954%3A%20Injection%20in%20Dromara%20UJCMS&amp;severity=medium&amp;id=699b1df9be58cf853b5c408f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2953-path-traversal-in-dromara-ujcms-ab2c642f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2953%3A%20Path%20Traversal%20in%20Dromara%20UJCMS&amp;severity=medium&amp;id=699b0fe9be58cf853b4f96d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2952-os-command-injection-in-vaelsys-49bece5a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2952%3A%20OS%20Command%20Injection%20in%20Vaelsys&amp;severity=medium&amp;id=699b0fe9be58cf853b4f96d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2947-cross-site-scripting-in-rymcu-forest-64f20955</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2947%3A%20Cross%20Site%20Scripting%20in%20rymcu%20forest&amp;severity=medium&amp;id=699b0c63be58cf853b4cb9ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2946-cross-site-scripting-in-rymcu-forest-abcecd89</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2946%3A%20Cross%20Site%20Scripting%20in%20rymcu%20forest&amp;severity=medium&amp;id=699b01d9be58cf853b401db1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2945-server-side-request-forgery-in-jeecg-da011b53</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2945%3A%20Server-Side%20Request%20Forgery%20in%20JeecgBoot&amp;severity=medium&amp;id=699b01d9be58cf853b401dab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2944-os-command-injection-in-tosei-online-56edbc08</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2944%3A%20OS%20Command%20Injection%20in%20Tosei%20Online%20Store%20Management%20System%20%E3%83%8D%E3%83%83%E3%83%88%E5%BA%97%E8%88%97%E7%AE%A1%E7%90%86%E3%82%B7%E3%82%B9%E3%83%86%E3%83%A0&amp;severity=medium&amp;id=699ae5b9be58cf853b26a0e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2943-cross-site-scripting-in-sapneshnaik--0f3a9e14</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2943%3A%20Cross%20Site%20Scripting%20in%20SapneshNaik%20Student%20Management%20System&amp;severity=medium&amp;id=699adeb1be58cf853b22022d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2940-out-of-bounds-write-in-zaher1307-tin-2936ffcb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2940%3A%20Out-of-bounds%20Write%20in%20Zaher1307%20tiny_web_server&amp;severity=medium&amp;id=699ad7a9be58cf853b1cfbe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2939-cross-site-scripting-in-itsourcecode-0e030c3b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2939%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=699ad0a1be58cf853b190e51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2938-improper-access-controls-in-sourceco-92db5ba5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2938%3A%20Improper%20Access%20Controls%20in%20SourceCodester%20Student%20Result%20Management%20System&amp;severity=medium&amp;id=699ac613be58cf853b1434d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2385-cwe-345-insufficient-verification-of-07926427</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2385%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20posimyththemes%20The%20Plus%20Addons%20for%20Elementor%20%E2%80%93%20Addons%20for%20Elementor%2C%20Page%20Templates%2C%20Widgets%2C%20Mega%20Menu%2C%20WooCommerce&amp;severity=medium&amp;id=699abf0dbe58cf853b0fc39b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2935-buffer-overflow-in-utt-hiper-810g-939f645f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2935%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20810G&amp;severity=high&amp;id=699b6bbfbe58cf853b9fec50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2934-cross-site-scripting-in-yifang-cms-9b3c2ff3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2934%3A%20Cross%20Site%20Scripting%20in%20YiFang%20CMS&amp;severity=medium&amp;id=699b6bbfbe58cf853b9fec4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2933-cross-site-scripting-in-yifang-cms-f18756f0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2933%3A%20Cross%20Site%20Scripting%20in%20YiFang%20CMS&amp;severity=medium&amp;id=699ab481be58cf853b04fa68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2932-cross-site-scripting-in-yifang-cms-5172b3a6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2932%3A%20Cross%20Site%20Scripting%20in%20YiFang%20CMS&amp;severity=medium&amp;id=699ab481be58cf853b04fa60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2930-stack-based-buffer-overflow-in-tenda-1060ec7f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2930%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A18&amp;severity=medium&amp;id=699aa2ecbe58cf853bf5261c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1369-cwe-601-url-redirection-to-untrusted-8bf9bb9d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1369%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Conditional%20CAPTCHA&amp;severity=medium&amp;id=699b6bbfbe58cf853b9fec56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2929-stack-based-buffer-overflow-in-d-lin-63e7a69b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2929%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699a9861be58cf853bec2c17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2928-stack-based-buffer-overflow-in-d-lin-ba314a06</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2928%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699a9159be58cf853be4af18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2927-stack-based-buffer-overflow-in-d-lin-aa7f83a9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2927%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699a8a51be58cf853bdd6463</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2926-stack-based-buffer-overflow-in-d-lin-b63cbef8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2926%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699a8a51be58cf853bdd645c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2925-stack-based-buffer-overflow-in-d-lin-790f34e9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2925%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699a8349be58cf853bd68ac9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2913-heap-based-buffer-overflow-in-libvip-d7babcf4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2913%3A%20Heap-based%20Buffer%20Overflow%20in%20libvips&amp;severity=low&amp;id=699a8349be58cf853bd68abf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2912-sql-injection-in-code-projects-onlin-bf9f085a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2912%3A%20SQL%20Injection%20in%20code-projects%20Online%20Reviewer%20System&amp;severity=medium&amp;id=699a8349be58cf853bd68ab8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2911-buffer-overflow-in-tenda-fh451-0afdc9cc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2911%3A%20Buffer%20Overflow%20in%20Tenda%20FH451&amp;severity=high&amp;id=699b6bbfbe58cf853b9fec60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/massive-winos-40-campaigns-target-taiwan-61006908</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Massive%20Winos%204.0%20Campaigns%20Target%20Taiwan&amp;severity=medium&amp;id=699c21ebbe58cf853b6b6adf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2910-stack-based-buffer-overflow-in-tenda-db290378</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2910%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20HG9&amp;severity=high&amp;id=699b6bbfbe58cf853b9fec59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2909-stack-based-buffer-overflow-in-tenda-c1902d12</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2909%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20HG9&amp;severity=high&amp;id=699a6729be58cf853b9881bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2908-stack-based-buffer-overflow-in-tenda-8458ae06</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2908%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20HG9&amp;severity=high&amp;id=699a6729be58cf853b9881b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2907-stack-based-buffer-overflow-in-tenda-e9f3e7c3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2907%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20HG9&amp;severity=high&amp;id=699a6729be58cf853b9881ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2906-stack-based-buffer-overflow-in-tenda-4d6e371a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2906%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20HG9&amp;severity=high&amp;id=699a6729be58cf853b9881a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2905-stack-based-buffer-overflow-in-tenda-1e2cb94f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2905%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20HG9&amp;severity=high&amp;id=699a5c9dbe58cf853b91714c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2904-buffer-overflow-in-utt-hiper-810g-b0bb6f4a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2904%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20810G&amp;severity=high&amp;id=699a5593be58cf853b7fcbb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2903-null-pointer-dereference-in-skvadrik-a9b7e0e3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2903%3A%20NULL%20Pointer%20Dereference%20in%20skvadrik%20re2c&amp;severity=medium&amp;id=699a5593be58cf853b7fcba7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2898-deserialization-in-funadmin-1655bf68</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2898%3A%20Deserialization%20in%20funadmin&amp;severity=medium&amp;id=699a5593be58cf853b7fcba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2897-cross-site-scripting-in-funadmin-361272fa</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2897%3A%20Cross%20Site%20Scripting%20in%20funadmin&amp;severity=medium&amp;id=699a5593be58cf853b7fcb99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-02-22-ba8f968c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-02-22&amp;severity=medium&amp;id=699cebc3be58cf853be054cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-22-4d8876f6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-22&amp;severity=medium&amp;id=699b9c51be58cf853bc9aa6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-22-c03fd373</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-22&amp;severity=low&amp;id=699a8312be58cf853bd645fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2896-improper-authorization-in-funadmin-8b9a76de</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2896%3A%20Improper%20Authorization%20in%20funadmin&amp;severity=medium&amp;id=699a4401be58cf853b61d862</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2895-weak-password-recovery-in-funadmin-197487f1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2895%3A%20Weak%20Password%20Recovery%20in%20funadmin&amp;severity=medium&amp;id=699a3cfabe58cf853b5c220a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2894-information-disclosure-in-funadmin-e975faf5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2894%3A%20Information%20Disclosure%20in%20funadmin&amp;severity=medium&amp;id=699a3cfabe58cf853b5c2203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2889-use-after-free-in-ccextractor-8a5137dd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2889%3A%20Use%20After%20Free%20in%20CCExtractor&amp;severity=medium&amp;id=699a2ee9be58cf853b52baf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2887-uncontrolled-recursion-in-aardappel--a74e0dc3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2887%3A%20Uncontrolled%20Recursion%20in%20aardappel%20lobster&amp;severity=medium&amp;id=699a20dabe58cf853b48d564</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2886-stack-based-buffer-overflow-in-tenda-a6c0a7e5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2886%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A21&amp;severity=high&amp;id=699a20dabe58cf853b48d55d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2885-stack-based-buffer-overflow-in-d-lin-17be11df</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2885%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699a1a4cbe58cf853b44c9e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2884-stack-based-buffer-overflow-in-d-lin-b154b949</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2884%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699a1a4cbe58cf853b44c9d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2883-stack-based-buffer-overflow-in-d-lin-5a90424a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2883%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699a12cabe58cf853b2525ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2882-stack-based-buffer-overflow-in-d-lin-e735582c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2882%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699a12cabe58cf853b2525c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2881-stack-based-buffer-overflow-in-d-lin-f2038f8e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2881%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699a0bc7be58cf853b06b4e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2877-stack-based-buffer-overflow-in-tenda-d45c8c4e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2877%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A18&amp;severity=high&amp;id=699a0133be58cf853bda57b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2876-stack-based-buffer-overflow-in-tenda-20fd82b2</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2876%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A18&amp;severity=high&amp;id=6999efa1be58cf853bad3f13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2874-stack-based-buffer-overflow-in-tenda-d1cd837e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2874%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A21&amp;severity=high&amp;id=6999efa1be58cf853bad3f0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2873-stack-based-buffer-overflow-in-tenda-9e1c5986</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2873%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A21&amp;severity=high&amp;id=6999e192be58cf853ba5a4d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2872-stack-based-buffer-overflow-in-tenda-c3d8c5e9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2872%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A21&amp;severity=high&amp;id=6999da89be58cf853ba20638</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2871-stack-based-buffer-overflow-in-tenda-bd337d40</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2871%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A21&amp;severity=high&amp;id=6999d381be58cf853b9e8de7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2870-stack-based-buffer-overflow-in-tenda-01319858</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2870%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A21&amp;severity=high&amp;id=6999c571be58cf853b997438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2869-out-of-bounds-read-in-janet-lang-jan-d96dcc6b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2869%3A%20Out-of-Bounds%20Read%20in%20janet-lang%20janet&amp;severity=medium&amp;id=6999c571be58cf853b99742e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2867-sql-injection-in-itsourcecode-vehicl-078e6aa4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2867%3A%20SQL%20Injection%20in%20itsourcecode%20Vehicle%20Management%20System&amp;severity=medium&amp;id=6999bae3be58cf853b900a81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-grandstream-phone-vulnerability-exposes-c-7d749d0a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Grandstream%20Phone%20Vulnerability%20Exposes%20Calls%20to%20Interception&amp;severity=critical&amp;id=69999e90be58cf853b84f9c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1787-cwe-862-missing-authorization-in-thi-cbb97bf6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1787%3A%20CWE-862%20Missing%20Authorization%20in%20thimpress%20LearnPress%20%E2%80%93%20Backup%20%26%20Migration%20Tool&amp;severity=medium&amp;id=69998d30be58cf853b7cb605</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27579-cwe-346-origin-validation-error-in--edc4b98e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27579%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20karnop%20realtime-collaboration-platform&amp;severity=high&amp;id=699989acbe58cf853b7b329e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27492-cwe-488-exposure-of-data-element-to-626119f5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27492%3A%20CWE-488%3A%20Exposure%20of%20Data%20Element%20to%20Wrong%20Session%20in%20lettermint%20lettermint-node&amp;severity=medium&amp;id=699989acbe58cf853b7b3299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14339-cwe-862-missing-authorization-in-we-9669a54d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14339%3A%20CWE-862%20Missing%20Authorization%20in%20wedevs%20weMail%3A%20Email%20Marketing%2C%20Email%20Automation%2C%20Newsletters%2C%20Subscribers%20%26%20Email%20Optins%20for%20WooCommerce&amp;severity=medium&amp;id=69997b9dbe58cf853b7530da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27482-cwe-396-declaration-of-catch-for-ge-d7eb6f83</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27482%3A%20CWE-396%3A%20Declaration%20of%20Catch%20for%20Generic%20Exception%20in%20ray-project%20ray&amp;severity=medium&amp;id=69997b9dbe58cf853b7530e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27479-cwe-918-server-side-request-forgery-8b1d9bca</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27479%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ellite%20Wallos&amp;severity=high&amp;id=69996d8dbe58cf853b6e3314</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2865-sql-injection-in-itsourcecode-agri-t-9413028e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2865%3A%20SQL%20Injection%20in%20itsourcecode%20Agri-Trading%20Online%20Shopping%20System&amp;severity=medium&amp;id=69996301be58cf853b611671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2864-path-traversal-in-fenghaha-ssm-erp-918de2b2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2864%3A%20Path%20Traversal%20in%20feng_ha_ha%20ssm-erp&amp;severity=medium&amp;id=69996301be58cf853b61166a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27469-cwe-79-improper-neutralization-of-i-6807b486</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27469%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20isso-comments%20isso&amp;severity=medium&amp;id=69996301be58cf853b611665</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27206-cwe-502-deserialization-of-untruste-e15a97f3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27206%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20zumba%20json-serializer&amp;severity=high&amp;id=69995bf9be58cf853b593127</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27458-cwe-80-improper-neutralization-of-s-f57f6777</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27458%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Kovah%20LinkAce&amp;severity=high&amp;id=69995bf9be58cf853b59312f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27452-cwe-200-exposure-of-sensitive-infor-d39700d7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27452%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20JonathanWilbur%20asn1-ts&amp;severity=critical&amp;id=69995bf9be58cf853b59312c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27471-cwe-862-missing-authorization-in-fr-0d95cb60</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27471%3A%20CWE-862%3A%20Missing%20Authorization%20in%20frappe%20erpnext&amp;severity=critical&amp;id=699954f1be58cf853b55f45f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/japanese-language-phishing-emails-sat-feb-21st-02b8ce8a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Japanese-Language%20Phishing%20Emails%2C%20(Sat%2C%20Feb%2021st)&amp;severity=medium&amp;id=69994db5be58cf853b530115</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2863-path-traversal-in-fenghaha-ssm-erp-086ce83e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2863%3A%20Path%20Traversal%20in%20feng_ha_ha%20ssm-erp&amp;severity=medium&amp;id=69994df7be58cf853b531474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2861-information-disclosure-in-foswiki-785784dd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2861%3A%20Information%20Disclosure%20in%20Foswiki&amp;severity=medium&amp;id=69994df7be58cf853b53146c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27212-cwe-1321-improperly-controlled-modi-35374c82</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27212%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20nolimits4web%20swiper&amp;severity=critical&amp;id=69994a6fbe58cf853b51dfc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26047-uncontrolled-resource-consumption-2faa897d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26047%3A%20Uncontrolled%20Resource%20Consumption&amp;severity=medium&amp;id=69994a6fbe58cf853b51dfbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26046-improper-neutralization-of-special--aded30ca</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26046%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)&amp;severity=high&amp;id=69994a6fbe58cf853b51dfb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26045-improper-control-of-generation-of-c-ac6ce0f2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26045%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)&amp;severity=high&amp;id=69994a6fbe58cf853b51dfb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27210-cwe-79-improper-neutralization-of-i-304bf2ed</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27210%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mpetroff%20pannellum&amp;severity=medium&amp;id=699946e0be58cf853b4e0107</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27205-cwe-524-use-of-cache-containing-sen-0adafbc3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27205%3A%20CWE-524%3A%20Use%20of%20Cache%20Containing%20Sensitive%20Information%20in%20pallets%20flask&amp;severity=low&amp;id=699946e0be58cf853b4e0102</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27199-cwe-67-improper-handling-of-windows-2d486c7b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27199%3A%20CWE-67%3A%20Improper%20Handling%20of%20Windows%20Device%20Names%20in%20pallets%20werkzeug&amp;severity=medium&amp;id=699a1a4cbe58cf853b44ca10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27198-cwe-269-improper-privilege-manageme-f67eef78</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27198%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20getformwork%20formwork&amp;severity=high&amp;id=699a1a4cbe58cf853b44c9ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27197-cwe-287-improper-authentication-in--f7f67e7c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27197%3A%20CWE-287%3A%20Improper%20Authentication%20in%20getsentry%20sentry&amp;severity=critical&amp;id=69993c53be58cf853b46cc30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2860-improper-authorization-in-fenghaha-s-7b872e85</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2860%3A%20Improper%20Authorization%20in%20feng_ha_ha%20ssm-erp&amp;severity=medium&amp;id=69993c53be58cf853b46cc33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27196-cwe-79-improper-neutralization-of-i-471a7dc8</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27196%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20statamic%20cms&amp;severity=high&amp;id=69993c53be58cf853b46cc2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27194-cwe-74-improper-neutralization-of-s-60332a35</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27194%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20man-group%20dtale&amp;severity=high&amp;id=6999354dbe58cf853b449470</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27193-cwe-200-exposure-of-sensitive-infor-8c54f238</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27193%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20feathersjs%20feathers&amp;severity=high&amp;id=6999354dbe58cf853b44946b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27192-cwe-346-origin-validation-error-in--17700ad4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27192%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20feathersjs%20feathers&amp;severity=high&amp;id=69992e44be58cf853b3dccd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27191-cwe-601-url-redirection-to-untruste-5f61f9b4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27191%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20feathersjs%20feathers&amp;severity=high&amp;id=69992e44be58cf853b3dcccb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65995-cwe-209-generation-of-error-message-fae63ced</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65995%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=medium&amp;id=699923b9be58cf853b17289f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-21-47397153</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-21&amp;severity=medium&amp;id=699a4ad1be58cf853b672ed7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-02-21-314b93fe</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-02-21&amp;severity=medium&amp;id=6999f672be58cf853bb0d039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-21-d084b561</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-21&amp;severity=low&amp;id=6999664dbe58cf853b67e1d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27168-cwe-122-heap-based-buffer-overflow--338e400d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27168%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20HappySeaFox%20sail&amp;severity=high&amp;id=6998f281be58cf853bdfabe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27203-cwe-15-external-control-of-system-o-d4123025</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27203%3A%20CWE-15%3A%20External%20Control%20of%20System%20or%20Configuration%20Setting%20in%20YosefHayim%20ebay-mcp&amp;severity=high&amp;id=6998f281be58cf853bdfabe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27134-cwe-287-improper-authentication-in--be5a44cd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27134%3A%20CWE-287%3A%20Improper%20Authentication%20in%20strimzi%20strimzi-kafka-operator&amp;severity=high&amp;id=6998eb7cbe58cf853bdd2aac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27133-cwe-295-improper-certificate-valida-e5103e94</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27133%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20strimzi%20strimzi-kafka-operator&amp;severity=medium&amp;id=6998e47bbe58cf853bd9f753</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27125-cwe-915-improperly-controlled-modif-2f99b788</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27125%3A%20CWE-915%3A%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes%20in%20sveltejs%20svelte&amp;severity=medium&amp;id=6998e47bbe58cf853bd9f74e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27122-cwe-79-improper-neutralization-of-i-d6a4de72</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27122%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sveltejs%20svelte&amp;severity=medium&amp;id=6998e47bbe58cf853bd9f74b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27121-cwe-79-improper-neutralization-of-i-f01a2543</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27121%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sveltejs%20svelte&amp;severity=medium&amp;id=6998e47bbe58cf853bd9f748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27119-cwe-79-improper-neutralization-of-i-0a61a055</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27119%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sveltejs%20svelte&amp;severity=medium&amp;id=6998e47bbe58cf853bd9f745</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2490-cwe-59-improper-link-resolution-befo-d299ff2a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2490%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20RustDesk%20Client%20for%20Windows&amp;severity=medium&amp;id=6998e47bbe58cf853bd9f757</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2041-cwe-78-improper-neutralization-of-sp-9112e8cb</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2041%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Nagios%20Host&amp;severity=high&amp;id=6998e0efbe58cf853bd86542</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2043-cwe-78-improper-neutralization-of-sp-f93a8c83</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2043%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Nagios%20Host&amp;severity=high&amp;id=6998e0efbe58cf853bd8654a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2042-cwe-78-improper-neutralization-of-sp-c3d99d64</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2042%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Nagios%20Host&amp;severity=high&amp;id=6998e0efbe58cf853bd86546</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2040-cwe-427-uncontrolled-search-path-ele-0eaf6799</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2040%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=high&amp;id=6998e0efbe58cf853bd8653f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2039-cwe-862-missing-authorization-in-gfi-14597c17</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2039%3A%20CWE-862%3A%20Missing%20Authorization%20in%20GFI%20Archiver&amp;severity=high&amp;id=6998e0efbe58cf853bd8653c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2036-cwe-502-deserialization-of-untrusted-d76c5725</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2036%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20GFI%20Archiver&amp;severity=high&amp;id=6998e0efbe58cf853bd86533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2038-cwe-862-missing-authorization-in-gfi-f5fda3da</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2038%3A%20CWE-862%3A%20Missing%20Authorization%20in%20GFI%20Archiver&amp;severity=high&amp;id=6998e0efbe58cf853bd86539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2037-cwe-502-deserialization-of-untrusted-7d9015ad</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2037%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20GFI%20Archiver&amp;severity=high&amp;id=6998e0efbe58cf853bd86536</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2035-cwe-78-improper-neutralization-of-sp-ffc2acfa</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2035%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Deciso%20OPNsense&amp;severity=medium&amp;id=6998e0efbe58cf853bd8652f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2034-cwe-120-buffer-copy-without-checking-ee11093c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2034%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Sante%20DICOM%20Viewer%20Pro&amp;severity=high&amp;id=6998e0efbe58cf853bd8652c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2858-out-of-bounds-read-in-wren-lang-wren-beaad496</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2858%3A%20Out-of-Bounds%20Read%20in%20wren-lang%20wren&amp;severity=medium&amp;id=6998d662be58cf853bc3fe39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27120-cwe-75-failure-to-sanitize-special--5394c06d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27120%3A%20CWE-75%3A%20Failure%20to%20Sanitize%20Special%20Elements%20into%20a%20Different%20Plane%20(Special%20Element%20Injection)%20in%20vapor%20leaf-kit&amp;severity=medium&amp;id=6998d2dfbe58cf853bb9b97b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27118-cwe-346-origin-validation-error-in--a2829ba2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27118%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20sveltejs%20kit&amp;severity=medium&amp;id=6998d2dfbe58cf853bb9b978</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27112-cwe-863-incorrect-authorization-in--0476694e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27112%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20akuity%20kargo&amp;severity=critical&amp;id=6998d2dfbe58cf853bb9b974</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27111-cwe-862-missing-authorization-in-ak-4eba098a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27111%3A%20CWE-862%3A%20Missing%20Authorization%20in%20akuity%20kargo&amp;severity=medium&amp;id=6998d2dfbe58cf853bb9b970</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27026-cwe-770-allocation-of-resources-wit-2c968574</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27026%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=6998e47bbe58cf853bd9f76d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27025-cwe-834-excessive-iteration-in-py-p-037c1442</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27025%3A%20CWE-834%3A%20Excessive%20Iteration%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=6998e47bbe58cf853bd9f767</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27024-cwe-835-loop-with-unreachable-exit--6dceccea</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27024%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=6998e47bbe58cf853bd9f761</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27022-cwe-74-improper-neutralization-of-s-4e85c924</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27022%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20langchain-ai%20langgraphjs&amp;severity=medium&amp;id=6998e47bbe58cf853bd9f75b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27020-cwe-79-improper-neutralization-of-i-87028508</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27020%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lukas12000%20photobooth&amp;severity=medium&amp;id=6998cf5abe58cf853bb24fa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2857-stack-based-buffer-overflow-in-d-lin-756386cc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2857%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=6998cf5abe58cf853bb24faa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25896-cwe-185-incorrect-regular-expressio-a786da3a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25896%3A%20CWE-185%3A%20Incorrect%20Regular%20Expression%20in%20NaturalIntelligence%20fast-xml-parser&amp;severity=critical&amp;id=6998cf5abe58cf853bb24fa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27190-cwe-78-improper-neutralization-of-s-61ca1d2c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27190%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20denoland%20deno&amp;severity=high&amp;id=6998e47cbe58cf853bd9f781</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2856-stack-based-buffer-overflow-in-d-lin-e5278306</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2856%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=6998c9e1be58cf853bab6aa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2855-stack-based-buffer-overflow-in-d-lin-4a6d59bd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2855%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=6998c0ac2c4d84f260ce40a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62326-cwe-79-improper-neutralization-of-i-0249db27</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62326%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20HCLSoftware%20Digital%20Experience&amp;severity=medium&amp;id=6998c0ac2c4d84f260ce40a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2473-cwe-340-generation-of-predictable-nu-62055df8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2473%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20Google%20Cloud%20Vertex%20AI%20Experiments&amp;severity=high&amp;id=6998c9e1be58cf853bab6ab7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2472-cwe-79-improper-neutralization-of-in-08ce0843</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2472%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Google%20Cloud%20Vertex%20AI%20SDK%20for%20Python&amp;severity=high&amp;id=6998c9e1be58cf853bab6ab4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2854-stack-based-buffer-overflow-in-d-lin-0ac6d2fb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2854%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=6998c9e2be58cf853bab6b05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2853-stack-based-buffer-overflow-in-d-lin-37fdae85</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2853%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=6998c9e2be58cf853bab6afe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2852-improper-access-controls-in-yeqifu-w-d3d7f563</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2852%3A%20Improper%20Access%20Controls%20in%20yeqifu%20warehouse&amp;severity=medium&amp;id=6998c9e4be58cf853bab7605</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2832-cwe-200-in-hp-inc-samsung-multixpres-5f46e4eb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2832%3A%20CWE-200%20in%20HP%20Inc%20Samsung%20MultiXpress%20SL-X7600LXR%2C%20SL-X7500LXR%2C%20SL-X7400LXR&amp;severity=medium&amp;id=69989d822c4d84f260b8d827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27115-cwe-22-improper-limitation-of-a-pat-30707c13</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27115%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Alex4SSB%20ADB-Explorer&amp;severity=high&amp;id=699899fe2c4d84f260b6810c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2851-improper-access-controls-in-yeqifu-w-ad7331dd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2851%3A%20Improper%20Access%20Controls%20in%20yeqifu%20warehouse&amp;severity=medium&amp;id=699899fe2c4d84f260b68119</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2850-improper-access-controls-in-yeqifu-w-53b18e86</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2850%3A%20Improper%20Access%20Controls%20in%20yeqifu%20warehouse&amp;severity=medium&amp;id=699899fe2c4d84f260b68111</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26102-cwe-732-incorrect-permission-assign-3e8ec137</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26102%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Owl%20opds&amp;severity=high&amp;id=6998c9e6be58cf853bab77d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26101-cwe-732-incorrect-permission-assign-507e105d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26101%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Owl%20opds&amp;severity=high&amp;id=6998c9e6be58cf853bab77ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26100-cwe-732-incorrect-permission-assign-13572654</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26100%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Owl%20opds&amp;severity=medium&amp;id=6998c9e6be58cf853bab77cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27506-cwe-79-improper-neutralization-of-i-f9e184f8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27506%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20sa2blv%20SVXportal&amp;severity=medium&amp;id=6998c42f2c4d84f260d040b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26099-cwe-427-uncontrolled-search-path-el-e9a235da</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26099%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Owl%20opds&amp;severity=high&amp;id=6998c9e6be58cf853bab77c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26098-cwe-427-uncontrolled-search-path-el-122bfb41</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26098%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Owl%20opds&amp;severity=high&amp;id=6998c9e6be58cf853bab77c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26097-cwe-427-uncontrolled-search-path-el-a14c6dd5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26097%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Owl%20opds&amp;severity=high&amp;id=6998c9e4be58cf853bab7622</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26096-cwe-732-incorrect-permission-assign-d2bc77a6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26096%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Owl%20opds&amp;severity=high&amp;id=6998c9e4be58cf853bab761f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26095-cwe-732-incorrect-permission-assign-d597aa2a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26095%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Owl%20opds&amp;severity=high&amp;id=6998c9e4be58cf853bab761c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26093-cwe-77-improper-neutralization-of-s-05064f5f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26093%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Owl%20opds&amp;severity=high&amp;id=6998c9e4be58cf853bab7619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27505-cwe-79-improper-neutralization-of-i-d9eb7933</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27505%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20sa2blv%20SVXportal&amp;severity=medium&amp;id=6998c42f2c4d84f260d040af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27504-cwe-79-improper-neutralization-of-i-79d41f19</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27504%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20sa2blv%20SVXportal&amp;severity=medium&amp;id=6998c42f2c4d84f260d040ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27503-cwe-79-improper-neutralization-of-i-299cc120</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27503%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20sa2blv%20SVXportal&amp;severity=medium&amp;id=6998c42f2c4d84f260d040a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2333-cwe-77-improper-neutralization-of-sp-a6e584ee</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2333%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Owl%20opds&amp;severity=critical&amp;id=6998c9e6be58cf853bab77d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27502-cwe-79-improper-neutralization-of-i-497f1478</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27502%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20sa2blv%20SVXportal&amp;severity=medium&amp;id=6998c42f2c4d84f260d040a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15583-cross-site-scripting-in-detronetdip-f3411607</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15583%3A%20Cross%20Site%20Scripting%20in%20detronetdip%20E-commerce&amp;severity=medium&amp;id=6998c9e6be58cf853bab77e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15582-authorization-bypass-in-detronetdip-decee4fc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15582%3A%20Authorization%20Bypass%20in%20detronetdip%20E-commerce&amp;severity=medium&amp;id=6998c9e6be58cf853bab77db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1842-cwe-613-insufficient-session-expirat-81f62f0b</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1842%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20SoftIron%20HyperCloud&amp;severity=medium&amp;id=6998c9e2be58cf853bab6b0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24790-cwe-306-in-welker-odoreyes-ecosyste-ec3e6d58</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24790%3A%20CWE-306%20in%20Welker%20OdorEyes%20EcoSystem%20Pulse%20Bypass%20System%20with%20XL4%20Controller&amp;severity=high&amp;id=69988bee2c4d84f260ae23d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26048-cwe-306-in-jinan-usr-iot-technology-9c6d3db0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26048%3A%20CWE-306%20in%20Jinan%20USR%20IOT%20Technology%20Limited%20(PUSR)%20USR-W610&amp;severity=high&amp;id=6998c9e1be58cf853bab6ab0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26049-cwe-522-in-jinan-usr-iot-technology-c466334b</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26049%3A%20CWE-522%20in%20Jinan%20USR%20IOT%20Technology%20Limited%20(PUSR)%20USR-W610&amp;severity=medium&amp;id=6998c0ac2c4d84f260ce40b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2818-cwe-23-relative-path-traversal-in-vm-a93f5c94</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2818%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20VMware%20Spring%20Data%20Geode&amp;severity=high&amp;id=6998c42f2c4d84f260d040b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2849-improper-access-controls-in-yeqifu-w-a0183a9d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2849%3A%20Improper%20Access%20Controls%20in%20yeqifu%20warehouse&amp;severity=medium&amp;id=6998c9e7be58cf853bab82aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2848-sql-injection-in-sourcecodester-simp-900bfef3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2848%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20Responsive%20Tourism%20Website&amp;severity=medium&amp;id=6998c9e7be58cf853bab82a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24455-cwe-319-in-jinan-usr-iot-technology-1aff07c2</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24455%3A%20CWE-319%20in%20Jinan%20USR%20IOT%20Technology%20Limited%20(PUSR)%20USR-W610&amp;severity=high&amp;id=6998c0ac2c4d84f260ce40b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25715-cwe-521-in-jinan-usr-iot-technology-b37d98fb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25715%3A%20CWE-521%20in%20Jinan%20USR%20IOT%20Technology%20Limited%20(PUSR)%20USR-W610&amp;severity=critical&amp;id=6998c0ac2c4d84f260ce40b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nists-quantum-breakthrough-single-photons-produced-1c6551af</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NIST%E2%80%99s%20Quantum%20Breakthrough%3A%20Single%20Photons%20Produced%20on%20a%20Chip&amp;severity=medium&amp;id=699884b12c4d84f260a9a399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27072-improper-neutralization-of-input-du-639631d6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27072%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PixelYourSite%20PixelYourSite%20%E2%80%93%20Your%20smart%20PIXEL%20(TAG)%20Manager&amp;severity=high&amp;id=6998ca03be58cf853bab938b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24959-improper-neutralization-of-special--8ecab645</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24959%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20JoomSky%20JS%20Help%20Desk&amp;severity=high&amp;id=6998c9e4be58cf853bab7616</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24956-improper-neutralization-of-special--3235d069</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24956%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Shahjada%20Download%20Manager%20Addons%20for%20Elementor&amp;severity=critical&amp;id=6998ca03be58cf853bab9388</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24955-improper-neutralization-of-input-du-9138314c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24955%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fox-themes%20Whizz%20Plugins&amp;severity=high&amp;id=6998c9e4be58cf853bab7613</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24953-improper-limitation-of-a-pathname-t-a40d9485</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24953%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Mitchell%20Bennis%20Simple%20File%20List&amp;severity=medium&amp;id=6998ca03be58cf853bab9385</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24950-authorization-bypass-through-user-c-c56e4f1e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24950%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20themeplugs%20Authorsy&amp;severity=high&amp;id=6998c9e4be58cf853bab7610</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24949-improper-neutralization-of-input-du-5bc860f3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24949%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeGoods%20PhotoMe&amp;severity=high&amp;id=6998ca03be58cf853bab9382</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24948-improper-neutralization-of-input-du-f23c3cea</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24948%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fox-themes%20Reflector&amp;severity=high&amp;id=6998c9e4be58cf853bab760d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24946-missing-authorization-in-tychesoftw-9a5efc38</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24946%3A%20Missing%20Authorization%20in%20tychesoftwares%20Print%20Invoice%20%26%20Delivery%20Notes%20for%20WooCommerce&amp;severity=medium&amp;id=6998ca02be58cf853bab9356</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24944-missing-authorization-in-wedevs-sub-bab27ece</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24944%3A%20Missing%20Authorization%20in%20weDevs%20Subscribe2&amp;severity=medium&amp;id=6998c9e4be58cf853bab7602</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24943-improper-neutralization-of-input-du-6c89e4dc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24943%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeGoods%20Grand%20Conference&amp;severity=high&amp;id=6998ca02be58cf853bab9353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24941-missing-authorization-in-wpjobporta-9352ccfd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24941%3A%20Missing%20Authorization%20in%20wpjobportal%20WP%20Job%20Portal&amp;severity=high&amp;id=6998c9e2be58cf853bab6b12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22384-deserialization-of-untrusted-data-i-c8cd76a7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22384%3A%20Deserialization%20of%20Untrusted%20Data%20in%20leafcolor%20Applay%20-%20Shortcodes&amp;severity=critical&amp;id=6998ca02be58cf853bab9350</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22383-authorization-bypass-through-user-c-2a198f42</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22383%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Mikado-Themes%20PawFriends%20-%20Pet%20Shop%20and%20Veterinary%20WordPress%20Theme&amp;severity=high&amp;id=6998c9e2be58cf853bab6b0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22381-improper-control-of-filename-for-in-8b33630f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22381%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20PawFriends%20-%20Pet%20Shop%20and%20Veterinary%20WordPress%20Theme&amp;severity=high&amp;id=6998ca02be58cf853bab934d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22380-improper-control-of-filename-for-in-7673de4b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22380%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20UnlimHost&amp;severity=high&amp;id=6998c9e2be58cf853bab6afb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22379-improper-control-of-filename-for-in-fd0926aa</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22379%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Netmix&amp;severity=high&amp;id=6998ca02be58cf853bab934a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22378-improper-control-of-filename-for-in-532e1939</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22378%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Blabber&amp;severity=high&amp;id=6998c9e2be58cf853bab6af8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22377-improper-control-of-filename-for-in-54cf682d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22377%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Saveo&amp;severity=high&amp;id=6998ca02be58cf853bab9347</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22376-improper-control-of-filename-for-in-47860a6b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22376%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Parkivia&amp;severity=high&amp;id=6998c9e2be58cf853bab6af5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22375-improper-control-of-filename-for-in-9e4ca84a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22375%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Impacto%20Patronus&amp;severity=high&amp;id=6998ca02be58cf853bab9344</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22374-improper-control-of-filename-for-in-ff6f952c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22374%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Zio%20Alberto&amp;severity=high&amp;id=6998c9e2be58cf853bab6af2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22373-improper-control-of-filename-for-in-91fdd6af</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22373%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Fooddy&amp;severity=high&amp;id=6998ca02be58cf853bab9341</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22372-improper-control-of-filename-for-in-99586c4a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22372%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Isida&amp;severity=high&amp;id=6998c9e2be58cf853bab6aef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22371-improper-control-of-filename-for-in-8243fd9a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22371%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Gustavo&amp;severity=high&amp;id=6998ca02be58cf853bab933e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22370-improper-control-of-filename-for-in-bbcd8a85</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22370%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Marveland&amp;severity=high&amp;id=6998c9e1be58cf853bab6ac3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22369-improper-control-of-filename-for-in-b974319a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22369%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Ironfit&amp;severity=high&amp;id=6998ca02be58cf853bab933b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22368-improper-control-of-filename-for-in-52f1856f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22368%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Redy&amp;severity=high&amp;id=6998c9e1be58cf853bab6ac0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22367-improper-control-of-filename-for-in-4478fc38</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22367%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Coworking&amp;severity=high&amp;id=6998ca00be58cf853bab9221</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22366-improper-control-of-filename-for-in-3cf8c652</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22366%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Jude&amp;severity=high&amp;id=6998c9e1be58cf853bab6abd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22365-improper-control-of-filename-for-in-d19f4323</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22365%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Soleng&amp;severity=high&amp;id=6998ca00be58cf853bab921e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22364-improper-control-of-filename-for-in-70fc26a4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22364%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20SevenTrees&amp;severity=high&amp;id=6998c9e1be58cf853bab6aba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22363-improper-control-of-filename-for-in-2eb32049</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22363%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Rhodos&amp;severity=high&amp;id=6998ca00be58cf853bab921b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22362-improper-control-of-filename-for-in-9a7bc312</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22362%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Photolia&amp;severity=high&amp;id=6998c9e1be58cf853bab6aad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22361-improper-control-of-filename-for-in-5e350512</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22361%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20A-Mart&amp;severity=high&amp;id=6998ca00be58cf853bab9218</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22357-improper-neutralization-of-input-du-32b18cf1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22357%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Spencer%20Haws%20Link%20Whisper%20Free&amp;severity=high&amp;id=6998ca00be58cf853bab9215</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22356-improper-control-of-filename-for-in-7d50b9f6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22356%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Automattic%20Jetpack%20CRM&amp;severity=high&amp;id=6998ca00be58cf853bab9212</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22354-deserialization-of-untrusted-data-i-a275f0c5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22354%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Dotstore%20Woocommerce%20Category%20Banner%20Management&amp;severity=high&amp;id=6998ca00be58cf853bab920f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22352-improper-neutralization-of-input-du-82c9c764</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22352%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PersianScript%20Persian%20Woocommerce%20SMS&amp;severity=high&amp;id=6998ca00be58cf853bab920c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22351-missing-authorization-in-marcus-aka-382d6452</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22351%3A%20Missing%20Authorization%20in%20Marcus%20(aka%20%40msykes)%20WP%20FullCalendar&amp;severity=high&amp;id=6998ca00be58cf853bab9209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22350-missing-authorization-in-add-onsorg-90039836</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22350%3A%20Missing%20Authorization%20in%20add-ons.org%20PDF%20for%20Elementor%20Forms%20%2B%20Drag%20And%20Drop%20Template%20Builder&amp;severity=medium&amp;id=6998ca00be58cf853bab9206</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22346-deserialization-of-untrusted-data-i-85dcd642</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22346%3A%20Deserialization%20of%20Untrusted%20Data%20in%20A%20WP%20Life%20Slider%20Responsive%20Slideshow%20%E2%80%93%20Image%20slider%2C%20Gallery%20slideshow&amp;severity=high&amp;id=6998c9ffbe58cf853bab91df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22345-deserialization-of-untrusted-data-i-f1793858</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22345%3A%20Deserialization%20of%20Untrusted%20Data%20in%20A%20WP%20Life%20Image%20Gallery%20%E2%80%93%20Lightbox%20Gallery%2C%20Responsive%20Photo%20Gallery%2C%20Masonry%20Gallery&amp;severity=high&amp;id=6998c9ffbe58cf853bab91dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22344-improper-control-of-filename-for-in-72fff014</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22344%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20FiveStar&amp;severity=high&amp;id=6998c9ffbe58cf853bab91d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22341-authentication-bypass-using-an-alte-258b6c54</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22341%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Case-Themes%20Booked&amp;severity=medium&amp;id=6998c9ffbe58cf853bab91d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69410-improper-control-of-filename-for-in-4818f79c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69410%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Edge-Themes%20Belletrist&amp;severity=high&amp;id=6998c9ffbe58cf853bab91d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69409-improper-control-of-filename-for-in-8f64e0af</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69409%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20PJ%20%7C%20Life%20%26%20Business%20Coaching&amp;severity=high&amp;id=6998c9ffbe58cf853bab91cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69408-improper-control-of-filename-for-in-5ca7bc52</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69408%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20HealthFirst&amp;severity=high&amp;id=6998c9ffbe58cf853bab91ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69407-improper-control-of-filename-for-in-b72f7028</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69407%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Select-Themes%20Struktur&amp;severity=high&amp;id=6998c9ffbe58cf853bab91c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69406-improper-control-of-filename-for-in-8c56f980</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69406%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20FreightCo&amp;severity=high&amp;id=6998c9ffbe58cf853bab91c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69405-deserialization-of-untrusted-data-i-7fb533d4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69405%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Lorem%20Ipsum%20%7C%20Books%20%26%20Media%20Store&amp;severity=critical&amp;id=6998c9fdbe58cf853bab917f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69404-deserialization-of-untrusted-data-i-6248805e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69404%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Extreme%20Store&amp;severity=critical&amp;id=6998c9fdbe58cf853bab917c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69403-unrestricted-upload-of-file-with-da-1742b5b6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69403%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Bravis-Themes%20Bravis%20Addons&amp;severity=critical&amp;id=6998c9fdbe58cf853bab9179</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69402-improper-control-of-filename-for-in-c155e509</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69402%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20R%26F&amp;severity=high&amp;id=6998c9fdbe58cf853bab9176</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69401-authentication-bypass-by-spoofing-i-603d5f42</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69401%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20mdalabar%20WooODT%20Lite&amp;severity=high&amp;id=6998c9fdbe58cf853bab9173</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69400-improper-control-of-filename-for-in-aa67087f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69400%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Yokoo&amp;severity=high&amp;id=6998c9fdbe58cf853bab9170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69399-improper-control-of-filename-for-in-d84915fd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69399%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Cobble&amp;severity=high&amp;id=6998c9fdbe58cf853bab916d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69398-improper-control-of-filename-for-in-76bcabef</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69398%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Plank&amp;severity=high&amp;id=6998c9fdbe58cf853bab9169</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69397-improper-control-of-filename-for-in-2d7f5a1f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69397%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Tint&amp;severity=high&amp;id=6998c9fdbe58cf853bab9166</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69396-improper-control-of-filename-for-in-cd4d231d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69396%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Splendour&amp;severity=high&amp;id=6998c9fdbe58cf853bab915e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69395-improper-control-of-filename-for-in-3d4a5ce4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69395%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Gable&amp;severity=high&amp;id=6998c9fbbe58cf853bab8d89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69393-missing-authorization-in-jthemes-ex-5b6e7a1c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69393%3A%20Missing%20Authorization%20in%20Jthemes%20Exzo&amp;severity=high&amp;id=6998c9fbbe58cf853bab8d86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69392-improper-neutralization-of-input-du-90e30f56</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69392%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20itex%20iMoney&amp;severity=high&amp;id=6998c9fbbe58cf853bab8d83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69391-improper-neutralization-of-input-du-33c897e1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69391%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GT3themes%20Diamond&amp;severity=high&amp;id=6998c9fbbe58cf853bab8d80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69390-improper-neutralization-of-input-du-59d41ec8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69390%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themebon%20Business%20Template%20Blocks%20for%20WPBakery%20(Visual%20Composer)%20Page%20Builder&amp;severity=high&amp;id=6998c9fbbe58cf853bab8d7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69389-improper-neutralization-of-input-du-b9f61373</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69389%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Hugh%20Mungus%20Visitor%20Maps%20Extended%20Referer%20Field&amp;severity=high&amp;id=6998c9fbbe58cf853bab8d7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69388-missing-authorization-in-cliengo-cl-828a358a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69388%3A%20Missing%20Authorization%20in%20cliengo%20Cliengo%20%E2%80%93%20Chatbot&amp;severity=medium&amp;id=6998c9fbbe58cf853bab8d77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69387-improper-control-of-filename-for-in-bd9b7785</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69387%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20whatwouldjessedo%20Simple%20Retail%20Menus&amp;severity=high&amp;id=6998c9fbbe58cf853bab8d74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69386-improper-neutralization-of-input-du-559119a0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69386%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20realvirtualmx%20RVCFDI%20para%20Woocommerce&amp;severity=high&amp;id=6998c9fbbe58cf853bab8d71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69385-missing-authorization-in-agnihd-car-5e178203</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69385%3A%20Missing%20Authorization%20in%20AgniHD%20Cartify%20-%20WooCommerce%20Gutenberg%20WordPress%20Theme&amp;severity=medium&amp;id=6998c9fbbe58cf853bab8d6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69384-improper-neutralization-of-input-du-dcf39699</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69384%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdiscover%20Timeline%20Event%20History&amp;severity=high&amp;id=6998c9fabe58cf853bab8d0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69383-improper-control-of-filename-for-in-bdded47d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69383%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Agence%20web%20Eoxia%20-%20Montpellier%20WP%20shop&amp;severity=high&amp;id=6998c9fabe58cf853bab8d08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69382-deserialization-of-untrusted-data-i-d1f8436f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69382%3A%20Deserialization%20of%20Untrusted%20Data%20in%20themesflat%20Themesflat%20Elementor&amp;severity=critical&amp;id=6998c9fabe58cf853bab8d05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69381-missing-authorization-in-vanquish-w-22979e9c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69381%3A%20Missing%20Authorization%20in%20vanquish%20WooCommerce%20Bulk%20Product%20Editor&amp;severity=high&amp;id=6998c9fabe58cf853bab8d02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69380-improper-limitation-of-a-pathname-t-0705c153</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69380%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20vanquish%20Upload%20Files%20Anywhere&amp;severity=high&amp;id=6998c9fabe58cf853bab8cff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69379-improper-limitation-of-a-pathname-t-7d9b991f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69379%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20vanquish%20Upload%20Files%20Anywhere&amp;severity=high&amp;id=6998c9fabe58cf853bab8cfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69378-incorrect-privilege-assignment-in-x-adbe137f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69378%3A%20Incorrect%20Privilege%20Assignment%20in%20XforWooCommerce%20Product%20Filter%20for%20WooCommerce&amp;severity=high&amp;id=6998c9fabe58cf853bab8cf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69377-improper-limitation-of-a-pathname-t-444ddb21</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69377%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20vanquish%20User%20Extra%20Fields&amp;severity=high&amp;id=6998c9fabe58cf853bab8cf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69376-improper-limitation-of-a-pathname-t-8d35ed40</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69376%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20vanquish%20User%20Extra%20Fields&amp;severity=high&amp;id=6998c9fabe58cf853bab8cf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69375-improper-control-of-filename-for-in-aceae499</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69375%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20SolverWp%20Portfolio%20Builder&amp;severity=high&amp;id=6998c9fabe58cf853bab8cf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69374-improper-control-of-filename-for-in-c98b4c6c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69374%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20SolverWp%20Eleblog%20%E2%80%93%20Elementor%20Blog%20And%20Magazine%20Addons&amp;severity=high&amp;id=6998c9f8be58cf853bab8ca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69373-improper-control-of-filename-for-in-8a23076b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69373%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20beeteam368%20VidoRev&amp;severity=high&amp;id=6998c9f8be58cf853bab8c9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69372-deserialization-of-untrusted-data-i-478c0a38</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69372%3A%20Deserialization%20of%20Untrusted%20Data%20in%20AncoraThemes%20SevenHills&amp;severity=critical&amp;id=6998c9f8be58cf853bab8c9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69371-deserialization-of-untrusted-data-i-9dcd4607</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69371%3A%20Deserialization%20of%20Untrusted%20Data%20in%20AncoraThemes%20KindlyCare&amp;severity=critical&amp;id=6998c9f8be58cf853bab8c99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69370-deserialization-of-untrusted-data-i-c59240a2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69370%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeGoods%20Capella&amp;severity=critical&amp;id=6998c9f8be58cf853bab8c96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69368-improper-neutralization-of-input-du-b3fb562b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69368%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GT3themes%20SOHO%20-%20Photography%20WordPress%20Theme&amp;severity=high&amp;id=6998c9f8be58cf853bab8c93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69367-improper-neutralization-of-input-du-9e3ce157</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69367%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GT3themes%20Oyster%20-%20Photography%20WordPress%20Theme&amp;severity=high&amp;id=6998c9f8be58cf853bab8c90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69366-improper-neutralization-of-special--9fb40b7d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69366%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TeconceTheme%20Emerce%20Core&amp;severity=critical&amp;id=6998c9f8be58cf853bab8c8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69365-improper-neutralization-of-special--9f132755</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69365%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TeconceTheme%20Uroan%20Core&amp;severity=critical&amp;id=6998c9f8be58cf853bab8c8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69337-improper-neutralization-of-special--a25bade3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69337%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20don-themes%20Wolmart%20Core&amp;severity=critical&amp;id=6998c9f8be58cf853bab8c87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69330-improper-neutralization-of-input-du-0fc4e224</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69330%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jthemes%20Prestige&amp;severity=high&amp;id=6998c9f7be58cf853bab8c24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69329-deserialization-of-untrusted-data-i-5554d9e5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69329%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Jthemes%20Prestige&amp;severity=critical&amp;id=6998c9f7be58cf853bab8c21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69328-deserialization-of-untrusted-data-i-1008c2af</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69328%3A%20Deserialization%20of%20Untrusted%20Data%20in%20magepeopleteam%20Booking%20and%20Rental%20Manager&amp;severity=high&amp;id=6998c9f7be58cf853bab8c1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69326-improper-neutralization-of-input-du-066280cd</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69326%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Basix%20NEX-Forms&amp;severity=high&amp;id=6998c9f7be58cf853bab8c1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69325-path-traversal-in-primersoftware-pr-d91b8f83</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69325%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20primersoftware%20Primer%20MyData%20for%20Woocommerce&amp;severity=medium&amp;id=6998c9f7be58cf853bab8c18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69324-improper-neutralization-of-input-du-c43fe3a3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69324%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Basix%20NEX-Forms&amp;severity=high&amp;id=6998c9f7be58cf853bab8c15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69323-improper-neutralization-of-input-du-3d87008f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69323%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20VeronaLabs%20Slimstat%20Analytics&amp;severity=high&amp;id=6998c9f7be58cf853bab8c12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69322-improper-control-of-filename-for-in-30c6fada</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69322%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20fuelthemes%20PeakShops&amp;severity=high&amp;id=6998c9f7be58cf853bab8c0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69310-improper-neutralization-of-special--63c262ad</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69310%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TeconceTheme%20Woodly%20Core&amp;severity=critical&amp;id=6998c9f7be58cf853bab8c0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69309-improper-neutralization-of-special--f916c2e0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69309%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TeconceTheme%20Saasplate%20Core&amp;severity=critical&amp;id=6998c9f7be58cf853bab8c09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69308-improper-neutralization-of-special--b67a36af</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69308%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TeconceTheme%20Nestbyte%20Core&amp;severity=critical&amp;id=6998c9f5be58cf853bab87af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69307-improper-neutralization-of-special--ec1cc96c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69307%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TeconceTheme%20Medinik%20Core&amp;severity=critical&amp;id=6998c9f5be58cf853bab87ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69306-improper-neutralization-of-special--b1330bd2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69306%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TeconceTheme%20Electio%20Core&amp;severity=critical&amp;id=6998c9f5be58cf853bab87a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69305-improper-neutralization-of-special--6c729442</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69305%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TeconceTheme%20Crete%20Core&amp;severity=critical&amp;id=6998c9f5be58cf853bab87a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69304-improper-neutralization-of-special--0851bfff</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69304%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TeconceTheme%20Allmart&amp;severity=critical&amp;id=6998c9f5be58cf853bab87a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69303-missing-authorization-in-modeltheme-fd7a5bf7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69303%3A%20Missing%20Authorization%20in%20modeltheme%20ModelTheme%20Framework&amp;severity=high&amp;id=6998c9f5be58cf853bab87a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69302-improper-neutralization-of-input-du-9e32252c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69302%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20designthemes%20DesignThemes%20Core%20Features&amp;severity=high&amp;id=6998c9f5be58cf853bab879d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69301-deserialization-of-untrusted-data-i-01b61f2d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69301%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeGoods%20PhotoMe&amp;severity=critical&amp;id=6998c9f5be58cf853bab879a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69299-server-side-request-forgery-ssrf-in-e830acbf</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69299%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Laborator%20Oxygen&amp;severity=high&amp;id=6998c9f5be58cf853bab8797</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69298-missing-authorization-in-ghostpool--dab750db</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69298%3A%20Missing%20Authorization%20in%20GhostPool%20Gauge&amp;severity=high&amp;id=6998c9f5be58cf853bab8794</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69297-missing-authorization-in-ghostpool--4d32211b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69297%3A%20Missing%20Authorization%20in%20GhostPool%20Aardvark%20Plugin&amp;severity=high&amp;id=6998c9f3be58cf853bab8754</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69296-improper-neutralization-of-input-du-3cf6c340</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69296%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GhostPool%20Aardvark&amp;severity=high&amp;id=6998c9f3be58cf853bab8751</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69295-improper-neutralization-of-special--97e31acb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69295%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TeconceTheme%20Coven%20Core&amp;severity=critical&amp;id=6998c9f3be58cf853bab874e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69294-deserialization-of-untrusted-data-i-973f59a7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69294%3A%20Deserialization%20of%20Untrusted%20Data%20in%20fuelthemes%20PeakShops&amp;severity=high&amp;id=6998c9f3be58cf853bab874b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69063-missing-authorization-in-saad-iqbal-38006240</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69063%3A%20Missing%20Authorization%20in%20Saad%20Iqbal%20New%20User%20Approve&amp;severity=high&amp;id=6998c9f3be58cf853bab8748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69011-improper-neutralization-of-input-du-827a8668</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69011%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPKube%20Cool%20Tag%20Cloud&amp;severity=medium&amp;id=6998c9f3be58cf853bab8745</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68895-authentication-bypass-using-an-alte-e179568e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68895%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20ahachat%20AhaChat%20Messenger%20Marketing&amp;severity=medium&amp;id=6998c9f3be58cf853bab8742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68880-improper-neutralization-of-input-du-45b81ed2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68880%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20peterwsterling%20Simple%20Archive%20Generator&amp;severity=high&amp;id=6998c9f3be58cf853bab873f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68863-improper-neutralization-of-input-du-4674b2bf</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68863%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Zack%20Katz%20iContact%20for%20Gravity%20Forms&amp;severity=high&amp;id=6998c9f3be58cf853bab873c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68862-improper-limitation-of-a-pathname-t-47bc47d3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68862%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Murtaza%20Bhurgri%20Woo%20File%20Dropzone&amp;severity=high&amp;id=6998c9f3be58cf853bab8739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68856-improper-neutralization-of-input-du-05949549</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68856%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20keeswolters%20Mopinion%20Feedback%20Form&amp;severity=high&amp;id=6998c9f2be58cf853bab86e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68855-insertion-of-sensitive-information--0c4f6164</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68855%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20themeglow%20JobBoard%20Job%20listing&amp;severity=medium&amp;id=6998c9f2be58cf853bab86e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68854-improper-neutralization-of-input-du-72219380</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68854%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20harman79%20ID%20Arrays&amp;severity=high&amp;id=6998c9f2be58cf853bab86e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68853-deserialization-of-untrusted-data-i-506d20b9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68853%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Kleor%20Contact%20Manager&amp;severity=high&amp;id=6998c9f2be58cf853bab86df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68852-improper-neutralization-of-input-du-2bac6d5c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68852%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webmuehle%20Court%20Reservation&amp;severity=high&amp;id=6998c9f2be58cf853bab86dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68848-improper-neutralization-of-input-du-64555e11</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68848%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20anmari%20amr%20cron%20manager&amp;severity=high&amp;id=6998c9f2be58cf853bab86d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68847-improper-neutralization-of-input-du-0893a46a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68847%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20itex%20iSape&amp;severity=high&amp;id=6998c9f2be58cf853bab86d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68846-improper-neutralization-of-input-du-59a39808</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68846%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Paris%20Holley%20Asynchronous%20Javascript&amp;severity=high&amp;id=6998c9f2be58cf853bab86d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68845-improper-neutralization-of-input-du-c1a8b4ba</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68845%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aThemeArt%20Translations%20eDS%20Responsive%20Menu&amp;severity=high&amp;id=6998c9f2be58cf853bab86d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68844-improper-neutralization-of-input-du-cb75cd2c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68844%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DaleAB%20Membee%20Login&amp;severity=high&amp;id=6998c9f2be58cf853bab86cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68843-improper-neutralization-of-input-du-8f6fcf3d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68843%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bas%20Schuiling%20FeedWordPress%20Advanced%20Filters&amp;severity=high&amp;id=6998c9f0be58cf853bab85d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68842-improper-neutralization-of-input-du-7eab223a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68842%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20totalbounty%20Widget%20Logic%20Visual&amp;severity=high&amp;id=6998c9f0be58cf853bab85cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68841-improper-control-of-filename-for-in-dc039b31</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68841%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Themepul%20TopperPack%20%E2%80%93%20Complete%20Elementor%20Addons%2C%20Theme%20%26%20CPT%20Builder&amp;severity=high&amp;id=6998c9f0be58cf853bab85cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68837-missing-authorization-in-elextensio-def71628</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68837%3A%20Missing%20Authorization%20in%20ELEXtensions%20ELEX%20WordPress%20HelpDesk%20%26%20Customer%20Ticketing%20System&amp;severity=medium&amp;id=6998c9f0be58cf853bab85c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68834-missing-authorization-in-saiful-isl-51f7d3ba</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68834%3A%20Missing%20Authorization%20in%20Saiful%20Islam%20Sync%20Master%20Sheet%20%E2%80%93%20Product%20Sync%20with%20Google%20Sheet%20for%20WooCommerce&amp;severity=high&amp;id=6998c9f0be58cf853bab85c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68552-improper-control-of-filename-for-in-47d1e875</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68552%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20WebCodingPlace%20WooCommerce%20Coming%20Soon%20Product%20with%20Countdown&amp;severity=high&amp;id=6998c9f0be58cf853bab85c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68549-unrestricted-upload-of-file-with-da-f300012a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68549%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20zozothemes%20Wiguard&amp;severity=critical&amp;id=6998c9f0be58cf853bab85c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68545-improper-control-of-filename-for-in-e55abf46</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68545%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Nika&amp;severity=high&amp;id=6998c9f0be58cf853bab85bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68543-improper-control-of-filename-for-in-ec7a0378</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68543%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Diza&amp;severity=high&amp;id=6998c9f0be58cf853bab85ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68542-missing-authorization-in-vgdevsolut-4bad2e8c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68542%3A%20Missing%20Authorization%20in%20vgdevsolutions%20Checkout%20Gateway%20for%20IRIS&amp;severity=medium&amp;id=6998c9f0be58cf853bab85b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68541-deserialization-of-untrusted-data-i-129a58cb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68541%3A%20Deserialization%20of%20Untrusted%20Data%20in%20BoldThemes%20Ippsum&amp;severity=critical&amp;id=6998c9efbe58cf853bab857d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68539-improper-control-of-filename-for-in-ce4a1980</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68539%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Fana&amp;severity=high&amp;id=6998c9efbe58cf853bab857a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68536-improper-control-of-filename-for-in-c935bbb3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68536%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Zota&amp;severity=high&amp;id=6998c9efbe58cf853bab8577</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68534-missing-authorization-in-add-onsorg-81e370f4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68534%3A%20Missing%20Authorization%20in%20add-ons.org%20PDF%20for%20WPForms&amp;severity=medium&amp;id=6998c9efbe58cf853bab8574</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68531-deserialization-of-untrusted-data-i-863bd6f5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68531%3A%20Deserialization%20of%20Untrusted%20Data%20in%20modeltheme%20ModelTheme%20Addons%20for%20WPBakery%20and%20Elementor&amp;severity=high&amp;id=6998c9efbe58cf853bab8571</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68526-deserialization-of-untrusted-data-i-cbe087a9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68526%3A%20Deserialization%20of%20Untrusted%20Data%20in%20A%20WP%20Life%20Modal%20Popup%20Box&amp;severity=high&amp;id=6998c9efbe58cf853bab856e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68514-authorization-bypass-through-user-c-16b1a07c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68514%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Cozmoslabs%20Paid%20Member%20Subscriptions&amp;severity=medium&amp;id=6998c9efbe58cf853bab856b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68501-improper-neutralization-of-input-du-bb80394a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68501%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mollie%20Mollie%20Payments%20for%20WooCommerce&amp;severity=high&amp;id=6998c9efbe58cf853bab8568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68495-improper-neutralization-of-input-du-a12344e3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68495%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetEngine&amp;severity=high&amp;id=6998c9efbe58cf853bab8565</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68069-missing-authorization-in-wpwax-dire-46097e51</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68069%3A%20Missing%20Authorization%20in%20wpWax%20Directorist&amp;severity=high&amp;id=6998c9efbe58cf853bab8562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68048-missing-authorization-in-xlplugins--6cbcdeeb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68048%3A%20Missing%20Authorization%20in%20XLPlugins%20NextMove%20Lite&amp;severity=high&amp;id=6998c9edbe58cf853bab853a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68037-improper-neutralization-of-input-du-72ad97fa</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68037%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Atlas%20Gondal%20Export%20Media%20URLs&amp;severity=high&amp;id=6998c9edbe58cf853bab8537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68032-missing-authorization-in-passionate-ce65cf7a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68032%3A%20Missing%20Authorization%20in%20Passionate%20Brains%20Advanced%20WC%20Analytics&amp;severity=medium&amp;id=6998c9edbe58cf853bab8534</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68031-improper-neutralization-of-input-du-36f5d8bc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68031%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)&amp;severity=high&amp;id=6998c9edbe58cf853bab8531</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68028-missing-authorization-in-passionate-0531b7c1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68028%3A%20Missing%20Authorization%20in%20Passionate%20Brains%20GA4WP%3A%20Google%20Analytics%20for%20WordPress&amp;severity=medium&amp;id=6998c9edbe58cf853bab852e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68026-missing-authorization-in-niaj-morsh-decb3063</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68026%3A%20Missing%20Authorization%20in%20Niaj%20Morshed%20LC%20Wizard&amp;severity=medium&amp;id=6998c9edbe58cf853bab852b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68025-missing-authorization-in-addonify-a-80dba42c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68025%3A%20Missing%20Authorization%20in%20Addonify%20Addonify%20Floating%20Cart%20For%20WooCommerce&amp;severity=medium&amp;id=6998c9edbe58cf853bab8528</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68024-missing-authorization-in-addonify-a-946402e4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68024%3A%20Missing%20Authorization%20in%20Addonify%20Addonify%20%E2%80%93%20WooCommerce%20Wishlist&amp;severity=medium&amp;id=6998c9edbe58cf853bab8525</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68023-missing-authorization-in-addonify-a-eac8ceeb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68023%3A%20Missing%20Authorization%20in%20Addonify%20Addonify%20%E2%80%93%20Compare%20Products%20For%20WooCommerce&amp;severity=medium&amp;id=6998c9edbe58cf853bab8522</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68022-missing-authorization-in-soporteblu-ee8ea804</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68022%3A%20Missing%20Authorization%20in%20soporteblue%20Plugin%20BlueX%20for%20WooCommerce&amp;severity=high&amp;id=6998c9edbe58cf853bab851f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68005-missing-authorization-in-themewant--1a4a0af9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68005%3A%20Missing%20Authorization%20in%20themewant%20Easy%20Hotel%20Booking&amp;severity=medium&amp;id=6998c9ecbe58cf853bab84dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68002-improper-limitation-of-a-pathname-t-04dee762</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68002%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20100plugins%20Open%20User%20Map&amp;severity=medium&amp;id=6998c9ecbe58cf853bab84da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68000-missing-authorization-in-pickplugin-6f6543a3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68000%3A%20Missing%20Authorization%20in%20PickPlugins%20Testimonial%20Slider&amp;severity=medium&amp;id=6998c9ecbe58cf853bab84d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67998-authentication-bypass-using-an-alte-c4558126</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67998%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20kamleshyadav%20Miraculous%20Elementor&amp;severity=high&amp;id=6998c9ecbe58cf853bab84d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67997-deserialization-of-untrusted-data-i-ea8428bc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67997%3A%20Deserialization%20of%20Untrusted%20Data%20in%20BoldThemes%20Travelicious&amp;severity=critical&amp;id=6998c9ecbe58cf853bab84d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67996-deserialization-of-untrusted-data-i-0cb61011</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67996%3A%20Deserialization%20of%20Untrusted%20Data%20in%20BoldThemes%20Nestin&amp;severity=critical&amp;id=6998c9ecbe58cf853bab84ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67995-deserialization-of-untrusted-data-i-acd7a12c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67995%3A%20Deserialization%20of%20Untrusted%20Data%20in%20LoftOcean%20PatioTime&amp;severity=critical&amp;id=6998c9ecbe58cf853bab84cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67994-missing-authorization-in-yaycommerc-c7ea2cf4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67994%3A%20Missing%20Authorization%20in%20YayCommerce%20YayCurrency&amp;severity=high&amp;id=6998c9ecbe58cf853bab84c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67993-missing-authorization-in-vito-peleg-3197c6fa</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67993%3A%20Missing%20Authorization%20in%20Vito%20Peleg%20Atarim&amp;severity=medium&amp;id=6998c9ecbe58cf853bab84c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67992-improper-control-of-filename-for-in-679a1900</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67992%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20LoftOcean%20PatioTime&amp;severity=high&amp;id=6998c9ecbe58cf853bab84c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67991-improper-neutralization-of-input-du-776021b1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67991%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vanquish%20User%20Extra%20Fields&amp;severity=high&amp;id=6998c9eabe58cf853bab835c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67990-improper-neutralization-of-input-du-3006f4c4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67990%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RealMag777%20GMap%20Targeting&amp;severity=high&amp;id=6998c9eabe58cf853bab8359</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67988-improper-control-of-filename-for-in-236db501</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67988%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20LoftOcean%20CozyStay&amp;severity=high&amp;id=6998c9eabe58cf853bab8356</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67987-improper-neutralization-of-special--112bf3eb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67987%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ExpressTech%20Systems%20Quiz%20And%20Survey%20Master&amp;severity=high&amp;id=6998c9eabe58cf853bab8353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67984-improper-neutralization-of-input-du-e2f8e180</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67984%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20calliko%20NPS%20computy&amp;severity=high&amp;id=6998c9eabe58cf853bab8350</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67982-improper-control-of-filename-for-in-712cbfe8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67982%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Urna&amp;severity=high&amp;id=6998c9eabe58cf853bab834d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67981-improper-control-of-filename-for-in-f1219db4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67981%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Besa&amp;severity=high&amp;id=6998c9eabe58cf853bab834a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67980-improper-control-of-filename-for-in-9a55cb06</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67980%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Hara&amp;severity=high&amp;id=6998c9eabe58cf853bab8347</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67979-improper-control-of-generation-of-c-bb0bfd2a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67979%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20WesternDeal%20WPForms%20Google%20Sheet%20Connector&amp;severity=critical&amp;id=6998c9eabe58cf853bab8344</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67978-improper-neutralization-of-input-du-9190c74a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67978%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20FixBD%20Educare&amp;severity=high&amp;id=6998c9eabe58cf853bab8341</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67977-missing-authorization-in-villatheme-4000ddd1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67977%3A%20Missing%20Authorization%20in%20VillaTheme%20HAPPY&amp;severity=high&amp;id=6998c9e9be58cf853bab830e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67974-missing-authorization-in-wp-legal-p-e9f4f790</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67974%3A%20Missing%20Authorization%20in%20WP%20Legal%20Pages%20WPLegalPages&amp;severity=high&amp;id=6998c9e9be58cf853bab830b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67973-missing-authorization-in-sunshineph-1ae5502d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67973%3A%20Missing%20Authorization%20in%20sunshinephotocart%20Sunshine%20Photo%20Cart&amp;severity=medium&amp;id=6998c9e9be58cf853bab8308</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67972-improper-neutralization-of-input-du-b07efd45</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67972%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fox-themes%20Prague&amp;severity=high&amp;id=6998c9e9be58cf853bab8305</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67971-improper-neutralization-of-input-du-41121860</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67971%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPManageNinja%20FluentCart&amp;severity=high&amp;id=6998c9e9be58cf853bab8302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67970-missing-authorization-in-vertim-sch-71e7bfbc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67970%3A%20Missing%20Authorization%20in%20vertim%20Schedula&amp;severity=medium&amp;id=6998c9e9be58cf853bab82ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67969-missing-authorization-in-knitpay-up-14cf04d7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67969%3A%20Missing%20Authorization%20in%20knitpay%20UPI%20QR%20Code%20Payment%20Gateway%20for%20WooCommerce&amp;severity=medium&amp;id=6998c9e9be58cf853bab82fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67624-missing-authorization-in-arya-dhira-fa3ec6c7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67624%3A%20Missing%20Authorization%20in%20Arya%20Dhiratara%20Optimize%20More!%20%E2%80%93%20Images&amp;severity=medium&amp;id=6998c9e9be58cf853bab82f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67547-missing-authorization-in-uixthemes--a2440eab</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67547%3A%20Missing%20Authorization%20in%20uixthemes%20Konte&amp;severity=medium&amp;id=6998c9e9be58cf853bab82f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60183-improper-neutralization-of-input-du-63f9a290</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60183%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20silence%20Silencesoft%20RSS%20Reader&amp;severity=medium&amp;id=6998c9e9be58cf853bab82f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60087-improper-control-of-filename-for-in-3f1b81bf</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60087%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Nenad%20Obradovic%20Extensive%20VC%20Addons%20for%20WPBakery%20page%20builder&amp;severity=high&amp;id=6998c9e8be58cf853bab82e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53237-improper-neutralization-of-input-du-1c83c219</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53237%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Soflyy%20WP%20Wizard%20Cloak&amp;severity=high&amp;id=6998c9e8be58cf853bab82e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53233-improper-neutralization-of-input-du-2e3f291a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53233%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RylanH%20Storyform&amp;severity=high&amp;id=6998c9e8be58cf853bab82e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53231-improper-neutralization-of-input-du-8073dcd8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53231%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevstudio%20Easy%20Taxonomy%20Images&amp;severity=high&amp;id=6998c9e8be58cf853bab82dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53228-improper-neutralization-of-input-du-f0496251</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53228%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jezza101%20bbpress%20Simple%20Advert%20Units&amp;severity=high&amp;id=6998c9e8be58cf853bab82da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53217-missing-authorization-in-staviravn--0ff7bc23</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53217%3A%20Missing%20Authorization%20in%20staviravn%20AIO%20WP%20Builder&amp;severity=high&amp;id=6998c9e8be58cf853bab82d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52744-improper-control-of-generation-of-c-a7a31bdc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52744%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20inpersttion%20Inpersttion%20For%20Theme&amp;severity=high&amp;id=6998c9e8be58cf853bab82d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56208-improper-neutralization-of-input-du-1b25fa8f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56208%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20desertthemes%20NewsMash&amp;severity=medium&amp;id=6998c9e8be58cf853bab82d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54222-missing-authorization-in-seraphinit-70be42d4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54222%3A%20Missing%20Authorization%20in%20Seraphinite%20Solutions%20Seraphinite%20Accelerator&amp;severity=medium&amp;id=6998c9e8be58cf853bab82ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52387-improper-neutralization-of-input-du-a433f62f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52387%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Liton%20Arefin%20Master%20Addons%20for%20Elementor&amp;severity=medium&amp;id=6998c9e8be58cf853bab82cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51915-improper-neutralization-of-input-du-bfa7ecbf</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51915%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LiteSpeed%20Technologies%20LiteSpeed%20Cache&amp;severity=medium&amp;id=6998c9e7be58cf853bab82be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50555-improper-neutralization-of-input-du-894cf101</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50555%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Elementor%20Elementor%20Website%20Builder&amp;severity=medium&amp;id=6998c9e7be58cf853bab82bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50452-improper-neutralization-of-input-du-ad138d1d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50452%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20POSIMYTH%20Nexter%20Blocks&amp;severity=medium&amp;id=6998c9e7be58cf853bab82b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43228-missing-authorization-in-secupress--cc2fda00</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43228%3A%20Missing%20Authorization%20in%20SecuPress%20SecuPress%20Free&amp;severity=medium&amp;id=6998c9e7be58cf853bab82b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34438-missing-authorization-in-anssi-lait-aeee1e22</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34438%3A%20Missing%20Authorization%20in%20Anssi%20Laitila%20Shared%20Files&amp;severity=medium&amp;id=6998c9e7be58cf853bab82b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22885-cwe-125-in-enocean-edge-inc-smartse-f22a8efc</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22885%3A%20CWE-125%20in%20EnOcean%20Edge%20Inc%20SmartServer%20IoT&amp;severity=low&amp;id=6998c0ac2c4d84f260ce40ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20761-cwe-77-in-enocean-edge-inc-smartser-9757ab30</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20761%3A%20CWE-77%20in%20EnOcean%20Edge%20Inc%20SmartServer%20IoT&amp;severity=high&amp;id=6998c42f2c4d84f260d0409d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2847-os-command-injection-in-utt-hiper-52-018dc81b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2847%3A%20OS%20Command%20Injection%20in%20UTT%20HiPER%20520&amp;severity=high&amp;id=6998ca03be58cf853bab939f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2846-os-command-injection-in-utt-hiper-52-0e4310ed</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2846%3A%20OS%20Command%20Injection%20in%20UTT%20HiPER%20520&amp;severity=high&amp;id=6998ca03be58cf853bab9399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-ransomware-shuts-us-clinics-ics-vuln-e4a097e6</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20Ransomware%20Shuts%20US%20Clinics%2C%20ICS%20Vulnerability%20Surge%2C%20European%20Parliament%20Bans%20AI&amp;severity=medium&amp;id=6998812d2c4d84f260a7f175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52603-cwe-213-exposure-of-sensitive-infor-70398438</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52603%3A%20CWE-213%20%20Exposure%20of%20Sensitive%20Information%20Due%20to%20Incompatible%20Schemas%20in%20HCLSoftware%20Connections&amp;severity=low&amp;id=6998c9e1be58cf853bab6aaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mimicrat-clickfix-campaign-delivers-custom-rat-via-6562c0b2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MIMICRAT%3A%20ClickFix%20Campaign%20Delivers%20Custom%20RAT%20via%20Compromised%20Legitimate%20Websites&amp;severity=medium&amp;id=6998d62bbe58cf853bbef474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14055-cwe-191-integer-underflow-wrap-or-w-90759bce</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14055%3A%20CWE-191%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20silabs.com%20Simplicity%20SDK%2C%20Gecko%20SDK&amp;severity=low&amp;id=69987a5a2c4d84f260a3d5a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21627-cwe-284-improper-access-control-in--2cdc7bab</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21627%3A%20CWE-284%20Improper%20Access%20Control%20in%20tassos.gr%20Novarain%2FTassos%20Framework%20(plg_system_nrframework)&amp;severity=critical&amp;id=69986fcd2c4d84f2609bdee0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14547-cwe-191-integer-underflow-wrap-or-w-929387be</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14547%3A%20CWE-191%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20silabs.com%20Simplicity%20SDK&amp;severity=low&amp;id=69986fcd2c4d84f2609bdedd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beyondtrust-vulnerability-exploited-in-ransomware--5bc2f812</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BeyondTrust%20Vulnerability%20Exploited%20in%20Ransomware%20Attacks&amp;severity=medium&amp;id=699856fd2c4d84f26027f687</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10970-cwe-89-improper-neutralization-of-s-93695009</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10970%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Kolay%20Software%20Inc.%20Talentics&amp;severity=critical&amp;id=699849242c4d84f260e0c473</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2486-cwe-79-improper-neutralization-of-in-1483f93c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2486%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20litonice13%20Master%20Addons%20For%20Elementor%20%E2%80%93%20Widgets%2C%20Extensions%2C%20Theme%20Builder%2C%20Popup%20Builder%20%26%20Template%20Kits&amp;severity=medium&amp;id=699849242c4d84f260e0c476</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-20-million-losses-caused-by-700-atm-jackpottin-96c1ed05</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%3A%20%2420%20Million%20Losses%20Caused%20by%20700%20ATM%20Jackpotting%20Attacks%20in%202025&amp;severity=medium&amp;id=699841e52c4d84f260dc08ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21620-cwe-23-relative-path-traversal-in-e-c649a935</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21620%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20Erlang%20OTP&amp;severity=low&amp;id=699842282c4d84f260dc3158</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chip-testing-giant-advantest-hit-by-ransomware-94fb5275</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chip%20Testing%20Giant%20Advantest%20Hit%20by%20Ransomware&amp;severity=medium&amp;id=69982ccd2c4d84f260d68ffe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26050-uncontrolled-search-path-element-in-8a10be9e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26050%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Ricoh%20Company%2C%20Ltd.%20%E3%82%B8%E3%83%A7%E3%83%96%E3%83%AD%E3%82%B0%E9%9B%86%E8%A8%88%2F%E5%88%86%E6%9E%90%E3%82%BD%E3%83%95%E3%83%88%E3%82%A6%E3%82%A7%E3%82%A2%20RICOH%E3%82%B8%E3%83%A7%E3%83%96%E3%83%AD%E3%82%B0%E9%9B%86%E8%A8%88%E3%83%84%E3%83%BC%E3%83%AB&amp;severity=high&amp;id=69981b6d2c4d84f260ba1514</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59819-vulnerability-in-zenitel-alphacomxe-52bf65ac</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59819%3A%20Vulnerability%20in%20zenitel%20alphacom_xe_audio_server&amp;severity=medium&amp;id=699817e92c4d84f260b3b7ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26370-cross-site-scripting-xss-in-ays-pro-56c43348</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26370%3A%20Cross-site%20scripting%20(XSS)%20in%20Ays%20Pro%20Survey%20Maker&amp;severity=medium&amp;id=699814672c4d84f260b0ab28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/promptspy-android-malware-abuses-gemini-ai-at-runt-c11b47db</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PromptSpy%20Android%20Malware%20Abuses%20Gemini%20AI%20at%20Runtime%20for%20Persistence&amp;severity=medium&amp;id=69980a3dd7880ec89b828a3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2825-cross-site-scripting-in-rachelos-wer-0b8688e2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2825%3A%20Cross%20Site%20Scripting%20in%20rachelos%20WeRSS%20we-mp-rss&amp;severity=medium&amp;id=6997ffe5d7880ec89b7f6308</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2824-command-injection-in-comfast-cf-e7-9473cc19</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2824%3A%20Command%20Injection%20in%20Comfast%20CF-E7&amp;severity=medium&amp;id=6997f559d7880ec89b7a587f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2823-command-injection-in-comfast-cf-e7-d06bcd96</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2823%3A%20Command%20Injection%20in%20Comfast%20CF-E7&amp;severity=medium&amp;id=6997ee52d7880ec89b7878ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2739-infinite-loop-in-bnjs-275193c4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2739%3A%20Infinite%20loop%20in%20bn.js&amp;severity=medium&amp;id=6997ee52d7880ec89b7878a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2822-sql-injection-in-jeecgboot-80678eca</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2822%3A%20SQL%20Injection%20in%20JeecgBoot&amp;severity=medium&amp;id=6997e749d7880ec89b76b0c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26996-cwe-1333-inefficient-regular-expres-e16ebdd4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26996%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20isaacs%20minimatch&amp;severity=high&amp;id=6997d231d7880ec89b52f4e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26994-cwe-693-protection-mechanism-failur-b9c23838</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26994%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20refraction-networking%20utls&amp;severity=medium&amp;id=6997d231d7880ec89b52f4db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27017-cwe-1240-use-of-a-cryptographic-pri-4912fee6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27017%3A%20CWE-1240%3A%20Use%20of%20a%20Cryptographic%20Primitive%20with%20a%20Risky%20Implementation%20in%20refraction-networking%20utls&amp;severity=low&amp;id=6997d231d7880ec89b52f4e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26993-cwe-79-improper-neutralization-of-i-e0932b1a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26993%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20FlintSH%20Flare&amp;severity=medium&amp;id=6997d231d7880ec89b52f4d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2821-sql-injection-in-fujian-smart-integr-beb955f4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2821%3A%20SQL%20Injection%20in%20Fujian%20Smart%20Integrated%20Management%20Platform%20System&amp;severity=medium&amp;id=6997d231d7880ec89b52f4ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2384-cwe-79-improper-neutralization-of-in-9ab065e5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2384%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ays-pro%20Quiz%20Maker&amp;severity=medium&amp;id=6997d231d7880ec89b52f4ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2820-sql-injection-in-fujian-smart-integr-6e17dc32</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2820%3A%20SQL%20Injection%20in%20Fujian%20Smart%20Integrated%20Management%20Platform%20System&amp;severity=medium&amp;id=6997c421d7880ec89b4b332d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26065-cwe-22-improper-limitation-of-a-pat-53326093</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26065%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20kovidgoyal%20calibre&amp;severity=critical&amp;id=6997c421d7880ec89b4b3324</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26064-cwe-22-improper-limitation-of-a-pat-71d04e0e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26064%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20kovidgoyal%20calibre&amp;severity=critical&amp;id=6997c421d7880ec89b4b3320</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2819-missing-authorization-in-dromara-ruo-8f2bcf3f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2819%3A%20Missing%20Authorization%20in%20Dromara%20RuoYi-Vue-Plus&amp;severity=medium&amp;id=6997c421d7880ec89b4b3328</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26960-cwe-22-improper-limitation-of-a-pat-f4c7978c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26960%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20isaacs%20node-tar&amp;severity=high&amp;id=6997b995d7880ec89b49375c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26980-cwe-89-improper-neutralization-of-s-8eb7ae8a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26980%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TryGhost%20Ghost&amp;severity=critical&amp;id=6997b995d7880ec89b493764</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26977-cwe-862-missing-authorization-in-fr-ffbb104f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26977%3A%20CWE-862%3A%20Missing%20Authorization%20in%20frappe%20lms&amp;severity=medium&amp;id=6997b995d7880ec89b493761</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26975-cwe-73-external-control-of-file-nam-f0001b29</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26975%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20music-assistant%20server&amp;severity=high&amp;id=6997b28bd7880ec89b4763b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26974-cwe-829-inclusion-of-functionality--308fd3d3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26974%3A%20CWE-829%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20Tygo-van-den-Hurk%20Slyde&amp;severity=high&amp;id=6997b28bd7880ec89b4763ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30416-cwe-862-in-acronis-acronis-cyber-pr-18eb4836</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30416%3A%20CWE-862%20in%20Acronis%20Acronis%20Cyber%20Protect%2016&amp;severity=critical&amp;id=6997b28bd7880ec89b4763a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30410-cwe-306-in-acronis-acronis-cyber-pr-860d526f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30410%3A%20CWE-306%20in%20Acronis%20Acronis%20Cyber%20Protect%20Cloud%20Agent&amp;severity=critical&amp;id=6997b28bd7880ec89b47639b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30412-cwe-1390-in-acronis-acronis-cyber-p-987c0858</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30412%3A%20CWE-1390%20in%20Acronis%20Acronis%20Cyber%20Protect%2016&amp;severity=critical&amp;id=6997b28bd7880ec89b4763a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30411-cwe-1390-in-acronis-acronis-cyber-p-fb33b5b6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30411%3A%20CWE-1390%20in%20Acronis%20Acronis%20Cyber%20Protect%2016&amp;severity=critical&amp;id=6997b28bd7880ec89b47639e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26967-cwe-122-heap-based-buffer-overflow--08daf09a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26967%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20pjsip%20pjproject&amp;severity=high&amp;id=6997b28bd7880ec89b4763a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-20-83513d60</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-20&amp;severity=medium&amp;id=6998f951be58cf853be4de6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67438-na-a723b11f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67438%3A%20n%2Fa&amp;severity=medium&amp;id=6998ca03be58cf853bab9395</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70831-na-fa79fcf8</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70831%3A%20n%2Fa&amp;severity=critical&amp;id=6998c9ffbe58cf853bab91d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26722-na-4b78286c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26722%3A%20n%2Fa&amp;severity=critical&amp;id=6998c9e7be58cf853bab82a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26721-na-eb123149</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26721%3A%20n%2Fa&amp;severity=high&amp;id=6998c9e7be58cf853bab829d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70833-na-f5cb3103</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70833%3A%20n%2Fa&amp;severity=critical&amp;id=6998c9e7be58cf853bab829a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26745-na-81cf31d0</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26745%3A%20n%2Fa&amp;severity=medium&amp;id=6998c9e6be58cf853bab77eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26747-na-b48669ef</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26747%3A%20n%2Fa&amp;severity=critical&amp;id=6998c9e6be58cf853bab77d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26746-na-0aa41fc0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26746%3A%20n%2Fa&amp;severity=high&amp;id=69988bee2c4d84f260ae23de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26725-na-693f5a50</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26725%3A%20n%2Fa&amp;severity=critical&amp;id=69988bee2c4d84f260ae23db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26724-na-c05ea1f7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26724%3A%20n%2Fa&amp;severity=high&amp;id=69988bee2c4d84f260ae23d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26723-na-edc024f1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26723%3A%20n%2Fa&amp;severity=high&amp;id=69988bee2c4d84f260ae23d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-02-20-dbe5a726</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-02-20&amp;severity=medium&amp;id=699848ea2c4d84f260df6052</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-20-483261dc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-20&amp;severity=low&amp;id=6997bce2d7880ec89b49f57a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26964-cwe-200-exposure-of-sensitive-infor-8aa0004f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26964%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20windmill-labs%20windmill&amp;severity=low&amp;id=6997a804d7880ec89b3e50e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26957-cwe-209-generation-of-error-message-7d2335a7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26957%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20abhinavxd%20github.com%2Fabhinavxd%2Flibredesk&amp;severity=medium&amp;id=6997a0f9d7880ec89b3c537a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26959-cwe-829-inclusion-of-functionality--f5a9dc71</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26959%3A%20CWE-829%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20Alex4SSB%20ADB-Explorer&amp;severity=high&amp;id=69979d74d7880ec89b3b86a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2350-insertion-of-sensitive-information-i-31b4d7ec</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2350%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Tanium%20Interact&amp;severity=medium&amp;id=699799f2d7880ec89b3a60c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1292-insertion-of-sensitive-information-i-909b0d7f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1292%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Tanium%20Trends&amp;severity=medium&amp;id=699799f2d7880ec89b3a60be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2605-insertion-of-sensitive-information-i-48b70d08</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2605%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Tanium%20TanOS&amp;severity=medium&amp;id=699799f2d7880ec89b3a60ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2408-use-after-free-in-tanium-cloud-workl-a7d99991</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2408%3A%20Use%20After%20Free%20in%20Tanium%20Cloud%20Workloads&amp;severity=medium&amp;id=699799f2d7880ec89b3a60c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2435-improper-neutralization-of-special-e-0dedcf2a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2435%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Tanium%20Asset&amp;severity=medium&amp;id=699799f2d7880ec89b3a60c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26958-cwe-665-improper-initialization-in--5a8d8b28</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26958%3A%20CWE-665%3A%20Improper%20Initialization%20in%20FiloSottile%20filippo.io%2Fedwards25519&amp;severity=low&amp;id=699799f2d7880ec89b3a60d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26953-cwe-20-improper-input-validation-in-8d5e6ff8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26953%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20pi-hole%20web&amp;severity=medium&amp;id=699799f2d7880ec89b3a60cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26952-cwe-20-improper-input-validation-in-df9bf6c0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26952%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20pi-hole%20web&amp;severity=medium&amp;id=6997966bd7880ec89b39b1c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1658-cwe-451-user-interface-ui-misreprese-a1f01e7c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1658%3A%20CWE-451%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20OpenText%E2%84%A2%20Directory%20Services&amp;severity=medium&amp;id=6997966bd7880ec89b39b1c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9208-cwe-79-improper-neutralization-of-in-929ee02c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9208%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20OpenText%E2%84%A2%20Web%20Site%20Management%20Server&amp;severity=high&amp;id=6997966bd7880ec89b39b1c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13671-cwe-352-cross-site-request-forgery--32f486e3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13671%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20OpenText%E2%84%A2%20Web%20Site%20Management%20Server&amp;severity=medium&amp;id=6997966bd7880ec89b39b1bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13672-cwe-79-improper-neutralization-of-i-90740624</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13672%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20OpenText%E2%84%A2%20Web%20Site%20Management%20Server&amp;severity=high&amp;id=6997966bd7880ec89b39b1c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24122-cwe-295-improper-certificate-valida-6ee03aa4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24122%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20sigstore%20cosign&amp;severity=low&amp;id=69978f65d7880ec89b384555</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8054-cwe-22-improper-limitation-of-a-path-4a1532b2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8054%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20OpenText%E2%84%A2%20XM%20Fax&amp;severity=high&amp;id=69978f65d7880ec89b38454f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8055-cwe-918-server-side-request-forgery--f0ad7d95</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8055%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20OpenText%E2%84%A2%20XM%20Fax&amp;severity=medium&amp;id=69978f65d7880ec89b384552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21535-cwe-284-improper-access-control-in--009ed0d5</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21535%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20Teams&amp;severity=high&amp;id=699812ae2c4d84f260aeb027</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26275-cwe-354-improper-validation-of-inte-950dde7b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26275%3A%20CWE-354%3A%20Improper%20Validation%20of%20Integrity%20Check%20Value%20in%20junkurihara%20httpsig-rs&amp;severity=high&amp;id=699784dbd7880ec89b358466</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26315-cwe-203-observable-discrepancy-in-e-62cd0e05</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26315%3A%20CWE-203%3A%20Observable%20Discrepancy%20in%20ethereum%20go-ethereum&amp;severity=medium&amp;id=69978157d7880ec89b34978b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26314-cwe-20-improper-input-validation-in-4cb96009</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26314%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20ethereum%20go-ethereum&amp;severity=high&amp;id=69978157d7880ec89b349786</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26313-cwe-770-allocation-of-resources-wit-4e11e521</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26313%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20ethereum%20go-ethereum&amp;severity=medium&amp;id=69977dd1d7880ec89b33bbe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26312-cwe-770-allocation-of-resources-wit-7acc7255</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26312%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20stalwartlabs%20stalwart&amp;severity=medium&amp;id=69977dd1d7880ec89b33bbe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27114-cwe-835-loop-with-unreachable-exit--1b68482c</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27114%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20M2Team%20NanaZip&amp;severity=medium&amp;id=69977dd1d7880ec89b33bbea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27014-cwe-674-uncontrolled-recursion-in-m-f769ac9a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27014%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20M2Team%20NanaZip&amp;severity=medium&amp;id=699812af2c4d84f260aeb048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27476-improper-neutralization-of-special--c7ddf948</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27476%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Bixat%20RustFly&amp;severity=critical&amp;id=699812af2c4d84f260aeb05d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26282-cwe-126-buffer-over-read-in-m2team--9d414d04</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26282%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20M2Team%20NanaZip&amp;severity=medium&amp;id=699812af2c4d84f260aeb044</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27440-improper-neutralization-of-input-du-8b27954b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27440%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Saad%20Iqbal%20myCred&amp;severity=medium&amp;id=699812af2c4d84f260aeb05a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27387-missing-authorization-in-designinve-9c9522c2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27387%3A%20Missing%20Authorization%20in%20Designinvento%20DirectoryPress&amp;severity=medium&amp;id=699812af2c4d84f260aeb057</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27368-missing-authorization-in-seedprod-c-d0069c9f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27368%3A%20Missing%20Authorization%20in%20SeedProd%20Coming%20Soon%20Page%2C%20Under%20Construction%20%26%20Maintenance%20Mode%20by%20SeedProd&amp;severity=medium&amp;id=699812af2c4d84f260aeb054</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27360-improper-neutralization-of-input-du-2e9761ab</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27360%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%2010Web%20Photo%20Gallery%20by%2010Web&amp;severity=medium&amp;id=699812af2c4d84f260aeb051</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27343-improper-control-of-filename-for-in-8ee1e181</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27343%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20VanKarWai%20Airtifact&amp;severity=high&amp;id=699812af2c4d84f260aeb04e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27328-missing-authorization-in-devsblink--83eee8d4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27328%3A%20Missing%20Authorization%20in%20DevsBlink%20EduBlink&amp;severity=medium&amp;id=699784dbd7880ec89b35847f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27327-missing-authorization-in-yaycommerc-2d0152ca</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27327%3A%20Missing%20Authorization%20in%20YayCommerce%20YayMail&amp;severity=medium&amp;id=699812af2c4d84f260aeb04b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/android-threats-using-genai-usher-in-a-new-era-6e840891</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Android%20threats%20using%20GenAI%20usher%20in%20a%20new%20era&amp;severity=medium&amp;id=69985e042c4d84f2604e723d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2738-cwe-131-incorrect-calculation-of-buf-20bc2c53</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2738%3A%20CWE-131%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20OpenVPN%20ovpn-dco-win&amp;severity=medium&amp;id=699812b02c4d84f260aeb081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26318-cwe-78-improper-neutralization-of-s-7d41b3c1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26318%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20sebhildebrandt%20systeminformation&amp;severity=high&amp;id=69978157d7880ec89b3497b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/under-the-hood-of-dynowiper-thu-feb-19th-48c2f7c7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Under%20the%20Hood%20of%20DynoWiper%2C%20(Thu%2C%20Feb%2019th)&amp;severity=medium&amp;id=69976885d7880ec89b2d6bb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26280-cwe-78-improper-neutralization-of-s-31a2a73c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26280%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20sebhildebrandt%20systeminformation&amp;severity=high&amp;id=69978157d7880ec89b3497ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26278-cwe-776-improper-restriction-of-rec-355d55b5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26278%3A%20CWE-776%3A%20Improper%20Restriction%20of%20Recursive%20Entity%20References%20in%20DTDs%20(&apos;XML%20Entity%20Expansion&apos;)%20in%20NaturalIntelligence%20fast-xml-parser&amp;severity=high&amp;id=69978157d7880ec89b3497a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27013-cwe-79-improper-neutralization-of-i-2ccb5e6d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27013%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fabricjs%20fabric.js&amp;severity=high&amp;id=69978157d7880ec89b3497cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26267-cwe-670-always-incorrect-control-fl-d3fc9f12</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26267%3A%20CWE-670%3A%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20stellar%20rs-soroban-sdk&amp;severity=high&amp;id=69978157d7880ec89b3497a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26205-cwe-863-incorrect-authorization-in--708376a8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26205%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20open-policy-agent%20opa-envoy-plugin&amp;severity=high&amp;id=69978157d7880ec89b34979b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26203-cwe-416-use-after-free-in-pjsip-pjm-a4f01553</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26203%3A%20CWE-416%3A%20Use%20After%20Free%20in%20pjsip%20pjmedia-video&amp;severity=medium&amp;id=69978157d7880ec89b349797</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26201-cwe-362-concurrent-execution-using--74d92c70</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26201%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20jm33-m0%20emp3r0r&amp;severity=high&amp;id=69978157d7880ec89b349792</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26200-cwe-122-heap-based-buffer-overflow--cf8f880a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26200%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20HDFGroup%20hdf5&amp;severity=high&amp;id=699784dbd7880ec89b35847c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26189-cwe-78-improper-neutralization-of-s-0d1acbd7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26189%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20aquasecurity%20trivy-action&amp;severity=medium&amp;id=699784dbd7880ec89b358477</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26063-cwe-20-improper-input-validation-in-f84fe624</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26063%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20xpertforextradeinc%20CediPay&amp;severity=high&amp;id=699784dbd7880ec89b358474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26059-cwe-79-improper-neutralization-of-i-dec12dc7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26059%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=low&amp;id=699784dbd7880ec89b358471</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26057-cwe-668-exposure-of-resource-to-wro-3cb17f96</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26057%3A%20CWE-668%3A%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20cisco-ai-defense%20skill-scanner&amp;severity=medium&amp;id=699784dbd7880ec89b35846d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23621-cwe-203-observable-discrepancy-in-g-89bef3ed</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23621%3A%20CWE-203%20Observable%20Discrepancy%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287c73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23620-cwe-203-observable-discrepancy-in-g-00e9e3a7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23620%3A%20CWE-203%20Observable%20Discrepancy%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287cc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23619-cwe-79-improper-neutralization-of-i-0ba70a1b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23619%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287cbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23618-cwe-79-improper-neutralization-of-i-0f203b95</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23618%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287cb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23617-cwe-79-improper-neutralization-of-i-1f682953</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23617%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287cb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23616-cwe-79-improper-neutralization-of-i-c76edad5</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23616%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287cb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23615-cwe-79-improper-neutralization-of-i-836d7073</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23615%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287cad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23614-cwe-79-improper-neutralization-of-i-3647667c</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23614%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287ca9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23613-cwe-79-improper-neutralization-of-i-4d93243b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23613%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287ca5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23612-cwe-79-improper-neutralization-of-i-6a6d684d</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23612%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287c97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23611-cwe-79-improper-neutralization-of-i-7afa1f4b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23611%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287c93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23610-cwe-79-improper-neutralization-of-i-baa9798b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23610%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287c8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23609-cwe-79-improper-neutralization-of-i-1ae29dc0</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23609%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287c8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23608-cwe-79-improper-neutralization-of-i-4186b949</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23608%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287c87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23607-cwe-79-improper-neutralization-of-i-d3ef599a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23607%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287c83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23606-cwe-79-improper-neutralization-of-i-ab3a8c9d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23606%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287c7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2409-cwe-89-improper-neutralization-of-sp-62e3fd17</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2409%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Delinea%20Cloud%20Suite&amp;severity=critical&amp;id=69975aafd7880ec89b287cc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23605-cwe-79-improper-neutralization-of-i-7eeab11c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23605%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287c7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23604-cwe-79-improper-neutralization-of-i-883f38b0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23604%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287c77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2243-out-of-bounds-read-in-red-hat-red-ha-6a33bed9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2243%3A%20Out-of-bounds%20Read&amp;severity=medium&amp;id=69975aafd7880ec89b287cc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2817-cwe-538-insertion-of-sensitive-infor-f124ebf9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2817%3A%20CWE-538%3A%20Insertion%20of%20Sensitive%20Information%20into%20Externally-Accessible%20File%20or%20Directory%20in%20VMware%20Spring%20Data%20Geode&amp;severity=medium&amp;id=69975ab1d7880ec89b287d18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26339-cwe-918-server-side-request-forgery-f1de4ab8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26339%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Hyland%20Alfresco%20Transformation%20Service%20(Enterprise)&amp;severity=critical&amp;id=699747f4532dc41ff8925d62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26338-cwe-918-server-side-request-forgery-b8fbc0b2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26338%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Hyland%20Alfresco%20Transformation%20Service%20(Enterprise)&amp;severity=medium&amp;id=699747f4532dc41ff8925d5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26337-cwe-36-absolute-path-traversal-in-h-328c4a75</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26337%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20Hyland%20Alfresco%20Transformation%20Service%20(Enterprise)&amp;severity=high&amp;id=699747f4532dc41ff8925d5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2232-cwe-89-improper-neutralization-of-sp-42d3fb6b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2232%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wcproducttable%20Product%20Table%20and%20List%20Builder%20for%20WooCommerce%20Lite&amp;severity=high&amp;id=699740bf3af16a0ef60c5452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1581-cwe-89-improper-neutralization-of-sp-1b58bb62</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1581%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20tomdever%20wpForo%20Forum&amp;severity=high&amp;id=699740bf3af16a0ef60c544c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26030-cwe-94-improper-control-of-generati-8c490551</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26030%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20microsoft%20semantic-kernel&amp;severity=critical&amp;id=69973b6be884a8a4cb409743</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26336-cwe-863-incorrect-authorization-in--91415450</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26336%3A%20CWE-863%20Incorrect%20Authorization%20in%20Hyland%20Alfresco%20Enterprise&amp;severity=high&amp;id=69973b6be884a8a4cb409748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26016-cwe-639-authorization-bypass-throug-e8901bb1</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26016%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20pterodactyl%20panel&amp;severity=critical&amp;id=69973b6be884a8a4cb40973f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25998-cwe-323-reusing-a-nonce-key-pair-in-650a41e8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25998%3A%20CWE-323%3A%20Reusing%20a%20Nonce%2C%20Key%20Pair%20in%20Encryption%20in%20strongswan%20strongMan&amp;severity=high&amp;id=69973b6be884a8a4cb40973c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25766-cwe-22-improper-limitation-of-a-pat-bf9abee8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25766%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20labstack%20echo&amp;severity=medium&amp;id=69973b6be884a8a4cb40974c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25940-cwe-116-improper-encoding-or-escapi-3b5e393d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25940%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20parallax%20jsPDF&amp;severity=high&amp;id=69973033732724e9dc4fe1d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/banners-bots-and-butchers-the-ai-driven-long-con-i-201d23f1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Banners%2C%20Bots%20and%20Butchers%3A%20The%20AI-Driven%20Long%20Con%20in%20Asia&amp;severity=medium&amp;id=69974c64d7880ec89b0185a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dns-used-to-hide-fake-investment-platform-schemes-6f0a62ac</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DNS%20Used%20to%20Hide%20Fake%20Investment%20Platform%20Schemes&amp;severity=medium&amp;id=69974fe8d7880ec89b065c1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uncovering-malicious-cryptocurrency-scam-domains-a-3f601d65</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Uncovering%20Malicious%20Cryptocurrency%20Scam%20Domains%20and%20Hacked%20YouTube%20Channels&amp;severity=medium&amp;id=69974fe8d7880ec89b065c04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clickfix-in-action-how-fake-captcha-can-encrypt-an-cb7d2d98</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ClickFix%20in%20action%3A%20how%20fake%20captcha%20can%20encrypt%20an%20entire%20company&amp;severity=medium&amp;id=69974fe8d7880ec89b065be4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-homebrew-pages-deliver-cuckoo-stealer-via-cli-06fd4ca1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Homebrew%20Pages%20Deliver%20Cuckoo%20Stealer%20via%20ClickFix%20%7C%20macOS%20Threat%20Hunting%20Analysis&amp;severity=medium&amp;id=69974fe8d7880ec89b065bd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-curious-case-of-the-triton-malware-fork-7ad7ab52</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Curious%20Case%20of%20the%20Triton%20Malware%20Fork&amp;severity=medium&amp;id=69974fe8d7880ec89b065bcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/invitation-to-trouble-the-rise-of-calendar-phishin-a8d550c4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Invitation%20to%20Trouble%3A%20The%20Rise%20of%20Calendar%20Phishing%20Attacks&amp;severity=medium&amp;id=69974fe8d7880ec89b065bbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2274-cwe-918-server-side-request-forgery--9b739968</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2274%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20AppSheet%20AppSheet%20Web%20(Main%20Server)&amp;severity=high&amp;id=69973033732724e9dc4fe1d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/french-government-says-12-million-bank-accounts-ex-c8159355</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=French%20Government%20Says%201.2%20Million%20Bank%20Accounts%20Exposed%20in%20Breach&amp;severity=medium&amp;id=699727c07e7f1adb9b09d85b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71250-37952455</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71250&amp;severity=null&amp;id=699812b02c4d84f260aeb08e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71249-9c5c2bd7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71249&amp;severity=null&amp;id=699812b02c4d84f260aeb08c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71248-06ef444d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71248&amp;severity=null&amp;id=699812b02c4d84f260aeb08a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71247-6402c740</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71247&amp;severity=null&amp;id=699812b02c4d84f260aeb088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71246-69173469</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71246&amp;severity=null&amp;id=69973033732724e9dc4fe1dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71245-8ab54884</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71245&amp;severity=null&amp;id=69973033732724e9dc4fe1db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71243-improper-control-of-generation-of-c-2638c8dc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71243%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20SPIP%20Saisies%20pour%20formulaire&amp;severity=critical&amp;id=69972933732724e9dc4156ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25755-cwe-94-improper-control-of-generati-50f78405</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25755%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20parallax%20jsPDF&amp;severity=high&amp;id=6997264f5215391843713250</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25535-cwe-400-uncontrolled-resource-consu-f7e35d0a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25535%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20parallax%20jsPDF&amp;severity=high&amp;id=6997264f521539184371324a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25527-cwe-22-improper-limitation-of-a-pat-fbd70c8f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25527%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20dgtlmoon%20changedetection.io&amp;severity=medium&amp;id=6997227c0018ac3e97d29273</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2744-a-blind-time-based-sql-injection-exi-c9474617</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2744&amp;severity=null&amp;id=699718e0b557332a80facb47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nearly-1-million-user-records-compromised-in-figur-3dddb4f0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nearly%201%20Million%20User%20Records%20Compromised%20in%20Figure%20Data%20Breach&amp;severity=medium&amp;id=69970e21b557332a80f47921</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ivanti-exploitation-surges-as-zero-day-attacks-tra-6b929eb3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ivanti%20Exploitation%20Surges%20as%20Zero-Day%20Attacks%20Traced%20Back%20to%20July%202025&amp;severity=medium&amp;id=6996fcc88fb9188dea8dc9b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9953-cwe-566-authorization-bypass-through-d2732060</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9953%3A%20CWE-566%20Authorization%20Bypass%20Through%20User-Controlled%20SQL%20Primary%20Key%20in%20DATABASE%20Software%20Training%20Consulting%20Ltd.%20Databank%20Accreditation%20Software&amp;severity=critical&amp;id=6996fd118fb9188dea8e12c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-exposure-to-exploitation-how-ai-collapses-you-4f26d7b1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Exposure%20to%20Exploitation%3A%20How%20AI%20Collapses%20Your%20Response%20Window&amp;severity=low&amp;id=6996fcb68fb9188dea8dba1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8350-cwe-698-execution-after-redirect-ear-309eb7b7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8350%3A%20CWE-698%20Execution%20After%20Redirect%20(EAR)%20in%20Inrove%20Software%20and%20Internet%20Services%20BiEticaret%20CMS&amp;severity=critical&amp;id=6996f9728fb9188dea8891b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/arkanix-stealer-targets-a-variety-of-data-offers-a-3dad42b8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Arkanix%20Stealer%20targets%20a%20variety%20of%20data%2C%20offers%20a%20MaaS%20referral%20program&amp;severity=medium&amp;id=69970717b557332a80d468e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dont-trustconnect-its-a-rat-in-an-rmm-hat-b510e7bd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=(Don&apos;t)%20TrustConnect%3A%20It&apos;s%20a%20RAT%20in%20an%20RMM%20hat&amp;severity=medium&amp;id=69970717b557332a80d468cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uncovering-malicious-oauth-campaigns-in-entra-id-98390171</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Uncovering%20Malicious%20OAuth%20Campaigns%20in%20Entra%20ID&amp;severity=medium&amp;id=69970717b557332a80d4689b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/when-your-iptv-app-terminates-your-savings-9a8666f5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=When%20your%20IPTV%20app%20terminates%20your%20savings&amp;severity=medium&amp;id=69970717b557332a80d468c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15563-cwe-862-missing-authorization-in-ne-95441c78</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15563%3A%20CWE-862%20Missing%20Authorization%20in%20NesterSoft%20Inc.%20WorkTime%20(on-prem%2Fcloud)&amp;severity=medium&amp;id=6996efe46aea4a407a546d33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openclaw-security-issues-continue-as-secureclaw-op-ca5db0ef</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenClaw%20Security%20Issues%20Continue%20as%20SecureClaw%20Open%20Source%20Tool%20Debuts&amp;severity=medium&amp;id=6996ef9e6aea4a407a546318</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9062-cwe-639-authorization-bypass-through-3859c6ad</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9062%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20MeCODE%20Informatics%20and%20Engineering%20Services%20Ltd.%20Envanty&amp;severity=high&amp;id=6996efe46aea4a407a546d36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15562-cwe-79-improper-neutralization-of-i-8a71ee5d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15562%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20NesterSoft%20Inc.%20WorkTime%20(on-prem%2Fcloud)&amp;severity=medium&amp;id=6996efe46aea4a407a546d30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15561-cwe-269-improper-privilege-manageme-7dcf7ca4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15561%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20NesterSoft%20Inc.%20WorkTime%20(on-prem%2Fcloud)&amp;severity=high&amp;id=6996efe46aea4a407a546d2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15560-cwe-89-improper-neutralization-of-s-f69ba2aa</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15560%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20NesterSoft%20Inc.%20WorkTime%20(on-prem%2Fcloud)&amp;severity=high&amp;id=6996efe46aea4a407a546d2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15559-cwe-78-improper-neutralization-of-s-b731eacc</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15559%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20NesterSoft%20Inc.%20WorkTime%20(on-prem%2Fcloud)&amp;severity=critical&amp;id=6996efe46aea4a407a546d27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13590-vulnerability-in-wso2-wso2-api-mana-b8162e66</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13590%3A%20Vulnerability%20in%20WSO2%20WSO2%20API%20Manager&amp;severity=critical&amp;id=6996e1c36aea4a407a50ab8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12107-cwe-1336-improper-neutralization-of-29bfd138</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12107%3A%20CWE-1336%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20WSO2%20WSO2%20Identity%20Server&amp;severity=high&amp;id=6996e1c36aea4a407a50ab8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1219-cwe-639-authorization-bypass-through-443dcd1e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1219%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20sonaar%20MP3%20Audio%20Player%20%E2%80%93%20Music%20Player%2C%20Podcast%20Player%20%26%20Radio%20by%20Sonaar&amp;severity=medium&amp;id=6996de3e6aea4a407a4fb0e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2718-cwe-79-improper-neutralization-of-in-6113053f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2718%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dealia%20Dealia%20%E2%80%93%20Request%20a%20quote&amp;severity=medium&amp;id=6996de3e6aea4a407a4fb0f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2716-cwe-79-improper-neutralization-of-in-872e7bb2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2716%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20amu02aftab%20Client%20Testimonial%20Slider&amp;severity=medium&amp;id=6996de3e6aea4a407a4fb0f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1461-cwe-230-improper-handling-of-missing-fe7cd9e2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1461%3A%20CWE-230%20Improper%20Handling%20of%20Missing%20Values%20in%20wpinsider-1%20Simple%20Membership&amp;severity=medium&amp;id=6996de3e6aea4a407a4fb0ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22267-cwe-266-incorrect-privilege-assignm-254d0ded</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22267%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Dell%20PowerProtect%20Data%20Manager&amp;severity=high&amp;id=6996fb458fb9188dea8c0109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/german-rail-giant-deutsche-bahn-hit-by-large-scale-ea70538e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=German%20Rail%20Giant%20Deutsche%20Bahn%20Hit%20by%20Large-Scale%20DDoS%20Attack&amp;severity=medium&amp;id=6996d7026aea4a407a4de64d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22268-cwe-266-incorrect-privilege-assignm-7bfe1e59</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22268%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Dell%20PowerProtect%20Data%20Manager&amp;severity=medium&amp;id=6996fb458fb9188dea8c010c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22266-cwe-146-improper-neutralization-of--6efabe7e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22266%3A%20CWE-146%3A%20Improper%20Neutralization%20of%20Expression%2FCommand%20Delimiters%20in%20Dell%20PowerProtect%20Data%20Manager&amp;severity=medium&amp;id=6996fb458fb9188dea8c0105</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22269-cwe-940-improper-verification-of-so-b7ee7e18</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22269%3A%20CWE-940%3A%20Improper%20Verification%20of%20Source%20of%20a%20Communication%20Channel%20in%20Dell%20PowerProtect%20Data%20Manager&amp;severity=medium&amp;id=6996d42f6aea4a407a4d2c51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41023-cwe-287-improper-authentication-in--2613c504</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41023%3A%20CWE-287%20Improper%20Authentication%20in%20Thesamur%20AutoGPT&amp;severity=medium&amp;id=6996d42f6aea4a407a4d2c4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26358-cwe-862-missing-authorization-in-de-3cb4a373</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26358%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Dell%20Unisphere%20for%20PowerMax&amp;severity=high&amp;id=6996d42f6aea4a407a4d2c54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40697-cwe-79-improper-neutralization-of-i-be69e57f</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40697%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Lewe%20WebMeasure&amp;severity=medium&amp;id=6996d42f6aea4a407a4d2c4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26360-cwe-73-external-control-of-file-nam-58de98ef</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26360%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Dell%20Unisphere%20for%20PowerMax&amp;severity=high&amp;id=6996d0406aea4a407a4bdbf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2736-cwe-79-improper-neutralization-of-in-36538f08</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2736%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Alkacon%20OpenCms&amp;severity=medium&amp;id=6996d0416aea4a407a4bdc84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishing-via-google-tasks-kaspersky-official-blog-67986fba</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishing%20via%20Google%20Tasks%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=6996cce46aea4a407a4aeea0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2735-cwe-79-improper-neutralization-of-in-2caebd8a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2735%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Alkacon%20OpenCms&amp;severity=medium&amp;id=6996d0416aea4a407a4bdc81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26359-cwe-73-external-control-of-file-nam-3c2b5529</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26359%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Dell%20Unisphere%20for%20PowerMax&amp;severity=high&amp;id=6996d0406aea4a407a4bdbf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27094-improper-neutralization-of-input-du-3a6ce8ee</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27094%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GoDaddy%20CoBlocks&amp;severity=medium&amp;id=6996d0416aea4a407a4bdc7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27092-missing-authorization-in-greg-winia-42c235cc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27092%3A%20Missing%20Authorization%20in%20Greg%20Winiarski%20WPAdverts&amp;severity=medium&amp;id=6996d0416aea4a407a4bdc7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27090-cross-site-request-forgery-csrf-in--21629815</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27090%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WP%20Moose%20Kenta%20Companion&amp;severity=medium&amp;id=6996d0416aea4a407a4bdc78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27074-improper-neutralization-of-input-du-ec830fd8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27074%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vaakash%20Shortcoder&amp;severity=medium&amp;id=6996d0416aea4a407a4bdc74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27069-improper-neutralization-of-input-du-d5ac6a7b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27069%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PenciDesign%20Soledad&amp;severity=medium&amp;id=6996d0416aea4a407a4bdc70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27066-missing-authorization-in-pi-web-sol-a04d8bc6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27066%3A%20Missing%20Authorization%20in%20PI%20Web%20Solution%20Live%20sales%20notification%20for%20WooCommerce&amp;severity=medium&amp;id=6996d0416aea4a407a4bdc6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27059-improper-neutralization-of-input-du-800fcc52</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27059%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PenciDesign%20Penci%20Recipe&amp;severity=medium&amp;id=6996d0416aea4a407a4bdc6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27058-improper-neutralization-of-input-du-3546c209</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27058%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PenciDesign%20Penci%20Podcast&amp;severity=medium&amp;id=6996d0416aea4a407a4bdc67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27057-improper-neutralization-of-input-du-558cfaf1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27057%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PenciDesign%20Penci%20Filter%20Everything&amp;severity=medium&amp;id=6996d0406aea4a407a4bdc06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27055-missing-authorization-in-pencidesig-c4c69316</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27055%3A%20Missing%20Authorization%20in%20PenciDesign%20Penci%20AI%20SmartContent%20Creator&amp;severity=medium&amp;id=6996d0406aea4a407a4bdc03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27052-improper-control-of-filename-for-in-edeeece4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27052%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20villatheme%20Sales%20Countdown%20Timer%20for%20WooCommerce%20and%20WordPress&amp;severity=high&amp;id=6996d0406aea4a407a4bdc00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27050-cross-site-request-forgery-csrf-in--8fabd6ee</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27050%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ThimPress%20RealPress&amp;severity=medium&amp;id=6996d0406aea4a407a4bdbfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27042-missing-authorization-in-wpdevelope-0b951907</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27042%3A%20Missing%20Authorization%20in%20WPDeveloper%20NotificationX&amp;severity=medium&amp;id=6996d0406aea4a407a4bdbfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25473-missing-authorization-in-aa-team-wz-2422b9e0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25473%3A%20Missing%20Authorization%20in%20AA-Team%20WZone&amp;severity=medium&amp;id=6996d0406aea4a407a4bdbf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25472-improper-neutralization-of-input-du-bcf2c1a1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25472%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeFusion%20Fusion%20Builder&amp;severity=medium&amp;id=6996d0406aea4a407a4bdbee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25463-improper-neutralization-of-input-du-be7e3ad9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25463%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WpEstate%20Wpresidence%20Core&amp;severity=medium&amp;id=6996d0406aea4a407a4bdbeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25459-missing-authorization-in-uixthemes--73feec42</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25459%3A%20Missing%20Authorization%20in%20uixthemes%20Sober&amp;severity=medium&amp;id=6996d03e6aea4a407a4bdbc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25453-improper-neutralization-of-input-du-b9e30016</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25453%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mdempfle%20Advanced%20iFrame&amp;severity=medium&amp;id=6996d03e6aea4a407a4bdbbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25451-improper-neutralization-of-input-du-15b76c39</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25451%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boldthemes%20Bold%20Page%20Builder&amp;severity=medium&amp;id=6996d03e6aea4a407a4bdbbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25441-missing-authorization-in-varunvaira-f0cb3156</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25441%3A%20Missing%20Authorization%20in%20varunvairavanlc%20LeadConnector&amp;severity=medium&amp;id=69ea9e8d87115cfb686fd784</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25432-improper-neutralization-of-input-du-72dd3094</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25432%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20omnipressteam%20Omnipress&amp;severity=medium&amp;id=6996d03e6aea4a407a4bdbb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25428-server-side-request-forgery-ssrf-in-7cc51cd9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25428%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20totalsoft%20TS%20Poll&amp;severity=medium&amp;id=6996d03e6aea4a407a4bdbb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25423-missing-authorization-in-creativein-e1c95667</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25423%3A%20Missing%20Authorization%20in%20creativeinteractivemedia%20Real%203D%20FlipBook&amp;severity=low&amp;id=6996d03e6aea4a407a4bdbb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25422-cross-site-request-forgery-csrf-in--259d5f65</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25422%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Themes4WP%20Popularis%20Extra&amp;severity=medium&amp;id=6996d03e6aea4a407a4bdbb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25419-missing-authorization-in-flycart-up-adad61a6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25419%3A%20Missing%20Authorization%20in%20flycart%20UpsellWP&amp;severity=medium&amp;id=6996d03e6aea4a407a4bdbad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25418-improper-neutralization-of-special--7990e464</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25418%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Bit%20Apps%20Bit%20Form&amp;severity=high&amp;id=6996d03e6aea4a407a4bdbaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25416-missing-authorization-in-blazetheme-79a5f340</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25416%3A%20Missing%20Authorization%20in%20blazethemes%20News%20Kit%20Elementor%20Addons&amp;severity=medium&amp;id=6996d03e6aea4a407a4bdba7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25415-missing-authorization-in-iqonicdesi-646705f1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25415%3A%20Missing%20Authorization%20in%20iqonicdesign%20WPBookit%20Pro&amp;severity=medium&amp;id=6996d03d6aea4a407a4bdb9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25412-missing-authorization-in-mdempfle-a-ec684b57</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25412&amp;severity=null&amp;id=6996d03d6aea4a407a4bdb97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25411-cross-site-request-forgery-csrf-in--180d3fa1</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25411%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20themastercut%20Revision%20Manager%20TMC&amp;severity=medium&amp;id=6996d03d6aea4a407a4bdb94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25410-missing-authorization-in-tstephenso-4b7b85ae</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25410%3A%20Missing%20Authorization%20in%20tstephenson%20WP-CORS&amp;severity=medium&amp;id=6996d03d6aea4a407a4bdb91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25409-missing-authorization-in-crgeary-ja-dfc92e7f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25409%3A%20Missing%20Authorization%20in%20crgeary%20JAMstack%20Deployments&amp;severity=medium&amp;id=6996d03d6aea4a407a4bdb8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25408-missing-authorization-in-pluginrx-b-dba145e5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25408%3A%20Missing%20Authorization%20in%20PluginRx%20Broken%20Link%20Notifier&amp;severity=medium&amp;id=6996d03d6aea4a407a4bdb8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25404-missing-authorization-in-automattic-4e8ade6a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25404%3A%20Missing%20Authorization%20in%20Automattic%20WP%20Job%20Manager&amp;severity=medium&amp;id=6996d03d6aea4a407a4bdb88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25402-missing-authorization-in-echoplugin-d048715d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25402%3A%20Missing%20Authorization%20in%20echoplugins%20Knowledge%20Base%20for%20Documentation%2C%20FAQs%20with%20AI%20Assistance&amp;severity=medium&amp;id=6996d03d6aea4a407a4bdb85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25399-missing-authorization-in-cryoutcrea-06781103</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25399%3A%20Missing%20Authorization%20in%20CryoutCreations%20Serious%20Slider&amp;severity=medium&amp;id=6996d03d6aea4a407a4bdb82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25395-missing-authorization-in-ikreatethe-1b5ad1e8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25395%3A%20Missing%20Authorization%20in%20ikreatethemes%20Business%20Roy&amp;severity=medium&amp;id=6996d03d6aea4a407a4bdb7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25394-missing-authorization-in-sparklewpt-6fa71379</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25394%3A%20Missing%20Authorization%20in%20sparklewpthemes%20Fitness%20FSE&amp;severity=medium&amp;id=6996d03c6aea4a407a4bdb72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25393-missing-authorization-in-sparklewpt-e54b2b2e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25393%3A%20Missing%20Authorization%20in%20sparklewpthemes%20Hello%20FSE&amp;severity=medium&amp;id=6996d03c6aea4a407a4bdb6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25392-url-redirection-to-untrusted-site-o-073f2a0b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25392%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20KaizenCoders%20Update%20URLs%20%E2%80%93%20Quick%20and%20Easy%20way%20to%20search%20old%20links%20and%20replace%20them%20with%20new%20links%20in%20WordPress&amp;severity=medium&amp;id=6996d03c6aea4a407a4bdb6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25391-missing-authorization-in-wp-grids-w-7ee36a35</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25391%3A%20Missing%20Authorization%20in%20WP%20Grids%20WP%20Wand&amp;severity=medium&amp;id=6996d03c6aea4a407a4bdb69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25389-exposure-of-sensitive-system-inform-28856952</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25389%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Metagauss%20EventPrime&amp;severity=medium&amp;id=6996d03c6aea4a407a4bdb66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25388-missing-authorization-in-scripteo-a-1c6db8df</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25388%3A%20Missing%20Authorization%20in%20scripteo%20Ads%20Pro&amp;severity=medium&amp;id=6996d03c6aea4a407a4bdb63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25387-missing-authorization-in-elementor--19a8b174</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25387%3A%20Missing%20Authorization%20in%20Elementor%20Image%20Optimizer%20by%20Elementor&amp;severity=medium&amp;id=6996d03c6aea4a407a4bdb60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25386-missing-authorization-in-elementor--08435fd6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25386%3A%20Missing%20Authorization%20in%20Elementor%20Ally&amp;severity=medium&amp;id=6996d03c6aea4a407a4bdb5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25385-server-side-request-forgery-ssrf-in-61b3efa0</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25385%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20KaizenCoders%20URL%20Shortify&amp;severity=medium&amp;id=6996d03c6aea4a407a4bdb5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25384-missing-authorization-in-wp-lab-wp--d641c9ce</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25384%3A%20Missing%20Authorization%20in%20WP%20Lab%20WP-Lister%20Lite%20for%20eBay&amp;severity=medium&amp;id=6996d03c6aea4a407a4bdb57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25378-improper-neutralization-of-special--1061033a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25378%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Nelio%20Software%20Nelio%20AB%20Testing&amp;severity=high&amp;id=6996d03b6aea4a407a4bdb4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25375-missing-authorization-in-wp-chill-i-b047d8e6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25375%3A%20Missing%20Authorization%20in%20WP%20Chill%20Image%20Photo%20Gallery%20Final%20Tiles%20Grid&amp;severity=medium&amp;id=6996d03b6aea4a407a4bdb47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25374-missing-authorization-in-raratheme--ff689366</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25374%3A%20Missing%20Authorization%20in%20raratheme%20Spa%20and%20Salon&amp;severity=medium&amp;id=6996d03b6aea4a407a4bdb44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25372-missing-authorization-in-kodezen-ll-d79d483e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25372%3A%20Missing%20Authorization%20in%20Kodezen%20LLC%20Academy%20LMS&amp;severity=medium&amp;id=6996d03b6aea4a407a4bdb41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25370-missing-authorization-in-aresit-wp--e21e150e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25370%3A%20Missing%20Authorization%20in%20AresIT%20WP%20Compress&amp;severity=medium&amp;id=6996d03b6aea4a407a4bdb3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25368-missing-authorization-in-codepeople-22306e55</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25368%3A%20Missing%20Authorization%20in%20codepeople%20Calculated%20Fields%20Form&amp;severity=medium&amp;id=6996d03b6aea4a407a4bdb3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25367-missing-authorization-in-nootheme-c-d914e208</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25367%3A%20Missing%20Authorization%20in%20NooTheme%20CitiLights&amp;severity=medium&amp;id=6996d03b6aea4a407a4bdb38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25364-missing-authorization-in-boldgrid-c-f7a39e1e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25364%3A%20Missing%20Authorization%20in%20BoldGrid%20Client%20Invoicing%20by%20Sprout%20Invoices&amp;severity=medium&amp;id=6996d03b6aea4a407a4bdb35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25363-missing-authorization-in-fooplugins-d6a0900a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25363%3A%20Missing%20Authorization%20in%20FooPlugins%20FooGallery&amp;severity=medium&amp;id=6996d03b6aea4a407a4bdb32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25362-improper-neutralization-of-input-du-64f8da8f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25362%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20FooPlugins%20FooGallery&amp;severity=medium&amp;id=6996d03b6aea4a407a4bdb2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25348-missing-authorization-in-alttextai--401d8de9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25348%3A%20Missing%20Authorization%20in%20alttextai%20Download%20Alt%20Text%20AI&amp;severity=medium&amp;id=6996d03a6aea4a407a4bdae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25343-improper-neutralization-of-input-du-ac41061b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25343%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20VeronaLabs%20WP%20SMS&amp;severity=medium&amp;id=6996d03a6aea4a407a4bdae3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25338-missing-authorization-in-ays-pro-ai-66c38245</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25338%3A%20Missing%20Authorization%20in%20Ays%20Pro%20AI%20ChatBot%20with%20ChatGPT%20and%20Content%20Generator%20by%20AYS&amp;severity=medium&amp;id=6996d03a6aea4a407a4bdae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25337-cross-site-request-forgery-csrf-in--8313170b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25337%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpcoachify%20Coachify&amp;severity=medium&amp;id=6996d03a6aea4a407a4bdadd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25336-missing-authorization-in-wpcoachify-998f5918</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25336%3A%20Missing%20Authorization%20in%20wpcoachify%20Coachify&amp;severity=medium&amp;id=6996d03a6aea4a407a4bdada</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25335-missing-authorization-in-ays-pro-se-2ea44f1a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25335%3A%20Missing%20Authorization%20in%20Ays%20Pro%20Secure%20Copy%20Content%20Protection%20and%20Content%20Locking&amp;severity=medium&amp;id=6996d03a6aea4a407a4bdad7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25333-missing-authorization-in-peregrinet-3c853645</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25333%3A%20Missing%20Authorization%20in%20peregrinethemes%20Shopwell&amp;severity=medium&amp;id=6996d03a6aea4a407a4bdad4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25332-missing-authorization-in-fahad-mahm-6ec6ce9b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25332%3A%20Missing%20Authorization%20in%20Fahad%20Mahmood%20Endless%20Posts%20Navigation&amp;severity=medium&amp;id=6996d03a6aea4a407a4bdad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25331-improper-neutralization-of-input-du-aa7a8b7f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25331%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Melapress%20WP%20Activity%20Log&amp;severity=medium&amp;id=6996d03a6aea4a407a4bdace</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25330-missing-authorization-in-publishpre-b3ec89fe</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25330%3A%20Missing%20Authorization%20in%20PublishPress%20PublishPress%20Authors&amp;severity=medium&amp;id=6996d03a6aea4a407a4bdacb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25329-missing-authorization-in-expresstec-12fd90b8</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25329%3A%20Missing%20Authorization%20in%20ExpressTech%20Systems%20Quiz%20And%20Survey%20Master&amp;severity=medium&amp;id=6996d0396aea4a407a4bdabe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25326-improper-control-of-filename-for-in-65619dcc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25326%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20cmsmasters%20CMSMasters%20Content%20Composer&amp;severity=high&amp;id=6996d0396aea4a407a4bdabb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25325-exposure-of-sensitive-system-inform-6f27c875</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25325%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20rtCamp%20rtMedia%20for%20WordPress%2C%20BuddyPress%20and%20bbPress&amp;severity=medium&amp;id=6996d0396aea4a407a4bdab8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25324-authorization-bypass-through-user-c-e4d41ddb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25324%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20ExpressTech%20Systems%20Quiz%20And%20Survey%20Master&amp;severity=medium&amp;id=6996d0396aea4a407a4bdab5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25323-missing-authorization-in-mika-osm-a88b9dab</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25323%3A%20Missing%20Authorization%20in%20MiKa%20OSM&amp;severity=medium&amp;id=6996d0396aea4a407a4bdab2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25322-cross-site-request-forgery-csrf-in--04f4991e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25322%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20PublishPress%20PublishPress%20Revisions&amp;severity=medium&amp;id=6996d0396aea4a407a4bdaaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25321-missing-authorization-in-psm-plugin-d65c99a6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25321%3A%20Missing%20Authorization%20in%20PSM%20Plugins%20SupportCandy&amp;severity=medium&amp;id=6996d0396aea4a407a4bdaac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25320-missing-authorization-in-cool-plugi-2a32e607</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25320%3A%20Missing%20Authorization%20in%20Cool%20Plugins%20Elementor%20Contact%20Form%20DB&amp;severity=medium&amp;id=6996d0396aea4a407a4bdaa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25319-cross-site-request-forgery-csrf-in--3b15fc23</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25319%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpzita%20Zita%20Elementor%20Site%20Library&amp;severity=medium&amp;id=6996d0396aea4a407a4bdaa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25318-missing-authorization-in-wisernotif-3f7bb303</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25318%3A%20Missing%20Authorization%20in%20Wisernotify%20team%20WiserReview%20Product%20Reviews%20for%20WooCommerce&amp;severity=medium&amp;id=6996d0396aea4a407a4bdaa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25316-deserialization-of-untrusted-data-i-59087cd2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25316%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Brainstorm%20Force%20CartFlows&amp;severity=high&amp;id=6996d0386aea4a407a4bda8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25315-missing-authorization-in-hcaptcha-h-07a34daf</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25315%3A%20Missing%20Authorization%20in%20hcaptcha%20hCaptcha%20for%20WP&amp;severity=medium&amp;id=6996d0386aea4a407a4bda8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25314-missing-authorization-in-wp-messiah-0418239d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25314%3A%20Missing%20Authorization%20in%20WP%20Messiah%20TOP%20Table%20Of%20Contents&amp;severity=medium&amp;id=6996d0386aea4a407a4bda89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25313-missing-authorization-in-shahjahan--0f6ad9ee</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25313%3A%20Missing%20Authorization%20in%20Shahjahan%20Jewel%20FluentForm&amp;severity=medium&amp;id=6996d0386aea4a407a4bda86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25311-missing-authorization-in-10up-autos-33062f6f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25311%3A%20Missing%20Authorization%20in%2010up%20Autoshare%20for%20Twitter&amp;severity=medium&amp;id=6996d0386aea4a407a4bda83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25310-server-side-request-forgery-ssrf-in-6d72ac77</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25310%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Alobaidi%20Extend%20Link&amp;severity=medium&amp;id=6996d0386aea4a407a4bda80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25308-missing-authorization-in-wpinsider--0b8f7c9b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25308%3A%20Missing%20Authorization%20in%20wp.insider%20Simple%20Membership&amp;severity=medium&amp;id=6996d0386aea4a407a4bda7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25307-improper-neutralization-of-input-du-6dbcd956</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25307%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%208theme%20XStore%20Core&amp;severity=medium&amp;id=6996d0386aea4a407a4bda7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25305-improper-neutralization-of-input-du-f5beaf43</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25305%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%208theme%20XStore&amp;severity=medium&amp;id=6996d0386aea4a407a4bda77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25008-insertion-of-sensitive-information--0dd2307c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25008%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Shahjahan%20Jewel%20Ninja%20Tables&amp;severity=medium&amp;id=6996d0386aea4a407a4bda74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25006-improper-neutralization-of-script-r-5b622005</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25006%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%208theme%20XStore&amp;severity=medium&amp;id=6996d0376aea4a407a4bda51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25005-authorization-bypass-through-user-c-6404975d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25005%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20N-Media%20Frontend%20File%20Manager&amp;severity=medium&amp;id=6996d0376aea4a407a4bda4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25004-improper-neutralization-of-input-du-60d5840d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25004%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CreativeMindsSolutions%20CM%20Business%20Directory&amp;severity=medium&amp;id=6996d0376aea4a407a4bda4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25003-missing-authorization-in-madalinung-0b9b2d3b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25003%3A%20Missing%20Authorization%20in%20madalin.ungureanu%20Client%20Portal&amp;severity=medium&amp;id=6996d0376aea4a407a4bda48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25000-missing-authorization-in-kraft-plug-cd5f9376</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25000%3A%20Missing%20Authorization%20in%20Kraft%20Plugins%20Wheel%20of%20Life&amp;severity=medium&amp;id=6996d0376aea4a407a4bda45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24392-improper-neutralization-of-input-du-94e77840</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24392%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Nabil%20Lemsieh%20HurryTimer&amp;severity=medium&amp;id=6996d0376aea4a407a4bda42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24375-missing-authorization-in-wp-swings--9db90c65</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24375%3A%20Missing%20Authorization%20in%20WP%20Swings%20Ultimate%20Gift%20Cards%20For%20WooCommerce&amp;severity=medium&amp;id=6996d0376aea4a407a4bda3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23805-improper-neutralization-of-special--a345d836</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23805%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Yoren%20Chang%20Media%20Search%20Enhanced&amp;severity=high&amp;id=6996d0376aea4a407a4bda3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23804-missing-authorization-in-bbr-plugin-8011aa53</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23804%3A%20Missing%20Authorization%20in%20BBR%20Plugins%20Better%20Business%20Reviews&amp;severity=medium&amp;id=6996d0376aea4a407a4bda39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23803-server-side-request-forgery-ssrf-in-8ac5dfee</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23803%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Burhan%20Nasir%20Smart%20Auto%20Upload%20Images&amp;severity=high&amp;id=6996d0376aea4a407a4bda36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23549-deserialization-of-untrusted-data-i-f6de6946</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23549%3A%20Deserialization%20of%20Untrusted%20Data%20in%20magepeopleteam%20WpEvently&amp;severity=critical&amp;id=6996d0366aea4a407a4bd9ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23548-missing-authorization-in-designinve-984efe83</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23548%3A%20Missing%20Authorization%20in%20Designinvento%20DirectoryPress&amp;severity=medium&amp;id=6996d0366aea4a407a4bd9fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23547-missing-authorization-in-cmsmasters-b7a3c615</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23547%3A%20Missing%20Authorization%20in%20cmsmasters%20CMSMasters%20Content%20Composer&amp;severity=high&amp;id=6996d0366aea4a407a4bd9f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23545-missing-authorization-in-arubait-de-8215f625</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23545%3A%20Missing%20Authorization%20in%20Aruba.it%20Dev%20Aruba%20HiSpeed%20Cache&amp;severity=medium&amp;id=6996d0366aea4a407a4bd9f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23544-deserialization-of-untrusted-data-i-d501051b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23544%3A%20Deserialization%20of%20Untrusted%20Data%20in%20codetipi%20Valenti&amp;severity=high&amp;id=6996d0366aea4a407a4bd9f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23543-missing-authorization-in-wpdevelope-5a26a14b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23543%3A%20Missing%20Authorization%20in%20WPDeveloper%20Essential%20Addons%20for%20Elementor&amp;severity=medium&amp;id=6996d0366aea4a407a4bd9f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23542-deserialization-of-untrusted-data-i-3e8b78cc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23542%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeGoods%20Grand%20Restaurant&amp;severity=critical&amp;id=6996d0366aea4a407a4bd9ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23541-missing-authorization-in-wpfunnels--ff68d94b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23541%3A%20Missing%20Authorization%20in%20WPFunnels%20Mail%20Mint&amp;severity=high&amp;id=6996d0366aea4a407a4bd9ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22422-improper-neutralization-of-script-r-4517dc58</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22422%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20wpeverest%20Everest%20Forms&amp;severity=medium&amp;id=6996d0366aea4a407a4bd9e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22333-deserialization-of-untrusted-data-i-bb2e8d62</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22333%3A%20Deserialization%20of%20Untrusted%20Data%20in%20YITHEMES%20YITH%20WooCommerce%20Compare&amp;severity=high&amp;id=6996d0366aea4a407a4bd9e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26362-cwe-23-relative-path-traversal-in-d-60ca4fba</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26362%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20Dell%20Unisphere%20for%20PowerMax&amp;severity=high&amp;id=6996c9266aea4a407a4971ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27056-missing-authorization-in-stellarwp--ebd4b79e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27056%3A%20Missing%20Authorization%20in%20StellarWP%20iThemes%20Sync&amp;severity=medium&amp;id=6996c9266aea4a407a4971f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26361-cwe-73-external-control-of-file-nam-1088a3e9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26361%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Dell%20Unisphere%20for%20PowerMax&amp;severity=medium&amp;id=6996c9266aea4a407a4971eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2733-improper-authorization-in-red-hat-re-a42563f2</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2733%3A%20Improper%20Authorization%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=low&amp;id=6996c21f6aea4a407a46d597</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2711-server-side-request-forgery-in-zhuto-56075871</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2711%3A%20Server-Side%20Request%20Forgery%20in%20zhutoutoutousan%20worldquant-miner&amp;severity=medium&amp;id=6996be9a6aea4a407a45caee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2681-out-of-bounds-write-2d36b40a</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2681%3A%20Out-of-bounds%20Write&amp;severity=medium&amp;id=6996b7926aea4a407a43b2c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1994-cwe-269-improper-privilege-managemen-8fe39267</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1994%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20clavaque%20s2Member%20%E2%80%93%20Excellent%20for%20All%20Kinds%20of%20Memberships%2C%20Content%20Restriction%20Paywalls%20%26%20Member%20Access%20Subscriptions&amp;severity=critical&amp;id=6996b7926aea4a407a43b2bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2731-cwe-22-improper-limitation-of-a-path-c618341d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2731%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20DynamicWeb%20DynamicWeb%209&amp;severity=critical&amp;id=6996b7926aea4a407a43b2c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2709-open-redirect-in-busy-b1beee0a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2709%3A%20Open%20Redirect%20in%20busy&amp;severity=medium&amp;id=6996b08a6aea4a407a42042b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2706-sql-injection-in-code-projects-patie-e3cc38fd</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2706%3A%20SQL%20Injection%20in%20code-projects%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=6996fb458fb9188dea8c0110</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2705-out-of-bounds-read-in-open-babel-27ebd2a8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2705%3A%20Out-of-Bounds%20Read%20in%20Open%20Babel&amp;severity=medium&amp;id=69969ef76aea4a407a3d9a71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0722-cwe-89-improper-neutralization-of-sp-6a47f717</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0722%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20paultgoodchild%20Shield%3A%20Blocks%20Bots%2C%20Protects%20Users%2C%20and%20Prevents%20Security%20Breaches&amp;severity=medium&amp;id=699697f56aea4a407a3be0d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13851-cwe-269-improper-privilege-manageme-f596f457</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13851%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20scriptsbundle%20Buyent&amp;severity=critical&amp;id=699697f36aea4a407a3be048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1373-cwe-79-improper-neutralization-of-in-539fb955</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1373%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lawsonry%20Easy%20Author%20Image&amp;severity=medium&amp;id=699697f56aea4a407a3be103</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2284-cwe-862-missing-authorization-in-web-0ddb2ff6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2284%3A%20CWE-862%20Missing%20Authorization%20in%20webangon%20News%20Element%20Elementor%20Blog%20Magazine&amp;severity=medium&amp;id=699697f66aea4a407a3be124</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1455-cwe-352-cross-site-request-forgery-c-03feb7a4</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1455%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20whatsiplus%20Whatsiplus%20Scheduled%20Notification%20for%20Woocommerce&amp;severity=medium&amp;id=699697f66aea4a407a3be115</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14445-cwe-79-improper-neutralization-of-i-3ef243b9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14445%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20levantoan%20Image%20Hotspot%20by%20DevVN&amp;severity=medium&amp;id=699697f46aea4a407a3be08b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0926-cwe-98-improper-control-of-filename--2995b72c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0926%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20prodigycommerce%20Prodigy%20Commerce&amp;severity=critical&amp;id=699697f56aea4a407a3be0e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14357-cwe-862-missing-authorization-in-mi-278742bb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14357%3A%20CWE-862%20Missing%20Authorization%20in%20misbahwp%20Mega%20Store%20Woocommerce&amp;severity=medium&amp;id=699697f46aea4a407a3be082</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0561-cwe-79-improper-neutralization-of-in-0930a715</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0561%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20paultgoodchild%20Shield%3A%20Blocks%20Bots%2C%20Protects%20Users%2C%20and%20Prevents%20Security%20Breaches&amp;severity=medium&amp;id=699697f56aea4a407a3be0d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2504-cwe-862-missing-authorization-in-dea-a89224cb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2504%3A%20CWE-862%20Missing%20Authorization%20in%20dealia%20Dealia%20%E2%80%93%20Request%20a%20quote&amp;severity=medium&amp;id=699697f66aea4a407a3be130</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14452-cwe-79-improper-neutralization-of-i-7f77f351</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14452%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bompus%20WP%20Customer%20Reviews&amp;severity=high&amp;id=699697f46aea4a407a3be090</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14983-cwe-79-improper-neutralization-of-i-a51c85ba</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14983%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mattkeys%20Advanced%20Custom%20Fields%3A%20Font%20Awesome%20Field&amp;severity=medium&amp;id=699697f46aea4a407a3be0a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14167-cwe-352-cross-site-request-forgery--c7484d26</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14167%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20akshayshah5189%20Remove%20Post%20Type%20Slug&amp;severity=medium&amp;id=699697f36aea4a407a3be05e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0974-cwe-862-missing-authorization-in-ord-71118a8e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0974%3A%20CWE-862%20Missing%20Authorization%20in%20orderable%20Orderable%20%E2%80%93%20WordPress%20Restaurant%20Online%20Ordering%20System%20and%20Food%20Ordering%20Plugin&amp;severity=high&amp;id=699697f56aea4a407a3be0e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14270-cwe-862-missing-authorization-in-wa-38c78435</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14270%3A%20CWE-862%20Missing%20Authorization%20in%20walterpinem%20OneClick%20Chat%20to%20Order&amp;severity=low&amp;id=699697f36aea4a407a3be063</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13563-cwe-269-improper-privilege-manageme-f316666c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13563%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20BuddhaThemes%20Lizza%20LMS%20Pro&amp;severity=critical&amp;id=699697f26aea4a407a3bdfcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14851-cwe-79-improper-neutralization-of-i-e9a8e67b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14851%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yhunter%20YaMaps%20for%20WordPress%20Plugin&amp;severity=medium&amp;id=699697f46aea4a407a3be099</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1044-cwe-79-improper-neutralization-of-in-690d4bbf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1044%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20renoiriii%20Tennis%20Court%20Bookings&amp;severity=medium&amp;id=699697f56aea4a407a3be0f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14427-cwe-862-missing-authorization-in-pa-7cdb0948</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14427%3A%20CWE-862%20Missing%20Authorization%20in%20paultgoodchild%20Shield%3A%20Blocks%20Bots%2C%20Protects%20Users%2C%20and%20Prevents%20Security%20Breaches&amp;severity=medium&amp;id=699697f46aea4a407a3be087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14864-cwe-862-missing-authorization-in-vi-94f7408f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14864%3A%20CWE-862%20Missing%20Authorization%20in%20virusdie%20Virusdie%20%E2%80%93%20One-click%20website%20security&amp;severity=medium&amp;id=699697f46aea4a407a3be09f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13091-cwe-15-external-control-of-system-o-14fb2f77</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13091%3A%20CWE-15%20External%20Control%20of%20System%20or%20Configuration%20Setting%20in%20wpfable%20Shopire&amp;severity=medium&amp;id=699697f26aea4a407a3bdfba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13603-cwe-862-missing-authorization-in-hu-8ad3cb73</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13603%3A%20CWE-862%20Missing%20Authorization%20in%20husainali52%20WP%20AUDIO%20GALLERY&amp;severity=high&amp;id=699697f26aea4a407a3bdfd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1043-cwe-79-improper-neutralization-of-in-b68931d1</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1043%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gagan0123%20PostmarkApp%20Email%20Integrator&amp;severity=medium&amp;id=699697f56aea4a407a3be0ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14076-cwe-79-improper-neutralization-of-i-805923c9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14076%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20icount%20iXML%20%E2%80%93%20Google%20XML%20sitemap%20generator&amp;severity=medium&amp;id=699697f36aea4a407a3be059</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14342-cwe-862-missing-authorization-in-ci-3aae7fa1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14342%3A%20CWE-862%20Missing%20Authorization%20in%20cifi%20SEO%20Plugin%20by%20Squirrly%20SEO&amp;severity=medium&amp;id=699697f36aea4a407a3be073</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0549-cwe-79-improper-neutralization-of-in-d3b6a94d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0549%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20itthinx%20Groups&amp;severity=medium&amp;id=699697f46aea4a407a3be0bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13738-cwe-79-improper-neutralization-of-i-3e3a57ee</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13738%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20magazine3%20Easy%20Table%20of%20Contents&amp;severity=medium&amp;id=699697f36aea4a407a3be03e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13438-cwe-352-cross-site-request-forgery--f9da7b26</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13438%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20dienodigital%20Page%20Title%2C%20Description%20%26%20Open%20Graph%20Updater&amp;severity=medium&amp;id=699697f26aea4a407a3bdfc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0556-cwe-79-improper-neutralization-of-in-77332a23</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0556%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ishitaka%20XO%20Event%20Calendar&amp;severity=medium&amp;id=699697f56aea4a407a3be0cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1047-cwe-79-improper-neutralization-of-in-0644c054</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1047%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20goback2%20salavat%20counter%20Plugin&amp;severity=medium&amp;id=699697f56aea4a407a3be0fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13842-cwe-639-authorization-bypass-throug-14905ddc</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13842%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20mtekk%20Breadcrumb%20NavXT&amp;severity=medium&amp;id=699697f36aea4a407a3be043</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13864-cwe-862-missing-authorization-in-cl-6b00292c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13864%3A%20CWE-862%20Missing%20Authorization%20in%20cloudways%20Breeze%20Cache&amp;severity=medium&amp;id=699697f36aea4a407a3be04c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13617-cwe-79-improper-neutralization-of-i-ef5a0727</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13617%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20apollo13themes%20Apollo13%20Framework%20Extensions&amp;severity=medium&amp;id=699697f26aea4a407a3bdfe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4521-cwe-285-improper-authorization-in-th-365d2771</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4521%3A%20CWE-285%20Improper%20Authorization%20in%20themeatelier%20IDonate%20%E2%80%93%20Blood%20Donation%2C%20Request%20And%20Donor%20Management%20System&amp;severity=high&amp;id=699697f46aea4a407a3be0b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2282-cwe-79-improper-neutralization-of-in-6abaa2ce</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2282%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hollandben%20Slidorion&amp;severity=medium&amp;id=699697f66aea4a407a3be11f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12975-cwe-862-missing-authorization-in-wa-022d7735</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12975%3A%20CWE-862%20Missing%20Authorization%20in%20wahid0003%20Product%20Feed%20Manager%20for%20WooCommerce%20%E2%80%93%20CTX%20Feed%20%E2%80%93%20Support%20220%2B%20Shopping%20%26%20Social%20Channels&amp;severity=high&amp;id=699697f26aea4a407a3bdfb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0912-cwe-269-improper-privilege-managemen-d24351a7</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0912%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20toret%20Toret%20Manager&amp;severity=high&amp;id=699697f56aea4a407a3be0dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13612-cwe-79-improper-neutralization-of-i-dce9e05b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13612%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20essentialplugin%20Album%20and%20Image%20Gallery%20Plus%20Lightbox&amp;severity=medium&amp;id=699697f26aea4a407a3bdfdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1405-cwe-434-unrestricted-upload-of-file--bdda35a2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1405%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20franchidesign%20Slider%20Future&amp;severity=critical&amp;id=699697f66aea4a407a3be111</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13930-cwe-862-missing-authorization-in-qu-74a5a47a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13930%3A%20CWE-862%20Missing%20Authorization%20in%20quadlayers%20Checkout%20Field%20Manager%20(Checkout%20Manager)%20for%20WooCommerce&amp;severity=medium&amp;id=699697f36aea4a407a3be053</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1646-cwe-79-improper-neutralization-of-in-e044dc38</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1646%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20iamjaydip%20Advance%20Block%20Extend&amp;severity=medium&amp;id=699697f66aea4a407a3be11a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15041-cwe-862-missing-authorization-in-wp-57795334</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15041%3A%20CWE-862%20Missing%20Authorization%20in%20wp_media%20BackWPup%20%E2%80%93%20WordPress%20Backup%20%26%20Restore%20Plugin&amp;severity=high&amp;id=699697f46aea4a407a3be0b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14294-cwe-306-missing-authentication-for--b729fef3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14294%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20razorpay%20Razorpay%20for%20WooCommerce&amp;severity=medium&amp;id=699697f36aea4a407a3be06c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13413-cwe-352-cross-site-request-forgery--08917483</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13413%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20soyrodriguez%20Country%20Blocker%20for%20AdSense&amp;severity=medium&amp;id=699697f26aea4a407a3bdfc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13732-cwe-79-improper-neutralization-of-i-9d94ce94</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13732%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20clavaque%20s2Member%20%E2%80%93%20Excellent%20for%20All%20Kinds%20of%20Memberships%2C%20Content%20Restriction%20Paywalls%20%26%20Member%20Access%20Subscriptions&amp;severity=medium&amp;id=699697f26aea4a407a3bdfe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13587-cwe-20-improper-input-validation-in-299586cf</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13587%3A%20CWE-20%20Improper%20Input%20Validation%20in%20ss88_uk%20Two%20Factor%20(2FA)%20Authentication%20via%20Email&amp;severity=medium&amp;id=699697f26aea4a407a3bdfd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2502-cwe-79-improper-neutralization-of-in-b4ccae91</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2502%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yehudah%20xmlrpc%20attacks%20blocker&amp;severity=medium&amp;id=699697f66aea4a407a3be129</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2704-out-of-bounds-read-in-open-babel-8733ccdd</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2704%3A%20Out-of-Bounds%20Read%20in%20Open%20Babel&amp;severity=medium&amp;id=699697f66aea4a407a3be139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2703-off-by-one-in-xlnt-community-xlnt-0e483827</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2703%3A%20Off-by-One%20in%20xlnt-community%20xlnt&amp;severity=medium&amp;id=69968d666aea4a407a390167</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15586-cwe-287-improper-authentication-in--000235d7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15586%3A%20CWE-287%20Improper%20Authentication%20in%20OpenGamePanel%20OGP-Website&amp;severity=critical&amp;id=69968d666aea4a407a39015b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2702-hard-coded-credentials-in-beetel-777-0a5e4ed2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2702%3A%20Hard-coded%20Credentials%20in%20Beetel%20777VR1&amp;severity=low&amp;id=69968d666aea4a407a390160</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12500-cwe-434-unrestricted-upload-of-file-09de847c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12500%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20quadlayers%20Checkout%20Field%20Manager%20(Checkout%20Manager)%20for%20WooCommerce&amp;severity=medium&amp;id=69968d656aea4a407a39011c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12081-cwe-862-missing-authorization-in-na-99e39864</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12081%3A%20CWE-862%20Missing%20Authorization%20in%20navzme%20ACF%20Photo%20Gallery%20Field&amp;severity=medium&amp;id=69968d636aea4a407a3900c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13048-cwe-79-improper-neutralization-of-i-80bcab79</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13048%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20statcounter%20StatCounter%20%E2%80%93%20Free%20Real%20Time%20Visitor%20Stats&amp;severity=medium&amp;id=69968d656aea4a407a390139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12117-cwe-79-improper-neutralization-of-i-37d0aa8f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12117%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thinkupthemes%20Renden&amp;severity=medium&amp;id=69968d636aea4a407a3900d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13113-cwe-200-exposure-of-sensitive-infor-ef9e08ae</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13113%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20accessibewp%20Web%20Accessibility%20by%20accessiBe&amp;severity=medium&amp;id=69968d656aea4a407a390144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12845-cwe-862-missing-authorization-in-es-fca10b3a</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12845%3A%20CWE-862%20Missing%20Authorization%20in%20essekia%20Tablesome%20Table%20%E2%80%93%20Contact%20Form%20DB%20%E2%80%93%20WPForms%2C%20CF7%2C%20Gravity%2C%20Forminator%2C%20Fluent&amp;severity=high&amp;id=69968d656aea4a407a39012c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12884-cwe-284-improper-access-control-in--528c8d73</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12884%3A%20CWE-284%20Improper%20Access%20Control%20in%20monetizemore%20Advanced%20Ads%20%E2%80%93%C2%A0Ad%20Manager%20%26%20AdSense&amp;severity=medium&amp;id=69968d656aea4a407a390134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12821-cwe-352-cross-site-request-forgery--919c4720</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12821%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20spicethemes%20NewsBlogger&amp;severity=high&amp;id=69968d656aea4a407a390128</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12116-cwe-79-improper-neutralization-of-i-7a6487d6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12116%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thinkupthemes%20Drift&amp;severity=medium&amp;id=69968d636aea4a407a3900cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12882-cwe-269-improper-privilege-manageme-16cf93ff</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12882%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20SmartDataSoft%20Clasifico%20Listing&amp;severity=critical&amp;id=69968d656aea4a407a390130</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12707-cwe-89-improper-neutralization-of-s-d2c19dbe</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12707%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20owthub%20Library%20Management%20System&amp;severity=high&amp;id=69968d656aea4a407a390123</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13079-cwe-1241-use-of-predictable-algorit-50fba982</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13079%3A%20CWE-1241%20Use%20of%20Predictable%20Algorithm%20in%20Random%20Number%20Generator%20in%20popupbuilder%20Popup%20Builder%20%E2%80%93%20Create%20highly%20converting%2C%20mobile%20friendly%20marketing%20popups.&amp;severity=medium&amp;id=69968d656aea4a407a39013e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12375-cwe-918-server-side-request-forgery-409790b0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12375%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20printful%20Printful%20Integration%20for%20WooCommerce&amp;severity=medium&amp;id=69968d636aea4a407a3900d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12451-cwe-79-improper-neutralization-of-i-7d20ae4c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12451%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20benjamin_zekavica%20Easy%20SVG%20Support&amp;severity=medium&amp;id=69968d656aea4a407a390117</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11754-cwe-862-missing-authorization-in-wp-e1b287bc</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11754%3A%20CWE-862%20Missing%20Authorization%20in%20wplegalpages%20Cookie%20Banner%20for%20GDPR%20%2F%20CCPA%20%E2%80%93%20WPLP%20Cookie%20Consent&amp;severity=high&amp;id=69968d636aea4a407a3900bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12172-cwe-352-cross-site-request-forgery--33daff6f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12172%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mailchimp%20Mailchimp%20List%20Subscribe%20Form&amp;severity=medium&amp;id=69968d636aea4a407a3900d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11706-cwe-79-improper-neutralization-of-i-332bc478</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11706%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20arubadev%20Aruba%20HiSpeed%20Cache&amp;severity=medium&amp;id=69968d636aea4a407a3900b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12448-cwe-79-improper-neutralization-of-i-82d22b78</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12448%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20smartsupp%20Smartsupp%20%E2%80%93%20live%20chat%2C%20AI%20shopping%20assistant%20and%20chatbots&amp;severity=medium&amp;id=69968d636aea4a407a3900e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11725-cwe-862-missing-authorization-in-ar-5f34b89c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11725%3A%20CWE-862%20Missing%20Authorization%20in%20arubadev%20Aruba%20HiSpeed%20Cache&amp;severity=medium&amp;id=69968d636aea4a407a3900b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12027-cwe-862-missing-authorization-in-ho-2323287a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12027%3A%20CWE-862%20Missing%20Authorization%20in%20horearadu%20Mesmerize%20Companion&amp;severity=medium&amp;id=69968d636aea4a407a3900c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2693-improper-authorization-in-cocoteanet-cec810f3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2693%3A%20Improper%20Authorization%20in%20CoCoTeaNet%20CyreneAdmin&amp;severity=medium&amp;id=699682d66aea4a407a1958b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2692-path-traversal-in-cocoteanet-cyrenea-1b8f731f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2692%3A%20Path%20Traversal%20in%20CoCoTeaNet%20CyreneAdmin&amp;severity=medium&amp;id=699674c56aea4a407a102a08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4960-cwe-863-incorrect-authorization-in-e-60a4c497</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4960%3A%20CWE-863%20Incorrect%20Authorization%20in%20EPSON%20EPSON%20Printer%20Controller%20Installer&amp;severity=high&amp;id=699674c56aea4a407a1029fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2691-sql-injection-in-itsourcecode-event--a1045ded</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2691%3A%20SQL%20Injection%20in%20itsourcecode%20Event%20Management%20System&amp;severity=medium&amp;id=699674c56aea4a407a102a01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2690-sql-injection-in-itsourcecode-event--a819ead6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2690%3A%20SQL%20Injection%20in%20itsourcecode%20Event%20Management%20System&amp;severity=medium&amp;id=699666b66aea4a407a031a69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2689-sql-injection-in-itsourcecode-event--cc09d79e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2689%3A%20SQL%20Injection%20in%20itsourcecode%20Event%20Management%20System&amp;severity=medium&amp;id=69965fae6aea4a407afcc69e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2686-os-command-injection-in-seccn-dingch-6d02b310</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2686%3A%20OS%20Command%20Injection%20in%20SECCN%20Dingcheng%20G10&amp;severity=critical&amp;id=699655226aea4a407af3e26b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67304-na-25725329</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67304%3A%20n%2Fa&amp;severity=critical&amp;id=699812b02c4d84f260aeb084</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67305-na-1d23333f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67305%3A%20n%2Fa&amp;severity=critical&amp;id=699812af2c4d84f260aeb061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-19-7204c9d5</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-19&amp;severity=medium&amp;id=6997a7c9d7880ec89b3e18d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26744-na-888b51ab</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26744%3A%20n%2Fa&amp;severity=medium&amp;id=69978157d7880ec89b34978e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69725-na-1bd8ed05</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69725%3A%20n%2Fa&amp;severity=medium&amp;id=69973b6be884a8a4cb409738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69674-na-89b2ee83</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69674%3A%20n%2Fa&amp;severity=medium&amp;id=69973b6be884a8a4cb409734</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-02-19-04c57537</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-02-19&amp;severity=medium&amp;id=69972c74732724e9dc48b620</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55853-na-10f5b826</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55853%3A%20n%2Fa&amp;severity=critical&amp;id=6997227c0018ac3e97d2926f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-19-9b55a4bb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-19&amp;severity=low&amp;id=69969ebf6aea4a407a3d8b8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2684-unrestricted-upload-in-tsinghua-unig-ecd78fea</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2684%3A%20Unrestricted%20Upload%20in%20Tsinghua%20Unigroup%20Electronic%20Archives%20System&amp;severity=medium&amp;id=6996519e6aea4a407af2b707</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24126-cwe-88-improper-neutralization-of-a-85b85bf7</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24126%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20WeblateOrg%20weblate&amp;severity=medium&amp;id=69964a966aea4a407af16032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2683-path-traversal-in-tsinghua-unigroup--fa982e7b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2683%3A%20Path%20Traversal%20in%20Tsinghua%20Unigroup%20Electronic%20Archives%20System&amp;severity=medium&amp;id=699647126aea4a407af0a2bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15581-cwe-287-improper-authentication-in--eb504042</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15581%3A%20CWE-287%20Improper%20Authentication%20in%20orthanc-server%20orthanc&amp;severity=medium&amp;id=699647126aea4a407af0a2b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2682-sql-injection-in-tsinghua-unigroup-e-980aa67f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2682%3A%20SQL%20Injection%20in%20Tsinghua%20Unigroup%20Electronic%20Archives%20System&amp;severity=medium&amp;id=6996438e6aea4a407aefe487</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12812-cwe-89-improper-neutralization-of-s-40d68e92</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12812%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Delinea%20Inc.%20Cloud%20Suite%20and%20Privileged%20Access%20Service&amp;severity=medium&amp;id=69963c866aea4a407aee80e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12811-cwe-444-inconsistent-interpretation-52fa5661</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12811%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Delinea%20Inc.%20Cloud%20Suite%20and%20Privileged%20Access%20Service&amp;severity=medium&amp;id=69963c866aea4a407aee80dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2676-improper-authorization-in-googtech-s-cf4660a0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2676%3A%20Improper%20Authorization%20in%20GoogTech%20sms-ssm&amp;severity=medium&amp;id=69963c866aea4a407aee80e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2650-heap-buffer-overflow-in-google-chrom-0bc72c99</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2650%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=6996357e6aea4a407aec4451</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2649-integer-overflow-in-google-chrome-1776d2df</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2649%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=6996357e6aea4a407aec444d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2648-heap-buffer-overflow-in-google-chrom-8ba8b4eb</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2648%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=6996357e6aea4a407aec4449</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2672-path-traversal-in-tsinghua-unigroup--f5bf5b6d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2672%3A%20Path%20Traversal%20in%20Tsinghua%20Unigroup%20Electronic%20Archives%20System&amp;severity=medium&amp;id=6996357e6aea4a407aec4455</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27181-missing-authorization-in-sergejey-m-847720a0</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27181%3A%20Missing%20Authorization%20in%20sergejey%20MajorDoMo&amp;severity=high&amp;id=69962e786aea4a407ae9220d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27180-download-of-code-without-integrity--99709b79</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27180%3A%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20sergejey%20MajorDoMo&amp;severity=critical&amp;id=69962e786aea4a407ae92208</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27179-improper-neutralization-of-special--08ebabbd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27179%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20sergejey%20MajorDoMo&amp;severity=high&amp;id=69962e786aea4a407ae92203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27178-improper-neutralization-of-input-du-92230b61</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27178%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sergejey%20MajorDoMo&amp;severity=medium&amp;id=69962e786aea4a407ae921fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27177-improper-neutralization-of-input-du-8fe6a9fe</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27177%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sergejey%20MajorDoMo&amp;severity=medium&amp;id=69962e786aea4a407ae921f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27176-improper-neutralization-of-input-du-e69a01b9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27176%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sergejey%20MajorDoMo&amp;severity=medium&amp;id=69962e786aea4a407ae921f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27175-improper-neutralization-of-special--9a0f14bf</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27175%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20sergejey%20MajorDoMo&amp;severity=critical&amp;id=69962e786aea4a407ae921ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27174-improper-control-of-generation-of-c-e7d5bad6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27174%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20sergejey%20MajorDoMo&amp;severity=critical&amp;id=69962e786aea4a407ae921ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2670-os-command-injection-in-advantech-wi-d366eba0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2670%3A%20OS%20Command%20Injection%20in%20Advantech%20WISE-6610&amp;severity=high&amp;id=69962e796aea4a407ae92231</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2669-improper-access-controls-in-rongzhit-fabb5c97</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2669%3A%20Improper%20Access%20Controls%20in%20Rongzhitong%20Visual%20Integrated%20Command%20and%20Dispatch%20Platform&amp;severity=medium&amp;id=69962e786aea4a407ae92217</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27182-missing-authentication-for-critical-1fc2462d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27182%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20saturnremote%20Saturn%20Remote%20Mouse%20Server&amp;severity=high&amp;id=69962e786aea4a407ae92212</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0665-out-of-bounds-write-2671d8e4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0665%3A%20Out-of-bounds%20Write&amp;severity=medium&amp;id=69962af36aea4a407ae847e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8860-improper-removal-of-sensitive-inform-32c0e355</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8860%3A%20Improper%20Removal%20of%20Sensitive%20Information%20Before%20Storage%20or%20Transfer&amp;severity=low&amp;id=69962af36aea4a407ae847df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14876-allocation-of-resources-without-lim-2e422163</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14876%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling&amp;severity=medium&amp;id=69962af36aea4a407ae847db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1999-cwe-863-incorrect-authorization-in-g-962c7a88</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1999%3A%20CWE-863%20Incorrect%20Authorization%20in%20GitHub%20Enterprise%20Server&amp;severity=high&amp;id=69962af36aea4a407ae847ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1355-cwe-862-missing-authorization-in-git-91bfc7af</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1355%3A%20CWE-862%20Missing%20Authorization%20in%20GitHub%20Enterprise%20Server&amp;severity=medium&amp;id=69962af36aea4a407ae847e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0573-cwe-601-url-redirection-to-untrusted-fb40cff6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0573%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20GitHub%20Enterprise%20Server&amp;severity=high&amp;id=699631fa6aea4a407aeb5692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2668-improper-access-controls-in-rongzhit-55d063a0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2668%3A%20Improper%20Access%20Controls%20in%20Rongzhitong%20Visual%20Integrated%20Command%20and%20Dispatch%20Platform&amp;severity=medium&amp;id=699631fa6aea4a407aeb569a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2667-improper-access-controls-in-rongzhit-48cfbb24</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2667%3A%20Improper%20Access%20Controls%20in%20Rongzhitong%20Visual%20Integrated%20Command%20and%20Dispatch%20Platform&amp;severity=medium&amp;id=6996fb458fb9188dea8c0126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1272-vulnerability-in-fedora-project-fedo-30f9c46b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1272%3A%20Vulnerability%20in%20Fedora%20Project%20Fedora%20Linux&amp;severity=high&amp;id=69962af36aea4a407ae847fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12343-double-free-dde3ee36</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12343%3A%20Double%20Free&amp;severity=low&amp;id=6996fb458fb9188dea8c0122</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10256-null-pointer-dereference-58bc4ddc</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10256%3A%20NULL%20Pointer%20Dereference&amp;severity=medium&amp;id=6996fb458fb9188dea8c011c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0577-insufficient-entropy-df53ccfe</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0577%3A%20Insufficient%20Entropy&amp;severity=medium&amp;id=6996fb458fb9188dea8c0118</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1200-access-of-uninitialized-pointer-in-h-16b69636</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1200%3A%20Access%20of%20Uninitialized%20Pointer%20in%20https%3A%2F%2Fgithub.com%2Frgaufman%2Flive555%20rgaufman%2Flive555&amp;severity=medium&amp;id=699620676aea4a407add8670</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2666-unrestricted-upload-in-mingsoft-mcms-c239d51e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2666%3A%20Unrestricted%20Upload%20in%20mingSoft%20MCMS&amp;severity=medium&amp;id=6996fb458fb9188dea8c013a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2665-unrestricted-upload-in-huanzi-qch-ba-223f0da8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2665%3A%20Unrestricted%20Upload%20in%20huanzi-qch%20base-admin&amp;severity=medium&amp;id=6996fb458fb9188dea8c0132</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0875-cwe-787-out-of-bounds-write-in-autod-a34a9a01</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0875%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=699620676aea4a407add8679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0874-cwe-787-out-of-bounds-write-in-autod-190be7a3</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0874%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=699620676aea4a407add8675</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2663-sql-injection-in-alixhan-xh-admin-ba-882bff48</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2663%3A%20SQL%20Injection%20in%20Alixhan%20xh-admin-backend&amp;severity=medium&amp;id=6996fb478fb9188dea8c030c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2662-out-of-bounds-read-in-fascinatedbox--0b95d4f8</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2662%3A%20Out-of-Bounds%20Read%20in%20FascinatedBox%20lily&amp;severity=medium&amp;id=6996fb478fb9188dea8c0304</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2661-heap-based-buffer-overflow-in-squirr-3af36c3c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2661%3A%20Heap-based%20Buffer%20Overflow%20in%20Squirrel&amp;severity=medium&amp;id=6996fb478fb9188dea8c0319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69287-cwe-573-improper-following-of-speci-c693b5d8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69287%3A%20CWE-573%3A%20Improper%20Following%20of%20Specification%20by%20Caller%20in%20bsv-blockchain%20ts-sdk&amp;severity=medium&amp;id=6996fb478fb9188dea8c0320</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2660-use-after-free-in-fascinatedbox-lily-056100ae</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2660%3A%20Use%20After%20Free%20in%20FascinatedBox%20lily&amp;severity=medium&amp;id=6996fb498fb9188dea8c09a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14009-cwe-94-improper-control-of-generati-6b025b75</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14009%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20in%20nltk%20nltk%2Fnltk&amp;severity=critical&amp;id=69969ef76aea4a407a3d9a78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2659-out-of-bounds-read-in-squirrel-abffbf8a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2659%3A%20Out-of-Bounds%20Read%20in%20Squirrel&amp;severity=medium&amp;id=6996fb498fb9188dea8c09d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2658-cross-site-request-forgery-in-newbee-e3d0b3db</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2658%3A%20Cross-Site%20Request%20Forgery%20in%20newbee-ltd%20newbee-mall&amp;severity=medium&amp;id=6996fb498fb9188dea8c09c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/remcos-revisited-inside-the-rats-evolving-command--00631ee6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Remcos%20Revisited%3A%20Inside%20the%20RAT&apos;s%20Evolving%20Command-and-Control%20Techniques&amp;severity=medium&amp;id=699612556aea4a407acc7412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20142-information-written-to-log-files-ca-f0d31475</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20142%3A%20Information%20written%20to%20log%20files%20can%20be%20of%20a%20sensitive%20nature%20and%20give%20valuable%20guidance%20to%20an%20attacker%20or%20expose%20sensitive%20user%20information.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=69969ef76aea4a407a3d9a7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20138-information-written-to-log-files-ca-f3c5c5c3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20138%3A%20Information%20written%20to%20log%20files%20can%20be%20of%20a%20sensitive%20nature%20and%20give%20valuable%20guidance%20to%20an%20attacker%20or%20expose%20sensitive%20user%20information.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=69969ef76aea4a407a3d9a7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20139-the-software-does-not-properly-cont-7f5310ca</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20139%3A%20The%20software%20does%20not%20properly%20control%20the%20allocation%20and%20maintenance%20of%20a%20limited%20resource%20thereby%20enabling%20an%20actor%20to%20influence%20the%20amount%20of%20resources%20consumed%2C%20eventually%20leading%20to%20the%20exhaustion%20of%20available%20resources.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=6996fb4b8fb9188dea8c0dea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20144-information-written-to-log-files-ca-00300c2d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20144%3A%20Information%20written%20to%20log%20files%20can%20be%20of%20a%20sensitive%20nature%20and%20give%20valuable%20guidance%20to%20an%20attacker%20or%20expose%20sensitive%20user%20information.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=69969ef76aea4a407a3d9a81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20141-the-product-exposes-sensitive-infor-3b6f8480</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20141%3A%20The%20product%20exposes%20sensitive%20information%20to%20an%20actor%20that%20is%20not%20explicitly%20authorized%20to%20have%20access%20to%20that%20information.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=6996fb498fb9188dea8c09bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20137-the-product-exposes-sensitive-infor-4bd9248d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20137%3A%20The%20product%20exposes%20sensitive%20information%20to%20an%20actor%20that%20is%20not%20explicitly%20authorized%20to%20have%20access%20to%20that%20information.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=low&amp;id=6996fb498fb9188dea8c09b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2657-stack-based-buffer-overflow-in-wren--da471de2</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2657%3A%20Stack-based%20Buffer%20Overflow%20in%20wren-lang%20wren&amp;severity=medium&amp;id=6996fb498fb9188dea8c09bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2230-cwe-639-authorization-bypass-through-2fdc86b5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2230%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wpdevelop%20Booking%20Calendar&amp;severity=medium&amp;id=6996fb478fb9188dea8c0328</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/law-firm-sites-hijacked-in-suspected-supply-chain--44484675</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Law%20Firm%20Sites%20Hijacked%20in%20Suspected%20Supply-Chain%20Attack&amp;severity=medium&amp;id=699612556aea4a407acc7417</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2507-cwe-476-null-pointer-dereference-in--04591590</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2507%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20F5%20BIG-IP&amp;severity=high&amp;id=6996fb4b8fb9188dea8c0de3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-keenadu-android-malware-found-on-thousands-of--aeb3c090</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Keenadu%20Android%20Malware%20Found%20on%20Thousands%20of%20Devices&amp;severity=medium&amp;id=6995e0ea6aea4a407ac10f01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15579-cwe-502-deserialization-of-untruste-8ab4ff09</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15579%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20OpenText%E2%84%A2%20Directory%20Services&amp;severity=critical&amp;id=6995da1e6aea4a407abec468</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61982-cwe-94-improper-control-of-generati-7ed7f412</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61982%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20OpenCFD%20OpenFOAM&amp;severity=high&amp;id=6995d3146aea4a407abc1a0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2656-use-after-free-in-chaiscript-f70f7207</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2656%3A%20Use%20After%20Free%20in%20ChaiScript&amp;severity=low&amp;id=6995d3146aea4a407abc1a12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1404-cwe-79-improper-neutralization-of-in-d8b84df7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1404%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ultimatemember%20Ultimate%20Member%20%E2%80%93%20User%20Profile%2C%20Registration%2C%20Login%2C%20Member%20Directory%2C%20Content%20Restriction%20%26%20Membership%20Plugin&amp;severity=medium&amp;id=6995cf916aea4a407abb58be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1426-cwe-502-deserialization-of-untrusted-d5d3ff22</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1426%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20berocket%20Advanced%20AJAX%20Product%20Filters&amp;severity=high&amp;id=6995cf916aea4a407abb58c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71228-5c740b16</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71228&amp;severity=null&amp;id=69a0d69332ffcdb8a26c704b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71226-e967f3fa</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71226&amp;severity=null&amp;id=69a0d69332ffcdb8a26c7049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27100-vulnerability-in-jenkins-project-je-a7ca03e3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27100%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins&amp;severity=medium&amp;id=6995cf916aea4a407abb58cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27099-vulnerability-in-jenkins-project-je-f2bd90c0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27099%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins&amp;severity=high&amp;id=6995cf916aea4a407abb58cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2329-cwe-121-stack-based-buffer-overflow--e34cb0a5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2329%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Grandstream%20GXP1610&amp;severity=critical&amp;id=6995cf916aea4a407abb58d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60038-cwe-502-deserialization-of-untruste-df25c0a2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60038%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Bosch%20Rexroth%20IndraWorks&amp;severity=high&amp;id=6995c8856aea4a407a9d0cfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60037-cwe-502-deserialization-of-untruste-3b11b4fe</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60037%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Bosch%20Rexroth%20IndraWorks&amp;severity=high&amp;id=6995c8856aea4a407a9d0cfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60036-cwe-502-deserialization-of-untruste-01ac078c</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60036%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Bosch%20Rexroth%20IndraWorks&amp;severity=high&amp;id=6995c8856aea4a407a9d0cf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2655-use-after-free-in-chaiscript-4469a246</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2655%3A%20Use%20After%20Free%20in%20ChaiScript&amp;severity=low&amp;id=6995c8856aea4a407a9d0d03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60035-cwe-502-deserialization-of-untruste-4ac47a15</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60035%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Bosch%20Rexroth%20IndraWorks&amp;severity=high&amp;id=6995c8856aea4a407a9d0cf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33240-cwe-94-improper-control-of-generati-7295b46a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33240%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20Megatron-Bridge&amp;severity=high&amp;id=6995c8836aea4a407a9d0caf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33239-cwe-94-improper-control-of-generati-ce2d736d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33239%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20Megatron-Bridge&amp;severity=high&amp;id=6995c8836aea4a407a9d0caa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33253-cwe-502-deserialization-of-untruste-87fed69d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33253%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=6995c8856aea4a407a9d0cef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33252-cwe-502-deserialization-of-untruste-05b53bca</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33252%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=6995c8856aea4a407a9d0cea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33251-cwe-94-improper-control-of-generati-cf832903</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33251%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=6995c8846aea4a407a9d0cd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33250-cwe-94-improper-control-of-generati-c81e2e61</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33250%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=6995c8846aea4a407a9d0ccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33249-cwe-77-improper-neutralization-of-s-fbdebcf6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33249%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=6995c8846aea4a407a9d0cc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33246-cwe-77-improper-neutralization-of-s-665c462e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33246%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=6995c8836aea4a407a9d0cc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33245-cwe-502-deserialization-of-untruste-52801645</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33245%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=6995c8836aea4a407a9d0cbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33243-cwe-502-deserialization-of-untruste-6f19f5cb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33243%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=6995c8836aea4a407a9d0cb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33241-cwe-502-deserialization-of-untruste-f2752c91</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33241%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=6995c8836aea4a407a9d0cb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33236-cwe-94-improper-control-of-generati-bab7e094</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33236%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=6995c8836aea4a407a9d0ca5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2464-cwe-22-improper-limitation-of-a-path-49dc2395</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2464%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20AMR%20AMR%20Printer%20Management%20Beta%20web%20service&amp;severity=high&amp;id=6995c8856aea4a407a9d0d00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59920-cwe-89-improper-neutralization-of-s-2feb09f2</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59920%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20systems%20at%20work%20time%20at%20work&amp;severity=high&amp;id=6995c8856aea4a407a9d0d0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8308-cwe-79-improper-neutralization-of-in-80089374</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8308%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Key%20Software%20Solutions%20Inc.%20INFOREX-%20General%20Information%20Management%20System&amp;severity=medium&amp;id=6995cf916aea4a407abb58db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14340-cwe-79-improper-neutralization-of-i-71ccb838</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14340%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Payara%20Platform%20Payara%20Server&amp;severity=high&amp;id=6995cf916aea4a407abb58d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2654-server-side-request-forgery-in-huggi-4f6f3e57</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2654%3A%20Server-Side%20Request%20Forgery%20in%20huggingface%20smolagents&amp;severity=medium&amp;id=6995cf936aea4a407abb58fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vulnerabilities-in-popular-pdf-platforms-allowed-a-944486e7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vulnerabilities%20in%20Popular%20PDF%20Platforms%20Allowed%20Account%20Takeover%2C%20Data%20Exfiltration&amp;severity=low&amp;id=6995bed580d747be206eb309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-flaws-found-in-four-vs-code-extensions-wi-563d9726</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Flaws%20Found%20in%20Four%20VS%20Code%20Extensions%20with%20Over%20125%20Million%20Installs&amp;severity=critical&amp;id=6995bec280d747be206eaf99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1441-cwe-79-improper-neutralization-of-in-a4fd3745</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1441%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Graylog%20Graylog%20Web%20Interface&amp;severity=medium&amp;id=6995cf936aea4a407abb58f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1440-cwe-79-improper-neutralization-of-in-659e2c74</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1440%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Graylog%20Graylog%20Web%20Interface&amp;severity=medium&amp;id=6995cf936aea4a407abb58f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1439-cwe-79-improper-neutralization-of-in-d1082814</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1439%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Graylog%20Graylog%20Web%20Interface&amp;severity=medium&amp;id=6995cf936aea4a407abb58f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1438-cwe-79-improper-neutralization-of-in-7aa14847</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1438%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Graylog%20Graylog%20Web%20Interface&amp;severity=medium&amp;id=6995cf916aea4a407abb58e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1437-cwe-79-improper-neutralization-of-in-cb0fed4e</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1437%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Graylog%20Graylog%20Web%20Interface&amp;severity=medium&amp;id=6995cf916aea4a407abb58e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1436-cwe-639-authorization-bypass-through-46e35fb9</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1436%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Graylog%20Graylog%20Web%20Interface&amp;severity=high&amp;id=6995cf916aea4a407abb58de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1435-cwe-613-insufficient-session-expirat-34761982</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1435%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20Graylog%20Graylog%20Web%20Interface&amp;severity=critical&amp;id=6995da1e6aea4a407abec46e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1317-cwe-89-improper-neutralization-of-sp-6541c750</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1317%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20smackcoders%20WP%20Ultimate%20CSV%20Importer%20%E2%80%93%20Import%20CSV%2C%20XML%20%26%20Excel%20into%20WordPress&amp;severity=medium&amp;id=6995b46b80d747be206b6168</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1582-cwe-200-exposure-of-sensitive-inform-e684b84f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1582%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20soflyy%20WP%20All%20Export%20%E2%80%93%20Drag%20%26%20Drop%20Export%20to%20Any%20Custom%20CSV%2C%20XML%20%26%20Excel&amp;severity=low&amp;id=6995b46b80d747be206b616e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2386-cwe-863-incorrect-authorization-in-p-ce591677</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2386%3A%20CWE-863%20Incorrect%20Authorization%20in%20posimyththemes%20The%20Plus%20Addons%20for%20Elementor%20%E2%80%93%20Addons%20for%20Elementor%2C%20Page%20Templates%2C%20Widgets%2C%20Mega%20Menu%2C%20WooCommerce&amp;severity=medium&amp;id=6995b46b80d747be206b6173</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8781-cwe-89-improper-neutralization-of-sp-54f84aa7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8781%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20bookster%20Bookster%20%E2%80%93%20WordPress%20Appointment%20Booking%20Plugin&amp;severity=medium&amp;id=6995b46b80d747be206b6163</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/spam-campaign-abuses-atlassian-jira-targets-govern-d550c7cf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Spam%20Campaign%20Abuses%20Atlassian%20Jira%2C%20Targets%20Government%20and%20Corporate%20Entities&amp;severity=medium&amp;id=6995e8256aea4a407ac323e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7630-cwe-307-improper-restriction-of-exce-e9a6662f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7630%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Doruk%20Communication%20and%20Automation%20Industry%20and%20Trade%20Inc.%20Wispotter&amp;severity=medium&amp;id=6995b0e780d747be206a5422</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cybersecurity-tech-predictions-for-2026-operating--d75f27b5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cybersecurity%20Tech%20Predictions%20for%202026%3A%20Operating%20in%20a%20World%20of%20Permanent%20Instability&amp;severity=medium&amp;id=6995da846aea4a407abee716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14799-cwe-843-access-of-resource-using-in-c4359a93</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14799%3A%20CWE-843%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20neeraj_slit%20Brevo%20%E2%80%93%20Email%2C%20SMS%2C%20Web%20Push%2C%20Chat%2C%20and%20more.&amp;severity=medium&amp;id=6995a2d880d747be206547e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2653-heap-based-buffer-overflow-in-admesh-c73931a3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2653%3A%20Heap-based%20Buffer%20Overflow%20in%20admesh&amp;severity=medium&amp;id=69959f5480d747be2063f039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dell-recoverpoint-for-vms-zero-day-cve-2026-22769--1a732439</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dell%20RecoverPoint%20for%20VMs%20Zero-Day%20CVE-2026-22769%20Exploited%20Since%20Mid-2024&amp;severity=medium&amp;id=6995da846aea4a407abee719</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-hackers-exploiting-vulnerability-in-product-o-a099b96b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%3A%20Hackers%20Exploiting%20Vulnerability%20in%20Product%20of%20Taiwan%20Security%20Firm%20TeamT5&amp;severity=medium&amp;id=6995949480d747be205f87ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2426-cwe-22-improper-limitation-of-a-path-3d51e834</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2426%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20gamerz%20WP-DownloadManager&amp;severity=medium&amp;id=699594d680d747be205fb508</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1942-cwe-862-missing-authorization-in-pr--c306e9aa</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1942%3A%20CWE-862%20Missing%20Authorization%20in%20pr-gateway%20Blog2Social%3A%20Social%20Media%20Auto%20Post%20%26%20Scheduler&amp;severity=medium&amp;id=699594d680d747be205fb502</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14444-cwe-345-insufficient-verification-o-ccfaa86b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14444%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20metagauss%20RegistrationMagic%20%E2%80%93%20Custom%20Registration%20Forms%2C%20User%20Registration%2C%20Payment%2C%20and%20User%20Login&amp;severity=medium&amp;id=699594d680d747be205fb4fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11185-cwe-79-improper-neutralization-of-i-3a4690bd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11185%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20complianz%20Complianz%20%E2%80%93%20GDPR%2FCCPA%20Cookie%20Consent&amp;severity=medium&amp;id=699586ba80d747be2059d036</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13727-cwe-79-improper-neutralization-of-i-a926559b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13727%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20videowhisper%20Video%20Share%20VOD%20%E2%80%93%20Turnkey%20Video%20Site%20Builder%20Script&amp;severity=medium&amp;id=699586ba80d747be2059d03b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2126-cwe-863-incorrect-authorization-in-s-2ba6c938</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2126%3A%20CWE-863%20Incorrect%20Authorization%20in%20specialk%20User%20Submitted%20Posts%20%E2%80%93%20Enable%20Users%20to%20Submit%20Posts%20from%20the%20Front%20End&amp;severity=medium&amp;id=699586ba80d747be2059d043</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1656-cwe-862-missing-authorization-in-str-a682e6d5</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1656%3A%20CWE-862%20Missing%20Authorization%20in%20strategy11team%20Business%20Directory%20Plugin%20%E2%80%93%20Easy%20Listing%20Directories%20for%20WordPress&amp;severity=medium&amp;id=699578ab80d747be205539d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1649-cwe-79-improper-neutralization-of-in-45919fab</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1649%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jackdewey%20Community%20Events&amp;severity=medium&amp;id=699578ab80d747be205539cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2127-cwe-862-missing-authorization-in-gpr-82301c35</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2127%3A%20CWE-862%20Missing%20Authorization%20in%20gpriday%20SiteOrigin%20Widgets%20Bundle&amp;severity=medium&amp;id=699578ab80d747be205539e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2495-cwe-89-improper-neutralization-of-sp-08e20fbb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2495%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20qdonow%20WPNakama%20%E2%80%93%20Team%20and%20multi-Client%20Collaboration%2C%20Editorial%20and%20Project%20Management&amp;severity=high&amp;id=699578ab80d747be205539ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1941-cwe-79-improper-neutralization-of-in-e87c4116</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1941%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xylus%20WP%20Event%20Aggregator%3A%20Import%20Eventbrite%20events%2C%20Meetup%20events%2C%20social%20events%20and%20any%20iCal%20Events%20into%20Event%20Calendar&amp;severity=medium&amp;id=699578ab80d747be205539da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tracking-malware-campaigns-with-reused-material-we-f81192c1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tracking%20Malware%20Campaigns%20With%20Reused%20Material%2C%20(Wed%2C%20Feb%2018th)&amp;severity=medium&amp;id=6995787680d747be205506ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/notepad-fixes-hijacked-update-mechanism-used-to-de-7dc05b1b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Notepad%2B%2B%20Fixes%20Hijacked%20Update%20Mechanism%20Used%20to%20Deliver%20Targeted%20Malware&amp;severity=medium&amp;id=6995909980d747be205dea22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25421-1dcf4a9e</loc>
    <lastmod>2026-04-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25421&amp;severity=null&amp;id=6995719e80d747be205195d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2112-cwe-352-cross-site-request-forgery-c-a2c12543</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2112%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20webguyio%20Dam%20Spam&amp;severity=medium&amp;id=69956e1c80d747be20503e35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1831-cwe-862-missing-authorization-in-yay-f8b220fa</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1831%3A%20CWE-862%20Missing%20Authorization%20in%20yaycommerce%20YayMail%20%E2%80%93%20WooCommerce%20Email%20Customizer&amp;severity=low&amp;id=69956e1c80d747be20503e1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1860-cwe-862-missing-authorization-in-wpc-d30e477c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1860%3A%20CWE-862%20Missing%20Authorization%20in%20wpchill%20Kali%20Forms%20%E2%80%94%20Contact%20Form%20%26%20Drag-and-Drop%20Builder&amp;severity=medium&amp;id=69956e1c80d747be20503e21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1943-cwe-79-improper-neutralization-of-in-45cd9e0f</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1943%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yaycommerce%20YayMail%20%E2%80%93%20WooCommerce%20Email%20Customizer&amp;severity=medium&amp;id=69956e1c80d747be20503e2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1938-cwe-862-missing-authorization-in-yay-7ae76c05</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1938%3A%20CWE-862%20Missing%20Authorization%20in%20yaycommerce%20YayMail%20%E2%80%93%20WooCommerce%20Email%20Customizer&amp;severity=medium&amp;id=69956e1c80d747be20503e28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1655-cwe-862-missing-authorization-in-met-24a3e3cf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1655%3A%20CWE-862%20Missing%20Authorization%20in%20metagauss%20EventPrime%20%E2%80%93%20Events%20Calendar%2C%20Bookings%20and%20Tickets&amp;severity=medium&amp;id=69956e1c80d747be20503e12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2419-cwe-22-improper-limitation-of-a-path-275cb74b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2419%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20gamerz%20WP-DownloadManager&amp;severity=low&amp;id=69956e1c80d747be20503e3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dell-recoverpoint-zero-day-exploited-by-chinese-cy-148649a4</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dell%20RecoverPoint%20Zero-Day%20Exploited%20by%20Chinese%20Cyberespionage%20Group&amp;severity=medium&amp;id=699566e580d747be204cca72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2644-out-of-bounds-read-in-niklasso-minis-3863f627</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2644%3A%20Out-of-Bounds%20Read%20in%20niklasso%20minisat&amp;severity=medium&amp;id=6995672780d747be204d295f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-flags-four-security-flaws-under-active-exploi-14954e9e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Flags%20Four%20Security%20Flaws%20Under%20Active%20Exploitation%20in%20Latest%20KEV%20Update&amp;severity=low&amp;id=6995909980d747be205dea25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2296-cwe-94-improper-control-of-generatio-5b1b1df0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2296%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20acowebs%20Product%20Addons%20for%20Woocommerce%20%E2%80%93%20Product%20Options%20with%20Custom%20Fields&amp;severity=high&amp;id=6995672780d747be204d2951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2633-cwe-862-missing-authorization-in-ste-269f9374</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2633%3A%20CWE-862%20Missing%20Authorization%20in%20stellarwp%20Kadence%20Blocks%20%E2%80%94%20Page%20Builder%20Toolkit%20for%20Gutenberg%20Editor&amp;severity=medium&amp;id=6995672780d747be204d2959</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2281-cwe-79-improper-neutralization-of-in-518f2262</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2281%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20edersonpeka%20Private%20Comment&amp;severity=medium&amp;id=6995672780d747be204d294b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1640-cwe-862-missing-authorization-in-tas-e9acd827</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1640%3A%20CWE-862%20Missing%20Authorization%20in%20taskbuilder%20Taskbuilder%20%E2%80%93%20Project%20Management%20%26%20Task%20Management%20Tool%20With%20Kanban%20Board&amp;severity=medium&amp;id=6995672780d747be204d2927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1807-cwe-79-improper-neutralization-of-in-229ebdad</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1807%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20interactivecalculator%20InteractiveCalculator%20for%20WordPress&amp;severity=medium&amp;id=6995672780d747be204d2933</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1937-cwe-862-missing-authorization-in-yay-12c0a139</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1937%3A%20CWE-862%20Missing%20Authorization%20in%20yaycommerce%20YayMail%20%E2%80%93%20WooCommerce%20Email%20Customizer&amp;severity=high&amp;id=6995672780d747be204d293f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1666-cwe-79-improper-neutralization-of-in-3f7d4556</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1666%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codename065%20Download%20Manager&amp;severity=medium&amp;id=6995672780d747be204d292c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1857-cwe-918-server-side-request-forgery--805c3795</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1857%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20stellarwp%20Kadence%20Blocks%20%E2%80%94%20Page%20Builder%20Toolkit%20for%20Gutenberg%20Editor&amp;severity=medium&amp;id=6995672780d747be204d2939</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2019-cwe-74-improper-neutralization-of-sp-628198fb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2019%3A%20CWE-74%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20villatheme%20Cart%20All%20In%20One%20For%20WooCommerce&amp;severity=high&amp;id=6995672780d747be204d2945</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2642-null-pointer-dereference-in-ggreer-t-3ad53a2e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2642%3A%20NULL%20Pointer%20Dereference%20in%20ggreer%20the_silver_searcher&amp;severity=medium&amp;id=6995600b80d747be204893b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1368-cwe-287-improper-authentication-in-v-252c05b5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1368%3A%20CWE-287%20Improper%20Authentication%20in%20Video%20Conferencing%20with%20Zoom&amp;severity=high&amp;id=6995590380d747be20465104</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2641-uncontrolled-recursion-in-universal--0b937f98</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2641%3A%20Uncontrolled%20Recursion%20in%20universal-ctags%20ctags&amp;severity=medium&amp;id=6995557f80d747be2043e625</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12356-cwe-862-missing-authorization-in-ti-2b7bb65c</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12356%3A%20CWE-862%20Missing%20Authorization%20in%20tickera%20Tickera%20%E2%80%93%20Sell%20Tickets%20%26%20Manage%20Events&amp;severity=medium&amp;id=6995557f80d747be2043e5f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1304-cwe-79-improper-neutralization-of-in-84444595</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1304%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20stellarwp%20Membership%20Plugin%20%E2%80%93%20Restrict%20Content&amp;severity=medium&amp;id=6995557f80d747be2043e604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12122-cwe-78-improper-neutralization-of-s-95a10c0f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12122%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20wpcalc%20Popup%20Box%20%E2%80%93%20Easily%20Create%20WordPress%20Popups&amp;severity=medium&amp;id=6995557f80d747be2043e5f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1072-cwe-352-cross-site-request-forgery-c-9c430d35</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1072%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20jamesits%20Keybase.io%20Verification&amp;severity=medium&amp;id=6995557f80d747be2043e5fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1906-cwe-862-missing-authorization-in-wpo-2766b763</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1906%3A%20CWE-862%20Missing%20Authorization%20in%20wpovernight%20PDF%20Invoices%20%26%20Packing%20Slips%20for%20WooCommerce&amp;severity=medium&amp;id=6995557f80d747be2043e618</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1639-cwe-89-improper-neutralization-of-sp-f7f4ef30</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1639%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20taskbuilder%20Taskbuilder%20%E2%80%93%20Project%20Management%20%26%20Task%20Management%20Tool%20With%20Kanban%20Board&amp;severity=medium&amp;id=6995557f80d747be2043e612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11737-cwe-79-improper-neutralization-of-i-22f7971a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11737%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kurudrive%20VK%20All%20in%20One%20Expansion%20Unit&amp;severity=medium&amp;id=6995557f80d747be2043e5f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2023-cwe-352-cross-site-request-forgery-c-ec86f230</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2023%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20brikou%20WP%20Plugin%20Info%20Card&amp;severity=medium&amp;id=6995557f80d747be2043e61e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1925-cwe-862-missing-authorization-in-rox-64475f95</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1925%3A%20CWE-862%20Missing%20Authorization%20in%20roxnor%20EmailKit%20%E2%80%93%20Email%20Customizer%20for%20WooCommerce%20%26%20WP&amp;severity=medium&amp;id=6995477080d747be203eb807</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2576-cwe-89-improper-neutralization-of-sp-ac9124c3</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2576%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20strategy11team%20Business%20Directory%20Plugin%20%E2%80%93%20Easy%20Listing%20Directories%20for%20WordPress&amp;severity=high&amp;id=6995477180d747be203eb81e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1714-cwe-93-improper-neutralization-of-cr-f05f49aa</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1714%3A%20CWE-93%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20devitemsllc%20ShopLentor%20%E2%80%93%20All-in-One%20WooCommerce%20Growth%20%26%20Store%20Enhancement%20Plugin&amp;severity=high&amp;id=6995477080d747be203eb7fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1277-cwe-601-url-redirection-to-untrusted-f948f014</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1277%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20kaizencoders%20URL%20Shortify%20%E2%80%93%20Simple%20and%20Easy%20URL%20Shortener&amp;severity=medium&amp;id=6995477080d747be203eb7f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12037-cwe-79-improper-neutralization-of-i-6a60de39</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12037%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hwk-fr%20WP%20404%20Auto%20Redirect%20to%20Similar%20Post&amp;severity=medium&amp;id=6995477080d747be203eb7d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6460-cwe-79-improper-neutralization-of-in-28148615</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6460%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gserafini%20Display%20During%20Conditional%20Shortcode&amp;severity=medium&amp;id=6995477080d747be203eb7ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1296-cwe-601-url-redirection-to-untrusted-0f085222</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1296%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20wpshuffle%20Frontend%20Post%20Submission%20Manager%20Lite%20%E2%80%93%20Frontend%20Posting%20WordPress%20Plugin&amp;severity=medium&amp;id=6995477080d747be203eb7f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12075-cwe-862-missing-authorization-in-fa-23ec4d5e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12075%3A%20CWE-862%20Missing%20Authorization%20in%20fahadmahmood%20Order%20Splitter%20for%20WooCommerce&amp;severity=medium&amp;id=6995477080d747be203eb7e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1931-cwe-79-improper-neutralization-of-in-fa3944d4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1931%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jonschr%20Rent%20Fetch&amp;severity=high&amp;id=6995477180d747be203eb817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12071-cwe-639-authorization-bypass-throug-052ab4dc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12071%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20absikandar%20Frontend%20User%20Notes&amp;severity=medium&amp;id=6995477080d747be203eb7d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13959-cwe-79-improper-neutralization-of-i-1d68a836</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13959%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shanaver%20Filestack&amp;severity=medium&amp;id=6995477080d747be203eb7e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12074-cwe-200-exposure-of-sensitive-infor-e6ca8f6b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12074%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20postmagthemes%20Context%20Blog&amp;severity=medium&amp;id=6995477080d747be203eb7dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-02-18-116ea64e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-02-18&amp;severity=medium&amp;id=69971b5eb557332a80fbff32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65791-na-c5be6e2d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65791%3A%20n%2Fa&amp;severity=critical&amp;id=6996fb4b8fb9188dea8c0df6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65519-na-864da093</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65519%3A%20n%2Fa&amp;severity=medium&amp;id=6996fb4b8fb9188dea8c0df3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24708-cwe-669-incorrect-resource-transfer-b65710b0</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24708%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20OpenStack%20Nova&amp;severity=high&amp;id=6996fb4b8fb9188dea8c0ded</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70148-na-8c970d6c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70148%3A%20n%2Fa&amp;severity=high&amp;id=6996fb4b8fb9188dea8c0de6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70150-na-831b2e9a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70150%3A%20n%2Fa&amp;severity=critical&amp;id=6996fb4b8fb9188dea8c0ddf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70152-na-7fcec29d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70152%3A%20n%2Fa&amp;severity=critical&amp;id=6996fb498fb9188dea8c09b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70151-na-132a0884</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70151%3A%20n%2Fa&amp;severity=high&amp;id=6996fb498fb9188dea8c09b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70149-na-25fc9c21</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70149%3A%20n%2Fa&amp;severity=critical&amp;id=6996fb498fb9188dea8c09ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70141-na-7495087b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70141%3A%20n%2Fa&amp;severity=critical&amp;id=6996fb498fb9188dea8c09a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70147-na-713f71ae</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70147%3A%20n%2Fa&amp;severity=high&amp;id=6996fb478fb9188dea8c0331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70146-na-f560c7ee</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70146%3A%20n%2Fa&amp;severity=critical&amp;id=6996fb478fb9188dea8c032d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70064-na-0097a5a0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70064%3A%20n%2Fa&amp;severity=high&amp;id=6996fb478fb9188dea8c0324</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70063-na-e6c89975</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70063%3A%20n%2Fa&amp;severity=medium&amp;id=6996fb478fb9188dea8c0315</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70062-na-a4275ec3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70062%3A%20n%2Fa&amp;severity=medium&amp;id=6996fb478fb9188dea8c0311</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-18-d351e167</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-18&amp;severity=medium&amp;id=699654eb6aea4a407af39030</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70998-na-77dc81ec</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70998%3A%20n%2Fa&amp;severity=critical&amp;id=6995da1e6aea4a407abec46b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-18-9670f798</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-18&amp;severity=low&amp;id=699582fd80d747be20583fde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1344-incorrect-permission-assignment-for--4cd8ccfc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1344%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Tanium%20Enforce%20Recovery%20Key%20Portal&amp;severity=medium&amp;id=6995011f80d747be20e100cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23599-vulnerability-in-hewlett-packard-en-fdc96349</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23599%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20ClearPass%20Policy%20Manager&amp;severity=high&amp;id=6994f69980d747be20df435a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22048-918-in-netapp-storagegrid-formerly--5c913f90</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22048%3A%20918%20in%20NETAPP%20StorageGRID%20(formerly%20StorageGRID%20Webscale)&amp;severity=high&amp;id=6994f69980d747be20df4357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26119-cwe-287-improper-authentication-in--f09bdabb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26119%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Windows%20Admin%20Center&amp;severity=high&amp;id=6994f69980d747be20df4365</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1670-cwe-306-missing-authentication-for-c-7263f78b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1670%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Honeywell%20I-HIB2PI-UL%202MP%20IP&amp;severity=critical&amp;id=6994f69980d747be20df4360</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62183-cwe-79-improper-neutralization-of-i-fb957050</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62183%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pegasystems%20Pega%20Infinity&amp;severity=medium&amp;id=6994f69980d747be20df435d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13333-cwe-358-improperly-implemented-secu-e16039f3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13333%3A%20CWE-358%20Improperly%20Implemented%20Security%20Check%20for%20Standard%20in%20IBM%20WebSphere%20Application%20Server&amp;severity=medium&amp;id=6994f31080d747be20de97a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13689-cwe-434-unrestricted-upload-of-file-eecd60ee</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13689%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20IBM%20DataStage%20on%20Cloud%20Pak&amp;severity=high&amp;id=699575b980d747be2053752c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2629-os-command-injection-in-jishi-node-s-35f7c933</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2629%3A%20OS%20Command%20Injection%20in%20jishi%20node-sonos-http-api&amp;severity=medium&amp;id=6994e88380d747be20dc67c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33135-cwe-79-improper-neutralization-of-i-f6fbdd1f</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33135%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Financial%20Transaction%20Manager%20for%20ACH%20Services%20and%20Check%20Services%20for%20Multi-Platform&amp;severity=medium&amp;id=6994e1f780d747be20dad4a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33088-cwe-732-incorrect-permission-assign-9dbe55da</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33088%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20IBM%20Concert&amp;severity=high&amp;id=6994e1f780d747be20dad49f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36183-cwe-434-unrestricted-upload-of-file-4e55895a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36183%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20IBM%20watsonx.data&amp;severity=low&amp;id=6994e1f780d747be20dad4a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2627-link-following-in-softland-fbackup-21db41d8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2627%3A%20Link%20Following%20in%20Softland%20FBackup&amp;severity=high&amp;id=6994e1f780d747be20dad4ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36348-cwe-209-generation-of-error-message-2e5a614e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36348%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20IBM%20Sterling%20B2B%20Integrator&amp;severity=medium&amp;id=6994e1f780d747be20dad4a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2623-path-traversal-in-blossom-e8f3b710</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2623%3A%20Path%20Traversal%20in%20Blossom&amp;severity=medium&amp;id=6994e1f780d747be20dad4b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23598-vulnerability-in-hewlett-packard-en-c78a381d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23598%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20Private%205G%20Core&amp;severity=medium&amp;id=6994e1f780d747be20dad4b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23597-vulnerability-in-hewlett-packard-en-97c8adfe</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23597%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20Private%205G%20Core&amp;severity=medium&amp;id=699575b980d747be2053755e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23596-vulnerability-in-hewlett-packard-en-5a0b28fd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23596%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20Private%205G%20Core&amp;severity=medium&amp;id=699575b980d747be20537554</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23595-vulnerability-in-hewlett-packard-en-aaebd4dc</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23595%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20Private%205G%20Core&amp;severity=high&amp;id=699575b980d747be2053754a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36376-cwe-613-insufficient-session-expira-27f04f89</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36376%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20IBM%20Security%20QRadar%20EDR&amp;severity=medium&amp;id=699575b980d747be20537568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2622-cross-site-scripting-in-blossom-a97e2f4f</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2622%3A%20Cross%20Site%20Scripting%20in%20Blossom&amp;severity=medium&amp;id=699575b980d747be20537628</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36377-cwe-613-insufficient-session-expira-47b9f738</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36377%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20IBM%20Security%20QRadar%20EDR&amp;severity=medium&amp;id=699575b980d747be20537572</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36379-cwe-326-inadequate-encryption-stren-e8c56bdd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36379%3A%20CWE-326%20Inadequate%20Encryption%20Strength%20in%20IBM%20Security%20QRadar%20EDR&amp;severity=medium&amp;id=699575b980d747be2053757a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13691-cwe-497-exposure-of-sensitive-syste-e4d4e018</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13691%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20IBM%20DataStage%20on%20Cloud%20Pak%20for%20Data&amp;severity=high&amp;id=699575b980d747be20537634</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14289-cwe-80-improper-neutralization-of-s-15994d02</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14289%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20IBM%20webMethods%20Integration%20Server&amp;severity=medium&amp;id=699575b980d747be20537533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2621-sql-injection-in-sciyon-koyuan-therm-c2c7056e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2621%3A%20SQL%20Injection%20in%20Sciyon%20Koyuan%20Thermoelectricity%20Heat%20Network%20Management%20System&amp;severity=medium&amp;id=699575b980d747be2053753f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22762-cwe-22-improper-limitation-of-a-pat-fb7162fa</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22762%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Dell%20Avamar%20Server&amp;severity=medium&amp;id=699575bb80d747be205376a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27898-cwe-613-insufficient-session-expira-1fb50650</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27898%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20IBM%20DB2%20Recovery%20Expert%20for%20LUW&amp;severity=medium&amp;id=699575b980d747be20537640</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27899-cwe-526-cleartext-storage-of-sensit-79a8cd73</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27899%3A%20CWE-526%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20an%20Environment%20Variable%20in%20IBM%20DB2%20Recovery%20Expert%20for%20LUW&amp;severity=medium&amp;id=699575b980d747be20537643</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27900-cwe-601-url-redirection-to-untruste-44a62879</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27900%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20IBM%20DB2%20Recovery%20Expert%20for%20LUW&amp;severity=medium&amp;id=699575b980d747be20537646</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22284-cwe-77-improper-neutralization-of-s-5569d01c</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22284%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Dell%20SmartFabric%20OS10%20Software&amp;severity=medium&amp;id=69954e7880d747be2041357b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26357-cwe-79-improper-neutralization-of-i-851a7e59</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26357%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dell%20Unisphere%20for%20PowerMax%209.2.4.18&amp;severity=medium&amp;id=699575bb80d747be205376a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27901-cwe-644-improper-neutralization-of--a8ea6de3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27901%3A%20CWE-644%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20IBM%20DB2%20Recovery%20Expert%20for%20LUW&amp;severity=medium&amp;id=699575b980d747be2053763a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27903-cwe-319-cleartext-transmission-of-s-e4976127</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27903%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20IBM%20DB2%20Recovery%20Expert%20for%20LUW&amp;severity=medium&amp;id=699575b980d747be2053762e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27904-cwe-352-cross-site-request-forgery--7dfc647d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27904%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20IBM%20DB2%20Recovery%20Expert%20for%20LUW&amp;severity=medium&amp;id=699575b980d747be20537631</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36598-cwe-22-improper-limitation-of-a-pat-c71d019c</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36598%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Dell%20Avamar%20Virtual%20Edition&amp;severity=medium&amp;id=699575b980d747be20537539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22769-cwe-798-use-of-hard-coded-credentia-cad7841a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22769%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20Dell%20RecoverPoint%20for%20Virtual%20Machines&amp;severity=critical&amp;id=69954e7880d747be2041357f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33130-cwe-120-buffer-copy-without-checkin-6003e44e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33130%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20IBM%20DB2%20Merge%20Backup%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=699575bb80d747be205376ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0102-cwe-359-exposure-of-private-personal-0ea43207</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0102%3A%20CWE-359%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=low&amp;id=6994f69980d747be20df436a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33124-cwe-131-incorrect-calculation-of-bu-b76dcfb4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33124%3A%20CWE-131%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20IBM%20DB2%20Merge%20Backup%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=699575bb80d747be205376ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13108-vulnerability-in-ibm-db2-merge-back-fc73d8f9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13108%3A%20Vulnerability%20in%20IBM%20DB2%20Merge%20Backup%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=699575bb80d747be205376a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/webinar-how-modern-soc-teams-use-ai-and-context-to-72344316</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Webinar%3A%20How%20Modern%20SOC%20Teams%20Use%20AI%20and%20Context%20to%20Investigate%20Cloud%20Breaches%20Faster&amp;severity=medium&amp;id=6995909980d747be205dea28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36597-cwe-22-improper-limitation-of-a-pat-5ff59b14</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36597%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Dell%20Avamar%20Server&amp;severity=medium&amp;id=699575bb80d747be2053771d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33101-cwe-244-improper-clearing-of-heap-m-bfe34f61</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33101%3A%20CWE-244%20Improper%20Clearing%20of%20Heap%20Memory%20Before%20Release%20(&apos;Heap%20Inspection&apos;)%20in%20IBM%20Concert&amp;severity=medium&amp;id=699575bb80d747be20537717</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2620-sql-injection-in-huace-monitoring-an-0c8cd687</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2620%3A%20SQL%20Injection%20in%20Huace%20Monitoring%20and%20Early%20Warning%20System&amp;severity=medium&amp;id=699575bb80d747be20537720</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33089-cwe-798-use-of-hard-coded-credentia-ebf5d876</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33089%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20IBM%20Concert&amp;severity=medium&amp;id=699575bb80d747be20537714</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36243-cwe-918-server-side-request-forgery-a8c35159</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36243%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20IBM%20Concert&amp;severity=medium&amp;id=699575bb80d747be2053771a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43178-cwe-327-use-of-a-broken-or-risky-cr-5e3b81b3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43178%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20IBM%20Concert&amp;severity=medium&amp;id=699575bb80d747be2053772a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36018-cwe-352-cross-site-request-forgery--b52c9328</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36018%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20IBM%20Concert&amp;severity=medium&amp;id=6994e50080d747be20db79f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24734-cwe-20-improper-input-validation-in-7e1027c6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24734%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat%20Native&amp;severity=high&amp;id=699575bd80d747be205377f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36019-cwe-79-improper-neutralization-of-i-2052d908</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36019%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Concert&amp;severity=medium&amp;id=699575b980d747be2053763d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24733-cwe-20-improper-input-validation-in-12b56c6f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24733%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=medium&amp;id=699575bd80d747be205377ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12755-cwe-117-improper-output-neutralizat-4a26a9ca</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12755%3A%20CWE-117%20Improper%20Output%20Neutralization%20for%20Logs%20in%20IBM%20MQ%20Operator&amp;severity=medium&amp;id=699575b980d747be20537637</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66614-cwe-20-improper-input-validation-in-bcf18b8d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66614%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=high&amp;id=699575bd80d747be205377ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2630-cwe-78-improper-neutralization-of-sp-3ee12498</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2630%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Tenable%20Security%20Center&amp;severity=high&amp;id=6994b74c80d747be20cdd662</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-show-copilot-and-grok-can-be-abused-as-64561493</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Show%20Copilot%20and%20Grok%20Can%20Be%20Abused%20as%20Malware%20C2%20Proxies&amp;severity=low&amp;id=6995909980d747be205dea2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/badiis-to-the-bone-new-insights-to-a-global-seo-po-f94b5abc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BADIIS%20to%20the%20Bone%3A%20New%20Insights%20to%20a%20Global%20SEO%20Poisoning%20Campaign&amp;severity=medium&amp;id=6994b74a80d747be20cdd527</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-clickfix-opens-the-door-to-stealthy-stealc-inf-765d6586</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20ClickFix%20Opens%20the%20Door%20to%20Stealthy%20StealC%20Information%20Stealer&amp;severity=medium&amp;id=6994b74a80d747be20cdd577</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36247-cwe-611-improper-restriction-of-xml-6af3c952</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36247%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=high&amp;id=699575bb80d747be20537709</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36425-cwe-256-in-ibm-db2-for-linux-unix-a-ed5229e3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36425%3A%20CWE-256%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=699575bb80d747be2053770c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13867-cwe-1284-improper-validation-of-spe-49ea700b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13867%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=699575bb80d747be205376c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14689-cwe-1284-improper-validation-of-spe-6a88675e</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14689%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=699575bd80d747be20537800</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/keenadu-firmware-backdoor-infects-android-tablets--f07d8f19</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Keenadu%20Firmware%20Backdoor%20Infects%20Android%20Tablets%20via%20Signed%20OTA%20Updates&amp;severity=medium&amp;id=6995909980d747be205dea2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2618-risky-cryptographic-algorithm-in-bee-16b2753e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2618%3A%20Risky%20Cryptographic%20Algorithm%20in%20Beetel%20777VR1&amp;severity=medium&amp;id=699575bd80d747be20537849</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23648-cwe-732-incorrect-permission-assign-3c011f22</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23648%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Glory%20Global%20Solutions%20RBG-100&amp;severity=high&amp;id=699575bb80d747be205376b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23647-cwe-798-use-of-hard-coded-credentia-6b5abde7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23647%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Glory%20Global%20Solutions%20RBG-100&amp;severity=critical&amp;id=699575bb80d747be205376b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2617-insecure-default-initialization-of-r-3378e449</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2617%3A%20Insecure%20Default%20Initialization%20of%20Resource%20in%20Beetel%20777VR1&amp;severity=medium&amp;id=69948d1c80d747be20bdf6f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-offer-to-sell-millions-of-eurail-user-reco-ee3e48d6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Offer%20to%20Sell%20Millions%20of%20Eurail%20User%20Records&amp;severity=medium&amp;id=6994896480d747be20bc82aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31118-cwe-862-missing-authorization-in-sm-0efd5cdb</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31118%3A%20CWE-862%20Missing%20Authorization%20in%20Smartypants%20SP%20Project%20%26%20Document%20Manager&amp;severity=medium&amp;id=6994861680d747be20bbcc4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2616-hard-coded-credentials-in-beetel-777-5f01c821</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2616%3A%20Hard-coded%20Credentials%20in%20Beetel%20777VR1&amp;severity=high&amp;id=6994861680d747be20bbcc54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22208-cwe-749-exposed-dangerous-method-or-4594ea65</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22208%3A%20CWE-749%20Exposed%20Dangerous%20Method%20or%20Function%20in%20OpenS100%20Project%20OpenS100&amp;severity=critical&amp;id=69947f0d80d747be20b9dc52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-in-the-middle-turning-web-based-ai-services-int-ec8326ca</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20in%20the%20Middle%3A%20Turning%20Web-Based%20AI%20Services%20into%20C2%20Proxies%20%26%20The%20Future%20Of%20AI%20Driven%20Attacks&amp;severity=low&amp;id=6995917280d747be205e4203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyber-insights-2026-the-ongoing-fight-to-secure-in-7c6a9e61</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cyber%20Insights%202026%3A%20The%20Ongoing%20Fight%20to%20Secure%20Industrial%20Control%20Systems&amp;severity=critical&amp;id=699477d280d747be20b76d55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/api-threats-grow-in-scale-as-ai-expands-the-blast--2e69a229</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=API%20Threats%20Grow%20in%20Scale%20as%20AI%20Expands%20the%20Blast%20Radius&amp;severity=medium&amp;id=699477d280d747be20b76d52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23861-cwe-79-improper-neutralization-of-i-0569a841</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23861%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dell%20Unisphere%20for%20PowerMax%20vApp%2C&amp;severity=medium&amp;id=6994782680d747be20b7ac3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7706-cwe-306-missing-authentication-for-c-b448fb38</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7706%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20TUBITAK%20BILGEM%20Software%20Technologies%20Research%20Institute%20Liderahenk&amp;severity=medium&amp;id=699470fb80d747be20b50362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25087-cwe-416-use-after-free-in-apache-so-03b761d9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25087%3A%20CWE-416%20Use%20After%20Free%20in%20Apache%20Software%20Foundation%20Apache%20Arrow&amp;severity=high&amp;id=699470fb80d747be20b50365</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2615-command-injection-in-wavlink-wl-nu51-f6063523</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2615%3A%20Command%20Injection%20in%20Wavlink%20WL-NU516U1&amp;severity=high&amp;id=699469f380d747be20b30312</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/man-linked-to-phobos-ransomware-arrested-in-poland-3b18f07a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Man%20Linked%20to%20Phobos%20Ransomware%20Arrested%20in%20Poland&amp;severity=medium&amp;id=6994663c80d747be20b1b382</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/smartloader-attack-uses-trojanized-oura-mcp-server-98cb6579</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SmartLoader%20Attack%20Uses%20Trojanized%20Oura%20MCP%20Server%20to%20Deploy%20StealC%20Infostealer&amp;severity=medium&amp;id=6995909980d747be205dea31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-tablet-conqueror-and-the-links-between-major-a-456f5297</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20tablet%20conqueror%20and%20the%20links%20between%20major%20Android%20botnets&amp;severity=medium&amp;id=6994909f80d747be20bf9d8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8303-cwe-79-improper-neutralization-of-in-44be8a63</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8303%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20EKA%20Software%20Computer%20Information%20Advertising%20Services%20Ltd.%20Real%20Estate%20Script%20V5%20(With%20Doping%20Module%20%E2%80%93%20Store%20Module%20%E2%80%93%20New%20Language%20System)&amp;severity=medium&amp;id=69945be380d747be20af629b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7631-cwe-89-improper-neutralization-of-sp-5ca07faf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7631%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Tumeva%20Internet%20Technologies%20Software%20Information%20Advertising%20and%20Consulting%20Services%20Trade%20Ltd.%20Co.%20Tumeva%20Prime%20News%20Software&amp;severity=high&amp;id=6994585e80d747be20ae418f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2247-cwe-89-improper-neutralization-of-sp-b8f5f03e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2247%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Clickedu%20SaaS%20platform&amp;severity=high&amp;id=6994585e80d747be20ae4192</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2608-cwe-862-missing-authorization-in-ste-f8e195f2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2608%3A%20CWE-862%20Missing%20Authorization%20in%20stellarwp%20Kadence%20Blocks%20%E2%80%94%20Page%20Builder%20Toolkit%20for%20Gutenberg%20Editor&amp;severity=medium&amp;id=6994515780d747be20ac24ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/3-threat-groups-started-targeting-icsot-in-2025-dr-67494e06</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=3%20Threat%20Groups%20Started%20Targeting%20ICS%2FOT%20in%202025%3A%20Dragos&amp;severity=medium&amp;id=69944da080d747be20aa71bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25903-cwe-862-missing-authorization-in-ap-96d68c81</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25903%3A%20CWE-862%20Missing%20Authorization%20in%20Apache%20Software%20Foundation%20Apache%20NiFi&amp;severity=high&amp;id=69943fc480d747be20a60510</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-finds-summarize-with-ai-prompts-manipula-f515017d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Finds%20%E2%80%9CSummarize%20with%20AI%E2%80%9D%20Prompts%20Manipulating%20Chatbot%20Recommendations&amp;severity=medium&amp;id=69943af180d747be20a42712</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/password-managers-vulnerable-to-vault-compromise-u-4a6c986f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Password%20Managers%20Vulnerable%20to%20Vault%20Compromise%20Under%20Malicious%20Server&amp;severity=medium&amp;id=6994388980d747be20a2d08e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1216-cwe-79-improper-neutralization-of-in-1a4c00e9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1216%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rebelcode%20RSS%20Aggregator%20%E2%80%93%20RSS%20Import%2C%20News%20Feeds%2C%20Feed%20to%20Post%2C%20and%20Autoblogging&amp;severity=high&amp;id=699438cd80d747be20a32bcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-incident-report-used-in-phishing-campaign-tue-566cec83</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Incident%20Report%20Used%20in%20Phishing%20Campaign%2C%20(Tue%2C%20Feb%2017th)&amp;severity=medium&amp;id=69943c3e80d747be20a4e763</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-tests-end-to-end-encrypted-rcs-messaging-in--81f691ce</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Tests%20End-to-End%20Encrypted%20RCS%20Messaging%20in%20iOS%2026.4%20Developer%20Beta&amp;severity=medium&amp;id=69943af180d747be20a42715</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0829-cwe-862-missing-authorization-in-fro-323c4855</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0829%3A%20CWE-862%20Missing%20Authorization%20in%20Frontend%20File%20Manager%20Plugin&amp;severity=medium&amp;id=69940acad1735ca73126f76a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1657-cwe-862-missing-authorization-in-met-a2523868</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1657%3A%20CWE-862%20Missing%20Authorization%20in%20metagauss%20EventPrime%20%E2%80%93%20Events%20Calendar%2C%20Bookings%20and%20Tickets&amp;severity=medium&amp;id=6994003ed1735ca7311ee332</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2592-cwe-284-improper-access-control-in-z-22959dc1</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2592%3A%20CWE-284%20Improper%20Access%20Control%20in%20zarinpal%20Zarinpal%20Gateway&amp;severity=high&amp;id=6993f937d1735ca7311a09bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2002-cwe-79-improper-neutralization-of-in-2ec61ced</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2002%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpmudev%20Forminator%20Forms%20%E2%80%93%20Contact%20Form%2C%20Payment%20Form%20%26%20Custom%20Form%20Builder&amp;severity=medium&amp;id=6993f937d1735ca7311a09bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26220-cwe-502-deserialization-of-untruste-3d57a118</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26220%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20ModelTC%20LightLLM&amp;severity=critical&amp;id=6994257080d747be207b7270</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70397-na-47a1cc8b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70397%3A%20n%2Fa&amp;severity=high&amp;id=699575bd80d747be20537850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55270-na-03bef1f6</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55270%3A%20n%2Fa&amp;severity=high&amp;id=699575bd80d747be205377fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26736-na-558b5db5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26736%3A%20n%2Fa&amp;severity=high&amp;id=699575bd80d747be205377f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26732-na-96df64c5</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26732%3A%20n%2Fa&amp;severity=high&amp;id=699575bd80d747be205377f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26731-na-626ee67c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26731%3A%20n%2Fa&amp;severity=high&amp;id=699575bd80d747be205377f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59793-na-8a24ed08</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59793%3A%20n%2Fa&amp;severity=critical&amp;id=699575bd80d747be205377e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67905-na-fa4970fd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67905%3A%20n%2Fa&amp;severity=high&amp;id=699575bb80d747be20537726</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32355-na-085b6720</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32355%3A%20n%2Fa&amp;severity=high&amp;id=699575bb80d747be2053770f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70846-na-5e0ec656</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70846%3A%20n%2Fa&amp;severity=high&amp;id=699575bb80d747be205376c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67102-na-4a2a6626</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67102%3A%20n%2Fa&amp;severity=high&amp;id=699575bb80d747be2053769e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-17-43270302</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-17&amp;severity=medium&amp;id=6995046d80d747be20e1792b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65753-na-a83a2ef3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65753%3A%20n%2Fa&amp;severity=high&amp;id=6994a23480d747be20c6db0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55271-na-4ed4070f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55271%3A%20n%2Fa&amp;severity=low&amp;id=6994a23480d747be20c6db09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70830-na-05399173</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70830%3A%20n%2Fa&amp;severity=critical&amp;id=69948d1c80d747be20bdf6f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70828-na-795b8689</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70828%3A%20n%2Fa&amp;severity=high&amp;id=69948d1c80d747be20bdf6ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70829-na-8558d9cf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70829%3A%20n%2Fa&amp;severity=medium&amp;id=6994861680d747be20bbcc50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-17-96a06716</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-17&amp;severity=low&amp;id=6993d5d8d1735ca731db4256</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12062-cwe-22-improper-limitation-of-a-pat-191a7218</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12062%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20flippercode%20WP%20Maps%20%E2%80%93%20Store%20Locator%2CGoogle%20Maps%2COpenStreetMap%2CMapbox%2CListing%2CDirectory%20%26%20Filters&amp;severity=high&amp;id=6993abded1735ca731bdefea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2439-cwe-340-generation-of-predictable-nu-8847b5d6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2439%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20BVA%20Concierge%3A%3ASessions&amp;severity=critical&amp;id=69938fbfd1735ca731b5ffa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15578-cwe-338-use-of-cryptographically-we-572f6a23</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15578%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20TEEJAY%20Maypole&amp;severity=critical&amp;id=69938c3ad1735ca731b45482</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2474-cwe-122-heap-based-buffer-overflow-i-3d94ea2a</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2474%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20DDICK%20Crypt%3A%3AURandom&amp;severity=high&amp;id=6994257080d747be207b7278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2001-cwe-862-missing-authorization-in-wpx-dd0b0e65</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2001%3A%20CWE-862%20Missing%20Authorization%20in%20wpxpo%20WowRevenue%20%E2%80%93%20Product%20Bundles%20%26%20Bulk%20Discounts&amp;severity=high&amp;id=6993739ed1735ca731a8ba4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/infostealer-steals-openclaw-ai-agent-configuration-8bbd2b7c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Infostealer%20Steals%20OpenClaw%20AI%20Agent%20Configuration%20Files%20and%20Gateway%20Tokens&amp;severity=medium&amp;id=69943af180d747be20a42718</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/study-uncovers-25-password-recovery-attacks-in-maj-6f2cde85</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Study%20Uncovers%2025%20Password%20Recovery%20Attacks%20in%20Major%20Cloud%20Password%20Managers&amp;severity=medium&amp;id=69943af180d747be20a4271b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/16th-february-threat-intelligence-report-aa8bfcdd</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=16th%20February%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=low&amp;id=69943ba880d747be20a474a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2567-stack-based-buffer-overflow-in-wavli-0c1e9353</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2567%3A%20Stack-based%20Buffer%20Overflow%20in%20Wavlink%20WL-NU516U1&amp;severity=high&amp;id=6993577fd1735ca7319ea144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2566-stack-based-buffer-overflow-in-wavli-f35978e7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2566%3A%20Stack-based%20Buffer%20Overflow%20in%20Wavlink%20WL-NU516U1&amp;severity=high&amp;id=699353fad1735ca7319d6c0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2565-stack-based-buffer-overflow-in-wavli-6deb4b90</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2565%3A%20Stack-based%20Buffer%20Overflow%20in%20Wavlink%20WL-NU516U1&amp;severity=high&amp;id=6994257080d747be207b7280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26930-cwe-79-improper-neutralization-of-i-8e58780b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26930%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20SmarterTools%20SmarterMail&amp;severity=high&amp;id=6994257080d747be207b727c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2101-cwe-79-improper-neutralization-of-in-15efa45d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2101%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Dassault%20Syst%C3%A8mes%20ENOVIAvpm%20Web%20Access&amp;severity=high&amp;id=6994257080d747be207b7286</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2564-weak-password-recovery-in-intelbras--15b4ad92</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2564%3A%20Weak%20Password%20Recovery%20in%20Intelbras%20VIP%203260%20Z%20IA&amp;severity=critical&amp;id=6994257080d747be207b7289</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2563-privilege-escalation-in-jingdong-jd--d2760a62</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2563%3A%20Improper%20Privilege%20Management%20in%20JingDong%20JD%20Cloud%20Box%20AX6600&amp;severity=medium&amp;id=6994257080d747be207b728e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dior-louis-vuitton-tiffany-fined-25-million-in-sou-2f72e32c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dior%2C%20Louis%20Vuitton%2C%20Tiffany%20Fined%20%2425%20Million%20in%20South%20Korea%20After%20Data%20Breaches&amp;severity=medium&amp;id=69933423d1735ca731935dd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2562-privilege-escalation-in-jingdong-jd--f3eb266d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2562%3A%20Improper%20Privilege%20Management%20in%20JingDong%20JD%20Cloud%20Box%20AX6600&amp;severity=medium&amp;id=69933465d1735ca73193848d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2561-privilege-escalation-in-jingdong-jd--0fdfd21b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2561%3A%20Improper%20Privilege%20Management%20in%20JingDong%20JD%20Cloud%20Box%20AX6600&amp;severity=medium&amp;id=699330d2d1735ca731922b87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-ai-assistant-extensions-targeting-260000-chro-971e4e95</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20AI%20Assistant%20Extensions%20Targeting%20260%2C000%20Chrome%20Users%20via%20injected%20iframes&amp;severity=medium&amp;id=6994942680d747be20c100a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-macromaze-new-apt28-campaign-using-basic-8c994355</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20MacroMaze%3A%20New%20APT28%20Campaign%20Using%20Basic%20Tooling%20and%20Legitimate%20Infrastructure&amp;severity=medium&amp;id=6994942680d747be20c10099</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2032-vulnerability-in-mozilla-firefox-for-3fb5eb69</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2032%3A%20Vulnerability%20in%20Mozilla%20Firefox%20for%20iOS&amp;severity=medium&amp;id=6994257180d747be207b740f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2447-vulnerability-in-mozilla-firefox-ef99469f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2447%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=6994257180d747be207b740a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2560-os-command-injection-in-kalcaddle-ko-1fd95a3d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2560%3A%20OS%20Command%20Injection%20in%20kalcaddle%20kodbox&amp;severity=medium&amp;id=69932648d1735ca7318be8a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/android-17-beta-strengthens-secure-by-default-desi-e8c0e0a5</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Android%2017%20Beta%20Strengthens%20Secure-by-Default%20Design%20for%20Privacy%20and%20App%20Security&amp;severity=medium&amp;id=69932290d1735ca731892ba4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-navigates-dhs-shutdown-with-reduced-staff-3f2ba258</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Navigates%20DHS%20Shutdown%20With%20Reduced%20Staff&amp;severity=medium&amp;id=69932290d1735ca731892ba7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1335-cwe-787-out-of-bounds-write-in-dassa-22d5a00c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1335%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Dassault%20Syst%C3%A8mes%20SOLIDWORKS%20eDrawings&amp;severity=high&amp;id=699322e0d1735ca7318966e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1334-cwe-125-out-of-bounds-read-in-dassau-5f48827a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1334%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Dassault%20Syst%C3%A8mes%20SOLIDWORKS%20eDrawings&amp;severity=high&amp;id=699322e0d1735ca7318966e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1333-cwe-457-use-of-uninitialized-variabl-1f2a1adb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1333%3A%20CWE-457%20Use%20of%20Uninitialized%20Variable%20in%20Dassault%20Syst%C3%A8mes%20SOLIDWORKS%20eDrawings&amp;severity=high&amp;id=699322e0d1735ca7318966e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2558-server-side-request-forgery-in-geeka-7a60bbf7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2558%3A%20Server-Side%20Request%20Forgery%20in%20GeekAI&amp;severity=medium&amp;id=699322e0d1735ca7318966eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/key-openclaw-risks-clawdbot-moltbot-kaspersky-offi-a732c8e6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Key%20OpenClaw%20risks%2C%20Clawdbot%2C%20Moltbot%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69931bf6d1735ca731864664</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2557-cross-site-scripting-in-cskefu-a32390c7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2557%3A%20Cross%20Site%20Scripting%20in%20cskefu&amp;severity=medium&amp;id=69931bbad1735ca731861d1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-outlook-add-ins-hijack-0-day-patches--0d4cc800</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Weekly%20Recap%3A%20Outlook%20Add-Ins%20Hijack%2C%200-Day%20Patches%2C%20Wormable%20Botnet%20%26%20AI%20Malware&amp;severity=low&amp;id=69943af180d747be20a4271e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2556-server-side-request-forgery-in-cskef-9b320b42</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2556%3A%20Server-Side%20Request%20Forgery%20in%20cskefu&amp;severity=medium&amp;id=699314b2d1735ca73181d582</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2555-deserialization-in-jeecgboot-47ee4cd1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2555%3A%20Deserialization%20in%20JeecgBoot&amp;severity=low&amp;id=69931f3ed1735ca73187d04e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-warns-of-clickfix-attack-abusing-dns-loo-0fffbe0e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Warns%20of%20ClickFix%20Attack%20Abusing%20DNS%20Lookups&amp;severity=medium&amp;id=69930679d1735ca7315980e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/safe-and-inclusive-esociety-how-lithuania-is-braci-dbbd7465</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Safe%20and%20Inclusive%20E%E2%80%91Society%3A%20How%20Lithuania%20Is%20Bracing%20for%20AI%E2%80%91Driven%20Cyber%20Fraud&amp;severity=medium&amp;id=69931da4d1735ca731873d13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2418-cwe-601-url-redirection-to-untrusted-fc5517c3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2418%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20TR7%20Cyber%20%E2%80%8B%E2%80%8BDefense%20Inc.%20Web%20Application%20Firewall&amp;severity=medium&amp;id=699306bfd1735ca7315a65f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2553-sql-injection-in-tushar-2223-hotel-m-f8823bdb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2553%3A%20SQL%20Injection%20in%20tushar-2223%20Hotel-Management-System&amp;severity=medium&amp;id=699306bfd1735ca7315a65f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2552-path-traversal-in-zentao-5658ef66</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2552%3A%20Path%20Traversal%20in%20ZenTao&amp;severity=medium&amp;id=6992fd2fbda29fb02f6aa184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lumma-stealer-and-ninja-browser-malware-campaign-a-3606198a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lumma%20Stealer%20and%20Ninja%20Browser%20malware%20campaign%20abusing%20Google%20Groups&amp;severity=medium&amp;id=6992f9abbda29fb02f68dd2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2551-path-traversal-in-zentao-868a3066</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2551%3A%20Path%20Traversal%20in%20ZenTao&amp;severity=medium&amp;id=6992f627bda29fb02f6786e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-zerodayrat-mobile-spyware-enables-real-time-su-d5c92f82</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20ZeroDayRAT%20Mobile%20Spyware%20Enables%20Real-Time%20Surveillance%20and%20Data%20Theft&amp;severity=medium&amp;id=69931da4d1735ca731873d16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2452-cwe-627-dynamic-variable-evaluation--1e0b8836</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2452%3A%20CWE-627%20Dynamic%20Variable%20Evaluation%20in%20pretix%20pretix-newsletter&amp;severity=high&amp;id=6992f627bda29fb02f6786dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2451-cwe-627-dynamic-variable-evaluation--3e2879f1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2451%3A%20CWE-627%20Dynamic%20Variable%20Evaluation%20in%20pretix%20pretix-doistep&amp;severity=high&amp;id=6992f627bda29fb02f6786da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2550-unrestricted-upload-in-efm-iptime-a6-a8baac0d</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2550%3A%20Unrestricted%20Upload%20in%20EFM%20iptime%20A6004MX&amp;severity=critical&amp;id=6992ef1fbda29fb02f643b58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2577-cwe-306-missing-authentication-for-c-d0d526e7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2577%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20HKUDS%20nanobot&amp;severity=critical&amp;id=6992ef1fbda29fb02f643b5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2549-improper-access-controls-in-zhanghua-d9a74f1f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2549%3A%20Improper%20Access%20Controls%20in%20zhanghuanhao%20LibrarySystem%20%E5%9B%BE%E4%B9%A6%E9%A6%86%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F&amp;severity=medium&amp;id=6992eb9bbda29fb02f62aae7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2548-command-injection-in-wayos-fbm-220g-21493729</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2548%3A%20Command%20Injection%20in%20WAYOS%20FBM-220G&amp;severity=medium&amp;id=69930886d1735ca7315e7f79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2547-cross-site-scripting-in-ligerosmart-10ccf03b</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2547%3A%20Cross%20Site%20Scripting%20in%20LigeroSmart&amp;severity=medium&amp;id=6992da08bda29fb02f5c0246</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2546-cross-site-scripting-in-ligerosmart-e8ff2733</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2546%3A%20Cross%20Site%20Scripting%20in%20LigeroSmart&amp;severity=medium&amp;id=6992d684bda29fb02f5a9bfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-patches-first-actively-exploited-chrome-zer-9fc21206</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Patches%20First%20Actively%20Exploited%20Chrome%20Zero-Day%20of%202026&amp;severity=medium&amp;id=6992cf48bda29fb02f56ff7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/2026-64-bits-malware-trend-mon-feb-16th-76ab2197</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=2026%2064-Bits%20Malware%20Trend%2C%20(Mon%2C%20Feb%2016th)&amp;severity=low&amp;id=69931e47d1735ca7318782d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2545-cross-site-scripting-in-ligerosmart-43aa65d9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2545%3A%20Cross%20Site%20Scripting%20in%20LigeroSmart&amp;severity=medium&amp;id=6992cbf7bda29fb02f561cff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2544-os-command-injection-in-yued-fe-lulu-aec8889b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2544%3A%20OS%20Command%20Injection%20in%20yued-fe%20LuLu%20UI&amp;severity=medium&amp;id=6992cbf7bda29fb02f561cf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2543-unverified-password-change-in-vichan-bedef274</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2543%3A%20Unverified%20Password%20Change%20in%20vichan-devel%20vichan&amp;severity=medium&amp;id=6992c4f0bda29fb02f53b417</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-chrome-zero-day-cve-2026-2441-under-active-att-ba9a1f06</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Chrome%20Zero-Day%20(CVE-2026-2441)%20Under%20Active%20Attack%20%E2%80%94%20Patch%20Released&amp;severity=high&amp;id=69931da4d1735ca731873d19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2542-unquoted-search-path-in-total-vpn-86fa0d9d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2542%3A%20Unquoted%20Search%20Path%20in%20Total%20VPN&amp;severity=high&amp;id=6992bde8bda29fb02f5127ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2538-uncontrolled-search-path-in-flos-fre-d9540b5b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2538%3A%20Uncontrolled%20Search%20Path%20in%20Flos%20Freeware%20Notepad2&amp;severity=high&amp;id=6992b6dfbda29fb02f4dd9f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0929-cwe-862-missing-authorization-in-reg-a36cfddd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0929%3A%20CWE-862%20Missing%20Authorization%20in%20RegistrationMagic&amp;severity=medium&amp;id=69930886d1735ca7315e7f7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2537-command-injection-in-comfast-cf-e4-d2596177</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2537%3A%20Command%20Injection%20in%20Comfast%20CF-E4&amp;severity=medium&amp;id=6992b36bbda29fb02f4bb440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2536-xml-external-entity-reference-in-ope-cff9a8a0</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2536%3A%20XML%20External%20Entity%20Reference%20in%20opencc%20JFlow&amp;severity=medium&amp;id=6992ac53bda29fb02f486070</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2535-command-injection-in-comfast-cf-n1-v-8437b00c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2535%3A%20Command%20Injection%20in%20Comfast%20CF-N1%20V2&amp;severity=medium&amp;id=6992a54bbda29fb02f457206</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2534-command-injection-in-comfast-cf-n1-v-8ba549f5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2534%3A%20Command%20Injection%20in%20Comfast%20CF-N1%20V2&amp;severity=medium&amp;id=69929abfbda29fb02f425d39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2533-command-injection-in-tosei-self-serv-3617be85</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2533%3A%20Command%20Injection%20in%20Tosei%20Self-service%20Washing%20Machine&amp;severity=medium&amp;id=69929abfbda29fb02f425d33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2532-server-side-request-forgery-in-lints-c44236a2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2532%3A%20Server-Side%20Request%20Forgery%20in%20lintsinghua%20DeepAudit&amp;severity=medium&amp;id=69928cafbda29fb02f1ec50e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2531-server-side-request-forgery-in-minds-fd7157b6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2531%3A%20Server-Side%20Request%20Forgery%20in%20MindsDB&amp;severity=medium&amp;id=69928cafbda29fb02f1ec505</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2530-command-injection-in-wavlink-wl-wn57-daec65f6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2530%3A%20Command%20Injection%20in%20Wavlink%20WL-WN579A3&amp;severity=medium&amp;id=69928cafbda29fb02f1ec4ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2529-command-injection-in-wavlink-wl-wn57-744d9dbe</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2529%3A%20Command%20Injection%20in%20Wavlink%20WL-WN579A3&amp;severity=medium&amp;id=69927ea0bda29fb02f12609a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2528-command-injection-in-wavlink-wl-wn57-1a573700</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2528%3A%20Command%20Injection%20in%20Wavlink%20WL-WN579A3&amp;severity=medium&amp;id=69927ea0bda29fb02f126094</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2527-command-injection-in-wavlink-wl-wn57-afb46441</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2527%3A%20Command%20Injection%20in%20Wavlink%20WL-WN579A3&amp;severity=medium&amp;id=69927ea0bda29fb02f12608e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2526-command-injection-in-wavlink-wl-wn57-d05d2dfa</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2526%3A%20Command%20Injection%20in%20Wavlink%20WL-WN579A3&amp;severity=medium&amp;id=69927413bda29fb02f0e1194</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2525-denial-of-service-in-free5gc-897c96c9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2525%3A%20Denial%20of%20Service%20in%20Free5GC&amp;severity=medium&amp;id=69927413bda29fb02f0e118c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2524-denial-of-service-in-open5gs-6effde78</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2524%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=69926d0abda29fb02f03f172</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2523-reachable-assertion-in-open5gs-c69cfefb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2523%3A%20Reachable%20Assertion%20in%20Open5GS&amp;severity=medium&amp;id=69926d0abda29fb02f03f16a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65717-na-1fa0a602</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65717%3A%20n%2Fa&amp;severity=medium&amp;id=6994257180d747be207b7406</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65716-na-7ce38e2e</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65716%3A%20n%2Fa&amp;severity=high&amp;id=6994257080d747be207b729c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65715-na-fdb8ef7a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65715%3A%20n%2Fa&amp;severity=high&amp;id=6994257080d747be207b7298</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-16-388c1363</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-16&amp;severity=medium&amp;id=6993b2afd1735ca731bf33b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-16-309da41c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-16&amp;severity=low&amp;id=6992ba2ebda29fb02f4f9c2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2522-memory-corruption-in-open5gs-7f05b583</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2522%3A%20Memory%20Corruption%20in%20Open5GS&amp;severity=medium&amp;id=69925b77bda29fb02fd9898a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2521-memory-corruption-in-open5gs-c3391632</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2521%3A%20Memory%20Corruption%20in%20Open5GS&amp;severity=medium&amp;id=699253b94b0e3abdf99ab24e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26369-improper-privilege-management-in-ju-f86570ed</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26369%3A%20Improper%20Privilege%20Management%20in%20JUNG%20eNet%20SMART%20HOME%20server&amp;severity=critical&amp;id=6991ea414b0e3abdf972b019</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26368-missing-authorization-in-jung-enet--3a6df6c1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26368%3A%20Missing%20Authorization%20in%20JUNG%20eNet%20SMART%20HOME%20server&amp;severity=high&amp;id=6991ea414b0e3abdf972b015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26367-missing-authorization-in-jung-enet--173718f4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26367%3A%20Missing%20Authorization%20in%20JUNG%20eNet%20SMART%20HOME%20server&amp;severity=high&amp;id=6991ea414b0e3abdf972b010</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26366-use-of-default-credentials-in-jung--23983d02</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26366%3A%20Use%20of%20Default%20Credentials%20in%20JUNG%20eNet%20SMART%20HOME%20server&amp;severity=critical&amp;id=6991ea414b0e3abdf972b00c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-discloses-dns-based-clickfix-attack-usin-fbef1593</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Discloses%20DNS-Based%20ClickFix%20Attack%20Using%20Nslookup%20for%20Malware%20Staging&amp;severity=medium&amp;id=6992699ebda29fb02fff2c05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2517-denial-of-service-in-open5gs-08313086</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2517%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=6991c0114b0e3abdf95dbbfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2516-uncontrolled-search-path-in-unidocs--c9898b25</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2516%3A%20Uncontrolled%20Search%20Path%20in%20Unidocs%20ezPDF%20DRM%20Reader&amp;severity=high&amp;id=6991bc8d4b0e3abdf95c3022</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2541-cwe-331-insufficient-entropy-in-micc-57e2a0ff</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2541%3A%20CWE-331%3A%20Insufficient%20Entropy%20in%20Micca%20Auto%20Electronics%20Co.%2C%20Ltd.%20Car%20Alarm%20System%20KE700&amp;severity=medium&amp;id=6991aaf94b0e3abdf953ce6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2540-cwe-288-authentication-bypass-using--06adb1fa</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2540%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Micca%20Auto%20Electronics%20Co.%2C%20Ltd.%20Car%20Alarm%20System%20KE700&amp;severity=high&amp;id=6991aaf94b0e3abdf953ce6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2539-cwe-319-cleartext-transmission-of-se-fff717fd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2539%3A%20CWE-319%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Micca%20Auto%20Electronics%20Co.%2C%20Ltd.%20Car%20Alarm%20System%20KE700&amp;severity=medium&amp;id=69925668bda29fb02fd3ee5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32063-cwe-306-missing-authentication-for--681dee89</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32063%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Bosch%20Infotainment%20system%20ECU&amp;severity=medium&amp;id=6991a7744b0e3abdf9520b45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32062-cwe-121-stack-based-buffer-overflow-2fc9767c</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32062%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Bosch%20Infotainment%20system%20ECU&amp;severity=high&amp;id=6991a7744b0e3abdf9520b40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32061-cwe-121-stack-based-buffer-overflow-92f71bd2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32061%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Bosch%20Infotainment%20system%20ECU&amp;severity=high&amp;id=6991a7744b0e3abdf9520b3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32060-cwe-347-improper-verification-of-cr-41ae0f8d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32060%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Bosch%20Infotainment%20system%20ECU&amp;severity=medium&amp;id=6991a7744b0e3abdf9520b36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32059-cwe-121-stack-based-buffer-overflow-162b7b2c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32059%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Bosch%20Infotainment%20system%20ECU&amp;severity=high&amp;id=6991a7744b0e3abdf9520b31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32058-cwe-121-stack-based-buffer-overflow-68f844de</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32058%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Bosch%20Infotainment%20system%20ECU&amp;severity=critical&amp;id=6991a7744b0e3abdf9520b2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1793-cwe-22-improper-limitation-of-a-path-4752164f</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1793%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20bdthemes%20Element%20Pack%20%E2%80%93%20Widgets%2C%20Templates%20%26%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699151874b0e3abdf9d7dee0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1750-cwe-269-improper-privilege-managemen-02c6a8ce</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1750%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20ecwid%20Ecwid%20by%20Lightspeed%20Ecommerce%20Shopping%20Cart&amp;severity=high&amp;id=699151874b0e3abdf9d7dedb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1490-cwe-350-reliance-on-reverse-dns-reso-0fc3066a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1490%3A%20CWE-350%20Reliance%20on%20Reverse%20DNS%20Resolution%20for%20a%20Security-Critical%20Action%20in%20cleantalk%20Spam%20protection%2C%20Honeypot%2C%20Anti-Spam%20by%20CleanTalk&amp;severity=critical&amp;id=69913eb4c9e1ff5ad8fbefbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-15-2c822212</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-15&amp;severity=medium&amp;id=69926249bda29fb02ff8a81d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-15-3a1244b9</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-15&amp;severity=low&amp;id=69919cb34b0e3abdf946b1dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-300-malicious-chrome-extensions-caught-leakin-5e10fd10</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%20300%20Malicious%20Chrome%20Extensions%20Caught%20Leaking%20or%20Stealing%20User%20Data&amp;severity=medium&amp;id=69906489c9e1ff5ad887c2cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2312-cwe-862-missing-authorization-in-max-a02e1ede</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2312%3A%20CWE-862%20Missing%20Authorization%20in%20maxfoundry%20Media%20Library%20Folders&amp;severity=medium&amp;id=69906138c9e1ff5ad886470f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1512-cwe-79-improper-neutralization-of-in-96d8989a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1512%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20Essential%20Addons%20for%20Elementor%20%E2%80%93%20Popular%20Elementor%20Templates%20%26%20Widgets&amp;severity=medium&amp;id=6990489cc9e1ff5ad87d7ede</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1258-cwe-89-improper-neutralization-of-sp-f39be00a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1258%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20getwpfunnels%20Mail%20Mint%20%E2%80%93%20Email%20Marketing%2C%20Newsletter%2C%20Email%20Automation%20%26%20WooCommerce%20Emails&amp;severity=medium&amp;id=69903384c9e1ff5ad8746a1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0550-cwe-79-improper-neutralization-of-in-c7aab6e9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0550%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20saadiqbal%20Points%20Management%20System%20For%20Gamification%2C%20Ranks%2C%20Badges%2C%20and%20Loyalty%20Rewards%20Program%20%E2%80%93%20myCred&amp;severity=medium&amp;id=69903384c9e1ff5ad8746a0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8572-cwe-269-improper-privilege-managemen-357fd27c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8572%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20dreamstechnologies%20Truelysell%20Core&amp;severity=critical&amp;id=69903384c9e1ff5ad8746a0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1843-cwe-79-improper-neutralization-of-in-da8cc8a7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1843%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20optimole%20Super%20Page%20Cache&amp;severity=high&amp;id=69903384c9e1ff5ad8746a22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1254-cwe-862-missing-authorization-in-wpc-c0fbfd3f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1254%3A%20CWE-862%20Missing%20Authorization%20in%20wpchill%20Modula%20Image%20Gallery%20%E2%80%93%20Photo%20Grid%20%26%20Video%20Gallery&amp;severity=medium&amp;id=69903384c9e1ff5ad8746a17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1249-cwe-918-server-side-request-forgery--1a4e68ab</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1249%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20sonaar%20MP3%20Audio%20Player%20%E2%80%93%20Music%20Player%2C%20Podcast%20Player%20%26%20Radio%20by%20Sonaar&amp;severity=medium&amp;id=69903384c9e1ff5ad8746a13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1988-cwe-98-improper-control-of-filename--9af2696b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1988%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20wpdecent%20Flexi%20Product%20Slider%20and%20Grid%20for%20WooCommerce&amp;severity=high&amp;id=69901aeec9e1ff5ad868940c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1987-cwe-639-authorization-bypass-through-b74bd663</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1987%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20morelmathieuj%20Scheduler%20Widget&amp;severity=medium&amp;id=69901aedc9e1ff5ad86893ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0736-cwe-79-improper-neutralization-of-in-b1ef6454</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0736%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20collectchat%20Chatbot%20for%20WordPress%20by%20Collect.chat%20%E2%9A%A1%EF%B8%8F&amp;severity=medium&amp;id=69901aebc9e1ff5ad8689326</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1187-cwe-79-improper-neutralization-of-in-7770e71d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1187%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20terrazoom%20ZoomifyWP%20Free&amp;severity=medium&amp;id=69901aecc9e1ff5ad868938e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1915-cwe-79-improper-neutralization-of-in-a7b5b569</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1915%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bestony%20Simple%20Plyr&amp;severity=medium&amp;id=69901aedc9e1ff5ad86893d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1985-cwe-79-improper-neutralization-of-in-aac7a77d</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1985%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20arieslab%20Press3D&amp;severity=medium&amp;id=69901aedc9e1ff5ad86893e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0753-cwe-79-improper-neutralization-of-in-6158470c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0753%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bitacre%20Super%20Simple%20Contact%20Form&amp;severity=high&amp;id=69901aecc9e1ff5ad8689381</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1306-cwe-434-unrestricted-upload-of-file--95798a0f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1306%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20adminkov%20midi-Synth&amp;severity=critical&amp;id=69901aecc9e1ff5ad8689399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0735-cwe-79-improper-neutralization-of-in-90791c84</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0735%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webilop%20User%20Language%20Switch&amp;severity=medium&amp;id=69901aebc9e1ff5ad8689321</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15483-cwe-79-improper-neutralization-of-i-7adcdaf1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15483%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ajferg%20Link%20Hopper&amp;severity=medium&amp;id=69901aebc9e1ff5ad8689308</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1303-cwe-862-missing-authorization-in-mat-619170e8</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1303%3A%20CWE-862%20Missing%20Authorization%20in%20matthieuscarset%20MailChimp%20Campaigns&amp;severity=medium&amp;id=69901aecc9e1ff5ad8689394</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1910-cwe-79-improper-neutralization-of-in-eb230e1c</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1910%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20upmenu%20UpMenu%20%E2%80%93%20Online%20ordering%20for%20restaurants&amp;severity=medium&amp;id=69901aedc9e1ff5ad86893d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0693-cwe-79-improper-neutralization-of-in-24714602</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0693%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20arnoesterhuizen%20Allow%20HTML%20in%20Category%20Descriptions&amp;severity=medium&amp;id=69901aebc9e1ff5ad8689318</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1096-cwe-79-improper-neutralization-of-in-1ba42204</loc>
    <lastmod>2026-04-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1096%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20raju_ahmed%20Best-wp-google-map&amp;severity=medium&amp;id=69901aecc9e1ff5ad8689388</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0559-cwe-79-improper-neutralization-of-in-3ffb3a17</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0559%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20stylemix%20MasterStudy%20LMS%20WordPress%20Plugin%20%E2%80%93%20for%20Online%20Courses%20and%20Education&amp;severity=medium&amp;id=69901aebc9e1ff5ad8689314</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1394-cwe-352-cross-site-request-forgery-c-bd95f994</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1394%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20dmitritechs%20WP%20Quick%20Contact%20Us&amp;severity=medium&amp;id=69901aecc9e1ff5ad86893a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1905-cwe-79-improper-neutralization-of-in-0538bb4b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1905%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devmw%20Sphere%20Manager&amp;severity=medium&amp;id=69901aedc9e1ff5ad86893cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14852-cwe-352-cross-site-request-forgery--9b67a2c3</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14852%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20antevenio%20MDirector%20Newsletter%20WordPress%20Plugin&amp;severity=medium&amp;id=69901aebc9e1ff5ad86892ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1944-cwe-862-missing-authorization-in-kre-7484832f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1944%3A%20CWE-862%20Missing%20Authorization%20in%20krellbat%20CallbackKiller%20service%20widget&amp;severity=medium&amp;id=69901aedc9e1ff5ad86893de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0557-cwe-79-improper-neutralization-of-in-477d19e6</loc>
    <lastmod>2026-04-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0557%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20peterschulznl%20WP%20Data%20Access%20%E2%80%93%20App%20Builder%20for%20Tables%2C%20Forms%2C%20Charts%2C%20Maps%20%26%20Dashboards&amp;severity=medium&amp;id=69901aebc9e1ff5ad8689310</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2024-cwe-89-improper-neutralization-of-sp-e9679b86</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2024%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20savitasoni%20PhotoStack%20Gallery&amp;severity=high&amp;id=69901aeec9e1ff5ad8689418</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1939-cwe-79-improper-neutralization-of-in-2797da7b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1939%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cutesalah%20Percent%20to%20Infograph&amp;severity=medium&amp;id=69901aedc9e1ff5ad86893d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1795-cwe-79-improper-neutralization-of-in-f021e9a5</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1795%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sivenso%20Address%20Bar%20Ads&amp;severity=medium&amp;id=69901aecc9e1ff5ad86893a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1903-cwe-79-improper-neutralization-of-in-ad4b822d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1903%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shellbot%20Ravelry%20Designs%20Widget&amp;severity=medium&amp;id=69901aedc9e1ff5ad86893c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1792-cwe-79-improper-neutralization-of-in-5d191d6b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1792%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20owencutajar%20Geo%20Widget&amp;severity=medium&amp;id=69901aecc9e1ff5ad86893a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0745-cwe-918-server-side-request-forgery--d2649c34</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0745%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20webilop%20User%20Language%20Switch&amp;severity=medium&amp;id=69901aecc9e1ff5ad8689375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2022-cwe-862-missing-authorization-in-edg-f55545e6</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2022%3A%20CWE-862%20Missing%20Authorization%20in%20edgarrojas%20Smart%20Forms%20%E2%80%93%20when%20you%20need%20more%20than%20just%20a%20contact%20form&amp;severity=medium&amp;id=69901aeec9e1ff5ad8689413</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1901-cwe-79-improper-neutralization-of-in-1eecf619</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1901%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20questionpro%20QuestionPro%20Surveys&amp;severity=medium&amp;id=69901aedc9e1ff5ad86893c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14873-cwe-352-cross-site-request-forgery--070bf878</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14873%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20latepoint%20LatePoint%20%E2%80%93%20Calendar%20Booking%20Plugin%20for%20Appointments%20and%20Events&amp;severity=medium&amp;id=69901aebc9e1ff5ad8689304</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0727-cwe-862-missing-authorization-in-ess-2f6c0588</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0727%3A%20CWE-862%20Missing%20Authorization%20in%20essentialplugin%20Accordion%20and%20Accordion%20Slider&amp;severity=medium&amp;id=69901aebc9e1ff5ad868931d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0751-cwe-79-improper-neutralization-of-in-c61be848</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0751%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brandonfire%20Payment%20Page%20%7C%20Payment%20Form%20for%20Stripe&amp;severity=medium&amp;id=69901aecc9e1ff5ad868937c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6792-cwe-306-missing-authentication-for-c-1e53c2e4</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6792%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20amentotechpvtltd%20One%20to%20one%20user%20Chat%20by%20WPGuppy&amp;severity=medium&amp;id=69901aebc9e1ff5ad868930c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1796-cwe-79-improper-neutralization-of-in-c8d86ecc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1796%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20indextwo%20StyleBidet&amp;severity=medium&amp;id=69901aedc9e1ff5ad86893bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1932-cwe-862-missing-authorization-in-bss-73d0e9c7</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1932%3A%20CWE-862%20Missing%20Authorization%20in%20bssoftware%20Appointment%20Booking%20Calendar%20Plugin%20%E2%80%93%20Bookr&amp;severity=medium&amp;id=699010d0c9e1ff5ad864b5b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2469-improper-neutralization-of-special-e-90b4e04e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2469%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20directorytree%2Fimapengine&amp;severity=high&amp;id=69901846c9e1ff5ad867f1ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0692-cwe-862-missing-authorization-in-blu-69b2b913</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0692%3A%20CWE-862%20Missing%20Authorization%20in%20bluesnap%20BlueSnap%20Payment%20Gateway%20for%20WooCommerce&amp;severity=high&amp;id=698ffec8c9e1ff5ad85c71ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1912-cwe-79-improper-neutralization-of-in-35e454d9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1912%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ulaulaman%20Citations%20tools&amp;severity=medium&amp;id=698ffec8c9e1ff5ad85c7202</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1983-cwe-352-cross-site-request-forgery-c-ced2e775</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1983%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sourcez%20SEATT%3A%20Simple%20Event%20Attendance&amp;severity=medium&amp;id=698ffec8c9e1ff5ad85c7206</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1164-cwe-79-improper-neutralization-of-in-d439c77f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1164%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20phoenixstudiodz%20Easy%20Voice%20Mail&amp;severity=medium&amp;id=698ffec8c9e1ff5ad85c71f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1904-cwe-79-improper-neutralization-of-in-f585d933</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1904%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nayon46%20Simple%20Wp%20colorfull%20Accordion&amp;severity=medium&amp;id=698ffec8c9e1ff5ad85c71fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1754-cwe-79-improper-neutralization-of-in-d238dc53</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1754%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20alexeyknyazev%20personal-authors-category&amp;severity=medium&amp;id=698ffec8c9e1ff5ad85c71f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2144-cwe-269-improper-privilege-managemen-86e5e526</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2144%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20katsushi-kawamori%20Magic%20Login%20Mail%20or%20QR%20Code&amp;severity=high&amp;id=698ffec8c9e1ff5ad85c7211</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2027-cwe-79-improper-neutralization-of-in-ab34f6ef</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2027%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ampenhancer%20AMP%20Enhancer%20%E2%80%93%20Compatibility%20Layer%20for%20Official%20AMP%20Plugin&amp;severity=medium&amp;id=698ffec8c9e1ff5ad85c720b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishing-on-the-edge-of-the-web-and-mobile-using-q-9c0e2dc5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishing%20on%20the%20Edge%20of%20the%20Web%20and%20Mobile%20Using%20QR%20Codes&amp;severity=medium&amp;id=6992f627bda29fb02f678619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14608-cwe-862-missing-authorization-in-in-75b65e8b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14608%3A%20CWE-862%20Missing%20Authorization%20in%20infosatech%20WP%20Last%20Modified%20Info&amp;severity=medium&amp;id=69901846c9e1ff5ad867f1e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14067-cwe-862-missing-authorization-in-ha-9b0973c6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14067%3A%20CWE-862%20Missing%20Authorization%20in%20hassantafreshi%20Easy%20Form%20Builder%20by%20WhiteStudio%20%E2%80%94%20Drag%20%26%20Drop%20Form%20Builder&amp;severity=medium&amp;id=69901846c9e1ff5ad867f1d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13973-cwe-200-exposure-of-sensitive-infor-87f72582</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13973%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20kasuga16%20StickEasy%20Protected%20Contact%20Form&amp;severity=medium&amp;id=69901846c9e1ff5ad867f1cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13681-cwe-22-improper-limitation-of-a-pat-bc28d7b5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13681%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20thebaldfatguy%20BFG%20Tools%20%E2%80%93%20Extension%20Zipper&amp;severity=medium&amp;id=69901846c9e1ff5ad867f1be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-14-c654b42a</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-14&amp;severity=medium&amp;id=699110cac9e1ff5ad8c8365f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-14-389c6444</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-14&amp;severity=low&amp;id=698ff083c9e1ff5ad817a9b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26273-cwe-200-exposure-of-sensitive-infor-d59f1dbb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26273%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20idno%20known&amp;severity=critical&amp;id=698f9fdcc9e1ff5ad86c396f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1841-cwe-79-improper-neutralization-of-in-da2dead1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1841%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pixelyoursite%20PixelYourSite%20%E2%80%93%20Your%20smart%20PIXEL%20(TAG)%20%26%20API%20Manager&amp;severity=high&amp;id=698f9c59c9e1ff5ad86a8ed3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1844-cwe-79-improper-neutralization-of-in-13a5fcdf</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1844%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pixelyoursite%20PixelYourSite%20Pro%20%E2%80%93%20Your%20smart%20PIXEL%20(TAG)%20Manager&amp;severity=high&amp;id=698f9c59c9e1ff5ad86a8edb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15157-cwe-862-missing-authorization-in-st-7fd1e561</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15157%3A%20CWE-862%20Missing%20Authorization%20in%20starfishwp%20Starfish%20Review%20Generation%20%26%20Marketing%20for%20WordPress&amp;severity=high&amp;id=698f9c59c9e1ff5ad86a8ebf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26334-cwe-798-use-of-hard-coded-credentia-74ab6645</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26334%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Calero%20VeraSMART&amp;severity=high&amp;id=698f9c59c9e1ff5ad86a8ee3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26333-cwe-306-missing-authentication-for--bbf1e7d2</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26333%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Calero%20VeraSMART&amp;severity=critical&amp;id=698f9c59c9e1ff5ad86a8edf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26335-cwe-321-use-of-hard-coded-cryptogra-07023d75</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26335%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Calero%20VeraSMART&amp;severity=critical&amp;id=698f9c59c9e1ff5ad86a8ee7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26208-cwe-502-deserialization-of-untruste-4dc06e3a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26208%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Alex4SSB%20ADB-Explorer&amp;severity=high&amp;id=698f793ac9e1ff5ad85a8a62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26190-cwe-306-missing-authentication-for--6b5551d3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26190%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20milvus-io%20milvus&amp;severity=critical&amp;id=698f793ac9e1ff5ad85a8a5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26187-cwe-22-improper-limitation-of-a-pat-b61d1b8c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26187%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20treeverse%20lakeFS&amp;severity=high&amp;id=698f723cc9e1ff5ad857abde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25991-cwe-918-server-side-request-forgery-fb24aa80</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25991%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20TandoorRecipes%20recipes&amp;severity=high&amp;id=698f723cc9e1ff5ad857abd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2441-use-after-free-in-google-chrome-1b1b8c59</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2441%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=698f723cc9e1ff5ad857abe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25964-cwe-22-improper-limitation-of-a-pat-9ddfb3f3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25964%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20TandoorRecipes%20recipes&amp;severity=medium&amp;id=698f723cc9e1ff5ad857abd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-ties-suspected-russian-actor-to-canfail-mal-4b808088</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Ties%20Suspected%20Russian%20Actor%20to%20CANFAIL%20Malware%20Attacks%20on%20Ukrainian%20Orgs&amp;severity=medium&amp;id=698f605fc9e1ff5ad84f914a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1790-execution-with-unnecessary-privilege-abe9bcfc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1790%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Genetec%20Inc.%20Genetec%20Sipelia&amp;severity=medium&amp;id=698f5d11c9e1ff5ad84e392b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26226-cwe-79-improper-neutralization-of-i-47603533</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26226%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20lukilabs%20beautiful-mermaid&amp;severity=medium&amp;id=698f5609c9e1ff5ad84b62ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-links-china-iran-russia-north-korea-to-coor-be696efd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Links%20China%2C%20Iran%2C%20Russia%2C%20North%20Korea%20to%20Coordinated%20Defense%20Sector%20Cyber%20Operations&amp;severity=medium&amp;id=699067a1c9e1ff5ad8890c6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2026-cwe-276-incorrect-default-permission-871e516d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2026%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20Tenable%20Agent&amp;severity=medium&amp;id=698f5286c9e1ff5ad84a5d3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uat-9921-deploys-voidlink-malware-to-target-techno-ff44eb2e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UAT-9921%20Deploys%20VoidLink%20Malware%20to%20Target%20Technology%20and%20Financial%20Sectors&amp;severity=medium&amp;id=699067a1c9e1ff5ad8890c72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26221-cwe-502-deserialization-of-untruste-9949df79</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26221%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Hyland%20OnBase%20Workflow%20Timer%20Service&amp;severity=critical&amp;id=698f4474c9e1ff5ad8426b31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-google-looks-at-ai-abuse-trump-pause-beabdaf4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20Google%20Looks%20at%20AI%20Abuse%2C%20Trump%20Pauses%20China%20Bans%2C%20Disney%E2%80%99s%20%242.7M%20Fine&amp;severity=medium&amp;id=698f3d39c9e1ff5ad83e90c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1578-cwe-79-in-hp-inc-hp-app-fbc79362</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1578%3A%20CWE-79%20in%20HP%20Inc%20HP%20App&amp;severity=medium&amp;id=698f40f0c9e1ff5ad8409b5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1619-cwe-639-authorization-bypass-through-f50fd75b</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1619%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Universal%20Software%20Inc.%20FlexCity%2FKiosk&amp;severity=high&amp;id=698f2856c9e1ff5ad831b997</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1618-cwe-288-authentication-bypass-using--4e2f8f4b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1618%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Universal%20Software%20Inc.%20FlexCity%2FKiosk&amp;severity=high&amp;id=698f2856c9e1ff5ad831b994</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14349-cwe-267-privilege-defined-with-unsa-4d64021b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14349%3A%20CWE-267%20Privilege%20Defined%20With%20Unsafe%20Actions%20in%20Universal%20Software%20Inc.%20FlexCity%2FKiosk&amp;severity=high&amp;id=698f2856c9e1ff5ad831b991</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dutch-carrier-odido-discloses-data-breach-impactin-e3d3a0d1</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dutch%20Carrier%20Odido%20Discloses%20Data%20Breach%20Impacting%206%20Million&amp;severity=medium&amp;id=698f1309c9e1ff5ad826ee2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2443-out-of-bounds-read-in-red-hat-red-ha-7926b12b</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2443%3A%20Out-of-bounds%20Read%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=698f214cc9e1ff5ad82dd77b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33042-cwe-94-improper-control-of-generati-afe678c2</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33042%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Avro%20Java%20SDK&amp;severity=high&amp;id=698f16c1c9e1ff5ad828f5e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-chrome-extensions-caught-stealing-busine-8d267a5e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Chrome%20Extensions%20Caught%20Stealing%20Business%20Data%2C%20Emails%2C%20and%20Browsing%20History&amp;severity=medium&amp;id=699067a1c9e1ff5ad8890c75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beyondtrust-vulnerability-targeted-by-hackers-with-450e3726</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BeyondTrust%20Vulnerability%20Targeted%20by%20Hackers%20Within%2024%20Hours%20of%20PoC%20Release&amp;severity=critical&amp;id=698f04f9c9e1ff5ad81fd15b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/npms-update-to-harden-their-supply-chain-and-point-a4628ed5</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=npm%E2%80%99s%20Update%20to%20Harden%20Their%20Supply%20Chain%2C%20and%20Points%20to%20Consider&amp;severity=medium&amp;id=699067a1c9e1ff5ad8890c78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-warns-of-exploited-solarwinds-notepad-microso-e99c0319</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Warns%20of%20Exploited%20SolarWinds%2C%20Notepad%2B%2B%2C%20Microsoft%20Vulnerabilities&amp;severity=medium&amp;id=698f0175c9e1ff5ad81defee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/attackers-weaponize-rmm-tools-via-zoom-meet-teams--bedec14e</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Attackers%20Weaponize%20RMM%20Tools%20via%20Zoom%2C%20Meet%2C%20%26%20Teams%20Lures&amp;severity=medium&amp;id=698f1dccc9e1ff5ad82c8dfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0872-cwe-295-improper-certificate-validat-05369c91</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0872%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Thales%20SafeNet%20Agent%20for%20Windows%20Logon&amp;severity=low&amp;id=698f214cc9e1ff5ad82dd777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-observe-in-the-wild-exploitation-of-be-7ab8e8f7</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Observe%20In-the-Wild%20Exploitation%20of%20BeyondTrust%20CVSS%209.9%20Vulnerability&amp;severity=critical&amp;id=699067a1c9e1ff5ad8890c7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-145-patches-11-vulnerabilities-910eb94d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%20145%20Patches%2011%20Vulnerabilities&amp;severity=high&amp;id=698ee1d1c9e1ff5ad80c75e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-revives-tianfu-cup-hacking-contest-under-inc-4cdc4a0b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China%20Revives%20Tianfu%20Cup%20Hacking%20Contest%20Under%20Increased%20Secrecy&amp;severity=medium&amp;id=698eccb9c9e1ff5ad8fd6962</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15520-cwe-200-information-exposure-in-reg-6e404135</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15520%3A%20CWE-200%20Information%20Exposure%20in%20RegistrationMagic&amp;severity=medium&amp;id=698ec262c9e1ff5ad8f5317e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48023-cwe-617-reachable-assertion-in-yoko-bac58b67</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48023%3A%20CWE-617%20Reachable%20Assertion%20in%20Yokogawa%20Electric%20Corporation%20Vnet%2FIP%20Interface%20Package&amp;severity=medium&amp;id=698eb7d6c9e1ff5ad8edd0c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48022-cwe-130-in-yokogawa-electric-corpor-44c6e289</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48022%3A%20CWE-130%20in%20Yokogawa%20Electric%20Corporation%20Vnet%2FIP%20Interface%20Package&amp;severity=medium&amp;id=698eb7d6c9e1ff5ad8edd0c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48021-cwe-191-integer-underflow-wrap-or-w-f12d0e3a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48021%3A%20CWE-191%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Yokogawa%20Electric%20Corporation%20Vnet%2FIP%20Interface%20Package&amp;severity=medium&amp;id=698eb7d6c9e1ff5ad8edd0be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48020-cwe-617-reachable-assertion-in-yoko-6e599e6d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48020%3A%20CWE-617%20Reachable%20Assertion%20in%20Yokogawa%20Electric%20Corporation%20Vnet%2FIP%20Interface%20Package&amp;severity=medium&amp;id=698eb0ccc9e1ff5ad8e97a55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48019-cwe-617-reachable-assertion-in-yoko-0e0071b2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48019%3A%20CWE-617%20Reachable%20Assertion%20in%20Yokogawa%20Electric%20Corporation%20Vnet%2FIP%20Interface%20Package&amp;severity=medium&amp;id=698eb0ccc9e1ff5ad8e97a52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1924-cwe-191-integer-underflow-wrap-or-wr-fdbea02f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1924%3A%20CWE-191%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Yokogawa%20Electric%20Corporation%20Vnet%2FIP%20Interface%20Package&amp;severity=medium&amp;id=698eb0ccc9e1ff5ad8e97a4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25108-improper-neutralization-of-special--8909b9f5</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25108%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Soliton%20Systems%20K.K.%20FileZen&amp;severity=high&amp;id=698ea641c9e1ff5ad8e3f0c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1721-feae9b4f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1721&amp;severity=medium&amp;id=698e8a20c9e1ff5ad87f7e82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9293-cwe-295-improper-certificate-validat-d1d8ef32</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9293%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20TP-Link%20Systems%20Inc.%20Tapo%20App&amp;severity=high&amp;id=698e788cc9e1ff5ad8549279</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9292-cwe-942-permissive-cross-domain-secu-dbb25b94</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9292%3A%20CWE-942%20Permissive%20Cross-domain%20Security%20Policy%20with%20Untrusted%20Domains%20in%20TP-Link%20Systems%20Inc.%20Omada%20Cloud%20Controller&amp;severity=low&amp;id=698e788cc9e1ff5ad8549276</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-13-672978b4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-13&amp;severity=medium&amp;id=698fbf4ac9e1ff5ad878e2d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70957-na-7bf46715</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70957%3A%20n%2Fa&amp;severity=high&amp;id=698f9fdcc9e1ff5ad86c396a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69633-na-14384712</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69633%3A%20n%2Fa&amp;severity=critical&amp;id=698f9fdcc9e1ff5ad86c3966</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70955-na-2052c071</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70955%3A%20n%2Fa&amp;severity=high&amp;id=698f9c59c9e1ff5ad86a8ecd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70954-na-50a83a06</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70954%3A%20n%2Fa&amp;severity=high&amp;id=698f9c59c9e1ff5ad86a8ec7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70866-na-5a7b6f22</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70866%3A%20n%2Fa&amp;severity=high&amp;id=698f9c59c9e1ff5ad86a8ec3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70093-na-f5f88d30</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70093%3A%20n%2Fa&amp;severity=high&amp;id=698f98d5c9e1ff5ad868bfbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70956-na-f3a79383</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70956%3A%20n%2Fa&amp;severity=high&amp;id=698f98d5c9e1ff5ad868bfb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69770-na-4c2996be</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69770%3A%20n%2Fa&amp;severity=critical&amp;id=698f6419c9e1ff5ad8512193</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66676-na-9476df4d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66676%3A%20n%2Fa&amp;severity=medium&amp;id=698f60acc9e1ff5ad84fbaef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70095-na-a36d5605</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70095%3A%20n%2Fa&amp;severity=medium&amp;id=698f5609c9e1ff5ad84b62ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70091-na-1767a000</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70091%3A%20n%2Fa&amp;severity=medium&amp;id=698f5609c9e1ff5ad84b62b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70123-na-82db7ba4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70123%3A%20n%2Fa&amp;severity=high&amp;id=698f5286c9e1ff5ad84a5d38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70122-na-2037c377</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70122%3A%20n%2Fa&amp;severity=high&amp;id=698f5286c9e1ff5ad84a5d35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70121-na-deced414</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70121%3A%20n%2Fa&amp;severity=high&amp;id=698f5286c9e1ff5ad84a5d32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70094-na-132ab04f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70094%3A%20n%2Fa&amp;severity=medium&amp;id=698f4474c9e1ff5ad8426b2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-13-fc9bcc6c</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-13&amp;severity=low&amp;id=698ed3bfc9e1ff5ad804300a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21961-cwe-119-improper-restriction-of-ope-a0bfc363</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21961%3A%20CWE-119%20%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20AMD%20AMD%20EPYC%E2%84%A2%207002%20Series%20Processors&amp;severity=medium&amp;id=698e6a7bc9e1ff5ad82ff4e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40905-cwe-338-use-of-cryptographically-we-1325ff2a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40905%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20DBOOK%20WWW%3A%3AOAuth&amp;severity=high&amp;id=698e66f8c9e1ff5ad82e611b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26188-cwe-79-improper-neutralization-of-i-73929d2c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26188%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20solspace%20craft-freeform&amp;severity=medium&amp;id=698ec65ac9e1ff5ad8f7fbe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26068-cwe-77-improper-neutralization-of-s-58777eec</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26068%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20jm33-m0%20emp3r0r&amp;severity=critical&amp;id=698ec65ac9e1ff5ad8f7fbf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26224-cwe-367-time-of-check-time-of-use-t-b30068a7</loc>
    <lastmod>2026-04-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26224%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Intego%20Log%20Reporter&amp;severity=high&amp;id=698ec65ac9e1ff5ad8f7fc02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26225-cwe-59-improper-link-resolution-bef-505203a9</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26225%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Intego%20Personal%20Backup&amp;severity=high&amp;id=698ec65ac9e1ff5ad8f7fc14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26076-cwe-770-allocation-of-resources-wit-ed01ebe8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26076%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20pendulum-project%20ntpd-rs&amp;severity=medium&amp;id=698e4e5cc9e1ff5ad8206a37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26075-cwe-352-cross-site-request-forgery--6c6a6891</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26075%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20labring%20FastGPT&amp;severity=medium&amp;id=698e4e5cc9e1ff5ad8206a33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14282-incorrect-privilege-assignment-in-h-693927bb</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14282%3A%20Incorrect%20Privilege%20Assignment%20in%20https%3A%2F%2Fgithub.com%2Fmkj%2Fdropbear%2F%20dropbear&amp;severity=medium&amp;id=69962af36aea4a407ae847f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26069-cwe-200-exposure-of-sensitive-infor-4d72e5e9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26069%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20thecfu%20scraparr&amp;severity=critical&amp;id=698e4ad9c9e1ff5ad81db30f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1358-cwe-434-in-airleader-gmbh-airleader--2b35e562</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1358%3A%20CWE-434%20in%20Airleader%20GmbH%20Airleader%20Master&amp;severity=critical&amp;id=698e4ad9c9e1ff5ad81db306</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26056-cwe-94-improper-control-of-generati-da134cd8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26056%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20yokecd%20yoke&amp;severity=high&amp;id=698e4ad9c9e1ff5ad81db314</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26055-cwe-306-missing-authentication-for--d8f9a9d3</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26055%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20yokecd%20yoke&amp;severity=high&amp;id=698e4e5cc9e1ff5ad8206a3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26020-cwe-285-improper-authorization-in-s-31ca744c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26020%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Significant-Gravitas%20AutoGPT&amp;severity=critical&amp;id=698e404cc9e1ff5ad81500e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26011-cwe-787-out-of-bounds-write-in-ros--a5e729c2</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26011%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20ros-navigation%20navigation2&amp;severity=critical&amp;id=698e404cc9e1ff5ad81500de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26005-cwe-918-server-side-request-forgery-c84eb98a</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26005%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20MacWarrior%20clipbucket-v5&amp;severity=medium&amp;id=698e3cc8c9e1ff5ad81239fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26000-cwe-1021-improper-restriction-of-re-a50b6a03</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26000%3A%20CWE-1021%3A%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=698e3cc8c9e1ff5ad81239f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0619-cwe-190-integer-overflow-or-wraparou-ada214b8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0619%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20silabs.com%20Silicon%20Labs%20Matter&amp;severity=medium&amp;id=698e3944c9e1ff5ad80febe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25933-cwe-78-improper-neutralization-of-s-9b77262f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25933%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20arduino%20arduino-app-lab&amp;severity=medium&amp;id=698e35c0c9e1ff5ad80da744</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25768-cwe-862-missing-authorization-in-cl-4dd72b51</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25768%3A%20CWE-862%3A%20Missing%20Authorization%20in%20cloudamqp%20lavinmq&amp;severity=high&amp;id=698e323cc9e1ff5ad80b581e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25767-cwe-863-incorrect-authorization-in--8f387b94</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25767%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20cloudamqp%20lavinmq&amp;severity=high&amp;id=698e323cc9e1ff5ad80b5817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25922-cwe-287-improper-authentication-in--b40b4560</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25922%3A%20CWE-287%3A%20Improper%20Authentication%20in%20goauthentik%20authentik&amp;severity=high&amp;id=698e2eb9c9e1ff5ad808ac35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25748-cwe-287-improper-authentication-in--711f143d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25748%3A%20CWE-287%3A%20Improper%20Authentication%20in%20goauthentik%20authentik&amp;severity=high&amp;id=698e2eb9c9e1ff5ad808ac30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25227-cwe-94-improper-control-of-generati-cc39f642</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25227%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20goauthentik%20authentik&amp;severity=critical&amp;id=698e2eb9c9e1ff5ad808ac29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24895-cwe-180-incorrect-behavior-order-va-e6909ced</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24895%3A%20CWE-180%3A%20Incorrect%20Behavior%20Order%3A%20Validate%20Before%20Canonicalize%20in%20php%20frankenphp&amp;severity=high&amp;id=698e2b39c9e1ff5ad806e180</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24894-cwe-269-improper-privilege-manageme-ae84e94f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24894%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20php%20frankenphp&amp;severity=high&amp;id=698e2b39c9e1ff5ad806e17b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24044-cwe-336-same-seed-in-pseudo-random--1eb14671</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24044%3A%20CWE-336%3A%20Same%20Seed%20in%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20element-hq%20ess-helm&amp;severity=critical&amp;id=698e2b39c9e1ff5ad806e176</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22821-cwe-89-improper-neutralization-of-s-db2cc7da</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22821%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20pluginsGLPI%20mreporting&amp;severity=medium&amp;id=698e242ec9e1ff5ad802d084</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26219-cwe-327-use-of-a-broken-or-risky-cr-46123275</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26219%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20newbee-ltd%20newbee-mall&amp;severity=critical&amp;id=698e242ec9e1ff5ad802d08c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26218-cwe-798-use-of-hard-coded-credentia-92b3e8bd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26218%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20newbee-ltd%20newbee-mall&amp;severity=critical&amp;id=698e242ec9e1ff5ad802d088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21438-cwe-401-missing-release-of-memory-a-d1018b14</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21438%3A%20CWE-401%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20quic-go%20webtransport-go&amp;severity=medium&amp;id=698e1d24c9e1ff5ad8febca6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21435-cwe-400-uncontrolled-resource-consu-839c7a05</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21435%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20quic-go%20webtransport-go&amp;severity=medium&amp;id=698e1d24c9e1ff5ad8febca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21434-cwe-770-allocation-of-resources-wit-bab64128</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21434%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20quic-go%20webtransport-go&amp;severity=medium&amp;id=698e1d24c9e1ff5ad8febc9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-reports-state-backed-hackers-using-gemini-a-87649c99</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Reports%20State-Backed%20Hackers%20Using%20Gemini%20AI%20for%20Recon%20and%20Attack%20Support&amp;severity=medium&amp;id=698e15e7c9e1ff5ad8fa95d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54519-cwe-427-uncontrolled-search-path-el-82dd3c9b</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54519%3A%20CWE-427%20%20Uncontrolled%20Search%20Path%20Element%20in%20AMD%20Vivado%E2%84%A2%20Documentation%20Navigator%20Installation%20(Windows)&amp;severity=high&amp;id=698e19a6c9e1ff5ad8fc8114</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36319-cwe-1191-on-chip-debug-and-test-int-3f5c29d9</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36319%3A%20CWE-1191%20%20On-Chip%20Debug%20and%20Test%20Interface%20With%20Improper%20Access%20Control%20in%20AMD%20AMD%20Ryzen%E2%84%A2%207040%20Series%20Mobile%20Processors%20with%20Radeon%E2%84%A2%20Graphics%3B%0D%0AAMD%20Ryzen%E2%84%A2%208040%20Series%20Mobile%20Processors%20with%20Radeon%E2%84%A2%20Graphics&amp;severity=medium&amp;id=698e1298c9e1ff5ad8f85870</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52533-cwe-1191-on-chip-debug-and-test-int-189588d5</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52533%3A%20CWE-1191%20%20On-Chip%20Debug%20and%20Test%20Interface%20With%20Improper%20Access%20Control%20in%20AMD%20AMD%20EPYC%E2%84%A2%207003%20Series%20Processors&amp;severity=high&amp;id=698e0b91c9e1ff5ad8f3a8ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lazarus-campaign-plants-malicious-packages-in-npm--94a891a6</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lazarus%20Campaign%20Plants%20Malicious%20Packages%20in%20npm%20and%20PyPI%20Ecosystems&amp;severity=medium&amp;id=698ed2ddc9e1ff5ad8037a5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54756-cwe-1392-in-brightsign-brightsign-o-789cc207</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54756%3A%20CWE-1392%20in%20BrightSign%20BrightSign%20OS%20series%204%20players&amp;severity=high&amp;id=698e080ec9e1ff5ad8f198c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55210-cwe-270-privilege-context-switching-ded8b804</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55210%3A%20CWE-270%3A%20Privilege%20Context%20Switching%20Error%20in%20FreePBX%20api&amp;severity=low&amp;id=698e0109c9e1ff5ad8eda2a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-eliminate-the-technical-debt-of-insecure-ai-9fa385dc</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%20Eliminate%20the%20Technical%20Debt%20of%20Insecure%20AI-Assisted%20Software%20Development&amp;severity=medium&amp;id=698dfd4dc9e1ff5ad8ebf73e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26217-cwe-22-improper-limitation-of-a-pat-0f89b04d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26217%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20unclecode%20Crawl4AI&amp;severity=critical&amp;id=698df67cc9e1ff5ad8e8871a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26216-cwe-94-improper-control-of-generati-09f71e54</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26216%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20unclecode%20Crawl4AI&amp;severity=critical&amp;id=698df67cc9e1ff5ad8e88716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/i-bought-i-saw-i-attended-a-quick-guide-to-staying-415d6e4d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=I%20bought%2C%20I%20saw%2C%20I%20attended%3A%20a%20quick%20guide%20to%20staying%20scam-free%20at%20the%20Olympics%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=698df332c9e1ff5ad8e63992</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lockbit-strikes-with-new-50-version-targeting-wind-9390e947</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LockBit%20strikes%20with%20new%205.0%20version%2C%20targeting%20Windows%2C%20Linux%20and%20ESXI%20systems&amp;severity=medium&amp;id=698e4e5cc9e1ff5ad82069be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26214-cwe-297-improper-validation-of-cert-d70804ef</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26214%3A%20CWE-297%20Improper%20Validation%20of%20Certificate%20with%20Host%20Mismatch%20in%20Xiaomi%20Technology%20Co.%2C%20Ltd.%20Galaxy%20FDS%20Android%20SDK&amp;severity=critical&amp;id=698df2f6c9e1ff5ad8e60c1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1104-cwe-862-missing-authorization-in-nin-28323d66</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1104%3A%20CWE-862%20Missing%20Authorization%20in%20ninjateam%20FastDup%20%E2%80%93%20Fastest%20WordPress%20Migration%20%26%20Duplicator&amp;severity=high&amp;id=698de86ac9e1ff5ad8e08f98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14014-cwe-434-unrestricted-upload-of-file-0c2cae09</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14014%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20NTN%20Information%20Processing%20Services%20Computer%20Software%20Hardware%20Industry%20and%20Trade%20Ltd.%20Co.%20Smart%20Panel&amp;severity=critical&amp;id=698de160c9e1ff5ad8dd2345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1320-cwe-79-improper-neutralization-of-in-70548f61</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1320%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ays-pro%20Secure%20Copy%20Content%20Protection%20and%20Content%20Locking&amp;severity=high&amp;id=698de160c9e1ff5ad8dd2348</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13004-cwe-639-authorization-bypass-throug-c7870814</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13004%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Farktor%20Software%20E-Commerce%20Services%20Inc.%20E-Commerce%20Package&amp;severity=medium&amp;id=698dd351c9e1ff5ad8d5dee9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2007-heap-based-buffer-overflow-in-postgr-364c6713</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2007%3A%20Heap-based%20Buffer%20Overflow%20in%20PostgreSQL&amp;severity=high&amp;id=698dd351c9e1ff5ad8d5def8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2006-improper-validation-of-array-index-i-3ae45a05</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2006%3A%20Improper%20Validation%20of%20Array%20Index%20in%20PostgreSQL&amp;severity=high&amp;id=698dd351c9e1ff5ad8d5def5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2005-heap-based-buffer-overflow-in-postgr-f6887628</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2005%3A%20Heap-based%20Buffer%20Overflow%20in%20PostgreSQL&amp;severity=high&amp;id=698dd351c9e1ff5ad8d5def2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2004-improper-validation-of-specified-typ-7cc20198</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2004%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20PostgreSQL&amp;severity=high&amp;id=698dd351c9e1ff5ad8d5deef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2003-improper-validation-of-specified-typ-fa5f154d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2003%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20PostgreSQL&amp;severity=medium&amp;id=698dd351c9e1ff5ad8d5deec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13002-cwe-79-improper-neutralization-of-i-98ae0343</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13002%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Farktor%20Software%20E-Commerce%20Services%20Inc.%20E-Commerce%20Package&amp;severity=high&amp;id=698dd351c9e1ff5ad8d5dee6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10969-cwe-89-improper-neutralization-of-s-5a43f9f8</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10969%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Farktor%20Software%20E-Commerce%20Services%20Inc.%20E-Commerce%20Package&amp;severity=critical&amp;id=698dd351c9e1ff5ad8d5dee3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1316-cwe-79-improper-neutralization-of-in-d9728873</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1316%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ivole%20Customer%20Reviews%20for%20WooCommerce&amp;severity=high&amp;id=698ec65ac9e1ff5ad8f7fc23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1671-cwe-862-missing-authorization-in-swi-985d22a4</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1671%3A%20CWE-862%20Missing%20Authorization%20in%20switcorp%20Activity%20Log%20for%20WordPress&amp;severity=medium&amp;id=698de86ac9e1ff5ad8e08f9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apollomd-data-breach-impacts-626000-individuals-828dc9bd</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ApolloMD%20Data%20Breach%20Impacts%20626%2C000%20Individuals&amp;severity=medium&amp;id=698dc891c9e1ff5ad8cfc96e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-ai-prompt-rce-claude-0-click-r-6b5df16d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20AI%20Prompt%20RCE%2C%20Claude%200-Click%2C%20RenEngine%20Loader%2C%20Auto%200-Days%20%26%2025%2B%20Stories&amp;severity=low&amp;id=698ed2ddc9e1ff5ad8037a5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-to-enable-windows-baseline-security-with-ead898ba</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20to%20Enable%20%E2%80%98Windows%20Baseline%20Security%E2%80%99%20With%20New%20Runtime%20Integrity%20Safeguards&amp;severity=medium&amp;id=698dba81c9e1ff5ad8c59be6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacktivists-state-actors-cybercriminals-target-glo-7203090f</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacktivists%2C%20State%20Actors%2C%20Cybercriminals%20Target%20Global%20Defense%20Industry%2C%20Google%20Warns&amp;severity=medium&amp;id=698db6fdc9e1ff5ad8c36760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15574-cwe-330-use-of-insufficiently-rando-a169357c</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15574%3A%20CWE-330%20Use%20of%20Insufficiently%20Random%20Values%20in%20SolaX%20Power%20Pocket%20WiFi%203.0&amp;severity=medium&amp;id=698db73dc9e1ff5ad8c38f9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15575-cwe-494-download-of-code-without-in-51eadc64</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15575%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20SolaX%20Power%20Pocket%20WiFi%203.0&amp;severity=medium&amp;id=698db73dc9e1ff5ad8c38fa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15573-cwe-295-improper-certificate-valida-cc47b78d</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15573%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20SolaX%20Power%20Pocket%20WiFi%203.0&amp;severity=critical&amp;id=698db3acc9e1ff5ad8c09726</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/screenconnect-attack-smartscreen-bypass-and-rmm-ab-e1ad15db</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ScreenConnect%20Attack%3A%20SmartScreen%20Bypass%20and%20RMM%20Abuse&amp;severity=medium&amp;id=698e4e5cc9e1ff5ad82069ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/employee-monitoring-and-simplehelp-software-abused-52f33a69</loc>
    <lastmod>2026-04-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Employee%20Monitoring%20and%20SimpleHelp%20Software%20Abused%20in%20Ransomware%20Operations&amp;severity=medium&amp;id=698e4ad8c9e1ff5ad81db232</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-ctem-divide-why-84-of-security-programs-are-fa-5f888951</loc>
    <lastmod>2026-04-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20CTEM%20Divide%3A%20Why%2084%25%20of%20Security%20Programs%20Are%20Falling%20Behind&amp;severity=medium&amp;id=698ed2ddc9e1ff5ad8037a62</image:loc>
    </image:image>
  </url>
</urlset>